Metadata-Version: 2.4
Name: dorkeye
Version: 4.9.3
Summary: Advanced Google Dorking with Google Dorks Generator, SQLi analysis, WAF detection and extract metadata.
Author-email: xPloits3c <whitehat.report@onionmail.org>
License: MIT License
        
        Copyright (c) 2026 xPloits3c I.C.W.T
        
        Permission is hereby granted, free of charge, to any person obtaining a copy
        of this software and associated documentation files (the "Software"), to deal
        in the Software without restriction, including without limitation the rights
        to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
        copies of the Software, and to permit persons to whom the Software is
        furnished to do so, subject to the following conditions:
        
        The above copyright notice and this permission notice shall be included in all
        copies or substantial portions of the Software.
        
        THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
        IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
        FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
        AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
        LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
        OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
        SOFTWARE.
        I.C.W.T @xPloits3c
        
Project-URL: Homepage, https://github.com/xPloits3c/DorkEye
Project-URL: Repository, https://github.com/xPloits3c/DorkEye
Project-URL: Bug Tracker, https://github.com/xPloits3c/DorkEye/issues
Project-URL: Changelog, https://github.com/xPloits3c/DorkEye/blob/main/CHANGELOG.md
Keywords: osint,dorking,google-dork,security,recon,sqli,pentest,dorks-queries
Classifier: Development Status :: 4 - Beta
Classifier: Environment :: Console
Classifier: Intended Audience :: Information Technology
Classifier: Intended Audience :: Science/Research
Classifier: License :: OSI Approved :: MIT License
Classifier: Operating System :: OS Independent
Classifier: Programming Language :: Python :: 3
Classifier: Programming Language :: Python :: 3.8
Classifier: Programming Language :: Python :: 3.9
Classifier: Programming Language :: Python :: 3.10
Classifier: Programming Language :: Python :: 3.11
Classifier: Programming Language :: Python :: 3.12
Classifier: Topic :: Security
Classifier: Topic :: Internet :: WWW/HTTP
Requires-Python: >=3.8
Description-Content-Type: text/markdown
License-File: LICENSE
Requires-Dist: requests<3.0.0,>=2.32.3
Requires-Dist: urllib3<3.0.0,>=2.2.0
Requires-Dist: PyYAML<7.0.0,>=6.0.2
Requires-Dist: rich<14.0.0,>=13.7.0
Requires-Dist: ddgs>=6.0.0
Requires-Dist: colorama>=0.4.6
Requires-Dist: beautifulsoup4>=4.12.0
Requires-Dist: lxml>=4.9.0
Provides-Extra: llm
Requires-Dist: llama-cpp-python>=0.2.0; extra == "llm"
Provides-Extra: screenshots
Requires-Dist: playwright>=1.40.0; extra == "screenshots"
Provides-Extra: all
Requires-Dist: llama-cpp-python>=0.2.0; extra == "all"
Requires-Dist: playwright>=1.40.0; extra == "all"
Dynamic: license-file

<div align="center">
<img width="1536" height="1024" alt="image" src="https://github.com/user-attachments/assets/cceb7da1-c8cc-4a42-836e-30acc9443ff6" />

</div>

---

```json
" 🦅 DorkEye | OSINT Dorking Tool "
> I don't hack systems, i expose their secrets <
```

<!-- ── Row 1: Project identity ── -->
![Python](https://img.shields.io/badge/Python-3.9%2B-3670A0?style=flat-square&logo=python&logoColor=ffdd54)
![License](https://img.shields.io/badge/License-MIT-green?style=flat-square)
![Status](https://img.shields.io/badge/Status-Stable-brightgreen?style=flat-square)
![Search](https://img.shields.io/badge/Search-DuckDuckGo-FF6600?style=flat-square&logo=duckduckgo&logoColor=white)
![Version](https://img.shields.io/badge/Version-4.8-brightgreen?style=flat-square)

<!-- ── Row 2: Live stats ── -->
![Repo views](https://komarev.com/ghpvc/?username=xPloits3c&label=DorkEye%20views&color=blue)
![Stars](https://img.shields.io/github/stars/xPloits3c/DorkEye?style=flat-square&logo=github&label=Stars&color=yellow)
![Forks](https://img.shields.io/github/forks/xPloits3c/DorkEye?style=flat-square&logo=github&label=Forks&color=lightgrey)
![Issues](https://img.shields.io/github/issues/xPloits3c/DorkEye?style=flat-square&logo=github&label=Issues&color=brightgreen)
![Last Commit](https://img.shields.io/github/last-commit/xPloits3c/DorkEye?style=flat-square&logo=github&label=Last+Commit&color=informational)

