Disclaimer: Don’t missuse the information here. Use only on servers you own at your own risk !!
No, no, this is not hacking Google. This is a database created by the community or some individual using google dorks. They have arranged google dorks in a way that it can be used to pull out information such as email addresses and lists, login credentials, sensitive files, website vulnerabilities, and even financial information (e.g. Payment card data) from google search engine.
Most importantly with this Google hacking database, you can find the vulnerabilities of your website and fix the issues before someone else tries to hack you.
These are some strings that can be send with google advance search operators in order pull out sensitive information.
As an example, one dork can be used to identify the vulnerable server. Then using another dork you can try to get sensitive data like user credentials from those servers. With another dork, you can get some other sensitive data like database credentials.
In the following table you can see a list of google advance search operators.
As an example,
You can use - to ignore results.
I think you get the idea. You can try these commands in Google. It is not a crime. People use these commands to customize their results and search in Google like a pro!
Same way, dorks are also search strings that contains advance search operators. But the aim is different.
Exploit DB Google Hacking Database is the most popular Google Hacking Database in the internet.