Skip to content

xPloits3c/DorkEye

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

703 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
image

" πŸ¦… DorkEye | OSINT Dorking Tool "
> I don't hack systems, i expose their secrets <

Python License Status Search Version

Repo views Stars Forks Issues Last Commit

Telegram

image


What is DorkEye

DorkEye is an advanced automated dorking and OSINT recon tool that leverages DuckDuckGo to discover exposed web resources through intelligent search queries.

  • It combines a powerful dork generator, a full SQL injection detection engine, a 11-step autonomous analysis pipeline, and an adaptive recursive crawler β€” all without requiring any external AI or cloud services.

  • It can identify indexed directories, sensitive files, admin panels, databases, backups, configuration files, credentials, PII data, subdomains, and technology fingerprints β€” efficiently and with stealth controls.

startdev4 9 5 startdev4 9 5_0

Why DorkEye

  • Bypass CAPTCHA and rate‑limiting
  • Advanced .html report interactive
  • Maintain anonymity and avoid IP blocking
  • Clean and unfiltered search results
  • Advanced analysis and automated SQLi testing
  • Continue Dorking for hours, DorkEye won’t get banned.
564558417-37385827-9112-4efe-aa0a-f8941da0a2d9

What’s New πŸ₯‡

Feature Details
πŸ§™ Wizard Interactive guided session β€” all options
βš™οΈ Dork Generator YAML template modes: soft / medium / aggressive
🎯 Direct SQLi Test Test a single URL directly with -u
πŸ“‚ File Re-Processing Re-run SQLi / analysis / crawl on saved result files with -f
πŸ’‰ SQL Injection 5 methods: 105 payloads
πŸ’‰ XSS Injection 4 methods: 111 payloads
πŸ€– Agents v3.1 Pipeline 11-step autonomous analysis
πŸ›‘οΈ HeaderIntelAgent Info leaks, missing security headers, outdated server
🧬 TechFingerprintAgent 35 technologies detected, CVE dorks generated
πŸ“§ EmailHarvesterAgent Collects and categorizes emails: admin / security / info..
πŸ” PiiDetectorAgent Phone, IBAN, fiscal code, credit card, SSN, DOB
🌐 SubdomainAgent Extracts subdomains and generates queries
πŸ”„ Adaptive Crawl Recursive multi-round dorking
πŸ”‘ HTTP Fingerprinting 22 browser/OS profiles β€” Chrome,Firefox,Safari,mobile..
πŸ“Š Output Formats HTML interactive report β€” all saved to Dump/
πŸ—‚οΈ File Categories 7 auto-detected categories - whitelist / blacklist filtering
πŸ–₯️ Full CLI Reference All 31 flags and every possible combination

Quick Install

"Update:"
  sudo apt update
  sudo apt install -y python3 python3-pip python3-venv git

"Git Clone:"
  git clone https://github.com/xPloits3c/DorkEye.git
  cd DorkEye

"Create environment:"
  python -m venv dorkeye_env

"Activate environment:"
  source dorkeye_env/bin/activate

"Install requirements:"
  pip install -r requirements.txt

"WIZARD MODE:"
  python dorkeye.py --wizard
dev5 0wiz
"Help:"
  python dorkeye.py -h

"Deactivate environment:"
  deactivate

"Remove environment:"
  rm -rf dorkeye_env

Usage

de-h

πŸ”Ή # WIZARD Mode

  python dorkeye.py --wizard

πŸ”Ή # Basic search

  python dorkeye.py -d "inurl:admin" -o results.txt

πŸ”Ή # Dork Generator + Detection

  python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json

πŸ”Ή # SQLi + stealth

  python dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html

πŸ”Ή # Fast scan

  python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv

πŸ”Ή # Direct SQLi test on a URL

python dorkeye.py -u "https://target.com/page.php?id=1" --sqli --stealth -o result.json

πŸ”Ή # Re-process a saved result file

  python dorkeye.py -f Dump/results.json --sqli --analyze -o retest.html
de-hex

πŸ“ Project Structure

DorkEye/
β”‚ β”œβ”€β”€ dorkeye.py               ← DorkEye Engine
β”‚ β”œβ”€β”€ requirements.txt
β”‚ β”œβ”€β”€ http_fingerprints.json
β”‚ β”œβ”€β”€ README.md
β”‚ /Tools/
β”‚    β”œβ”€β”€ dork_generator.py     ← Dork Generator Queries
β”‚    β”œβ”€β”€ dorkeye_agents.py     ← Agents v3.1 pipeline
β”‚    β”œβ”€β”€ dorkeye_patterns.py   ← Shared pattern library
β”‚    β”œβ”€β”€ dorkeye_analyze.py    ← Standalone analysis CLI
β”‚    β”œβ”€β”€ sqli.py     ← 5 method sqli injection(105 payloads)
β”‚    └── xss.py     ← 4 method xss injection (111 payloads)
β”‚ /Templates/
β”‚    β”œβ”€β”€ dorks_templates.yaml
β”‚    β”œβ”€β”€ sqli.yaml
β”‚    β”œβ”€β”€ osint.yaml
β”‚    β”œβ”€β”€ intel_dorks.yaml
β”‚    β”œβ”€β”€ epstein_files.yaml
β”‚    └── example.yaml
β”‚ /.github/
β”‚    β”œβ”€β”€ CODE_OF_CONDUCT.md
β”‚    β”œβ”€β”€ CONTRIBUTING.md
β”‚    β”œβ”€β”€ SECURITY.md
β”‚    β”œβ”€β”€ pull_request_template.md
β”‚     /ISSUE_TEMPLATE/
β”‚        β”œβ”€β”€ bug_report.md
β”‚        └── feature_request.md
β”‚     /workflows
β”‚        └── claude-dorkeye.yml
β”‚ /Dump/
β”‚    β”œβ”€β”€ *.csv
β”‚    β”œβ”€β”€ *.json
β”‚    β”œβ”€β”€ *.txt
β”‚    └── *.html
β”‚ /Docs/
β”‚    β”œβ”€β”€ cli.md
β”‚    β”œβ”€β”€ wizard.md
β”‚    β”œβ”€β”€ sqli.md
β”‚    β”œβ”€β”€ agents.md
β”‚    β”œβ”€β”€ crawler.md
β”‚    β”œβ”€β”€ fingerprinting.md
β”‚    β”œβ”€β”€ output_formats.md
β”‚    β”œβ”€β”€ file_categories.md
β”‚    β”œβ”€β”€ dork_generator.md
β”‚    β”œβ”€β”€ INSTALL.md
β”‚    β”œβ”€β”€ REPORT_HTML.md
β”‚    β”œβ”€β”€ USAGE.md
β”‚    └── DDGSEE.md

Example HTML Report

image

Example final Report

image


⚠️ WARNING

  • This tool is for educational, research, and authorized security testing only.
  • Unauthorized access is illegal.
  • The author is not responsible for misuse.

πŸ“ž Contact


⭐ Support

If you find DorkEye useful, please consider starring the repository 🌟

πŸ“œ License

MIT License Β© 2026 xPloits3c I.C.W.T

Packages

 
 
 

Contributors

Languages