> Google Dorks Builder
ITFree online advanced Google search query generator. Build Google Dorks to check if your sensitive files (PDF, SQL, backup, config) have been indexed by mistake on search engines.
site:yourdomain.com filetype:pdf
Responsible Use
This tool is intended exclusively for checking the exposure of your own files and domains. Using it to access other people's data without authorization is illegal. Use this tool ethically and responsibly.
Build Your Google Dork Query
Generated Query
Fill in the fields to generate the query...
Quick Queries
> Google Search Operators Guide
Google advanced search operators allow you to refine queries to find exactly what you're looking for. Here are the main operators used in Google Hacking.
site: Operator
Limits search to a specific domain. Useful for finding all indexed files on a site.
site:example.com
filetype: Operator
Search only for files of a specific type like PDF, DOC, XLS, SQL, ENV, BAK and others.
filetype:pdf
inurl: Operator
Search for a specific word in the page URL. Ideal for finding admin pages or directories.
inurl:admin
intitle: Operator
Search in the HTML page title. Useful for finding directory listings or panels.
intitle:"index of"
intext: Operator
Search in page text content. Find documents containing specific keywords.
intext:"password"
"exact phrase" Search
Use quotes to search for an exact phrase. Essential for finding specific text.
"confidential file"
> Frequently Asked Questions about Google Dorks
filetype: operator allows you to search only for files of a specific type. For example:
filetype:pdf- search PDF documentsfiletype:sql- search SQL database filesfiletype:env- search environment configuration filesfiletype:xls- search Excel spreadsheetsfiletype:bak- search backup files
site: to search these files on a specific domain.
site:yourdomain.com filetype:pdf
Replace yourdomain.com with your domain and pdf with the file type you want to search. Add keywords like "confidential" or "password" to find potentially sensitive documents.
- Checking your own data exposure
- Security audit of your site
- Authorized penetration testing
- Bug bounty on authorized programs