Skip to main content

Great Google Secrets

Great Google Secrets


Google Search HackingThis is a featured page



Well if u ask me this is the best Part " how to Search ",

Anyone anywhere needs something out fo the great "www",

now if u know how to grab hold to "something" in one click that is the skill,

this article henceforth is one of my best my best,

n especially crafted to meet all ur needs !!

Hackin ur DNA


Songs
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER ARTIST OR SONG NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+mp3+OR+wma+OR+ogg
+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe
=active&sa=N'


Ebook
javascript:Qr='';if(!Qr){void(Qr=prompt('Enter Author name OR Book name:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+pdf+OR+rar+OR+zip+OR+lit
+OR+djvu+OR+pdb+-html+-htm&num=100&hl=en&lr=&ie=UTF-8&
oe=UTF-8&safe=active&sa=N'


Image
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER IMAGE NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+jpg+OR+png+OR+bmp+-html
+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe=active&sa=N'


Movie
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER MOVIE NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+avi+OR+mov+OR+mpg+
-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&safe
=active&sa=N'


Application
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER Application NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+exe+OR+rar+OR+zip+
-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&
safe=active&sa=N'


Game
javascript:Qr='';if(!Qr){void(Qr=prompt('ENTER GAME NAME:',''))};if(Qr)location.href='http://www2.google.com/ie?query=%22parent+directory%22+%22'+escape(Qr)+'%22+exe+OR+iso+OR+rar+
-html+-htm&num=100&hl=en&lr=&ie=UTF-8&oe=UTF-8&
safe=active&sa=N'


Just copy from javascript and paste this on ur add bar and enter the details and Enjoy!


Google Operators:

Operators are used to refine the results and to maximize the search value. They are your tools as well as ethical hackers’ weapons
Basic Operators:
+, -, ~ , ., *, “”, |, 


OR

Advanced Operators:


allintext:, allintitle:, allinurl:, bphonebook:, cache:, define:, filetype:, info:, intext:, intitle:, inurl:, link:, phonebook:, related:, rphonebook:, site:, numrange:, daterange


Basic Operators !!


(+) force inclusion of something common


Google ignores common words (where, how, digit, single letters) by default:
Example: StarStar Wars Episode +I


(-) exclude a search term
Example: apple –red


(“) use quotes around a search term to search exact phrases:
Example: “Robert Masse”


Robert masse without “” has the 309,000 results, but “robert masse” only has 927 results. Reduce the 99% irrelevant results




Basic Operators


(~) search synonym:
Example: ~food
Return the results about food as well as recipe, nutrition and cooking information 

( . ) a single-character wildcard:
Example: m.trix 

Return the results of M@trix, matrix, metrix…….
( * ) any word wildcard



Advanced Operators: “Site:”


Site: Domain_name
Find Web pages only on the specified domain. If we search a specific site, usually we get the Web structure of the domain


Examples:
site:http://rohitpatelgrkist.co.cc/



Advanced Operators: “Filetype:”


Filetype: extension_type


Find documents with specified extensions


The supported extensions are:


- HyperText Markup Language (html) - Microsoft PowerPoint (ppt) 
- Adobe Portable Document Format (pdf) - Microsoft Word (doc) 
- Adobe PostScript (ps) - Microsoft Works (wks, wps, wdb) 
- Lotus 1-2-3 - Microsoft Excel (xls) 
(wk1, wk2, wk3, wk4, wk5, wki, wks, wku) - Microsoft Write (wri) 
- Lotus WordPro (lwp) - Rich Text Format (rtf) 
- MacWrite (mw) - Shockwave Flash (swf) 
- Text (ans, txt) 

Note: We actually can search asp, php and cgi, pl files as long as it is text-compatible.
Example: Budget filetype: xls


Advanced Operators “Intitle:”


Intitle: search_term 


Find search term within the title of a Webpage


Allintitle: search_term1 search_term2 search_term3
Find multiple search terms in the Web pages with the title that includes all these words
These operators are specifically useful to find the directory lists

Example:
Find directory list:
Intitle: Index.of “parent directory” 



Advanced Operators “Inurl:”

Inurl: search_term
Find search term in a Web address


Allinurl: search_term1 search_term2 search_term3
Find multiple search terms in a Web address 

Examples:
Inurl: cgi-bin
Allinurl: cgi-bin password



Advanced Operators “Intext;”



Intext: search_term
Find search term in the text body of a document.


Allintext: search_term1 search_term2 search_term3
Find multiple search terms in the text body of a document.

