Skip to content

Instantly share code, notes, and snippets.

@jakewarren
Last active June 29, 2016 21:13
Show Gist options
  • Star 3 You must be signed in to star a gist
  • Fork 3 You must be signed in to fork a gist
  • Save jakewarren/817070277ff36694165d to your computer and use it in GitHub Desktop.
Save jakewarren/817070277ff36694165d to your computer and use it in GitHub Desktop.
#md5 hash of most used password 123456
#ref: https://twitter.com/TekDefense/status/294556153151647744
https://github.com/search?q=e10adc3949ba59abbe56e057f20f883e&type=Code&ref=searchresults
#DB_PASSWORD
#ref: http://seclists.org/fulldisclosure/2014/Mar/343
https://github.com/search?q=define%28%22DB_PASSWORD%22&type=Code&ref=searchresults
#Possible SQL injection
#ref: http://seclists.org/fulldisclosure/2013/Jun/15
https://github.com/search?p=3&q=extension%3Aphp+mysql_query+%24_GET&ref=searchresults&type=Code
#Possible PHP backdoor
#ref: http://blog.conviso.com.br/2013/06/github-hacking-for-fun-and-sensitive.html
stars:>1000 forks:>100 extension:php "eval(preg_replace("
https://github.com/search?q=stars%3A%3E1000+forks%3A%3E100+extension%3Aphp+%22eval%28preg_replace%28%22&type=Code&utf8=%E2%9C%93
#private keys
#ref: http://blog.conviso.com.br/2013/06/github-hacking-for-fun-and-sensitive.html
extension:pem private
https://github.com/search?p=100&q=extension%3Apem+private&ref=searchresults&type=Code&utf8=%E2%9C%93
#email addresses
#ref: http://blog.conviso.com.br/2013/06/github-hacking-for-fun-and-sensitive.html
extension:xls mail
#find PHP applications that don't verify SSL certificates
lang:php "CURLOPT_SSL_VERIFYPEER,FALSE"
#find hard coded wordpress passwords
https://github.com/search?utf8=%E2%9C%93&q=filename%3Awp-config.php+&type=Code&ref=searchresults
Copy link

ghost commented Apr 23, 2016

Nice
But, if you want to become a google dorks expert.
you must need to watch this video -
here is the link => https://www.youtube.com/watch?v=B9xJ54aGppc & https://www.youtube.com/watch?v=VSZyeYnZk3c

What You will learn from this video ?

*how google dorks works
*how to use google dorks for penetration testing
*how to use google dorks for security searching
*how much google dorks is powerful
*find vulnerable website using google dorks
*find someones information with google dorks
*how to use google dorks for information gathering
*database exploit with google dorks
*how to become a expert of google dorks searcher
*do mastering at google dorks

A thanks is more appreciate :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment