" π¦
DorkEye | OSINT Dorking Tool "
> I don't hack systems, i expose their secrets <
DorkEye is an advanced automated dorking and OSINT recon tool that leverages DuckDuckGo to discover exposed web resources through intelligent search queries.
It combines a powerful dork generator, a full SQL injection detection engine, a 11-step autonomous analysis pipeline, and an adaptive recursive crawler β all without requiring any external AI or cloud services.
It can identify indexed directories, sensitive files, admin panels, databases, backups, configuration files, credentials, PII data, subdomains, and technology fingerprints β efficiently and with stealth controls.
"Update:"
sudo apt update
sudo apt install -y python3 python3-pip python3-venv git
"Git Clone:"
git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
"Create environment:"
python -m venv dorkeye_env
"Activate environment:"
source dorkeye_env/bin/activate
"Install requirements:"
pip install -r requirements.txt
"WIZARD MODE:"
python dorkeye.py --wizard
"Help:"
python dorkeye.py -h
"Deactivate environment:"
deactivate
"Remove environment:"
rm -rf dorkeye_env
πΉ # WIZARD Mode
python dorkeye.py --wizard
πΉ # Basic search
python dorkeye.py -d "inurl:admin" -o results.txt
πΉ # Dork Generator + Detection
python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json
πΉ # SQLi + stealth
python dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html
πΉ # Fast scan
python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv
πΉ # Direct SQLi test on a URL
python dorkeye.py -u "https://target.com/page.php?id=1" --sqli --stealth -o result.json
πΉ # Re-process a saved result file
python dorkeye.py -f Dump/results.json --sqli --analyze -o retest.html
DorkEye/
β βββ dorkeye.py β DorkEye Engine
β βββ requirements.txt
β βββ http_fingerprints.json
β βββ README.md
β /Tools/
β βββ dork_generator.py β Dork Generator Queries
β βββ dorkeye_agents.py β Agents v3.1 pipeline
β βββ dorkeye_patterns.py β Shared pattern library
β βββ dorkeye_analyze.py β Standalone analysis CLI
β βββ sqli.py β 4 method sqli injection(14 payloads)
β βββ xss.py β 4 method xss injection (51 payloads)
β /Templates/
β βββ dorks_templates.yaml
β βββ sqli.yaml
β βββ osint.yaml
β βββ intel_dorks.yaml
β βββ epstein_files.yaml
β βββ example.yaml
β /.github/
β βββ CODE_OF_CONDUCT.md
β βββ CONTRIBUTING.md
β βββ SECURITY.md
β βββ pull_request_template.md
β /ISSUE_TEMPLATE/
β βββ bug_report.md
β βββ feature_request.md
β /workflows
β βββ claude-dorkeye.yml
β /Dump/
β βββ *.csv
β βββ *.json
β βββ *.txt
β βββ *.html
β /Docs/
β βββ cli.md
β βββ wizard.md
β βββ sqli.md
β βββ agents.md
β βββ crawler.md
β βββ fingerprinting.md
β βββ output_formats.md
β βββ file_categories.md
β βββ dork_generator.md
β βββ INSTALL.md
β βββ REPORT_HTML.md
β βββ USAGE.md
β βββ DDGSEE.md
MIT License Β© 2026 xPloits3c I.C.W.T