Statements (23)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:security_resource
gptkb:database |
| gptkbp:category |
cybersecurity
information security search engine exploitation |
| gptkbp:contains |
search queries
Google search operators examples of sensitive data exposure |
| gptkbp:createdBy |
gptkb:Johnny_Long
|
| gptkbp:focusesOn |
information security
Google dorks search engine hacking |
| gptkbp:language |
English
|
| gptkbp:launched |
2004
|
| gptkbp:maintainedBy |
gptkb:Offensive_Security
|
| gptkbp:relatedTo |
gptkb:Exploit_Database
gptkb:Google_Dorking |
| gptkbp:usedFor |
penetration testing
vulnerability assessment |
| gptkbp:website |
https://www.exploit-db.com/google-hacking-database
|
| gptkbp:bfsParent |
gptkb:Google_Dorks
|
| gptkbp:bfsLayer |
8
|
| https://www.w3.org/2000/01/rdf-schema#label |
Google Hacking Database
|