Selasa, 26 Desember 2023

Payvertise ($PVT) Airdrop for Exclusive Rewards!

Payvertise is revolutionizing digital advertising by merging blockchain efficiency with a groundbreaking revenue-sharing model, maximizing ROI for its users. Through seamless integration of cryptocurrency and NFTs, the platform establishes a distinctive presence in the digital advertising landscape, creating a unique ecosystem for token holders and heralding a new era in digital advertising 🌐

Beyond traditional advertising approaches, Payvertise introduces cutting-edge solutions that redefine the industry. These innovations empower profitable user engagement in a dynamic digital marketing landscape, marking a significant advancement in both blockchain and marketing technologies.

How to Join the Payvertise Airdrop:

Discover the requirements to earn free crypto coins and be part of the future of digital advertising! 🚀






"Embark on the Native Blockchain Journey: Your Ultimate Guide to the Payvertise ($PVT) Airdrop!"


🌐 Follow these steps to dive into the Payvertise Airdrop adventure:


1. Visit the Payvertise Airdrop web3 app page.

2. Connect your web3 wallet (e.g., MetaMask and BITGET Wallet for Android) to seamlessly join the Airdrop.

3. Complete tasks and unlock 110 $PVT tokens (~$10.45).

4. Enjoy an extra 22 tokens (~$2.09) for each successful referral.


â–Ș Your hard-earned tokens await in the 'PVT EARNED' section, ready for withdrawal post-TGE.

Exciting news: The PVT presale is on the horizon! Join the waitlist on the homepage now 🚀

** Remember, when utilizing ÐApps, the security of your digital assets is solely your responsibility!




📚 Disclaimer: This content serves educational and informational purposes only, not financial advice. Prioritize thorough research before making any investment decisions (DYOR).

Label:

Jumat, 08 Juli 2022

list google dork 2022

 



Google Dork Queries Examples:

