Skip to content Dark Web Informer - Cyber Threat Intelligence

GitHub: https://github.com/xPloits3c/DorkEye


🧠 What is Dork-Eye?

Dork-Eye is an automated dorking tool that uses DuckDuckGo to find web resources exposed via OSINT techniques.
  • It can identify indexed directories, restricted files, admin panels and other public vulnerabilities, all in an anonymous and legal way, avoiding CAPTCHAs and blocks typical of mainstream engines.
Search Engine
  • Using DuckDuckGo (via DDGS()) allows to bypass limitations imposed by Google, making the tool more resilient and anonymous.
Why DorkEye?
  • It supports multiple dorks per command string allowing you to get better result in less time, also saves results without double links, fast, secure!

✨ Features

  • Search via DuckDuckGo (no CAPTCHA block)
  • Single input or from dork file
  • Save results to .txt file
  • Advanced visualization with rich
  • Simple and powerful CLI interface
  • Completely written in Python 3

⚙️ Install DorkEye

git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
pip install -r requirements.txt

⚙️ Requirements

  • Python 3.8+
  • Modules: rich and duckduckgo-search

🚀 How to use

• Single Dork search

python3 dorkeye.py -d "inurl:admin login" -o admin_panels -c 100

• Multiple Dork search

python3 dorkeye.py -d "site:.ru inurl:datacv filetype:pdf" -o RusCV -c 100
python3 dorkeye.py -d "site:.ru intitle:psw ext:txt" -o RusEP -c 100

• Dork file search

python3 dorkeye.py -d dorks.txt -o results -c 50
python3 dorkeye.py -d dorkeye_dorks.txt -c 80 -o test

• Options

  • -d / --dork Single dork or .txt file with dork Yes
  • -o / --output Output file name
  • -c / --count Number of results per dork

📂 Output Example

File results.txt:

  1. https://example.com/admin/login.php
  2. https://vulnerable.site/index.php?id=1
  3. https://ftp.example.org/files/ ...

📌 Project Structure

  • DorkEye/
  • ├── dorkeye.py
  • ├── requirements.txt
  • ├── README.md
  • ├── dorks.txt # (optional)
  • └── results.txt # (generated output)

🔒 Best Practice

  • Use in test environments or with written permission
  • Integrate with vulnerability scanners (e.g. SQLMap, XSStrike, Nikto, Nuclei)
  • Automate with cronjob for periodic OSINT tests

🧩 Future Ideas

  • CSV / JSON export
  • Active scanner of found URLs
  • Support for Bing / Brave / Qwant
  • Advanced filters by file type or domain
  • Interactive GUI or TUI with textual

  • This tool is intended for educational, research and authorized testing purposes only.
  • Use of it unethically or against local laws may constitute a crime. The author disclaims all liability for improper use.

🧑‍💻 Author

📜 License

Distributed under MIT License

⭐ Support the project

Do you like this tool? Leave a ⭐

MetaByte Clean and Save Unique: URL’s-Email-Phone-IP’s. 👇

Visit MetaByte on GitHub

Latest