DorkEye

Output Formats — DorkEye Project

All result files are saved to the Dump/ folder, created automatically in the same directory as dorkeye.py.


Specify Output

python dorkeye.py -d "site:example.com" -o results.html   # HTML report
python dorkeye.py -d "site:example.com" -o results.json   # JSON + analysis prompt
python dorkeye.py -d "site:example.com" -o results.csv    # CSV spreadsheet
python dorkeye.py -d "site:example.com" -o results.txt    # Plain text

If -o is omitted, DorkEye generates: report_YYYYMMDD_HHMMSS.html


HTML Report

The default and most feature-rich format. Opens in any browser — no server required.

Interface elements

Filter bar (left side):

Right-side panels:

Results table columns:

ⓘ Detail popup (v4.8): clicking the button on any row opens a floating panel with:

Field Content
URL Full URL (truncated at 80 chars)
Title Page title
Category File category
Extension File extension
Size Formatted file size
Timestamp Discovery time
Dork Dork that produced this result
Snippet DDG body snippet (120 chars)
SQLi Status Confidence level
Method / Payload Test method(s) and evidence
WAF WAF name if detected

The popup closes on ✕ click or click-outside. Positioning is viewport-aware.

Matrix rain background — animated green character rain (toggle: reduce motion for accessibility).


JSON

python dorkeye.py -d "site:example.com" -o results.json

When the output is .json, DorkEye prompts after the search:

“Vuoi analizzare i risultati? [y/N]”

Use --analyze to skip the prompt and force yes.

Structure

{
  "metadata": {
    "total_results": 42,
    "generated_at": "2026-03-21 14:30:00",
    "sqli_detection_enabled": true,
    "sqli_vulnerabilities_found": 3,
    "waf_blocked_count": 1,
    "http_fingerprinting_enabled": true,
    "stealth_mode": false,
    "statistics": { "total_found": 48, "duplicates": 6, "..." }
  },
  "results": [
    {
      "url":          "https://target.com/page.php?id=1",
      "title":        "Page title",
      "snippet":      "DDG body snippet...",
      "dork":         "inurl:.php?id=",
      "timestamp":    "2026-03-21 14:25:11",
      "extension":    ".php",
      "category":     "scripts",
      "file_size":    null,
      "content_type": null,
      "accessible":   null,
      "status_code":  null,
      "sqli_test": {
        "tested":             true,
        "vulnerable":         true,
        "overall_confidence": "high",
        "waf_detected":       null,
        "message":            "Tested 2 parameter(s)",
        "tests": [
          {
            "method":     "error_based",
            "vulnerable": true,
            "confidence": "high",
            "evidence":   ["MYSQL error signature matched: extractvalue(0,...)"]
          }
        ]
      }
    }
  ]
}

Analysis report JSON (from --analyze --analyze-fmt json)

{
  "meta":       { "generated_at": "...", "target": "...", "engine": "DorkEye v4.8 + Agents v3.0" },
  "metrics":    { "total": 42, "by_label": { "CRITICAL": 3, "HIGH": 8, "..." }, "secrets": 5, "pii": 2, "emails": 7, "subdomains": 4 },
  "secrets":    [{ "type": "AWS_KEY", "severity": "CRITICAL", "value": "AKIA…", "..." }],
  "pii":        [{ "type": "CF_IT", "value": "RSM***", "..." }],
  "emails":     [{ "email": "admin@target.com", "category": "admin", "source": "..." }],
  "subdomains": { "target.com": ["api.target.com", "staging.target.com"] },
  "cve_dorks":  ["site:target.com inurl:wp-login.php", "..."],
  "results":    [...]
}

CSV

python dorkeye.py -d "site:example.com" -o results.csv

Columns:

Column Content
url Full URL
title Page title
snippet DDG snippet
dork Search dork
timestamp Discovery timestamp
extension File extension
category File category
file_size Size in bytes (if analyzed)
content_type Content-Type header (if analyzed)
accessible True / False (if analyzed)
status_code HTTP status code (if analyzed)
sqli_vulnerable True / False
sqli_confidence critical / high / medium / low / none
waf_detected WAF name or empty

TXT

python dorkeye.py -d "site:example.com" -o results.txt

Plain numbered list with per-result details:

1. https://target.com/admin/login.php
   Title: Admin Login
   Category: scripts
   SQLi: VULNERABLE (high)
   WAF: cloudflare

2. https://target.com/backup.sql
   Title: (no title)
   Category: databases

Analysis Report Formats (--analyze-fmt)

The Agents v3.0 pipeline produces its own report separately from the main result file.

--analyze-fmt html   # full dark-theme HTML with all agent sections (default)
--analyze-fmt md     # markdown with tables
--analyze-fmt json   # structured JSON with pii, emails, subdomains, cve_dorks
--analyze-fmt txt    # plain text summary

Default output path: {basename}_analysis_{TIMESTAMP}.{fmt} next to the main output file. Override with --analyze-out custom_report.html.