DorkEye

image

" πŸ¦… DorkEye | OSINT Dorking Tool "
> I don't hack systems, i expose their secrets <

Python License Status Search Version

Repo views Stars Forks Issues Last Commit

Telegram

image


What is DorkEye

DorkEye is an advanced, automated OSINT DORKING TOOL that leverages its capabilities to discover exposed web assets through intelligent search queries.

startdev4 9 5 startdev4 9 5_0


Why DorkEye

564558417-37385827-9112-4efe-aa0a-f8941da0a2d9


What’s New πŸ₯‡

Feature Details
πŸ§™ Wizard Interactive guided session β€” all options
βš™οΈ Dork Generator YAML template modes: soft / medium / aggressive
🎯 Direct SQLi-XSS Test Test a single URL directly with -u
πŸ“‚ File Re-Processing Re-run SQLi/XSS/analysis/crawl on saved result files with -f
πŸ’‰ SQL Injection 5 methods: 105 payloads
πŸ’‰ XSS Injection 4 methods: 111 payloads
➜] Web Console Matrix-Style local dashboard via browser --ui
πŸšͺ DB Port Scan 15 services,no-auth probes. 3 levels severity --dbscan
πŸ€– Agents Pipeline 13-step autonomous analysis
πŸ›‘οΈ HeaderIntelAgent Info leaks, missing security headers, outdated server
🧬 TechFingerprintAgent 35 technologies detected, CVE dorks generated
πŸ“§ EmailHarvesterAgent Collects and categorizes emails: admin / security / info..
πŸ” PiiDetectorAgent Phone, IBAN, fiscal code, credit card, SSN, DOB
🌐 SubdomainAgent Extracts subdomains and generates queries
πŸ”„ Adaptive Crawl Recursive multi-round dorking
πŸ”‘ HTTP Fingerprinting 22 browser/OS profiles β€” Chrome,Firefox,Safari,mobile..
πŸ“Š Output Formats HTML interactive report β€” all saved to Dump/
πŸ—‚οΈ File Categories 7 auto-detected categories - whitelist / blacklist filtering
πŸ–₯️ Full CLI Reference All 38 flags and every possible combination

Quick Install

"Update:"
  sudo apt update
  sudo apt install -y python3 python3-pip python3-venv git

"Git Clone:"
  git clone https://github.com/xPloits3c/DorkEye.git
  cd DorkEye

"Create environment:"
  python -m venv dorkeye_env

"Activate environment:"
  source dorkeye_env/bin/activate

"Install requirements:"
  pip install -r requirements.txt

"WIZARD MODE:"
  python dorkeye.py --wizard

dev5 0wiz


"Help:"
  python dorkeye.py -h

"Deactivate environment:"
  deactivate

"Remove environment:"
  rm -rf dorkeye_env

Usage

dev5 0usage


πŸ”Ή # WIZARD Mode

  python dorkeye.py --wizard

πŸ”Ή # Basic search

  python dorkeye.py -d "inurl:admin" -o results.txt

πŸ”Ή # Dork Generator + Detection

  python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json

πŸ”Ή # SQLi + stealth

  python dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html

πŸ”Ή # Fast scan

  python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv

πŸ”Ή # Direct SQLi test on a URL

python dorkeye.py -u "https://target.com/page.php?id=1" --sqli --stealth -o result.json

πŸ”Ή # Re-process a saved result file

  python dorkeye.py -f Dump/results.json --sqli --xss --dbscan --analyze -o retest.html

πŸ”Ή # Web Console

  python dorkeye.py --ui

image

Examples:

de-hex


πŸ“ Project Structure

DorkEye/
β”‚ β”œβ”€β”€ dorkeye.py               ← DorkEye Engine
β”‚ β”œβ”€β”€ requirements.txt
β”‚ β”œβ”€β”€ http_fingerprints.json
β”‚ β”œβ”€β”€ README.md
β”‚ /Tools/
β”‚    β”œβ”€β”€ dork_generator.py     ← Dork Generator Queries
β”‚    β”œβ”€β”€ dorkeye_agents.py     ← Agents v3.1 pipeline
β”‚    β”œβ”€β”€ dorkeye_patterns.py   ← Shared pattern library
β”‚    β”œβ”€β”€ dorkeye_analyze.py    ← Standalone analysis CLI
β”‚    β”œβ”€β”€ db_portscan.py   ← Scans exposed database ports
β”‚    β”œβ”€β”€ dorkeye_web.py   ← Local web interface
β”‚    β”œβ”€β”€ sqli.py     ← 5 Method sqli injection(105 payloads)
β”‚    └── xss.py     ← 4 Method xss injection (111 payloads)
β”‚ /Templates/
β”‚    β”œβ”€β”€ dorks_templates.yaml
β”‚    β”œβ”€β”€ sqli.yaml
β”‚    β”œβ”€β”€ osint.yaml
β”‚    β”œβ”€β”€ intel_dorks.yaml
β”‚    β”œβ”€β”€ epstein_files.yaml
β”‚    └── example.yaml
β”‚ /.github/
β”‚    β”œβ”€β”€ CODE_OF_CONDUCT.md
β”‚    β”œβ”€β”€ CONTRIBUTING.md
β”‚    β”œβ”€β”€ SECURITY.md
β”‚    β”œβ”€β”€ pull_request_template.md
β”‚     /ISSUE_TEMPLATE/
β”‚        β”œβ”€β”€ bug_report.md
β”‚        └── feature_request.md
β”‚     /workflows
β”‚        └── claude-dorkeye.yml
β”‚ /Dump/
β”‚    β”œβ”€β”€ *.csv
β”‚    β”œβ”€β”€ *.json
β”‚    β”œβ”€β”€ *.txt
β”‚    └── *.html
β”‚ /Docs/
β”‚    β”œβ”€β”€ cli.md
β”‚    β”œβ”€β”€ wizard.md
β”‚    β”œβ”€β”€ sqli.md
β”‚    β”œβ”€β”€ agents.md
β”‚    β”œβ”€β”€ crawler.md
β”‚    β”œβ”€β”€ fingerprinting.md
β”‚    β”œβ”€β”€ output_formats.md
β”‚    β”œβ”€β”€ file_categories.md
β”‚    β”œβ”€β”€ dork_generator.md
β”‚    β”œβ”€β”€ INSTALL.md
β”‚    β”œβ”€β”€ REPORT_HTML.md
β”‚    β”œβ”€β”€ USAGE.md
β”‚    └── DDGSEE.md
β”‚ /Screeshots
β”‚    β”œβ”€β”€ img0
β”‚    └── img1

Example DorkEye Report

image image


⚠️ WARNING


πŸ“ž Contact

⭐ Support

If you find DorkEye useful, please consider starring the repository 🌟

πŸ“œ License

MIT License Β© 2026 xPloits3c I.C.W.T