" π¦
DorkEye | OSINT Dorking Tool "
> I don't hack systems, i expose their secrets <
DorkEye is an advanced, automated OSINT DORKING TOOL that leverages its capabilities to discover exposed web assets through intelligent search queries.
It combines a powerful dork generator, a full SQL,XSS injection detection engine, a 13-step autonomous analysis pipeline, an adaptive recursive crawler and Database port scanner.
It can identify indexed directories, sensitive files, admin panels, databases, backups, configuration files, credentials, PII data, subdomains, and technology fingerprints β efficiently and with stealth controls.
"Update:"
sudo apt update
sudo apt install -y python3 python3-pip python3-venv git
"Git Clone:"
git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
"Create environment:"
python -m venv dorkeye_env
"Activate environment:"
source dorkeye_env/bin/activate
"Install requirements:"
pip install -r requirements.txt
"WIZARD MODE:"
python dorkeye.py --wizard
"Help:"
python dorkeye.py -h
"Deactivate environment:"
deactivate
"Remove environment:"
rm -rf dorkeye_env
πΉ # WIZARD Mode
python dorkeye.py --wizard
πΉ # Basic search
python dorkeye.py -d "inurl:admin" -o results.txt
πΉ # Dork Generator + Detection
python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json
πΉ # SQLi + stealth
python dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html
πΉ # Fast scan
python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv
πΉ # Direct SQLi test on a URL
python dorkeye.py -u "https://target.com/page.php?id=1" --sqli --stealth -o result.json
πΉ # Re-process a saved result file
python dorkeye.py -f Dump/results.json --sqli --xss --dbscan --analyze -o retest.html
πΉ # Web Console
python dorkeye.py --ui
DorkEye/
β βββ dorkeye.py β DorkEye Engine
β βββ requirements.txt
β βββ http_fingerprints.json
β βββ README.md
β /Tools/
β βββ dork_generator.py β Dork Generator Queries
β βββ dorkeye_agents.py β Agents v3.1 pipeline
β βββ dorkeye_patterns.py β Shared pattern library
β βββ dorkeye_analyze.py β Standalone analysis CLI
β βββ db_portscan.py β Scans exposed database ports
β βββ dorkeye_web.py β Local web interface
β βββ sqli.py β 5 Method sqli injection(105 payloads)
β βββ xss.py β 4 Method xss injection (111 payloads)
β /Templates/
β βββ dorks_templates.yaml
β βββ sqli.yaml
β βββ osint.yaml
β βββ intel_dorks.yaml
β βββ epstein_files.yaml
β βββ example.yaml
β /.github/
β βββ CODE_OF_CONDUCT.md
β βββ CONTRIBUTING.md
β βββ SECURITY.md
β βββ pull_request_template.md
β /ISSUE_TEMPLATE/
β βββ bug_report.md
β βββ feature_request.md
β /workflows
β βββ claude-dorkeye.yml
β /Dump/
β βββ *.csv
β βββ *.json
β βββ *.txt
β βββ *.html
β /Docs/
β βββ cli.md
β βββ wizard.md
β βββ sqli.md
β βββ agents.md
β βββ crawler.md
β βββ fingerprinting.md
β βββ output_formats.md
β βββ file_categories.md
β βββ dork_generator.md
β βββ INSTALL.md
β βββ REPORT_HTML.md
β βββ USAGE.md
β βββ DDGSEE.md
β /Screeshots
β βββ img0
β βββ img1
MIT License Β© 2026 xPloits3c I.C.W.T