Examples:
Intext: Administrator login
Allintext: Administrator login


Advanced Operators: “Cache:”


Cache: URL
Find the old version of Website in Google cache


Sometimes, even the site has already been updated, the old information might be found in cache

Examples:



Advanced Operators


<number1>..<number2>
Conduct a number range search by specifying two numbers, separated by two periods, with no spaces. Be sure to specify a unit of measure or some other indicator of what the number range represents 

Examples:
Computer $500..1000
DVD player $250..350




Advanced Operators: “Daterange:”



Daterange: <start_date>-<end date> 


Find the Web pages between start date and end date


Note: start_date and end date use the Julian date
The Julian date is calculated by the number of days since January 1, 4713 BC. For example, the Julian date for August 1, 2001 is 2452122

Examples:
2004.07.10=2453196
2004.08.10=2453258
Vulnerabilities date range: 2453196-2453258



Advanced Operators “Link:”



Link: URL
Find the Web pages having a link to the specified URL


Related: URL
Find the Web pages that are “similar” to the specified Web page
info: URL 


Present some information that Google has about that Web page
Define: search_term


Provide a definition of the words gathered from various online sources

Examples:
     Link:  rohitpatelgrkist.co.cc/
Related: rohitpatelgrkist.co.cc/

       Info:  rohitpatelgrkist.co.cc/


Define: Network security


Advanced Operators “phonebook:”


Phonebook 

Search the entire Google phonebook 

rphonebook 
Search residential listings only 
bphonebook 
Search business listings only 



Examples:

Phonebook: robert las vegas (robert in Las Vegas)
Phonebook: (702) 944-2001 (reverse search, not always work)

The phonebook is quite limited to U.S.A



Comments

Popular posts from this blog

Defacing Sites via HTML Injections (XSS)

Defacing Sites via HTML Injections Defacing Sites via HTML Injections What Is HTML Injection: "HTML Injection" is called as the Virtual Defacement Technique and also known as the "XSS" Cross Site Scripting. It is a very common vulnerability found when searched for most of the domains. This kind of a Vulnerability allows an "Attacker" to Inject some code into the applications affected in order to bypass access to the "Website" or to Infect any particular Page in that "Website". HTML injections = Cross Site Scripting, It is a Security Vulnerability in most of the sites, that allows an Attacker to Inject HTML Code into the Web Pages that are viewed by other users. XSS Attacks are essentially code injection attacks into the various interpreters in the browser. These attacks can be carried out using HTML, JavaScript, VBScript, ActiveX, Flash and other clinet side Languages. Well crafted Malicious Code can even hep the ...

EKS Cluster and Create CSI Driver to store credentials in AWS Secrets Manager via SecretProviderClass

EKS Cluster | CSI Driver | SecretProviderClass | AWS Secrets Manager Setup EKS Cluster and Manage Credentials at runtime using CSI driver using SecretProviderClass and Secrets Manager Assuming you have Configured/Installed AWS CLI, EKSCTL, KUBECTL, HELM. CSI Basic Information: CSI (Container Storage Interface) widely used as a Storage Technology. Created by Google | Mesosphere | Docker.  It has two two Plugins one runs on the Master Node (Centralized Controller Plugin) and another one on Worker Nodes (Decentralized headless Node Plugin).  CSI communication protocol is gRPC.   The communication between Container Orchestration to Controller Plugin (Master) and to Node Plugin (Worker Node) happens using gRPC .  CSI Drivers : vendor specific compiled into Kubernetes/openshift binaries. To use a CSI driver, a StorageClass needs to be assigned first.  The CSI driver is then set as the Provisioner for the Storage Class. CSI drivers provide three main service...

Linux Systems Performance/Observability (BPF (bpfcc-tools), BCC Tools

  Linux System Performance/Observability Tools Linux Systems Performance/Observability (BPF (bpfcc-tools), BCC Tools Assuming you have Linux Server in place and have the required BPF aka BCC related packages installed on the system(s) for the required Linux distribution. BPF(eBPF) aka BCC Tools (bpfcc-tools) : BPF, which originally stood for Berkley Packet Filter is the dynamic tracing tools for Linux Systems.  BPF initially used for the speeding up for the tcpdump expressions and since then it has been know as the extended Berkley packet Filter (eBPF).  Its new uses are Tracing Tools where it provides programmability for the BPF Compiler Collection (BCC) and bpftrace front ends .   Example: execsnoop, biosnoop etc is a BCC Tool. When facing production performance crisis these such list of tools comes handy to trace and fix the issue. However, it requires certain KERNEL level config options to be enabled such as CONFIG_FTRACE, CONFIG_BPF. Profiling tools typically re...