  • site:.edu “phone number”– This Dork searches for websites on .edu domains that contain the words “phone number”. student “phone number” – This Dork searches for websites on .edu domains that contain the words “student” and “phone number”.
  • inurl:edu “login” – This Dork searches for websites on .edu domains that contain the words “login”. This Dork searches for school websites that contain student login information.
  • “powered by vbulletin” site:.edu – This Dork searches for websites on .edu domains that contain the words “powered by vbulletin”. This Dork searches for school websites that are running on the vbulletin forum software.
  • “powered by vbulletin” site:.gov – This Dork searches for websites on .gov domains that contain the words “powered by vbulletin”. This Dork searches for governmental websites that are running on the vbulletin forum software.
  • “powered by vbulletin” site:.mil – This Dork searches for websites on .mil domains that contain the words “powered by vbulletin”. This Dork searches for military websites that are running on the vbulletin forum software.
  • “powered by vbulletin” inurl:.edu – This Dork searches for websites on .edu domains that contain the words “powered by vbulletin”. This Dork searches for school websites that are running on the vbulletin forum software.
  • “powered by vbulletin” inurl:.mil – This Dork searches for websites on .mil domains that contain the words “powered by vbulletin”. This Dork searches for military websites that are running on the vbulletin forum software.
  • inurl:.com “powered by vbulletin” – This Dork searches for websites on .com domains that contain the words “powered by vbulletin”. This Dork searches for websites that are running on the vbulletin forum software.
  • inurl:.edu “register forum” – This Dork searches for websites on .edu domains that contain the words “register forum”. This Dork searches for school websites that allow you to register for a forum.
  • inurl:.gov “register forum” – This Dork searches for websites on .gov domains that contain the words “register forum”. This Dork searches for governmental websites that allow you to register for a forum.
  • Scraper API provides a proxy service designed for web scraping. With over 20 million residential IPs across 12 countries, as well as software that can handle JavaScript rendering and solving CAPTCHAs, you can quickly complete large scraping jobs without ever having to worry about being blocked by any servers.
  • Search Operators :
  • cache:
  • [cache:www.google.com web] will show the cached content with the word “web” highlighted. This functionality is also accessible by clicking on the “Cached” link on Google’s main results page. The query [cache:] will show the version of the web page that Google has in its cache. For instance, [cache:www.google.com] will show Google’s cache of the Google homepage.
  • link:
  • [link:www.google.com] will list webpages that have links pointing to the Google homepage.
  • related:
  • [related:www.google.com] will list web pages that are similar to the Google homepage.
  • info:
  • [info:www.google.com] will show information about the Google homepage.
  • define:
  • The query [define:] will provide a definition of the words you enter after it, gathered from various online sources. The definition will be for the entire phrase entered (i.e., it will include all the words in the exact order you typed them). Eg: [define:google]
  • stocks:
  • If you begin a query with the [stocks:] operator, Google will treat the rest of the query terms as stock ticker symbols, and will link to a page showing stock information for those symbols. For instance, [stocks: intc yhoo] will show information about Intel and Yahoo. (Note you must type the ticker symbols, not the company name.)
  • site:
  • If you include [site:] in your query, Google will restrict the results to those websites in the given domain. For instance, [help site:www.google.com] will find pages about help within www.google.com. [help site:com] will find pages about help within .com urls. Note there can be no space between the “site:” and the domain.
  • allintitle:
  • If you start a query with [allintitle:], Google will restrict the results to those with all of the query words in the title. For instance, [allintitle: google search] will return only documents that have both “google” and “search” in the title.
  • intitle:
  • If you include [intitle:] in your query, Google will restrict the results to documents containing that word in the title. For instance, [intitle:google search] will return documents that mention the word “google” in their title, and mention the word “search” anywhere in the document (title or no). Putting [intitle:] in front of every word in your query is equivalent to putting [allintitle:] at the front of your query: [intitle:google intitle:search] is the same as [allintitle: google search].
  • allinurl:
  • If you start a query with [allinurl:], Google will restrict the results to those with all of the query words in the url. For instance, [allinurl: google search] will return only documents that have both “google” and “search” in the url. Note that [allinurl:] works on words, not url components. In particular, it ignores punctuation. Thus, [allinurl: foo/bar] will restrict the results to page with the words “foo” and “bar” in the url, but won’t require that they be separated by a slash within that url, that they be adjacent, or that they be in that particular word order. There is currently no way to enforce these constraints.
  • inurl:
  • If you include [inurl:] in your query, Google will restrict the results to documents containing that word in the url. For instance, [inurl:google search] will return documents that mention the word “google” in their url, and mention the word “search” anywhere in the document (url or no). Putting “inurl:” in front of every word in your query is equivalent to putting “allinurl:” at the front of your query: [inurl:google inurl:search] is the same as [allinurl: google search].





Google Dorks Updated Database:

goog_1022753263Nina Simone intitle:”index.of” “parent directory” “size” “last modified” “description” I Put A Spell On You (mp4|mp3|avi|flac|aac|ape|ogg) -inurl:(jsp|php|html|aspx|htm|cf|shtml|lyrics-realm|mp3-collection) -site:.info
Bill Gates 
Bill Gates intitle:”index.of” “parent directory” “size” “last modified” “description” Microsoft (pdf|txt|epub|doc|docx) -inurl:(jsp|php|html|aspx|htm|cf|shtml|ebooks|ebook) -site:.info parent directory /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums



parent directory /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums parent directory MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums
  • parent directory Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums


