{"id":48665837,"url":"https://github.com/xPloits3c/DorkEye","last_synced_at":"2026-04-26T05:00:40.007Z","repository":{"id":294928660,"uuid":"988543312","full_name":"xPloits3c/DorkEye","owner":"xPloits3c","description":"Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also tests SQLi, Analyzes and extracts metadata ","archived":false,"fork":false,"pushed_at":"2026-04-10T23:08:32.000Z","size":8419,"stargazers_count":99,"open_issues_count":0,"forks_count":18,"subscribers_count":4,"default_branch":"master","last_synced_at":"2026-04-11T00:20:21.134Z","etag":null,"topics":["awesome","cybersecurity","dork","dorking-list","duckduckgo","duckduckgo-dork","duckduckgo-search","google-dork","google-dorks","hacker","hacking","osint","osint-tool","python3","sql-injection","sql-server","sqlite","vulnerabilities","xss-injection"],"latest_commit_sha":null,"homepage":"https://xploits3c.github.io/DorkEye/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"other","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/xPloits3c.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":".github/CONTRIBUTING.md","funding":null,"license":"LICENSE","code_of_conduct":".github/CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":".github/SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":"Docs/agents.md","dco":null,"cla":null}},"created_at":"2025-05-22T17:47:28.000Z","updated_at":"2026-04-10T23:08:35.000Z","dependencies_parsed_at":"2025-05-22T19:04:25.630Z","dependency_job_id":"9220f021-356f-4e50-b0cc-b7d1fcd1c67b","html_url":"https://github.com/xPloits3c/DorkEye","commit_stats":null,"previous_names":["xploits3c/dorkeye"],"tags_count":17,"template":false,"template_full_name":null,"purl":"pkg:github/xPloits3c/DorkEye","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xPloits3c%2FDorkEye","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xPloits3c%2FDorkEye/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xPloits3c%2FDorkEye/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xPloits3c%2FDorkEye/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/xPloits3c","download_url":"https://codeload.github.com/xPloits3c/DorkEye/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/xPloits3c%2FDorkEye/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":32286271,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-04-25T18:29:39.964Z","status":"online","status_checked_at":"2026-04-26T02:00:05.962Z","response_time":129,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["awesome","cybersecurity","dork","dorking-list","duckduckgo","duckduckgo-dork","duckduckgo-search","google-dork","google-dorks","hacker","hacking","osint","osint-tool","python3","sql-injection","sql-server","sqlite","vulnerabilities","xss-injection"],"created_at":"2026-04-10T11:00:23.443Z","updated_at":"2026-04-26T05:00:39.997Z","avatar_url":"https://github.com/xPloits3c.png","language":"Python","readme":"\u003cdiv align=\"center\"\u003e\n\u003cimg width=\"1536\" height=\"1024\" alt=\"image\" src=\"https://github.com/user-attachments/assets/cceb7da1-c8cc-4a42-836e-30acc9443ff6\" /\u003e\n\n\u003c/div\u003e\n\n---\n\n```json\n\" 🦅 DorkEye | OSINT Dorking Tool \"\n\u003e I don't hack systems, i expose their secrets \u003c\n```\n\n\u003c!-- ── Row 1: Project identity ── --\u003e\n![Python](https://img.shields.io/badge/Python-3.9%2B-3670A0?style=flat-square\u0026logo=python\u0026logoColor=ffdd54)\n![License](https://img.shields.io/badge/License-MIT-green?style=flat-square)\n![Status](https://img.shields.io/badge/Status-Stable-brightgreen?style=flat-square)\n![Search](https://img.shields.io/badge/Search-DuckDuckGo-FF6600?style=flat-square\u0026logo=duckduckgo\u0026logoColor=white)\n![Version](https://img.shields.io/badge/Version-4.8-brightgreen?style=flat-square)\n\n\u003c!