Project Dork : Google
Sensitive File Search Bug Bounty Hunters
Enter a domain /subdomain /custom word to search:
Search Options : Google Dorks for Finding juicy stuff
manifest.xml
config.php
travis.yml
config.inc.php
.ovpn
vim_settings.xml
prod.secret.exs
.cscfg
.rdp
database
prod.exs
configuration.php
.mdf
.sh_history
sdf
prod.secret.exs
shadow
.npmrc _auth flename: dockercis
proftpdpasswd
sqlite
.psafe3
.pspass
secret token.rb
WebServers.xml
bash history
idea14.key
hub
carrierwave.rb
sftp-config.json
database.yml
.bash_profile
sftp.json
keychain
.env
kwallet
secrets.yml
wp-config.php
esmtprc
.exports
credentials
passwd
id rsa
config.yaml
LocalSettings.php
settings.py
id dsa
credentials.xmi
site:http://blob.core.windows.net
site:http://blob.core.windows.net + CONFIDENTIAL
site:*.http://core.windows.net + TLP:RED
site:*.http://core.windows.net
site:*.http://core.windows.net +blob
site:*.http://core.windows.net +files -web -blob
site:*.http://core.windows.net -web
site:*.http://core.windows.net -web -blob -files
site:*.http://core.windows.net inurl:dsts.dsts
site:*.http://core.windows.net inurl:"term" -web
site:*.http://blob.core.windows.net ext:xls | ext:xlsx (login | password | username)
intext:connectionstring blob filetype:config
intext:accountkey http://windows.net filetype:xml
intext:storageaccountkey http://windows.net filetype:txt