filetype:config inurl:web.config inurl:ftp “Windows XP Professional” 94FBR
“Windows XP Professional” 94FBR
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:"budget approved") inurl:confidential
ext:(doc | pdf | xls | txt | ps | rtf | odt | sxw | psw | ppt | pps | xml) (intext:confidential salary | intext:”budget approved”) inurl:confidential
ext:inc "pwd=" "UID="
ext:ini intext:env.ini
ext:ini Version=... password
ext:ini Version=4.0.0.4 password
ext:ini eudora.ini
ext:ini intext:env.ini
ext:log "Software: Microsoft Internet Information Services _._"
ext:log "Software: Microsoft Internet Information
ext:log "Software: Microsoft Internet Information Services _._"
ext:log \"Software: Microsoft Internet Information Services _._\"
ext:mdb inurl:_.mdb inurl:fpdb shop.mdb
ext:mdb inurl:_.mdb inurl:fpdb shop.mdb
ext:mdb inurl:_.mdb inurl:fpdb shop.mdb
filetype:SWF SWF
filetype:TXT TXT
filetype:XLS XLS
filetype:asp DBQ=" _ Server.MapPath("_.mdb")
filetype:asp "Custom Error Message" Category Source
filetype:asp + "[ODBC SQL"
filetype:asp DBQ=" _ Server.MapPath("_.mdb")
filetype:asp DBQ=\" _ Server.MapPath(\"_.mdb\")
filetype:asp “Custom Error Message” Category Source
filetype:bak createobject sa
filetype:bak inurl:"htaccess|passwd|shadow|htusers"
filetype:bak inurl:\"htaccess|passwd|shadow|htusers\"
filetype:conf inurl:firewall -intitle:cvs
filetype:conf inurl:proftpd. PROFTP FTP server configuration file reveals
filetype:dat "password.dat
filetype:dat \"password.dat\"
filetype:eml eml +intext:"Subject" +intext:"From" +intext:"To"
filetype:eml eml +intext:\"Subject\" +intext:\"From\" +intext:\"To\"
filetype:eml eml +intext:”Subject” +intext:”From” +intext:”To”
filetype:inc dbconn
filetype:inc intext:mysql*connect
filetype:inc mysql_connect OR mysql_pconnect
filetype:log inurl:"password.log"
filetype:log username putty PUTTY SSH client logs can reveal usernames
filetype:log “PHP Parse error” | “PHP Warning” | “PHP Error”
filetype:mdb inurl:users.mdb
filetype:ora ora
filetype:ora tnsnames
filetype:pass pass intext:userid
filetype:pdf "Assessment Report" nessus
filetype:pem intext:private
filetype:properties inurl:db intext:password
filetype:pst inurl:"outlook.pst"
filetype:pst pst -from -to -date
filetype:reg reg +intext:"defaultusername" +intext:"defaultpassword"
filetype:reg reg +intext:\"defaultusername\" +intext:\"defaultpassword\"
filetype:reg reg +intext:Ăą? WINVNC3Ăą?
filetype:reg reg +intext:”defaultusername” +intext:”defaultpassword”
filetype:reg reg HKEY* Windows Registry exports can reveal
filetype:reg reg HKEY_CURRENT_USER SSHHOSTKEYS
filetype:sql "insert into" (pass|passwd|password)
filetype:sql ("values _ MD5" | "values _ password" | "values _ encrypt")
filetype:sql (\"passwd values\" | \"password values\" | \"pass values\" )
filetype:sql (\"values _ MD\" | \"values _ password\" | \"values _ encrypt\")
filetype:sql +"IDENTIFIED BY" -cvs
filetype:sql password
filetype:sql password
filetype:sql “insert into” (pass|passwd|password)
filetype:url +inurl:"ftp://" +inurl:";@"
filetype:url +inurl:\"ftp://\" +inurl:\";@\"
filetype:url +inurl:”ftp://” +inurl:”;@”
filetype:xls inurl:"email.xls"
filetype:xls username password email index
index of: intext:Gallery in Configuration mode index.of passlist index.of perform.ini mIRC IRC ini file can list IRC usernames and index.of.dcim index.of.password


index.of passlist index.of perform.ini mIRC IRC ini file can list IRC usernames and index.of.dcim
  • index.of.password

