Skip to content

DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login panels or indexed directories.

License

Notifications You must be signed in to change notification settings

xPloits3c/DorkEye

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

99 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

image

DorkEye | Advanced Dorking Tool

Python License Status DuckDuckGo


Repo View Counter

🧠 What is Dork-Eye?

  • Is an automated dorking tool that uses DuckDuckGo to find web resources exposed via OSINT techniques.
  • It can identify indexed directories, restricted files, admin panels and other public vulnerabilities, all in an anonymous and legal way, avoiding CAPTCHAs and blocks typical of mainstream engines.

Search Engine

  • Using DuckDuckGo (via DDGS()) allows to bypass limitations imposed by Google, making the tool more resilient and anonymous.

Why DorkEye?

  • It supports multiple dorks per command string allowing you to get better result in less time, also saves results without double links, fast, secure!

image

✨ Features

  • Search via DuckDuckGo (no CAPTCHA block)
  • Single input or from dork file
  • Save results to .csv file
  • Advanced visualization with rich

⚙️ Install DorkEye

 git clone https://github.com/xPloits3c/DorkEye.git
 cd DorkEye
 pip install -r requirements.txt

⚙️ Requirements

  • Python 3.9+ > "Make sure you have the latest version of python installed."
  • If not installed, you can do it with: sudo apt update sudo apt install python3
  • Modules: rich and duckduckgo-search

🚀 How to use

• Single Dork search

python3 dorkeye.py -d "inurl:admin login" -o admin_panels -c 100

• Multiple Dork search

python3 dorkeye.py -d "site:.ru inurl:russian_cv filetype:pdf" -o RusCV -c 100
python3 dorkeye.py -d dorkeye_dorks.txt -c 60 -o dorkResults

• Options

  • -d / --dork Single dork or .txt file with dork Yes
  • -o / --output Output file name
  • -c / --count Number of results per dork

image

📂 Output Example

File results.csv:

  1. https://example.com/admin/login.php
  2. https://vulnerable.site/index.php?id=1
  3. https://ftp.example.org/files/

image

📌 Project Structure

  • DorkEye/
  • ├── dorkeye.py
  • ├── requirements.txt
  • ├── README.md
  • ├── dorks.txt # (optional)
  • └── results.csv # (generated output)

🔒 Best Practice

  • Use in test environments or with written permission
  • Integrate with vulnerability scanners (e.g. SQLMap, XSStrike, Nikto, Nuclei)
  • Automate with cronjob for periodic OSINT tests

🧩 Future Ideas

  • Active scanner on file output
  • Advanced filters by file type or domain
  • Interactive GUI or TUI with textual

⚠️ Legal Disclaimer

  • This tool is intended for educational, research and authorized testing purposes only.
  • Use of it unethically or against local laws may constitute a crime.
  • The author disclaims all liability for improper use.

🧑‍💻 Author

📜 License

Distributed under MIT License

⭐ Support the project

Do you like this tool? Leave a ⭐

MetaByte Clean and Save Unique: URL’s-Email-Phone-IP’s. 👇

Visit MetaByte on GitHub

---

Releases

No releases published

Packages

No packages published

Languages