https://github.com/xploits3c/dorkeye
DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login panels or indexed directories.
https://github.com/xploits3c/dorkeye
admin cybersecurity dork dorking-list dorking-tool duckduckgo duckduckgo-dork duckduckgo-search google google-dork google-dorks hacker hacking osint python3 sql-injection sql-server vulnerabilities vulnerability-detection xss-injection
Last synced: 4 days ago
JSON representation
DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login panels or indexed directories.
- Host: GitHub
- URL: https://github.com/xploits3c/dorkeye
- Owner: xPloits3c
- License: mit
- Created: 2025-05-22T17:47:28.000Z (6 months ago)
- Default Branch: master
- Last Pushed: 2025-06-02T18:00:07.000Z (5 months ago)
- Last Synced: 2025-06-26T14:05:08.119Z (5 months ago)
- Topics: admin, cybersecurity, dork, dorking-list, dorking-tool, duckduckgo, duckduckgo-dork, duckduckgo-search, google, google-dork, google-dorks, hacker, hacking, osint, python3, sql-injection, sql-server, vulnerabilities, vulnerability-detection, xss-injection
- Language: Python
- Homepage: https://github.com/xPloits3c/DorkEye
- Size: 176 KB
- Stars: 47
- Watchers: 3
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README

# DorkEye | Advanced Dorking Tool




---

## 🧠 What is Dork-Eye?
- Is an automated **dorking** tool that uses **DuckDuckGo** to find web resources exposed via OSINT techniques.
- It can identify indexed directories, restricted files, admin panels and other public vulnerabilities, all in an **anonymous and legal** way, avoiding CAPTCHAs and blocks typical of mainstream engines.
> Search Engine
- Using DuckDuckGo (via DDGS()) allows to bypass limitations imposed by Google, making the tool more resilient and anonymous.
> Why DorkEye?
- It supports multiple dorks per command string allowing you to get better result in less time, also saves results without double links, fast, secure!

## ✨ Features
- Search via **DuckDuckGo** (no CAPTCHA block)
- Single input or from **dork file**
- Save results to **.csv file**
- **Advanced visualization** with `rich`
---
## ⚙️ Install DorkEye
```bash
git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
pip install -r requirements.txt
```
## ⚙️ Requirements
- Python 3.9+ > "Make sure you have the latest version of python installed."
- If not installed, you can do it with:
`sudo apt update`
`sudo apt install python3`
- Modules:
`rich` and `duckduckgo-search`
## 🚀 How to use
• Single Dork search
```
python3 dorkeye.py -d "inurl:admin login" -o admin_panels -c 100
```
• Multiple Dork search
```
python3 dorkeye.py -d "site:.ru inurl:russian_cv filetype:pdf" -o RusCV -c 100
python3 dorkeye.py -d dorkeye_dorks.txt -c 60 -o dorkResults
```
• Options
- `-d` / --dork Single dork or .txt file with dork
- `-o` / --output Output file name
- `-c` / --count Number of results per dork

## 📂 Output Example
File `results.csv`:
1. https://example.com/admin/login.php
2. https://vulnerable.site/index.php?id=1
3. https://ftp.example.org/files/

## 📌 Project Structure
- `DorkEye/`
- `├── dorkeye.py`
- `├── requirements.txt`
- `├── README.md`
- `├── dorks.txt # (optional)`
- `└── results.csv # (generated output)`
## 🔒 Best Practice
- Use in test environments or with written permission
- Integrate with vulnerability scanners (e.g. SQLMap, XSStrike, Nikto, Nuclei)
- Automate with cronjob for periodic OSINT tests
## 🧩 Future Ideas
- Active scanner on file output
- Advanced filters by file type or domain
- Interactive GUI or TUI with textual
---
## ⚠️ Legal Disclaimer
- This tool is intended for educational, research and authorized testing purposes only.
- Use of it unethically or against local laws may constitute a crime.
- The author disclaims all liability for improper use.
---
## 🧑💻 Author
- xPloits3c
- Contact: whitehat.report@onionmail.org
## 📜 License
Distributed under MIT License
## ⭐ Support the project
Hit a ⭐
---