intext:" -FrontPage-" ext:pwd inurl:(service | authors | administrators | users)
intext:""BiTBOARD v2.0" BiTSHiFTERS Bulletin Board"
intext:"# -FrontPage-" ext:pwd inurl:(service | authors | administrators | users) "# -FrontPage-" inurl:service.pwd
intext:"#mysql dump" filetype:sql
intext:"#mysql dump" filetype:sql 21232f297a57a5a743894a0e4a801fc3
intext:"A syntax error has occurred" filetype:ihtml
intext:"ASP.NET_SessionId" "data source="
intext:"About Mac OS Personal Web Sharing"
intext:"An illegal character has been found in the statement" -"previous message"
intext:"AutoCreate=TRUE password=_"
intext:"Can't connect to local" intitle:warning
intext:"Certificate Practice Statement" filetype:PDF | DOC
intext:"Certificate Practice Statement" inurl:(PDF | DOC)
intext:"Copyright (c) Tektronix, Inc." "printer status"
intext:"Copyright © Tektronix, Inc." "printer status"
intext:"Emergisoft web applications are a part of our"
intext:"Error Diagnostic Information" intitle:"Error Occurred While"
intext:"Error Message : Error loading required libraries."
intext:"Establishing a secure Integrated Lights Out session with" OR intitle:"Data Frame - Browser not HTTP 1.1 compatible" OR intitle:"HP Integrated Lights-
intext:"Fatal error: Call to undefined function" -reply -the -next
intext:"Fill out the form below completely to change your password and user name. If new username is left blank, your old one will be assumed." -edu
intext:"Generated by phpSystem"
intext:"Generated by phpSystem"
intext:"Host Vulnerability Summary Report"
intext:"HostingAccelerator" intitle:"login" +"Username" -"news" -demo
intext:"IMail Server Web Messaging" intitle:login
intext:"Incorrect syntax near"
intext:"Index of" /"chat/logs"
intext:"Index of /network" "last modified"
intext:"Index of /" +.htaccess
intext:"Index of /" +passwd
intext:"Index of /" +password.txt
intext:"Index of /admin"
intext:"Index of /backup"
intext:"Index of /mail"
intext:"Index of /password"
intext:"Microsoft (R) Windows _ (TM) Version _ DrWtsn32 Copyright (C)" ext:log
intext:"Microsoft CRM : Unsupported Browser Version"
intext:"Microsoft Âź Windows _ ℱ Version _ DrWtsn32 Copyright ©" ext:log
intext:"Network Host Assessment Report" "Internet Scanner"
intext:"Network Vulnerability Assessment Report"
intext:"Network Vulnerability Assessment Report"
intext:"Network Vulnerability Assessment Report" æœŹæ–‡æ„è‡Ș pc007.com
intext:"SQL Server Driver][SQL Server]Line 1: Incorrect syntax near"
intext:"Thank you for your order" +receipt
intext:"Thank you for your order" +receipt
intext:"Thank you for your purchase" +download
intext:"The following report contains confidential information" vulnerability -search
intext:"phpMyAdmin MySQL-Dump" "INSERT INTO" -"the"
intext:"phpMyAdmin MySQL-Dump" filetype:txt
intext:"phpMyAdmin" "running on" inurl:"main.php"
intextpassword | passcode) intextusername | userid | user) filetype:csv intextpassword | passcode
intextpassword | passcode) intextusername | userid | user) filetype:csv
intitle:"index of" +myd size
intitle:"index of" etc/shadow
intitle:"index of" htpasswd
intitle:"index of" intext:connect.inc
intitle:"index of" intext:globals.inc
intitle:"index of" master.passwd
intitle:"index of" master.passwd 007 ç””è„‘è”„èźŻ
intitle:"index of" members OR accounts
intitle:"index of" mysql.conf OR mysql_config
intitle:"index of" passwd
intitle:"index of" people.lst
intitle:"index of" pwd.db
intitle:"index of" spwd
intitle:"index of" user_carts OR user_cart
intitle:"index.of \*" admin news.asp configview.asp
intitle:("TrackerCam Live Video")|("TrackerCam Application Login")|("Trackercam Remote") -trackercam.com
intitle:(“TrackerCam Live Video”)|(“TrackerCam Application Login”)|(“Trackercam Remote”) -trackercam.com
inurl:admin inurl:userlist Generic userlist files
"'dsn: mysql:host=localhost;dbname=" ext:yml | ext:txt "password:"
"* Authentication Unique Keys and Salts" ext:txt | ext:log
"-- Dumped from database version" + "-- Dumped by pg_dump version" ext:txt | ext:sql | ext:env | ext:log
"-- Dumping data for table `admin`" | "-- INSERT INTO `admin`" "VALUES" ext:sql | ext:txt | ext:log | ext:env
