UNDERCODE COMMUNITY
2.69K subscribers
1.23K photos
31 videos
2.65K files
80.8K links
🦑 Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

Web & Services:
Undercode.help
Download Telegram
Forwarded from Exploiting Crew (Pr1vAt3)
🦑 New Working list of Google Dorks :

### Files Containing Passwords
1. site:github.com "BEGIN OPENSSH PRIVATE KEY"
2. ext:nix "BEGIN OPENSSH PRIVATE KEY"
3. intext:"aws_access_key_id" | intext:"aws_secret_access_key" filetype:json | filetype:yaml
4. intitle:index of /etc/ssh

### Various Online Devices
5. inurl:home.htm intitle:1766

### Vulnerable Servers
6. intitle:"SSL Network Extender Login" -checkpoint.com
7. intext:"siemens" & inurl:"/portal/portal.mwsl"
8. Google Dork Submisson For GlobalProtect Portal
9. inurl:"cgi-bin/koha"

### Files Containing Juicy Info
10. intext:"proftpd.conf" "index of"
11. site:.edu filetype:xls "root" database
12. intext:"dhcpd.conf" "index of"
13. site:uat.* * inurl:login

### Files Containing Usernames
14. "START test_database" ext:log
15. "Header for logs at time" ext:log
Forwarded from Exploiting Crew (Pr1vAt3)