# Google Dork: "'username' =>" + "'password' =>" ext:log # Exposed passwords, and much more... # Date: 22/09/2020 # Exploit Author: Alexandros Pappas
不再关注网络安全
# Google Dork: "'username' =>" + "'password' =>" ext:log # Exposed passwords, and much more... # Date: 22/09/2020 # Exploit Author: Alexandros Pappas
# Google Dork: intitle:"database.php" inurl:"database.php" intext:"db_password" -git -gitlab # Exposed database usernames and passwords. # Date: 22/09/2020 # Exploit Author: Alexandros Pappas
# Google Dork: intitle:"Lists Web Service" # Exposed SharePoint (Lists Web Service). # Date: 15/09/2020 # Exploit Author: Alexandros Pappas
# Google Dork: "POSTGRES_PASSWORD=" ext:txt | ext:cfg | ext:env | ext:ini | ext:yml | ext:sql -git -gitlab # Exposed passwords. # Date: 15/09/2020 # Exploit Author: Alexandros Pappas
# Google Dork: inurl:/Dashboard.xhtml intitle:"Dashboard" # Various exposed dashboards. # Date: 1/09/2020 # Exploit Author: Alexandros Pappas
# Google Dork: "EMAIL_HOST_PASSWORD" ext:yml | ext:env | ext:txt | ext:log # Exposed passwords. # Date: 14/08/2020 # Exploit Author: Alexandros Pappas
# Google Dork: allintext:"redis_password" ext:env # Exposed Redis Passwords found in .env files. # Date: 05/08/2020 # Exploit Author: Alexandros Pappas
# Google Dork: intext:"db_database" ext:env intext:"db_password" # Exposed database credentials (username and password). # Date: 23/07/2020 # Exploit Author: Alexandros Pappas
*Google Dork:* intitle:"index of" /var/logs filetype:'"log | txt | csv" Description:- Discovers log files stored on linux servers in open directories of websites. Sensitive information is exposed on the site. Date:- 21st J...
Dork: intitle:"Index of /" "joomla/database" This google dork gives us about joomla related database files and source code related to websites running joomla it will also expose directory listing of websites Thanks NaveenKumar