"-- Server version" "-- MySQL Administrator dump 1.4" ext:sql
"DefaultPassword" ext:reg "[HKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionWinlogon]"
"Powered by vBulletin(R) Version 5.6.3"
"System" + "Toner" + "Input Tray" + "Output Tray" inurl:cgi
"The SQL command completed successfully." ext:txt | ext:log
"change the Administrator Password." intitle:"HP LaserJet" -pdf
"define('DB_USER'," + "define('DB_PASSWORD'," ext:txt
"define('SECURE_AUTH_KEY'" + "define('LOGGED_IN_KEY'" + "define('NONCE_KEY'" ext:txt | ext:cfg | ext:env | ext:ini
"index of" "/home/000~ROOT~000/etc"
"index of" inurl:database ext:sql | xls | xml | json | csv
"keystorePass=" ext:xml | ext:txt -git -gitlab
"mailer_password:" + "mailer_host:" + "mailer_user:" + "secret:" ext:yml
"putty.log" ext:log | ext:cfg | ext:txt | ext:sql | ext:env
"secret_key_base:" ext:exs | ext:txt | ext:env | ext:cfg /etc/certs +
/etc/certs + "index of /" */* /etc/config + "index of /" / AXIS Camera exploit Index of /_vti_pvt +"*.pwd" Server: Mida eFramework allintext:"Copperfasten Technologies" "Login" allintext:"Index Of" "cookies.txt" allintext:@gmail.com filetype:log ext:php intitle:phpinfo "published by the PHP Group" ext:sql | ext:txt intext:"-- phpMyAdmin SQL Dump --" + intext:"admin" ext:txt | ext:log | ext:cfg "Building configuration..." ext:txt | ext:log | ext:cfg | ext:yml "administrator:500:" ext:yml | ext:txt | ext:env "Database Connection Information Database server =" intext:"Connection" AND "Network name" AND " Cisco Meraki cloud" AND "Security Appliance details" intext:"Healthy" + "Product model" + " Client IP" + "Ethernet" intext:"Incom CMS 2.0" intext:"SonarQube" + "by SonarSource SA." + "LGPL v3" intext:"user name" intext:"orion core" -solarwinds.com intext:construct('mysql:host intitle:"Agent web client: Phone Login" intitle:"Exchange Log In" intitle:"Humatrix 8" intitle:"Insurance Admin Login" | "(c) Copyright 2020 Cityline Websites. All Rights Reserved." | "http://www.citylinewebsites.com" intitle:"NetCamSC*" intitle:"NetCamSC*" | intitle:"NetCamXL*" inurl:index.html intitle:"NetCamXL*" intitle:"Please Login" "Use FTM Push" intitle:"Powered by Pro Chat Rooms" intitle:"Sphider Admin Login" intitle:"Xenmobile Console Logon" intitle:"index of" "*.cert.pem" | "*.key.pem" intitle:"index of" "*Maildir/new" intitle:"index of" "/.idea" intitle:"index of" "/xampp/htdocs" | "C:/xampp/htdocs/" intitle:"index of" "Clientaccesspolicy.xml" intitle:"index of" "WebServers.xml" intitle:"index of" "anaconda-ks.cfg" | "anaconda-ks-new.cfg" intitle:"index of" "config.exs" | "dev.exs" | "test.exs" | "prod.secret.exs" intitle:"index of" "credentials.xml" | "credentials.inc" | "credentials.txt" intitle:"index of" "db.properties" | "db.properties.BAK" intitle:"index of" "dump.sql" intitle:"index of" "filezilla.xml" intitle:"index of" "password.yml intitle:"index of" "service-Account-Credentials.json" | "creds.json" intitle:"index of" "sitemanager.xml" | "recentservers.xml" intitle:"index of" intext:"apikey.txt intitle:"index of" intext:"web.xml" intitle:"index of" intext:credentials intitle:"index of" inurl:admin/download intitle:"irz" "router" intext:login gsm info -site:*.com -site:*.net intitle:"web client: login" intitle:("Index of" AND "wp-content/plugins/boldgrid-backup/=") intitle:Login intext:HIKVISION inurl:login.asp? intitle:index of .git/hooks/ USG60W|USG110|USG210|USG310|USG1100|USG1900|USG2200|"ZyWALL110"|"ZyWALL310"|"ZyWALL1100"|ATP100|ATP100W|ATP200|ATP500|ATP700|ATP800|VPN50|VPN100|VPN300|VPN000|"FLEX")
  • jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:javascript -git -gitlab jdbc:oracle://localhost: + username + password ext:yml | ext:java -git -gitlab jdbc:postgresql://localhost: + username + password ext:yml | ext:java -git -gitlab jdbc:sqlserver://localhost:1433 + username + password ext:yml | ext:java site:*gov.* intitle:index.of db site:checkin.*.* intitle:"login" site:ftp.*.*.* "ComputerName=" + "[Unattended] UnattendMode" site:gov ext:sql | ext:dbf | ext:mdb site:password.*.* intitle:"login" site:portal.*.* intitle:"login" site:sftp.*.*/




























