- DorkEye is an advanced osint automated dorking tool that leverages DuckDuckGo to discover exposed web resources through OSINT (Open Source Intelligence) techniques.
- It can identify indexed directories, sensitive files, admin panels, databases, backups, and other publicly accessible resourcesβall in an anonymous, efficient, and legal manner.
- β Bypass CAPTCHA and rate-limiting typical of mainstream search engines.
- β Maintain anonymity and privacy during searches, avoided IP blocks and detection mechanisms.
- β Access a clean, unfiltered index of web resources.
- β Dorking, analyze, extract metadata, test sqli vulnerability.
- π§ SQL Param Vuln Automatically Testing for SQL vulnerabilty after Potenzial SQLi Found
- π Advanced File Metadata Analysis - Checks file accessibility, size, and content-type
- ποΈ Global Deduplication - Removes duplicate URLs across all dorks
- π Detailed Statistics - Comprehensive analytics and category breakdowns
- βοΈ Configuration Files - YAML/JSON config support for advanced customization
- π¨ Rich Terminal UI - Beautiful progress bars and formatted output
- π― File Analysis & Categorization - Automatically categorizes results by file type (documents, archives, databases, backups, configs, scripts, credentials)
- -- π Documents .pdf, .doc, .docx, .xls, .xlsx, .ppt, .pptx Office documents, reports
- -- π¦ Archives .zip, .rar, .tar, .gz, .7z, .bz2 Compressed files, backups
- -- ποΈ Databases .sql, .db, .sqlite, .mdb Database dumps, exports
- -- πΎ Backups .bak, .backup, .old, .tmp Backup files, temp data
- -- βοΈ Configs .conf, .ini, .yaml, .json, .xml Configuration files
- -- π Scripts .php, .asp, .jsp, .sh, .bat, .ps1 Server-side scripts
- -- π Credentials .env, .git, .svn, .htpasswd Sensitive auth files
- πΎ Multiple Export Formats - CSV, JSON, and interactive HTML reports structured data with columns
- -- URL, Title, Snippet, Dork, Timestamp
- -- Extension, Category, File Size, Content Type
- -- Accessibility Status, HTTP Status Code
- π Smart Dorking Execute single or multiple dorks from files
- π« Extension Filtering Blacklist/whitelist specific file types
- π File Analysis Check file size, content-type, and accessibility
- π― Global Deduplication Intelligent URL hash-based duplicate removal
- β‘ Rate Limit Protection Smart delays to avoid blocking
- π Detailed Statistics Real-time metrics and category breakdowns
- βοΈ Config Support YAML/JSON configuration files
- π¨ Beautiful UI Rich terminal interface with progress tracking
- π¦ Automatic Installation
-
sudo apt update -
sudo apt install -y python3 python3-pip python3-venv git -
git clone https://github.com/xPloits3c/DorkEye.git -
cd DorkEye -
python3 -m venv dorkeye_env -
source dorkeye_env/bin/activate -
sudo chmod +x setup.sh -
./setup.sh
-
python dorkeye.py --help
-
deactivate
-
cd DorkEye -
rm -rf dorkeye_env
-
python3 dorkeye.py -d "inurl:admin" -o results
-
python3 dorkeye.py -d "site:example.com .php?id=" --sqli -o scan
-
python3 dorkeye.py -d dorks.txt --stealth --sqli -c 100 -o stealth_scan
-
python3 dorkeye.py -d "site:target.com" --whitelist .pdf .doc .xls -o documents
-
python3 dorkeye.py -d dorks.txt --no-analyze -c 50 -o quick_scan
-
python3 dorkeye.py --create-config
-
python3 dorkeye.py -d "site:example.com filetype:pdf" -o results
-
python3 dorkeye.py -d dorks.txt -c 100 -o output
-
python3 dorkeye.py -d "inurl:admin" -o admin_pages
-
python dorkeye.py -d dorks.txt --stealth --sqli -o results -
python dorkeye.py -d "site:example.com .php?id=" --sqli -o results -
python dorkeye.py -d dorks.txt --sqli --stealth -c 100 -o scan
-
