https://github.com/xPloits3c/DorkEye
Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also tests SQLi, Analyzes and extracts metadata
https://github.com/xPloits3c/DorkEye
awesome cybersecurity dork dorking-list duckduckgo duckduckgo-dork duckduckgo-search google-dork google-dorks hacker hacking osint osint-tool python3 sql-injection sql-server sqlite vulnerabilities xss-injection
Last synced: 3 days ago
JSON representation
Automated Google Dorking Tool. Generates and runs advanced search queries for exposed files. It also tests SQLi, Analyzes and extracts metadata
- Host: GitHub
- URL: https://github.com/xPloits3c/DorkEye
- Owner: xPloits3c
- License: other
- Created: 2025-05-22T17:47:28.000Z (11 months ago)
- Default Branch: master
- Last Pushed: 2026-04-10T23:08:32.000Z (18 days ago)
- Last Synced: 2026-04-11T00:20:21.134Z (18 days ago)
- Topics: awesome, cybersecurity, dork, dorking-list, duckduckgo, duckduckgo-dork, duckduckgo-search, google-dork, google-dorks, hacker, hacking, osint, osint-tool, python3, sql-injection, sql-server, sqlite, vulnerabilities, xss-injection
- Language: Python
- Homepage: https://xploits3c.github.io/DorkEye/
- Size: 8.03 MB
- Stars: 99
- Watchers: 4
- Forks: 18
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- Contributing: .github/CONTRIBUTING.md
- License: LICENSE
- Code of conduct: .github/CODE_OF_CONDUCT.md
- Security: .github/SECURITY.md
- Agents: Docs/agents.md
Awesome Lists containing this project
- awesome-osint - DorkEye - DorkEye is a Python-based OSINT framework for automated Google Dorking. It includes an interactive wizard for guided configuration, a dork generator to build and customize queries, a multi-agent analysis pipeline with SQLi detection, secrets scanning, security analysis, and advanced HTML report export with selective result saving β allowing accurate, targeted inclusion of findings. ([β](#-google-dorks-tools) Google Dorks Tools)
README
---
```json
" π¦
DorkEye | OSINT Dorking Tool "
> I don't hack systems, i expose their secrets <
```










[](#)

---
## What is DorkEye
**DorkEye** is an advanced automated dorking and OSINT recon tool that leverages DuckDuckGo to discover exposed web resources through intelligent search queries.
- It combines a powerful dork generator, a full SQL injection detection engine, a 11-step autonomous analysis pipeline, and an adaptive recursive crawler β all without requiring any external AI or cloud services.
- It can identify indexed directories, sensitive files, admin panels, databases, backups, configuration files, credentials, PII data, subdomains, and technology fingerprints β efficiently and with stealth controls.

---
## Why DorkEye
- Bypass CAPTCHA and rateβlimiting
- Advanced .html report interactive
- Maintain anonymity and avoid IP blocking
- Clean and unfiltered search results
- Advanced analysis and automated SQLi testing
- Continue Dorking for hours, DorkEye wonβt get banned.