  • /etc/config + "index of /" / AXIS Camera exploit Index of /_vti_pvt +"*.pwd" Server: Mida eFramework allintext:"Copperfasten Technologies" "Login" allintext:"Index Of" "cookies.txt" allintext:@gmail.com filetype:log ext:php intitle:phpinfo "published by the PHP Group" ext:sql | ext:txt intext:"-- phpMyAdmin SQL Dump --" + intext:"admin" ext:txt | ext:log | ext:cfg "Building configuration..." ext:txt | ext:log | ext:cfg | ext:yml "administrator:500:" ext:yml | ext:txt | ext:env "Database Connection Information Database server =" intext:"Connection" AND "Network name" AND " Cisco Meraki cloud" AND "Security Appliance details" intext:"Healthy" + "Product model" + " Client IP" + "Ethernet" intext:"Incom CMS 2.0" intext:"SonarQube" + "by SonarSource SA." + "LGPL v3" intext:"user name" intext:"orion core" -solarwinds.com intext:construct('mysql:host intitle:"Agent web client: Phone Login" intitle:"Exchange Log In" intitle:"Humatrix 8" intitle:"Insurance Admin Login" | "(c) Copyright 2020 Cityline Websites. All Rights Reserved." | "http://www.citylinewebsites.com" intitle:"NetCamSC*" intitle:"NetCamSC*" | intitle:"NetCamXL*" inurl:index.html intitle:"NetCamXL*" intitle:"Please Login" "Use FTM Push" intitle:"Powered by Pro Chat Rooms" intitle:"Sphider Admin Login" intitle:"Xenmobile Console Logon" intitle:"index of" "*.cert.pem" | "*.key.pem" intitle:"index of" "*Maildir/new" intitle:"index of" "/.idea" intitle:"index of" "/xampp/htdocs" | "C:/xampp/htdocs/" intitle:"index of" "Clientaccesspolicy.xml" intitle:"index of" "WebServers.xml" intitle:"index of" "anaconda-ks.cfg" | "anaconda-ks-new.cfg" intitle:"index of" "config.exs" | "dev.exs" | "test.exs" | "prod.secret.exs" intitle:"index of" "credentials.xml" | "credentials.inc" | "credentials.txt" intitle:"index of" "db.properties" | "db.properties.BAK" intitle:"index of" "dump.sql" intitle:"index of" "filezilla.xml" intitle:"index of" "password.yml intitle:"index of" "service-Account-Credentials.json" | "creds.json" intitle:"index of" "sitemanager.xml" | "recentservers.xml" intitle:"index of" intext:"apikey.txt intitle:"index of" intext:"web.xml" intitle:"index of" intext:credentials intitle:"index of" inurl:admin/download intitle:"irz" "router" intext:login gsm info -site:*.com -site:*.net intitle:"web client: login" intitle:("Index of" AND "wp-content/plugins/boldgrid-backup/=") intitle:Login intext:HIKVISION inurl:login.asp? intitle:index of .git/hooks/ USG60W|USG110|USG210|USG310|USG1100|USG1900|USG2200|"ZyWALL110"|"ZyWALL310"|"ZyWALL1100"|ATP100|ATP100W|ATP200|ATP500|ATP700|ATP800|VPN50|VPN100|VPN300|VPN000|"FLEX") jdbc:mysql://localhost:3306/ + username + password ext:yml | ext:javascript -git -gitlab jdbc:oracle://localhost: + username + password ext:yml | ext:java -git -gitlab jdbc:postgresql://localhost: + username + password ext:yml | ext:java -git -gitlab jdbc:sqlserver://localhost:1433 + username + password ext:yml | ext:java site:*gov.* intitle:index.of db site:checkin.*.* intitle:"login" site:ftp.*.*.* "ComputerName=" + "[Unattended] UnattendMode" site:gov ext:sql | ext:dbf | ext:mdb site:password.*.* intitle:"login" site:portal.*.* intitle:"login" site:sftp.*.*/
  • intext:"login" intitle:"server login"
  • site:user.*.* intitle:"login"
  • ssh_host_dsa_key.pub + ssh_host_key + ssh_config = "index of / "

