- Spectatorguy's Newsletter
- Posts
- GitHub Dorks: Unearthing Hidden Gems in Code Repositories
GitHub Dorks: Unearthing Hidden Gems in Code Repositories

Welcome to BitPanic!
Today, we dive into GitHub dorks, a powerful yet often overlooked tool for bug hunters, penetration testers, and developers looking to secure their codebases.
GitHub dorks are specially crafted search queries that help find sensitive information accidentally left in public repositories. By leveraging GitHub’s search functionality with specific operators, you can locate exposed credentials, API keys, configuration files, or even potential vulnerabilities.
Using these queries responsibly is essential, as GitHub dorks can be a double-edged sword—use them to secure your code, but always respect ethical boundaries.
Top 50+ GitHub Dorks for Bug Bounty Hunters and Security Professionals
Below is a curated list of dorks you can use to enhance your bug bounty hunting process or secure your projects:
1. filename:".env" password
2. filename:"config.json" api_key
3. filename:"settings.py" secret_key
4. filename:"database.yml" password
5. extension:sql mysql dump
6. extension:json apiKey
7. extension:yaml aws_access_key_id
8. extension:ini aws_secret_access_key
9. filename:"wp-config.php" database
10. filename:"config.php" dbpassword
11. extension:log password
12. filename:"id_rsa"
13. filename:"authorized_keys"
14. filename:"known_hosts"
15. extension:pem private
16. extension:key private
17. filename:".ftpconfig"
18. filename:".dockercfg"
19. filename:"Dockerfile" password 
20. filename:"bash_history"
21.filename:".bash_profile"
22. filename:".bashrc"
23. filename:".zshrc"
24. filename:".npmrc" //registry.npmjs.org/:_authToken
25. filename:".netrc"
26. extension:php pass 
27. extension:php pwd 
28. extension:php dbhost 
29. filename:"shadow" 
30. filename:"passwd" 
31. filename:"sshd_config" 
32. filename:"config" password
33. filename:"web.config" connectionString
 
34. filename:"app.config" connectionString
35. extension:xml credentials 
36. extension:ini password 
37. extension:properties password 
38. filename:"settings.xml" server 
39. filename:"settings.gradle" password 
40. filename:"key.json" 
41. filename:"client_secret.json" 
42. extension:sql password 
43. filename:"composer.json" password 
44. filename:"secrets.yml" 
45. extension:env DATABASE_URL 
46. filename:"config.ini" password 
47. extension:js apiKey 
48. filename:".aws/credentials" 
49. extension:txt password 
50. filename:".azure" 
51. filename:"pip.conf" password 
52. filename:"config.js" dbPassword 
53. filename:"config.rb" password 
54. filename:"config.groovy" password
55. filename:".git-credentials"How to Use GitHub Dorks ?
1. Visit GitHub’s search page.
2. Use the above dorks in the search bar.
3. Refine results with filters like :
org:<organization> or
repo:<repository> For Targeted Searches.
Disclaimer
This post is for educational purposes only. Always follow ethical guidelines and only use these dorks on your own projects or with explicit permission.
Stay secure,
The Bitpanic Team
