Skip to content

DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login panels or indexed directories.

License

Notifications You must be signed in to change notification settings

MyParsingData/DorkEye

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

43 Commits
 
 
 
 
 
 
 
 

Repository files navigation

image

DorkEye — Advanced Dorking Tool

Python License Status DuckDuckGo


Repo View Counter

🧠 What is Dork-Eye?

Dork-Eye is an automated dorking tool that uses DuckDuckGo to find web resources exposed via OSINT techniques.

  • It can identify indexed directories, restricted files, admin panels and other public vulnerabilities, all in an anonymous and legal way, avoiding CAPTCHAs and blocks typical of mainstream engines.

Search Engine

  • Using DuckDuckGo (via DDGS()) allows to bypass limitations imposed by Google, making the tool more resilient and anonymous.

Why DorkEye?

  • It supports multiple dorks per command string allowing you to get better result in less time, also saves results without double links, fast, secure!

image

✨ Features

  • Search via DuckDuckGo (no CAPTCHA block)
  • Single input or from dork file
  • Save results to .txt file
  • Advanced visualization with rich
  • Simple and powerful CLI interface
  • Completely written in Python 3

⚙️ Install DorkEye

 git clone https://github.com/xPloits3c/DorkEye.git
 cd DorkEye
 pip install -r requirements.txt

⚙️ Requirements

  • Python 3.8+
  • Modules: rich and duckduckgo-search

🚀 How to use

• Single Dork search

python3 dorkeye.py -d "inurl:admin login" -o admin_panels -c 100

• Multiple Dork search

python3 dorkeye.py -d "site:.ru inurl:datacv filetype:pdf" -o RusCV -c 100
python3 dorkeye.py -d "site:.ru intitle:psw ext:txt" -o RusEP -c 100

• Dork file search

python3 dorkeye.py -d dorks.txt -o results -c 50

• Options

Flag Description Mandatory

  • -d / --dork Single dork or .txt file with dork Yes
  • -o / --output Output file name
  • -c / --count Number of results per dork

image

📂 Output Example

File results.txt:

  1. https://example.com/admin/login.php
  2. https://vulnerable.site/index.php?id=1
  3. https://ftp.example.org/files/ ...

📌 Project Structure

  • DorkEye/
  • ├── dorkeye.py
  • ├── requirements.txt
  • ├── README.md
  • ├── dorks.txt # (optional)
  • └── results.txt # (generated output)

🔒 Best Practice

  • Use in test environments or with written permission
  • Integrate with vulnerability scanners (e.g. Nikto, Nuclei)
  • Automate with cronjob for periodic OSINT tests

🧩 Future Ideas

  • CSV / JSON export
  • Active scanner of found URLs
  • Support for Bing / Brave / Qwant
  • Advanced filters by file type or domain
  • Interactive GUI or TUI with textual

⚠️ Legal Disclaimer

  • This tool is intended for educational, research and authorized testing purposes only.
  • Use of it unethically or against local laws may constitute a crime. The author disclaims all liability for improper use.

🧑‍💻 Author

📜 License

Distributed under MIT License

⭐ Support the project

Do you like this tool? Leave a ⭐

MetaByte Clean and Save Unique: URL’s-Email-Phone-IP’s. 👇

Visit MetaByte on GitHub

---

About

DorkEye is a Python script for ethical dorking. The goal is to identify unintentionally exposed resources, such as sensitive files, login panels or indexed directories.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 100.0%