1. Google Docs 📄
Unearth sensitive data just by swapping example.com with your target:
site:docs.google.com inurl:"/d/" "example.com"2. OneDrive ☁️
Microsoft's cloud storage solution for files and photos. Score big by finding internal presentations and private photos that were accidentally made public:
site:onedrive.live.com "example.com"
3. Dropbox 🔗
Reveal Dropbox links containing source code, proprietary information, and even customer data:
site:dropbox.com/s "example.com"
4. Box 📦
Discover sensitive files like internal reports and client contracts by searching for Box-hosted files:
site:box.com/s "example.com"5. Azure DevOps 🛠️
Microsoft's suite of developer services, including repos and pipelines. Uncover critical information like API keys, authentication tokens, and unsecured repositories by dorking Azure DevOps:
site:dev.azure.com "example.com"
6. SharePoint 🗂️
Microsoft's web-based collaboration platform. Find treasure troves of internal communications, project plans, and employee records, all available to the public eye:
site:http://sharepoint.com "example.com"
7. DigitalOcean Spaces 🌊
Object storage for developers to store and serve large amounts of data. Unearth juicy files like database backups, configuration files, and logs stored on DigitalOcean Spaces:
site:digitaloceanspaces.com "example.com"8. Firebase 🔥
Google's mobile and web app development platform. Reveal app secrets, user data, and even private API endpoints by searching Firebase-hosted files:
site:firebaseio.com "example"Example HackerOne Report: https://hackerone.com/reports/1065134
9. JFrog 🐸
A platform for managing and distributing software artifacts. Jump on JFrog to discover exposed artifacts, builds, and release packages that could lead to serious security risks:
site:jfrog.io "example"Example HackerOne Report: https://hackerone.com/reports/911606

10. Lesser-known Amazon S3 subdomains 🏢
Gain access to sensitive files like customer data and even full server backups by exploring these lesser-known S3 subdomains:
site:http://s3-external-1.amazonaws.com "example.com"
site:http://s3.dualstack.us-east-1.amazonaws.com "example.com"And that's it, folks! With these search strings in your toolkit, you'll be able to uncover the hidden gems of the internet.
More Google Dorks:
Follow me on Twitter for daily hacking tips:
Happy hunting! 🎉