python3 dorkeye.py -d "filetype:pdf OR filetype:xls" --whitelist .pdf .xls .xlsx -o documents
-
python3 dorkeye.py -d "site:.com" --blacklist .jpg .png .gif .svg -o no_images
-
python3 dorkeye.py -d dorks.txt --config custom_config.yaml -o results
-
python3 dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results
-
inurl:admin intitle:login -
inurl:administrator -
site:.com inurl:wp-admin
-
filetype:sql "MySQL dump" -
filetype:env DB_PASSWORD -
filetype:log inurl:access.log
-
site:.edu filetype:pdf "confidential" -
site:.gov filetype:xls -
inurl:uploads filetype:pdf
-
filetype:conf intext:password -
filetype:ini "database" -
ext:xml inurl:config
-
python3 dorkeye.py -d "filetype:sql" --whitelist .sql -o database_dumps
-
python3 dorkeye.py -d "site:.com filetype:pdf confidential" -o leaked_docs
-
python3 dorkeye.py -d "filetype:env OR filetype:git" -o credentials
-
python3 dorkeye.py -d "site:company.com filetype:bak OR filetype:backup" -o backups
-
python3 dorkeye.py -d "site:company.com ext:conf OR ext:ini" -o configs
-
python3 dorkeye.py -d sqli_dorks.txt --stealth --sqli -c 200 -o dorks
- β Always obtain written permission before testing
- β Use only on authorized targets or public data
- β Respect robots.txt and site policies
- β Follow responsible disclosure for findings
- β Never access or download unauthorized data
- β Never use for malicious purposes
- π Use appropriate delays to avoid rate limiting
- π Rotate search terms for better coverage
- π Analyze HTML reports for visual insights
- π― Combine with other OSINT tools (Maltego, theHarvester)
- πΎ Keep dork libraries organized and categorized
- π Integrate findings with vulnerability scanners (SQLMap, Nuclei, Nikto)
DorkEye/
- βββ dorkeye.py # Main script
- βββ requirements.txt # Python dependencies
- βββ setup.sh # Linux/macOS setup script
- βββ setup.bat # Windows setup script
- βββ run_dorkeye.sh # Quick launcher (Linux/macOS)
- βββ run_dorkeye.bat # Quick launcher (Windows)
- βββ INSTALL.md # Detailed installation guide
- βββ README.md # This file
- βββ dorkeye_config.yaml # Sample configuration
- βββ Dorks4SecTest.txt # Example dorks (security test)
- βββ dorks.txt # Your dorks (optional)
- βββ dorkeye_env/ # Virtual environment
- βββ Dump/ # Output directory (auto-created)
- βββ *.csv # CSV exports
- βββ *.json # JSON exports
- βββ *.html # HTML reports
- Multi-threaded searching for faster results
- Active vulnerability scanner integration
- Interactive TUI with textual
- Browser extension for quick dorking
- Cloud storage integration (AWS S3, Google Drive)
- Custom search engine support (Bing, Shodan)
- API endpoint for automation
- Collaborative sharing platform
- Machine learning for dork optimization
-
READ CAREFULLY BEFORE USE
-
This tool is provided for educational, research, and authorized security testing purposes only.
-
βοΈ Unauthorized access to computer systems is illegal in most jurisdictions
-
π Always obtain written permission before testing
-
π Users are solely responsible for compliance with local laws
-
π« The author disclaims all liability for misuse or damages
-
β Use responsibly and ethically at all times
- Use only on authorized targets or public information
- Comply with all applicable laws and regulations
- Not use for malicious, illegal, or unethical purposes
- Take full responsibility for your actions
- Author: xPloits3c
- Email: [email protected]
- GitHub: @xPloits3c
- β Star this repository
- π Report bugs via Issues
- π‘ Suggest features via Discussions
- π€ Fork the repository:
- Copyright (c) 2026 xPloits3c I.C.W.T
Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.