<!-- ── Row 3: Community ── -->
[![Telegram](https://img.shields.io/badge/Join-Telegram-26A5E4?style=flat-square&logo=telegram&logoColor=white)](#)

---

## What is DorkEye
**DorkEye** is an advanced automated dorking and OSINT recon tool that leverages DuckDuckGo to discover exposed web resources through intelligent search queries.
- It combines a powerful dork generator, a full SQL injection detection engine, a 10-step autonomous analysis pipeline, and an adaptive recursive crawler — all without requiring any external AI or cloud services.

- It can identify indexed directories, sensitive files, admin panels, databases, backups, configuration files, credentials, PII data, subdomains, and technology fingerprints — efficiently and with stealth controls.

![de_start_sql](https://github.com/user-attachments/assets/a34627b6-0862-4c02-91f2-3fe75fdbb516)

---

## Why DorkEye

- Bypass CAPTCHA and rate‑limiting
- Advanced .html report interactive
- Maintain anonymity and avoid IP blocking
- Clean and unfiltered search results
- Advanced analysis and automated SQLi testing
- Continue Dorking for hours, DorkEye won’t get banned.

<img width="1437" height="652" alt="564558417-37385827-9112-4efe-aa0a-f8941da0a2d9" src="https://github.com/user-attachments/assets/df21ead3-dd90-4692-9eab-259c6582ae86" />

---

## What’s New 🥇

| Feature | Details |
|---------|---------|
| 🧙 Wizard | [Interactive guided session — all options](Docs/wizard.md) |
| ⚙️ Dork Generator | [YAML template modes: `soft` / `medium` / `aggressive`](Docs/dork_generator.md) |
| 🎯 Direct SQLi Test | [Test a single URL directly with `-u`](Docs/sqli.md) |
| 📂 File Re-Processing | [Re-run SQLi / analysis / crawl on saved result files with `-f`](Docs/cli.md) |
| 💉 SQL Injection | [4 methods: error-based, UNION, boolean blind, time-based](Docs/sqli.md) |
| 💉 XSS Injection | [4 methods: reflected, stored, DOM-based, header-based](Docs/xss.md) |
| 🤖 Agents v3.1 Pipeline | [11-step autonomous analysis](Docs/agents.md) |
| 🛡️ HeaderIntelAgent | [Info leaks, missing security headers, outdated server](Docs/agents.md#headerintelagent) |
| 🧬 TechFingerprintAgent | [35 technologies detected, CVE dorks generated](Docs/agents.md#techfingerprintagent) |
| 📧 EmailHarvesterAgent | [Collects and categorizes emails: admin / security / info..](Docs/agents.md#emailharvesteragent) |
| 🔐 PiiDetectorAgent | [Phone, IBAN, fiscal code, credit card, SSN, DOB](Docs/agents.md#piidetectoragent) |
| 🌐 SubdomainAgent | [Extracts subdomains and generates `queries`](Docs/agents.md#subdomainharvesteragent) |
| 🔄 Adaptive Crawl | [Recursive multi-round dorking](Docs/crawler.md) |
| 🔑 HTTP Fingerprinting | [22 browser/OS profiles — Chrome,Firefox,Safari,mobile..](Docs/fingerprinting.md) |
| 📊 Output Formats | [HTML interactive report — all saved to `Dump/`](Docs/output_formats.md) |
| 🗂️ File Categories | [7 auto-detected categories - whitelist / blacklist filtering](Docs/file_categories.md) |
| 🖥️ Full CLI Reference | [All 31 flags and every possible combination](Docs/cli.md) |

---

## 📦 PyPI Installation (New!)

```bash
# Install directly via pip
python -m venv dorkeye_env
source dorkeye_env/bin/activate
pip install dorkeye

# Update to latest version
pip install --upgrade dorkeye

# Run after installation
dorkeye --help
```