A Google Dork is a search query that looks for specific information on Google’s search engine. Google Dorks are developed and published by hackers and are often used in “Google Hacking”. 
 Google Dorks are extremely powerful. They allow you to search for a wide variety of information on the internet and can be used to find information that you didn’t even know existed.
Because of the power of Google Dorks, they are often used by hackers to find information about their victims or to find information that can be used to exploit vulnerabilities in websites and web applications.
Google Search Engine is designed to crawl anything over the internet and this helps us to find images, text, videos, news and plethora of information sources. With it’s tremendous capability to crawl, it indexes data along the way, which also includes sensitive information like email addresses, login credentials, sensitive files, website vulnerabilities, and even financial information. In many cases, We as a user won’t be even aware of it.

Google Dork is a search query that we give to Google to look for more granular information and retrieve relevant information quickly. For example, try to search for your name and verify results with a search query [inurl:your-name]. Analyse the difference. You just have told google to go for a deeper search and it did that beautifully.


Google search service is never intended to gain unauthorised access of data but nothing can be done if we ourselves kept data in the open and do not follow proper security mechanisms.
Essentially emails, username, passwords, financial data and etc. shouldn’t be available in public until and unless it’s meant to be. Example, our details with the bank are never expected to be available in a google search. But our social media details are available in public because we ourselves allowed it.

Ending Note :
Google Search is very useful as well as equally harmful at the same time. Because it indexes everything available over the web.
You need to follow proper security mechanisms and prevent systems to expose sensitive data. Follow OWASP, it provides standard awareness document for developers and web application security.
Scraper API provides a proxy service designed for web scraping. With over 20 million residential IPs across 12 countries, as well as software that can handle JavaScript rendering and solving CAPTCHAs, you can quickly complete large scraping jobs without ever having to worry about being blocked by any servers.

