Sensitive Directories

https://www.exploit-db.com/google-hacking-database?category=1

intitle:Index of "/venv"
intitle:Index of "pyvenv.cfg"
site:com intitle:index of ..................etcpasswd
intitle:"index of /" "sqlite.db"
intitle:"index of" ".env"
intitle: "index of backup.php"
intitle:"index of" "private/log"
intitle: "Index of" inurl:fileadmin
intitle:index.of (inurl:admin | intitle:admin)
intitle:"index of" "/configs"
intitle:"index of" intext:"client.key.pem"
inurl:/wp-content/uploads/wp-file-manager-pro/fm_backup
inurl:wp-content/uploads/ intitle:logs
inurl:/wp-content/uploads/wp-file-manager-pro
"-----BEGIN EC PRIVATE KEY-----" | " -----BEGIN EC PARAMETERS-----" ext:pem | ext:key | ext:txt
"-----BEGIN PGP PRIVATE KEY BLOCK-----" ext:pem | ext:key | ext:txt -git
inurl:tcpconfig.html
inurl:/certs/server.key
inurl:print.htm intext:"Domain Name:" + "Open printable report"
"-- Dumped from database version" + "-- Dumped by pg_dump version" ext:txt | ext:sql | ext:env | ext:log	
/etc/config + "index of /" /

Última actualización