Google Dorks, a brief list of resources
Google hacking for fun and profit

In 2002, Johnny Long began to collect interesting Google search queries that uncovers vulnerable systems or sensitive information, and calls them “Google dorks”.
We identify with “Google Dorking” the method for finding vulnerable targets using the google dorks in order to obtain usernames and passwords, email lists, sensitive documents and website vulnerabilities.

Disclaimer!
Ethical hackers can use the “Google Dorking” to improve system security, but also a black hat could use this technique for illegal activities, including cyber terrorism, industrial espionage, and identity theft.
A brief list
The original Johnny Long’s website
GHDB " Hackers For Charity
Hackers for Charity is a non-profit organization that leverages the skills of technologists. We solve technology…johnny.ihackstuff.com
Hackers for Charity is a non-profit organization that leverages the skills of technologists. We solve technology…johnny.ihackstuff.com
Some dorks focused on SQLi vulnerabilities
Another list on Exploit-DB
SCADA and IoT
hackers-arise
Edit descriptionwww.hackers-arise.com
Edit descriptionwww.hackers-arise.com
Some articles concerning Google Hacking
Google Dorking: Exposing The Hidden Threat
Google Dorking sounds harmless, but it can take your company down. Here's what you need to know to avoid being hacked…www.darkreading.com
Google Dorking sounds harmless, but it can take your company down. Here's what you need to know to avoid being hacked…www.darkreading.com
How Penetration Testers Use Google Hacking
Me irlNot a day goes by in my life where I don't use Google search. Nothing is easier than loading up the page, typing…www.alienvault.com
Me irlNot a day goes by in my life where I don't use Google search. Nothing is easier than loading up the page, typing…www.alienvault.com
S3SS10N Wednesday - Guide to Google Hacking - Cybrary
We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the…www.cybrary.it
We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the…www.cybrary.it
[embed]
Defense against Google Hacking
13; For better understanding of the topic "Defense against Google hacking", we will have a look into what exactly…securitycommunity.tcs.com
13; For better understanding of the topic "Defense against Google hacking", we will have a look into what exactly…securitycommunity.tcs.com
Some list found on github
JohnTroony/Google-dorks
Google-dorks - Common google dorks and others you prolly donn know :Pgithub.com
Google-dorks - Common google dorks and others you prolly donn know :Pgithub.com
Some list found on github
[embed]
Other resources? Suggestions are welcome!