---

## Quick Install
```json
"Update:"
  sudo apt update
  sudo apt install -y python3 python3-pip python3-venv git

"Git Clone:"
  git clone https://github.com/xPloits3c/DorkEye.git
  cd DorkEye

"Create environment:"
  python -m venv dorkeye_env

"Activate environment:"
  source dorkeye_env/bin/activate

"Install requirements:"
  pip install -r requirements.txt

"WIZARD MODE:"
  python dorkeye.py --wizard
```
---
## Test
<img width="1247" height="928" alt="start0" src="https://github.com/user-attachments/assets/af8f2234-ec3a-4ae5-8150-7c3de1af2983" />

```json
"Help:"
  python dorkeye.py -h

"Deactivate environment:"
  deactivate

"Remove environment:"
  rm -rf dorkeye_env
```
---

## Usage 

<img width="1322" height="967" alt="h1" src="https://github.com/user-attachments/assets/6f5be8c5-4a71-4187-988d-6eb301789a1c" />

🔹 # WIZARD Mode
```json
  python dorkeye.py --wizard
```
🔹 # Basic search
```json
  python dorkeye.py -d "inurl:admin" -o results.txt
```
🔹 # Dork Generator + Detection
```json
  python dorkeye.py --dg=sqli --mode=aggressive --sqli --stealth -o report.json
```
🔹 # SQLi + stealth
```json
  python dorkeye.py -d "site:example.com .php?id=" --sqli --stealth -o scan.html
```
🔹 # Fast scan
```json
  python dorkeye.py -d dorks.txt --no-analyze -c 200 -o fast_results.csv
```
🔹 # Direct SQLi test on a URL
  ```json
python dorkeye.py -u "https://target.com/page.php?id=1" --sqli --stealth -o result.json
```
🔹 # Re-process a saved result file
```json
  python dorkeye.py -f Dump/results.json --sqli --analyze -o retest.html
```

<img width="852" height="626" alt="examples" src="https://github.com/user-attachments/assets/27525c33-db4d-43c1-a53d-2410f5f3e190" />

---

## 📁 Project Structure
```
DorkEye/
│ ├── dorkeye.py               ← DorkEye Engine
│ ├── requirements.txt
│ ├── http_fingerprints.json
│ ├── README.md
│ /Tools/
│    ├── dork_generator.py     ← Dork Generator Queries
│    ├── dorkeye_agents.py     ← Agents v3.1 pipeline
│    ├── dorkeye_patterns.py   ← Shared pattern library
│    └── dorkeye_analyze.py    ← Standalone analysis CLI
│ /Templates/
│    ├── dorks_templates.yaml
│    ├── sqli.yaml
│    ├── osint.yaml
│    ├── intel_dorks.yaml
│    ├── epstein_files.yaml
│    └── example.yaml
│ /.github/
│    ├── CODE_OF_CONDUCT.md
│    ├── CONTRIBUTING.md
│    ├── SECURITY.md
│    ├── pull_request_template.md
│     /ISSUE_TEMPLATE/
│        ├── bug_report.md
│        └── feature_request.md
│     /workflows
│        └── claude-dorkeye.yml
│ /Dump/
│    ├── *.csv
│    ├── *.json
│    ├── *.txt
│    └── *.html
│ /Docs/
│    ├── cli.md
│    ├── wizard.md
│    ├── sqli.md
│    ├── agents.md
│    ├── crawler.md
│    ├── fingerprinting.md
│    ├── output_formats.md
│    ├── file_categories.md
│    ├── dork_generator.md
│    ├── INSTALL.md
│    ├── REPORT_HTML.md
│    ├── USAGE.md
│    └── DDGSEE.md
```
---

## Example HTML Report
<img width="1682" height="847" alt="report" src="https://github.com/user-attachments/assets/b35069a4-b457-4cd4-8158-84caddf9b658" />


## Example final Report
![image](https://github.com/user-attachments/assets/20055807-2f9d-4979-b221-e0cfad32828a)

## Wizard MODE (default payload)
<img width="962" height="933" alt="de_generator" src="https://github.com/user-attachments/assets/dd0805c7-cce5-45ff-87e6-c3c5344d82d6" />

---

## ⚠️  ![WARNING](https://img.shields.io/badge/Legal%20Disclaimer-red)
-   **This tool is for educational, research, and authorized security testing only.**
-   **Unauthorized access is illegal.**
-   **The author is not responsible for misuse.**
    
---

## 📞 Contact

- **Author:** xPloits3c  
- **Email:** whitehat.report@onionmail.org  
- **Telegram:** https://t.me/DorkEye  
---

## ⭐ Support

If you find DorkEye useful, please consider starring the repository 🌟
---

## 📜 License

MIT License © 2026 xPloits3c I.C.W.T
