Sensitive Directories
https://www.exploit-db.com/google-hacking-database?category=1
intitle:Index of "/venv"intitle:Index of "pyvenv.cfg"site:com intitle:index of ..................etcpasswdintitle:"index of /" "sqlite.db"intitle:"index of" ".env"intitle: "index of backup.php"intitle:"index of" "private/log"intitle: "Index of" inurl:fileadminintitle:index.of (inurl:admin | intitle:admin)intitle:"index of" "/configs"intitle:"index of" intext:"client.key.pem"inurl:/wp-content/uploads/wp-file-manager-pro/fm_backupinurl:wp-content/uploads/ intitle:logsinurl:/wp-content/uploads/wp-file-manager-pro"-----BEGIN EC PRIVATE KEY-----" | " -----BEGIN EC PARAMETERS-----" ext:pem | ext:key | ext:txt"-----BEGIN PGP PRIVATE KEY BLOCK-----" ext:pem | ext:key | ext:txt -gitinurl:tcpconfig.htmlinurl:/certs/server.keyinurl:print.htm intext:"Domain Name:" + "Open printable report""-- Dumped from database version" + "-- Dumped by pg_dump version" ext:txt | ext:sql | ext:env | ext:log /etc/config + "index of /" /Última actualización