DorkEye

DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login panels or indexed directories.

40
4
Python

image

DorkEye | Advanced Dorking Tool

Python
License
Status
DuckDuckGo


Repo View Counter

🧠 What is Dork-Eye?

  • Is an automated dorking tool that uses DuckDuckGo to find web resources exposed via OSINT techniques.
  • It can identify indexed directories, restricted files, admin panels and other public vulnerabilities, all in an anonymous and legal way, avoiding CAPTCHAs and blocks typical of mainstream engines.

Search Engine

  • Using DuckDuckGo (via DDGS()) allows to bypass limitations imposed by Google, making the tool more resilient and anonymous.

Why DorkEye?

  • It supports multiple dorks per command string allowing you to get better result in less time, also saves results without double links, fast, secure!

image

✨ Features

  • Search via DuckDuckGo (no CAPTCHA block)
  • Single input or from dork file
  • Save results to .csv file
  • Advanced visualization with rich

⚙️ Install DorkEye

 git clone https://github.com/xPloits3c/DorkEye.git
 cd DorkEye
 pip install -r requirements.txt

⚙️ Requirements

  • Python 3.9+ > “Make sure you have the latest version of python installed.”
  • If not installed, you can do it with:
    sudo apt update
    sudo apt install python3
  • Modules:
    rich and duckduckgo-search

🚀 How to use

• Single Dork search

python3 dorkeye.py -d "inurl:admin login" -o admin_panels -c 100

• Multiple Dork search

python3 dorkeye.py -d "site:.ru inurl:russian_cv filetype:pdf" -o RusCV -c 100
python3 dorkeye.py -d dorkeye_dorks.txt -c 60 -o dorkResults

• Options

  • -d / --dork Single dork or .txt file with dork Yes
  • -o / --output Output file name
  • -c / --count Number of results per dork

image

📂 Output Example

File results.csv:

  1. https://example.com/admin/login.php
  2. https://vulnerable.site/index.php?id=1
  3. https://ftp.example.org/files/

image

📌 Project Structure

  • DorkEye/
  • ├── dorkeye.py
  • ├── requirements.txt
  • ├── README.md
  • ├── dorks.txt # (optional)
  • └── results.csv # (generated output)

🔒 Best Practice

  • Use in test environments or with written permission
  • Integrate with vulnerability scanners (e.g. SQLMap, XSStrike, Nikto, Nuclei)
  • Automate with cronjob for periodic OSINT tests

🧩 Future Ideas

  • Active scanner on file output
  • Advanced filters by file type or domain
  • Interactive GUI or TUI with textual

⚠️ Legal Disclaimer

  • This tool is intended for educational, research and authorized testing purposes only.
  • Use of it unethically or against local laws may constitute a crime.
  • The author disclaims all liability for improper use.

🧑‍💻 Author

📜 License

Distributed under MIT License

⭐ Support the project

Do you like this tool? Leave a ⭐

MetaByte Clean and Save Unique: URL’s-Email-Phone-IP’s. 👇

---