Google dork operators are specialized search parameters that refine queries to uncover specific data types, structures, or site elements. They are applied by combining operators with keywords to target precise results.
Here’s a compiled list of the most widely used Google dork operators, explained with their function and application. These are the building blocks of Google Dorking queries.
🔑 Core Google Dork Operators
| Operator | Function | Example | Application |
|---|---|---|---|
| site: | Restricts results to a specific domain or TLD | site:.edu "login" |
Finds login pages only on .edu domains |
| inurl: | Searches for keywords in the URL | inurl:admin |
Locates admin panels or directories |
| intitle: | Searches for keywords in the page title | intitle:"index of" |
Reveals open directory listings |
| filetype: | Finds specific file formats | filetype:pdf "confidential" |
Retrieves PDF documents containing keywords |
| ext: | Alias for filetype: |
ext:xls "salary" |
Targets Excel spreadsheets |
| cache: | Shows Google’s cached version of a page | cache:example.com |
Views stored snapshots of sites |
| link: | Finds pages linking to a specific URL | link:example.com |
Identifies backlinks |
| related: | Finds sites similar to a given domain | related:nytimes.com |
Discovers related websites |
| allintitle: | Searches for multiple words in the title | allintitle:report finance |
Finds pages with both terms in the title |
| allinurl: | Searches for multiple words in the URL | allinurl:login admin |
Narrows down URLs containing both keywords |
| allintext: | Searches for multiple words in the body text | allintext:"password username" |
Finds text strings inside pages |
| define: | Provides definitions | define:phishing |
Retrieves dictionary-style definitions |
| info: | Displays information about a site | info:example.com |
Shows Google’s metadata about a domain |
📌 Advanced Applications
Directory Discovery:
intitle:"index of" mp3→ Lists open directories with MP3 files.Login Pages:
inurl:login site:.gov→ Finds login portals on government sites.Document Search:
filetype:xls "email"→ Extracts spreadsheets containing emails.Configuration Files:
filetype:cfgorfiletype:ini→ Locates exposed configuration files.Database Dumps:
filetype:sql "insert into"→ Reveals SQL database files.
📊 Notes on Usage
- Operators can be combined for precision. Example:
site:.org inurl:admin filetype:php→ Searches for PHP admin pages on.orgdomains. - Quotation marks
" "enforce exact matches. - Minus sign
-excludes terms. Example:login -facebookremoves Facebook results.