GitHub: https://github.com/xPloits3c/DorkEye
🧠 What is Dork-Eye?
Dork-Eye
is an automated dorking tool that uses DuckDuckGo to find web resources exposed via OSINT techniques.
- It can identify indexed directories, restricted files, admin panels and other public vulnerabilities, all in an anonymous and legal way, avoiding CAPTCHAs and blocks typical of mainstream engines.
Search Engine
- Using DuckDuckGo (via DDGS()) allows to bypass limitations imposed by Google, making the tool more resilient and anonymous.
Why DorkEye?
- It supports multiple dorks per command string allowing you to get better result in less time, also saves results without double links, fast, secure!

✨ Features
- Search via DuckDuckGo (no CAPTCHA block)
- Single input or from dork file
- Save results to .txt file
- Advanced visualization with
rich
- Simple and powerful CLI interface
- Completely written in Python 3
⚙️ Install DorkEye
git clone https://github.com/xPloits3c/DorkEye.git
cd DorkEye
pip install -r requirements.txt
⚙️ Requirements
- Python 3.8+
- Modules:
rich
andduckduckgo-search
🚀 How to use
• Single Dork search
python3 dorkeye.py -d "inurl:admin login" -o admin_panels -c 100
• Multiple Dork search
python3 dorkeye.py -d "site:.ru inurl:datacv filetype:pdf" -o RusCV -c 100
python3 dorkeye.py -d "site:.ru intitle:psw ext:txt" -o RusEP -c 100
• Dork file search
python3 dorkeye.py -d dorks.txt -o results -c 50
python3 dorkeye.py -d dorkeye_dorks.txt -c 80 -o test
• Options
-d
/ --dork Single dork or .txt file with dork Yes-o
/ --output Output file name-c
/ --count Number of results per dork

📂 Output Example
File results.txt
:
- https://example.com/admin/login.php
- https://vulnerable.site/index.php?id=1
- https://ftp.example.org/files/ ...
📌 Project Structure
DorkEye/
├── dorkeye.py
├── requirements.txt
├── README.md
├── dorks.txt # (optional)
└── results.txt # (generated output)

🔒 Best Practice
- Use in test environments or with written permission
- Integrate with vulnerability scanners (e.g. SQLMap, XSStrike, Nikto, Nuclei)
- Automate with cronjob for periodic OSINT tests
🧩 Future Ideas
- CSV / JSON export
- Active scanner of found URLs
- Support for Bing / Brave / Qwant
- Advanced filters by file type or domain
- Interactive GUI or TUI with textual
⚠️ Legal Disclaimer
- This tool is intended for educational, research and authorized testing purposes only.
- Use of it unethically or against local laws may constitute a crime. The author disclaims all liability for improper use.
🧑💻 Author
- xPloits3c Contact: whitehat.report@onionmail.org
📜 License
Distributed under MIT License
⭐ Support the project
Do you like this tool? Leave a ⭐