-- ── Row 2: Live stats ── --\u003e\n![Repo views](https://komarev.com/ghpvc/?username=xPloits3c\u0026label=DorkEye%20views\u0026color=blue)\n![Stars](https://img.shields.io/github/stars/xPloits3c/DorkEye?style=flat-square\u0026logo=github\u0026label=Stars\u0026color=yellow)\n![Forks](https://img.shields.io/github/forks/xPloits3c/DorkEye?style=flat-square\u0026logo=github\u0026label=Forks\u0026color=lightgrey)\n![Issues](https://img.shields.io/github/issues/xPloits3c/DorkEye?style=flat-square\u0026logo=github\u0026label=Issues\u0026color=brightgreen)\n![Last Commit](https://img.shields.io/github/last-commit/xPloits3c/DorkEye?style=flat-square\u0026logo=github\u0026label=Last+Commit\u0026color=informational)\n\n\u003c!-- ── Row 3: Community ── --\u003e\n[![Telegram](https://img.shields.io/badge/Join-Telegram-26A5E4?style=flat-square\u0026logo=telegram\u0026logoColor=white)](#)\n\n![image](https://github.com/user-attachments/assets/c52b3326-6224-4fd5-9d41-d9f22e887b7a)\n\n---\n\n## What is DorkEye\n**DorkEye** is an advanced automated dorking and OSINT recon tool that leverages DuckDuckGo to discover exposed web resources through intelligent search queries.\n- It combines a powerful dork generator, a full SQL injection detection engine, a 11-step autonomous analysis pipeline, and an adaptive recursive crawler — all without requiring any external AI or cloud services.\n\n- It can identify indexed directories, sensitive files, admin panels, databases, backups, configuration files, credentials, PII data, subdomains, and technology fingerprints — efficiently and with stealth controls.\n\n\u003cimg width=\"1186\" height=\"778\" alt=\"startdev4 9 5\" src=\"https://github.com/user-attachments/assets/82056363-5f7a-4fe8-9aa1-df662e09796b\" /\u003e\n\u003cimg width=\"1202\" height=\"832\" alt=\"startdev4 9 5_0\" src=\"https://github.com/user-attachments/assets/1f593af6-5908-4f35-b2b9-fe7f89417589\" /\u003e\n\n---\n\n## Why DorkEye\n\n- Bypass CAPTCHA and rate‑limiting\n- Advanced .html report interactive\n- Maintain anonymity and avoid IP blocking\n- Clean and unfiltered search results\n- Advanced analysis and automated SQLi testing\n- Continue Dorking for hours, DorkEye won’t get banned.\n\n\u003cimg width=\"1437\" height=\"652\" alt=\"564558417-37385827-9112-4efe-aa0a-f8941da0a2d9\" src=\"https://github.com/user-attachments/assets/df21ead3-dd90-4692-9eab-259c6582ae86\" /\u003e\n\n---\n\n## What’s New 🥇\n\n| Feature | Details |\n|---------|---------|\n| 🧙 Wizard | [Interactive guided session — all options](Docs/wizard.md) |\n| ⚙️ Dork Generator | [YAML template modes: `soft` / `medium` / `aggressive`](Docs/dork_generator.md) |\n| 🎯 Direct SQLi Test | [Test a single URL directly with `-u`](Docs/sqli.md) |\n| 📂 File Re-Processing | [Re-run SQLi / analysis / crawl on saved result files with `-f`](Docs/cli.md) |\n| 💉 SQL Injection | [5 methods: 105 payloads](Docs/sqli.md) |\n| 💉 XSS Injection | [4 methods: 111 payloads](Docs/xss.md) |\n| 🤖 Agents v3.1 Pipeline | [11-step autonomous analysis](Docs/agents.md) |\n| 🛡️ HeaderIntelAgent | [Info leaks, missing security headers, outdated server](Docs/agents.md#headerintelagent) |\n| 🧬 TechFingerprintAgent | [35 technologies detected, CVE dorks generated](Docs/agents.md#techfingerprintagent) |\n| 📧 EmailHarvesterAgent | [Collects and categorizes emails: admin / security / info..](Docs/agents.md#emailharvesteragent) |\n| 🔐 PiiDetectorAgent | [Phone, IBAN, fiscal code, credit card, SSN, DOB](Docs/agents.md#piidetectoragent) |\n| 🌐 SubdomainAgent | [Extracts subdomains and generates `queries`](Docs/agents.md#subdomainharvesteragent) |\n| 🔄 Adaptive Crawl | [Recursive multi-round dorking](Docs/crawler.md) |\n| 🔑 HTTP Fingerprinting | [22 browser/OS profiles — Chrome,Firefox,Safari,mobile..](Docs/fingerprinting.md) |\n| 📊 Output Formats | [HTML interactive report — all saved to `Dump/`](Docs/output_formats.md) |\n| 🗂️ File Categories | [7 auto-detected categories - whitelist / blacklist filtering](Docs/file_categories.md) |\n| 🖥️ Full CLI Reference | [All 31 flags and every possible combination](Docs/cli.md) |\n\n---\n\n## Quick Install\n```json\n\"Update:\"\n  sudo apt update\n  sudo apt install -y python3 python3-pip python3-venv git\n\n\"Git Clone:\"\n  git clone https://github.com/xPloits3c/DorkEye.git\n  cd