Google Dorking: Advanced Search Operators for Targeted Discovery

Practical Google dorking tutorial: combine site, filetype, intitle, and inurl operators to surface exposed documents, staff directories, and legacy pages.

Intermediate digital

Google Dorking: Advanced Search Operators for Targeted Discovery

A generic Google search gives you what is popular. A well-constructed dork gives you what is buried. This tutorial covers the operators that still work in 2026, how to combine them for specific investigative goals, and the legal line you should not cross.

Who this is for

Intermediate

Journalists, due-diligence analysts, and academic researchers who have run basic searches and need to find specific documents, staff lists, or forgotten pages on known domains.

What you'll need

  • A browser — no account needed for basic dorking, but a Google account unlocks Programmable Search Engine for saved dork sets.
  • A second engine (Bing, DuckDuckGo, Yandex) for cross-checking.
  • A text file of your dork library. Treat it like code.

How it works

Google's operators narrow the query by field. site: scopes to a domain, filetype: to a file extension, intitle: and inurl: to positions in the page. Chaining operators with Boolean logic turns the search engine into a targeted index of the specific subset of the web you care about. None of this bypasses authentication — dorking only surfaces content the site chose to publish or left crawlable.

Step-by-step walkthrough

  1. Constrain to a domain.

    site:example.com
    

    Add subdomains by dropping the www. Exclude noisy subdomains with -site:blog.example.com.

  2. Find document dumps.

    site:example.com filetype:pdf
    site:example.com (filetype:xls OR filetype:xlsx OR filetype:csv)
    

    Spreadsheets published on public servers regularly contain more data than intended — staff rosters, vendor lists, budget line items.

  3. Surface exposed directories and legacy indexes.

    site:example.com intitle:"index of"
    site:example.com inurl:backup
    site:example.com inurl:old
    

    Stop and assess. If an index of files is clearly an unintentional exposure (credentials, private documents), close it. Note it, do not download it, and consider responsible disclosure. See the legal note below.

  4. Narrow by on-page text.

    site:example.com intext:"board of directors"
    site:example.com intext:"annual report" 2024
    

    Combining intext: with a year or a jargon phrase is how you find pages no one thought to link from the main navigation.

  5. Pivot across a whole sector.

    (site:.gov OR site:.mil) filetype:pdf intext:"memorandum of understanding" intext:"company-name"
    

    Sector-wide dorks discover contracts and regulatory filings without knowing in advance which agency holds them.

  6. Find mirrored or reposted content. If a page was deleted, search a distinctive phrase in quotes with -site:originaldomain.com:

    "unusual verbatim phrase from the page" -site:example.com
    

    Forums, aggregators, and cached copies often outlive the source.

  7. Save your dork set. Build a .txt or Programmable Search Engine configuration so you can re-run the same investigation against a new target by changing one variable. Treat dorks as reusable infrastructure.

Common pitfalls

  • Operator drift. Google deprecates operators quietly. inanchor: and link: barely function now; allintext: is unreliable. Always verify a new dork with a known-good result.
  • Personalisation noise. Logged-in results are personalised. Use an incognito window or a clean profile for reproducible queries.
  • Single-engine bias. Bing indexes different corners of the web than Google. Yandex is often better for Russian-language sources. Run the same dork against all three.
  • Ignoring rate limits. Aggressive automated dorking will get you served captchas and eventually blocked. Hand-crafted queries at human pace are far more productive.
  • Mistaking accidental exposure for fair game. A directory listing of someone's tax returns, surfaced through a dork, is still their tax returns.

Verifying your findings

Treat every dork hit as a lead, not a fact. Open the document, check the page headers and footers, cross-reference with a second source (a registry, a press release, a different archive). Record the exact query and the retrieval timestamp. The analysis phase guide covers how to move from lead to verified evidence.

Related tutorials

Apply this in practice

The tracing shell company ownership case study uses filetype dorks against government registries. For long-form investigations that lean heavily on targeted search, see the Epstein Revealed investigation series.