Skip to content

DorkEye | Automated Google Dorking Tool for OSINT & Recon. Generates and runs advanced search queries to surface exposed files, admin panels, open directories, login pages, and web misconfigurations. Built for pentesters and security researchers.

License

Notifications You must be signed in to change notification settings

xPloits3c/DorkEye

image

🦅 DorkEye > I don't hack systems, i expose their secrets <

Python License Status Search

Repo views Stars Forks Issues Last Commit

Telegram


What is DorkEye

DorkEye is an advanced and automated python script for Google Dorking to identify exposed web resources using Open Source Intelligence techniques.

See the full documents below:

INSTALL GUIDE USAGE DORKS_GENERATOR

de_start_sql

It helps discover:

  • Indexed directories
  • Sensitive files
  • Admin panels
  • Databases & backups
  • Misconfigurations and leaked credentials

image


Why DorkEye

  • ✅ Bypass CAPTCHA and rate‑limiting
  • ✅ Maintain anonymity and avoid IP blocking
  • ✅ Clean and unfiltered search results
  • ✅ Advanced analysis and automated SQLi testing
  • ✅ Continue Dorking for hours, DorkEye won’t get banned.

What’s New

WIZARD

Interactive menu

DORK GENERATOR

Generates structured Google dorks using a modular YAML template engine.

Automated SQL Injection Testing

  • Error‑based SQLi
  • Boolean‑based blind SQLi
  • Time‑based blind SQLi
  • Vulnerability confidence scoring

Advanced Analysis

  • File metadata inspection (size, type, accessibility)
  • Intelligent deduplication
  • YAML / JSON configuration support

Stealth & Fingerprinting

  • Realistic browser fingerprint rotation
  • Dynamic delays to evade rate limits

📊 File Categorization

  • 📄 Documents: .pdf .doc .xls
  • 📦 Archives: .zip .rar .7z
  • 🗄️ Databases: .sql .sqlite
  • 💾 Backups: .bak .old
  • ⚙️ Configs: .conf .ini .yaml
  • 📜 Scripts: .php .jsp
  • 🔑 Credentials: .env .git

💾 Export Formats available

  • .csv .json .txt .html

de_html_report


🚀 Features

  • 🔎 Smart single/multi‑dork execution
  • 🚫 Extension blacklist & whitelist
  • ⚡ Stealth mode & rate‑limit protection
  • 📈 Real‑time statistics
  • 🎨 Rich terminal UI

📦 Quick Install

sudo apt update
sudo apt install -y python3 python3-pip python3-venv git
git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
python3 -m venv dorkeye_env
source dorkeye_env/bin/activate
pip install -r requirements.txt

Test

usage
# Help:
python dorkeye.py -h
# Deactivate environment:
deactivate
# Remove environment:
rm -rf dorkeye_env

🎯 Usage

start0

🔹 # WIZARD Mode

python dorkeye.py --wizard

🔹 # Basic search

python3 dorkeye.py -d "inurl:admin" -o results.txt

🔹 # Dork Generator + Detection

python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json

🔹 # SQLi + stealth

python3 dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html

🔹 # Fast scan

python3 dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv
wizard

📁 Project Structure

DorkEye/
│ ├── dorkeye.py
│ ├── dork_generator.py
│ ├── requirements.txt
│ ├── http_fingerprints.json
│ ├── INSTALL.md
│ ├── README.md
│ ├── __init__
│ ├── dorkeye_config.yaml
│ /Templates/
│    ├── dorks_templates.yaml
│    ├── dorks_templates_research.yaml
│ /.github/
│    ├── CODE_OF_CONDUCT.md
│    ├── CONTRIBUTING.md
│    ├── SECURITY.md
│    ├── pull_request_template.md
│     /ISSUE_TEMPLATE/
│        ├── bug_report.md
│        ├── feature_request.md
│ /Dump/
│    ├── *.csv 
│    ├── *.json
│    ├── *.txt
│    └── *.html

🧩 Roadmap

  • Multi‑threaded search
  • Interactive TUI
  • Browser extension
  • Cloud integrations
  • API support
  • ML‑based dork optimization

⚠️ WARNING

  • This tool is for educational, research, and authorized security testing only.
  • Unauthorized access is illegal.
  • The author is not responsible for misuse.

📞 Contact


⭐ Support

If you find DorkEye useful, please consider starring the repository 🌟

📜 License

MIT License © 2026 xPloits3c I.C.W.T

About

DorkEye | Automated Google Dorking Tool for OSINT & Recon. Generates and runs advanced search queries to surface exposed files, admin panels, open directories, login pages, and web misconfigurations. Built for pentesters and security researchers.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Languages