DorkFinder

Google Dork Syntax Guide

Published by Ravi on June 26, 2025

Welcome to the comprehensive Google Dork Syntax Guide on DorkFinder.com. Mastering Google Dorking begins with a solid understanding of its powerful search operators. These operators allow you to craft highly specific queries to unearth information that might not be readily visible through standard searches. This guide will walk you through the most important operators, how to use them, and how to combine them for effective research, Open Source Intelligence (OSINT), and ethical security assessments.

Understanding Search Operators

Google search operators are special keywords or symbols that extend the capabilities of regular text searches. They act as filters or instructions to Google's search engine, telling it precisely what kind of information to look for and where to find it. Using operators effectively can transform Google from a simple search tool into a powerful instrument for discovery.

Before diving into the operators, it's helpful to understand What Google Dorking Is and its various applications.

Key Search Operators Explained

Below is a detailed list of commonly used Google Dork operators. Each entry includes its name, a description of its function, an example query, and a link to try the example directly in Google.

site:
Site Specific Search

Category: Basic Targeting

Restricts results to a specific website, domain, or subdomain. Essential for focusing your search on a particular target.

Example:

site:example.com sensitive data
inurl:
URL Search

Category: Basic Targeting

Finds pages with a specific term or phrase in their URL. Useful for locating specific paths, parameters, or admin sections.

Example:

inurl:admin login.php
allinurl:
All URL Terms

Category: Basic Targeting

Similar to inurl:, but ensures ALL specified terms appear consecutively in the URL. More restrictive.

Example:

allinurl:example.com/docs/confidential
filetype:
File Type Search

Category: Content Specific

Searches for specific file types (e.g., pdf, doc, xls, txt, sql, log, env). Crucial for finding exposed documents or configuration files.

Example:

filetype:pdf "internal report" site:example.com
ext:
Extension Alias

Category: Content Specific

An alias for filetype:. Works identically for specifying file extensions.

Example:

ext:log "error" site:target.com
intitle:
Title Search

Category: Content Specific

Finds pages with a specific term or phrase in their HTML title tag. Good for finding pages with specific purposes, like "Index of" or "Login".

Example:

intitle:"index of" passwords
allintitle:
All Title Terms

Category: Content Specific

Similar to intitle:, but all specified terms must appear in the title. Useful for very specific title searches.

Example:

allintitle:admin panel login portal
intext:
Text Search

Category: Content Specific

Searches for specific terms or phrases within the body text of pages. The most general content search.

Example:

intext:"DB_PASSWORD" filetype:env
allintext:
All Text Terms

Category: Content Specific

Similar to intext:, but all specified terms must appear in the page text. Use for finding pages containing multiple specific keywords.

Example:

allintext:username password "login error"
""
Exact Phrase

Category: Logical & Wildcard

Searches for an exact phrase. Wrap your query in double quotes. Extremely useful for precise matching.

Example:

"confidential company acquisition plan"
-
Exclude Term (NOT)

Category: Logical & Wildcard

Excludes results containing a specific term or operator. Prefix the term or operator with a minus sign.

Example:

passwords -site:wikipedia.org filetype:pdf
*
Wildcard

Category: Logical & Wildcard

Acts as a placeholder for one or more unknown words. Can be used within exact phrases.

Example:

intitle:"index of /admin/*config*"
OR or |
Logical OR

Category: Logical & Wildcard

Finds pages containing either one term or another (or both). Use uppercase OR or a pipe | symbol.

Example:

(login OR signin OR "auth page") site:example.com
AND
Logical AND

Category: Logical & Wildcard

Finds pages containing all specified terms. Usually implicit if not specified (spaces often act as AND), but can be used for clarity.

Example:

admin AND dashboard AND "user management"
( )
Grouping

Category: Logical & Wildcard

Groups multiple terms or operators to control the order of execution and logic of a query. Essential for complex dorks.

Example:

(confidential OR secret) (filetype:pdf OR filetype:docx) site:example.com -ext:html
cache:
Cached Version

Category: Advanced & Utility

Shows Google's cached version of a page as it appeared when Google last crawled it. Useful if a page is down or has changed.

Example:

cache:example.com/important-page.html
related:
Related Sites

Category: Advanced & Utility

Finds sites similar or related to a given domain. Good for competitive analysis or discovering related entities.

Example:

related:example.com
define:
Definition

Category: Advanced & Utility

Provides the definition of a word or phrase from various online sources.

Example:

define:dorking
info:
Page Information

Category: Advanced & Utility

Shows information Google has about a specific URL, including links to cache, related pages, and pages linking to it.

Example:

info:example.com/about-us.html

Combining Operators for Powerful Queries

The true power of Google Dorking comes from combining multiple operators. By chaining operators together, you can create highly specific and targeted queries. Parentheses ( ) can be used to group parts of your query and control the logic, similar to mathematical equations.

Example Combination:

Let's say you're looking for publicly exposed PDF reports containing "financial statement" on U.S. government websites, but you want to exclude any results from the SEC (Securities and Exchange Commission) website.

site:.gov filetype:pdf "financial statement" -site:sec.gov

Breakdown:

  • site:.gov: Restricts search to .gov domains.
  • filetype:pdf: Looks only for PDF files.
  • "financial statement": Searches for this exact phrase.
  • -site:sec.gov: Excludes results from sec.gov.

For more advanced combinations, especially in bug bounty hunting, check out our article on Advanced Dorking Techniques.

Tips for Effective Dorking

  • Be Specific, Yet Flexible: Start with broad terms and then narrow down your search using more specific operators and keywords. Sometimes, slightly different phrasing can yield different results.
  • Iterate and Refine: Your first dork might not give you perfect results. Analyze what you find and refine your query. Add exclusion terms (-) to remove noise.
  • Understand Your Target: If searching a specific site, try to understand its structure. Are there common URL patterns (e.g., /admin, /uploads)? What file types might they use for sensitive documents?
  • Use Quotation Marks: For exact phrases (e.g., "confidential report", "login failed"), always use double quotes.
  • Leverage the Wildcard (*): The asterisk can be very powerful for finding variations or unknown parts of a URL or phrase.
  • Don't Forget `ext:`: It's a direct alias for `filetype:` and can be quicker to type.
  • Explore Cached Versions: If a page is down or has recently changed, Google's cache (cache:) can be invaluable.
  • Stay Updated: Google occasionally changes how operators work or introduces new ones. Experimentation is key. You can find many practical examples on the DorkFinder homepage.

Best Practices and Further Learning

While this guide covers the syntax, effective dorking also involves creativity, persistence, and a responsible mindset. Always adhere to ethical guidelines—explore our Ethical Dorking Guidelines to understand the importance of responsible use.

The operators listed here are your building blocks. The more you practice combining them, the more adept you'll become at finding specific information. For those interested in using dorks for open-source intelligence, see Using Google Dorks for OSINT. If you're considering automating your dorking efforts, be sure to read about the Tools and Ethical Considerations for Automating Google Dorking.

A Note on Ethical Use

The information and operators described in this guide are powerful. They should only be used for legitimate research, learning, and security assessments on systems and networks for which you have explicit, written permission to test. Unauthorized dorking or attempting to access systems without consent can have serious legal and ethical consequences. DorkFinder.com promotes responsible and ethical use of these techniques.

Read our full Ethical Dorking Guidelines »