DorkEye\n\n\"Create environment:\"\n  python -m venv dorkeye_env\n\n\"Activate environment:\"\n  source dorkeye_env/bin/activate\n\n\"Install requirements:\"\n  pip install -r requirements.txt\n\n\"WIZARD MODE:\"\n  python dorkeye.py --wizard\n```\n\n\u003cimg width=\"1175\" height=\"982\" alt=\"dev5 0wiz\" src=\"https://github.com/user-attachments/assets/79253966-b2ed-431e-9d46-aaa8d8297c82\" /\u003e\n\n---\n\n```json\n\"Help:\"\n  python dorkeye.py -h\n\n\"Deactivate environment:\"\n  deactivate\n\n\"Remove environment:\"\n  rm -rf dorkeye_env\n```\n---\n\n## Usage \n\n\u003cimg width=\"1141\" height=\"948\" alt=\"de-h\" src=\"https://github.com/user-attachments/assets/99fe8d3a-822a-4bfe-97b1-62897db6db1d\" /\u003e\n\n🔹 # WIZARD Mode\n```json\n  python dorkeye.py --wizard\n```\n🔹 # Basic search\n```json\n  python dorkeye.py -d \"inurl:admin\" -o results.txt\n```\n🔹 # Dork Generator + Detection\n```json\n  python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json\n```\n🔹 # SQLi + stealth\n```json\n  python dorkeye.py -d \"site:example.com .php?id=\" --sqli --stealth -o scan.html\n```\n🔹 # Fast scan\n```json\n  python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv\n```\n🔹 # Direct SQLi test on a URL\n  ```json\npython dorkeye.py -u \"https://target.com/page.php?id=1\" --sqli --stealth -o result.json\n```\n🔹 # Re-process a saved result file\n```json\n  python dorkeye.py -f Dump/results.json --sqli --analyze -o retest.html\n```\n\n\u003cimg width=\"938\" height=\"832\" alt=\"de-hex\" src=\"https://github.com/user-attachments/assets/da253967-45a7-4249-aed2-9726eaa37b79\" /\u003e\n\n---\n\n## 📁 Project Structure\n```\nDorkEye/\n│ ├── dorkeye.py               ← DorkEye Engine\n│ ├── requirements.txt\n│ ├── http_fingerprints.json\n│ ├── README.md\n│ /Tools/\n│    ├── dork_generator.py     ← Dork Generator Queries\n│    ├── dorkeye_agents.py     ← Agents v3.1 pipeline\n│    ├── dorkeye_patterns.py   ← Shared pattern library\n│    ├── dorkeye_analyze.py    ← Standalone analysis CLI\n│    ├── sqli.py     ← 5 method sqli injection(105 payloads)\n│    └── xss.py     ← 4 method xss injection (111 payloads)\n│ /Templates/\n│    ├── dorks_templates.yaml\n│    ├── sqli.yaml\n│    ├── osint.yaml\n│    ├── intel_dorks.yaml\n│    ├── epstein_files.yaml\n│    └── example.yaml\n│ /.github/\n│    ├── CODE_OF_CONDUCT.md\n│    ├── CONTRIBUTING.md\n│    ├── SECURITY.md\n│    ├── pull_request_template.md\n│     /ISSUE_TEMPLATE/\n│        ├── bug_report.md\n│        └── feature_request.md\n│     /workflows\n│        └── claude-dorkeye.yml\n│ /Dump/\n│    ├── *.csv\n│    ├── *.json\n│    ├── *.txt\n│    └── *.html\n│ /Docs/\n│    ├── cli.md\n│    ├── wizard.md\n│    ├── sqli.md\n│    ├── agents.md\n│    ├── crawler.md\n│    ├── fingerprinting.md\n│    ├── output_formats.md\n│    ├── file_categories.md\n│    ├── dork_generator.md\n│    ├── INSTALL.md\n│    ├── REPORT_HTML.md\n│    ├── USAGE.md\n│    └── DDGSEE.md\n```\n---\n\n## Example HTML Report\n![image](https://github.com/user-attachments/assets/28b71d4e-0cb2-478d-a1f2-f49c98f9f8aa)\n\n## Example final Report\n![image](https://github.com/user-attachments/assets/20055807-2f9d-4979-b221-e0cfad32828a)\n\n---\n\n## ⚠️  ![WARNING](https://img.shields.io/badge/Legal%20Disclaimer-red)\n-   **This tool is for educational, research, and authorized security testing only.**\n-   **Unauthorized access is illegal.**\n-   **The author is not responsible for misuse.**\n    \n---\n\n## 📞 Contact\n\n- **Author:** xPloits3c  \n- **Email:** whitehat.report@onionmail.org  \n- **Telegram:** https://t.me/DorkEye  \n---\n\n## ⭐ Support\n\nIf you find DorkEye useful, please consider starring the repository 🌟\n---\n\n## 📜 License\n\nMIT License © 2026 xPloits3c I.C.W.T\n","funding_links":[],"categories":["[↑](#-google-dorks-tools) Google Dorks Tools"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FxPloits3c%2FDorkEye","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FxPloits3c%2FDorkEye","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FxPloits3c%2FDorkEye/lists"}