Label: , , ,

Sabtu, 24 Oktober 2020

Script Crash User Follow BC GAME

let config = {

    printMode: {

        label: '', value: 'off', type: 'radio',

        options: [

            { value: 'off', label: 'Bet Mode' },

            { value: 'on', label: 'Print Mode' }

        ]

    },

    followUser: {label: 'User to follow', value: '', type: 'text'},

    followCoin: {label: "Coin to follow", value: '', type: 'text'},

    maxBetTitle: {

        label:

        "Min Bet | Max Bet",

        type: 'title'

    },

    minBet: {label: 'Min Bet ', value: currency.minAmount * 1.2, type: 'number'},

    maxBet: {label: 'Max Bet ', value: currency.maxAmount, type: 'number'},

    percentTitle: {label: 'Set The Percent Of Users Bet To Make ', type: 'title'},

    percentBet: {label: 'Percent ', value: 100, type: 'number' },

    maxPayout: {

        label: 'Max payout',

        value: 100,

        type: 'number'

    },

    balanceBetTitle: {label: 'Stop Profit | Stop Loss ', type: 'title'},

    autoAdjust: {

        label: '', value: 'reset', type: 'radio',

        options: [

            { value: 'reset', label: 'Dont Auto Adjust' },

            { value: 'increase', label: 'Auto Adjust Stop Loss' }

        ]

    },

    profitStop: {label: 'Balance Over ', value: parseFloat(currency.amount) * 2 , type: 'number'},

    lossStop: {label: 'Balance Under ', value: 0, type: 'number'}


}


function main() {

    const followUser = config.followUser.value.toLowerCase()

    const maxPayout = config.maxPayout.value

    const maxBet = config.maxBet.value

    const minBet = config.minBet.value

    const profitStop = config.profitStop.value

    var lossStop = config.lossStop.value

    const percentBet = config.percentBet.value / 100

    const lossAmount = currency.amount - config.lossStop.value


    let isPlaying = false

    engine.on('GAME_STARTING', function() {

        if (isPlaying) {

            log.info(`Following ${config.followUser.value.toLowerCase()}`)

        }

    })

    engine.on('GAME_ENDED', function() {

        isPlaying = false

        const lastGame = engine.getHistory()[0]

        if (!lastGame.wager) {

            return

        }

        if (lastGame.cashedAt) {

            log.info(

                `Cashed Out: ${lastGame.cashedAt/100}x , profit: ${

parseFloat((lastGame.wager * (lastGame.cashedAt/100)) - lastGame.wager).toFixed(8)

                }`

)

        } else {

            log.info(`Lost: ${lastGame.wager}`)

        }

        log.info('\n')

        if (config.autoAdjust.value === 'increase') {

            if (currency.amount - lossStop >= lossAmount * 2) {

                log.info('*--------------------------------------------------------------------------*')

                log.info("   Adjusting Stop Loss")

                while(currency.amount - lossStop >= lossAmount * 2) {

                    lossStop += lossAmount

                }

                log.info("   Stop Loss Changed: "+lossStop)

                log.info('*--------------------------------------------------------------------------*')

            }


        }

    })

    engine.on('GAME_BET', function(player) {

        if(config.printMode.value === 'on') {

            if(player.name.toLowerCase().includes(config.followUser.value.toLowerCase())) {

                log.info(player.name +" : "+player.userId+" : "+player.bet+" "+player.currencyName);

                //console.log(player);

            }

        }

        if (player.userId != config.followUser.value) {

            return

        }

        if (player.currencyName.toLowerCase() != config.followCoin.value.toLowerCase()) {

            log.error("Player Has Switched Coins: "+player.bet+" "+player.currencyName);

            return;

        }

        let theBet = player.bet * percentBet

        if (theBet < minBet) {

            let theBet = minBet

            }

        if (maxBet < theBet) {

            log.info('Damn Hit Max Bet')

            return;

        }

        if (currency.amount - theBet < lossStop) {

            log.error('Sorry You Hit Stop Loss')

            engine.stop();

        }

        if (currency.amount > profitStop) {

            log.info('Congrats You Hit Profit Stop!')

            engine.stop();

        }

        isPlaying = true

        engine.bet(parseFloat(theBet).toFixed(8), maxPayout)


    })

    engine.on('GAME_CASHED', function(player) {

        if (player.userId == config.followUser.value) {

            engine.cashOut()

        }

    })

}