169+ GOOGLE DORKS
Advanced Google Dorking for OSINT Research
Professional-grade intelligence gathering toolkit. Discover exposed files, security vulnerabilities, and hidden information using advanced Google search operators.
100% Client-Side
No Registration
Security Focused
Dorks
Categories
Modes
Free
SELECT OPERATION MODE
Choose Your Intelligence Gathering Approach
CYBER_INTEL
Domain-focused security research
FILE_HUNTER
Global file and media search
TARGET DOMAIN
Domain to restrict your security research to
KEYWORD FILTER
13 categories available
Files & Documents
7 dorks
Find exposed files and documents
Server & Config
7 dorks
Server configurations and system files
Bug Bounty & Vulnerabilities
8 dorks
Vulnerability research and bug bounty targets
Cloud & DevOps
7 dorks
Cloud infrastructure and DevOps tools
Databases & Backups
6 dorks
Database files and backup systems
Credentials & Secrets
6 dorks
Exposed credentials and secrets
Source Code & Leaks
4 dorks
Source code repositories and leaks
Debug & Dev Environments
4 dorks
Development and debug environments
Network & Infrastructure
4 dorks
Network devices and infrastructure
People & Identity OSINT
4 dorks
People and identity research
OSINT & Recon
5 dorks
Reconnaissance and intelligence gathering
Advanced Operators
5 dorks
Advanced Google search operators
Breach & Incident Intelligence
3 dorks
Data breach and incident research
FEATURES
Professional OSINT Toolkit
Everything you need for advanced intelligence gathering and security research
Dual-Mode Operation
Switch between Security mode for targeted reconnaissance and Media mode for content discovery.
169+ Pre-Built Dorks
Comprehensive collection of Google dorks across 21 categories for security research and OSINT.
Privacy First
All processing happens client-side. No data collection, no tracking, no backend servers.
Instant Results
Lightning-fast query generation with real-time preview and one-click Google search.
EXIF Extractor
Extract metadata from images including GPS coordinates, camera info, and timestamps.
Emoji Steganography
Hide and reveal secret messages using Zero Width Characters in emoji sequences.
Domain Targeting
Focus your security research on specific domains with intelligent query construction.
Fully Responsive
Works flawlessly on desktop, tablet, and mobile devices with optimized UX.