Git Product home page Git Product logo

autosint's Introduction

AutOSINT

Tool to automate common osint tasks. Probably best run on Kali.

A project to try to automate some common things checked during open source intelligence gathering engagements.

Dependencies:

in your path: whois, host, git, theHarvester(https://github.com/laramies/theHarvester), pyFoca(https://github.com/altjx/ipwn)

python modules: python-docx, shodan, google

other files:

a hashcat style pot file, a list of hacked accounts (like linkedin) in format user:hash

Installation:

$ git clone https://github.com/bharshbarger/AutOSINT.git

$ chmod +x AutOSINT.py

$ pip install --upgrade pip (optional)

(if missing modules:)

https://github.com/achillean/shodan-python

$ pip install shodan

https://pypi.python.org/pypi/google

$ pip install google

https://python-docx.readthedocs.io/en/latest/user/install.html

$ pip install python-docx

usage: AutOSINT.py [-h] [-a] [-c] [-d DOMAIN [DOMAIN ...]] [-f] [-g GOOGLEDORK [GOOGLEDORK ...]] [-i IPADDRESS [IPADDRESS ...]] [-n] [-p PASTEBINSEARCH [PASTEBINSEARCH ...]] [-s SHODAN] [-S SCRAPER [SCRAPER ...]] [-t] [-v] [-w]

optional arguments:

-h, --help show this help message and exit

-a, --all run All queries

-c, --creds Search local copies of credential dumps

-d DOMAIN [DOMAIN ...], --domain DOMAIN [DOMAIN ...] the Domain(s) you want to search.

-f, --foca invoke pyfoca

-g GOOGLEDORK [GOOGLEDORK ...], --googledork GOOGLEDORK [GOOGLEDORK ...] query Google for supplied args that are treated as a dork. i.e. -g password becomes a search for "password site:" no option defaults to "password"

-i IPADDRESS [IPADDRESS ...], --ipaddress IPADDRESS [IPADDRESS ...] the IP address(es) you want to search. Must be a valid IP.

-n, --nslookup Name query DNS for supplied -d or -i values. Requires a -d or -i value

-p PASTEBINSEARCH [PASTEBINSEARCH ...], --pastebinsearch PASTEBINSEARCH [PASTEBINSEARCH ...] Search google for site:pastebin.com. Requires a pro account if you dont want to get blacklisted.

-s SHODAN, --shodan SHODAN query Shodan, optionally provide -s

-S SCRAPER [SCRAPER ...], --scraper SCRAPER [SCRAPER ...] Scrape pastebin, github, indeed, more to be added. Args are scrape keywords if applicable

-t, --theharvester Invoke theHarvester

-v, --verbose Verbose

-w, --whois query Whois for supplied -d or -i values. Requires a -d or -i value

autosint's People

Contributors

bharshbarger avatar bharshbarger-r7 avatar

Watchers

 avatar

Forkers

cyberdeep

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.