---
## Whatβs New π₯
| Feature | Details |
|---------|---------|
| π§ Wizard | [Interactive guided session β all options](Docs/wizard.md) |
| βοΈ Dork Generator | [YAML template modes: `soft` / `medium` / `aggressive`](Docs/dork_generator.md) |
| π― Direct SQLi Test | [Test a single URL directly with `-u`](Docs/sqli.md) |
| π File Re-Processing | [Re-run SQLi / analysis / crawl on saved result files with `-f`](Docs/cli.md) |
| π SQL Injection | [5 methods: 105 payloads](Docs/sqli.md) |
| π XSS Injection | [4 methods: 111 payloads](Docs/xss.md) |
| π€ Agents v3.1 Pipeline | [11-step autonomous analysis](Docs/agents.md) |
| π‘οΈ HeaderIntelAgent | [Info leaks, missing security headers, outdated server](Docs/agents.md#headerintelagent) |
| 𧬠TechFingerprintAgent | [35 technologies detected, CVE dorks generated](Docs/agents.md#techfingerprintagent) |
| π§ EmailHarvesterAgent | [Collects and categorizes emails: admin / security / info..](Docs/agents.md#emailharvesteragent) |
| π PiiDetectorAgent | [Phone, IBAN, fiscal code, credit card, SSN, DOB](Docs/agents.md#piidetectoragent) |
| π SubdomainAgent | [Extracts subdomains and generates `queries`](Docs/agents.md#subdomainharvesteragent) |
| π Adaptive Crawl | [Recursive multi-round dorking](Docs/crawler.md) |
| π HTTP Fingerprinting | [22 browser/OS profiles β Chrome,Firefox,Safari,mobile..](Docs/fingerprinting.md) |
| π Output Formats | [HTML interactive report β all saved to `Dump/`](Docs/output_formats.md) |
| ποΈ File Categories | [7 auto-detected categories - whitelist / blacklist filtering](Docs/file_categories.md) |
| π₯οΈ Full CLI Reference | [All 31 flags and every possible combination](Docs/cli.md) |
---
## Quick Install
```json
"Update:"
sudo apt update
sudo apt install -y python3 python3-pip python3-venv git
"Git Clone:"
git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
"Create environment:"
python -m venv dorkeye_env
"Activate environment:"
source dorkeye_env/bin/activate
"Install requirements:"
pip install -r requirements.txt
"WIZARD MODE:"
python dorkeye.py --wizard
```

---
```json
"Help:"
python dorkeye.py -h
"Deactivate environment:"
deactivate
"Remove environment:"
rm -rf dorkeye_env
```
---
## Usage

πΉ # WIZARD Mode
```json
python dorkeye.py --wizard
```
πΉ # Basic search
```json
python dorkeye.py -d "inurl:admin" -o results.txt
```
πΉ # Dork Generator + Detection
```json
python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json
```
πΉ # SQLi + stealth
```json
python dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html
```
πΉ # Fast scan
```json
python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv
```
πΉ # Direct SQLi test on a URL
```json
python dorkeye.py -u "https://target.com/page.php?id=1" --sqli --stealth -o result.json
```
πΉ # Re-process a saved result file
```json
python dorkeye.py -f Dump/results.json --sqli --analyze -o retest.html
```

---
## π Project Structure
```
DorkEye/
β βββ dorkeye.py β DorkEye Engine
β βββ requirements.txt
β βββ http_fingerprints.json
β βββ README.md
β /Tools/
β βββ dork_generator.py β Dork Generator Queries
β βββ dorkeye_agents.py β Agents v3.1 pipeline
β βββ dorkeye_patterns.py β Shared pattern library
β βββ dorkeye_analyze.py β Standalone analysis CLI
β βββ sqli.py β 5 method sqli injection(105 payloads)
β βββ xss.py β 4 method xss injection (111 payloads)
β /Templates/
β βββ dorks_templates.yaml
β βββ sqli.yaml
β βββ osint.yaml
β βββ intel_dorks.yaml
β βββ epstein_files.yaml
β βββ example.yaml
β /.github/
β βββ CODE_OF_CONDUCT.md
β βββ CONTRIBUTING.md
β βββ SECURITY.md
β βββ pull_request_template.md
β /ISSUE_TEMPLATE/
β βββ bug_report.md
β βββ feature_request.md
β /workflows
β βββ claude-dorkeye.yml
β /Dump/
β βββ *.csv
β βββ *.json
β βββ *.txt
β βββ *.html
β /Docs/
β βββ cli.md
β βββ wizard.md
β βββ sqli.md
β βββ agents.md
β βββ crawler.md
β βββ fingerprinting.md
β βββ output_formats.md
β βββ file_categories.md
β βββ dork_generator.md
β βββ INSTALL.md
β βββ REPORT_HTML.md
β βββ USAGE.md
β βββ DDGSEE.md
```
---
## Example HTML Report

## Example final Report

---
## β οΈ 
- **This tool is for educational, research, and authorized security testing only.**
- **Unauthorized access is illegal.**
- **The author is not responsible for misuse.**
---
## π Contact
- **Author:** xPloits3c
- **Email:** whitehat.report@onionmail.org
- **Telegram:** https://t.me/DorkEye
---
## β Support
If you find DorkEye useful, please consider starring the repository π
---
## π License
MIT License Β© 2026 xPloits3c I.C.W.T