{"id":13454606,"url":"https://github.com/DataSploit/datasploit","last_synced_at":"2025-03-24T06:30:56.773Z","repository":{"id":41497724,"uuid":"59483255","full_name":"DataSploit/datasploit","owner":"DataSploit","description":"An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc.,  aggregate all the raw data, and give data in multiple formats.","archived":false,"fork":true,"pushed_at":"2020-05-23T04:17:30.000Z","size":12092,"stargazers_count":2948,"open_issues_count":108,"forks_count":424,"subscribers_count":183,"default_branch":"master","last_synced_at":"2024-05-23T10:33:10.913Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":"dvopsway/datasploit","license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/DataSploit.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2016-05-23T13:01:45.000Z","updated_at":"2024-05-22T07:04:46.000Z","dependencies_parsed_at":null,"dependency_job_id":null,"html_url":"https://github.com/DataSploit/datasploit","commit_stats":null,"previous_names":[],"tags_count":1,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DataSploit%2Fdatasploit","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DataSploit%2Fdatasploit/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DataSploit%2Fdatasploit/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/DataSploit%2Fdatasploit/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/DataSploit","download_url":"https://codeload.github.com/DataSploit/datasploit/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":245222328,"owners_count":20580135,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2024-07-31T08:00:55.795Z","updated_at":"2025-03-24T06:30:56.442Z","avatar_url":"https://github.com/DataSploit.png","language":"Python","readme":"[![ToolsWatch Best Tools](https://www.toolswatch.org/badges/toptools/2016.svg)](http://www.toolswatch.org/2017/02/2016-top-security-tools-as-voted-by-toolswatch-org-readers/)\n\n[![Arsenal-2017-EU](https://github.com/toolswatch/badges/blob/master/arsenal/europe/2017.svg)](http://www.toolswatch.org/2017/09/black-hat-arsenal-europe-2017-lineup/)\n\n[![Arsenal-2017-US](https://github.com/toolswatch/badges/blob/master/arsenal/usa/2017.svg)](http://www.toolswatch.org/2017/06/the-black-hat-arsenal-usa-2017-phenomenal-line-up-announced/)\n\n[![Arsenal-2017-ASIA](https://github.com/toolswatch/badges/blob/master/arsenal/asia/2017.svg)](http://www.toolswatch.org/2017/02/the-black-hat-arsenal-asia-2017-great-line-up/)\n\n[![Arsenal-2016-EU](https://www.toolswatch.org/badges/arsenal/2016.svg)](http://www.toolswatch.org/2016/09/the-black-hat-arsenal-europe-2016-line-up/)\n\n[![Arsenal-2016-US](https://www.toolswatch.org/badges/arsenal/2016.svg)](http://www.toolswatch.org/2016/06/the-black-hat-arsenal-usa-2016-remarkable-line-up/) \n\n[![DEFCON 25 ReconVillage](https://img.shields.io/badge/DEFCON%2025-Recon%20Village-red.svg)](http://reconvillage.org/) [![DEFCON 24 Demolabs](https://img.shields.io/badge/DEFCON%2024-Demo%20Labs-red.svg)](https://www.defcon.org/html/defcon-24/dc-24-demolabs.html)\n\n[![Join Datasploit Slack](https://img.shields.io/badge/slack-open-e01563.svg)](http://datasploit.slack.com \"Join our Slack community\")\n\n[![Follow Datasploit on Twitter](https://img.shields.io/twitter/follow/datasploit.svg?style=social\u0026label=Follow%20%40datasploit)](https://twitter.com/intent/user?screen_name=datasploit \"Follow Datasploit on Twitter\")\n\n# Overview of the tool:\n* Performs OSINT on a domain / email / username / phone and find out information from different sources.\n* Correlate and collaborate the results, show them in a consolidated manner. \n* Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target. \n* Use specific script / launch automated OSINT for consolidated data.\n* Performs Active Scans on collected data.\n* Generates HTML, JSON reports along with text files.\n \n## Basic Usage:\n```\n\n\t  ____/ /____ _ / /_ ____ _ _____ ____   / /____  (_)/ /_\n\t  / __  // __ `// __// __ `// ___// __ \\ / // __ \\ / // __/\n\t / /_/ // /_/ // /_ / /_/ /(__  )/ /_/ // // /_/ // // /_  \n\t \\__,_/ \\__,_/ \\__/ \\__,_//____// .___//_/ \\____//_/ \\__/  \n\t                               /_/                        \n\t\t\t\t\t\t\n         \t   Open Source Assistant for #OSINT            \n                 website: www.datasploit.info               \n\t\nUsage: domainOsint.py [options]\n\nOptions:\n  -h,\t    \t--help\t\t\t    show this help message and exit\n  -d DOMAIN,\t--domain=DOMAIN\t\tDomain name against which automated Osint \n                                    is to be performed.\n\n```\n\n# Required Setup:\n* Python 2.7 (because bunch of dependencies do not support Python 3.0)\n* Bunch of python libraries (use requirements.txt)\n* In **Kali Linux**, please install the requirements using the command `pip install --upgrade --force-reinstall -r requirements.txt`\n\n## Detailed Tool Documentation:\n\u003e [https://datasploit.github.io/datasploit/](https://datasploit.github.io/datasploit/)\n\n### Lead Developers\n* Shubham Mittal - https://github.com/upgoingstar\n* Sudhanshu Chauhan - https://github.com/sudhanshuc\n* Kunal Aggarwal - https://github.com/KunalAggarwal\n\n### Social Media \n* [Official Website](https://datasploit.github.io/datasploit/) \n* [Twitter](https://twitter.com/datasploit)\n* [Facebook](https://facebook.com/datasploit)\n","funding_links":[],"categories":["Frameworks","\u003ca id=\"a76463feb91d09b3d024fae798b92be6\"\u003e\u003c/a\u003e侦察\u0026\u0026信息收集\u0026\u0026子域名发现与枚举\u0026\u0026OSINT","Python (1887)","Python","others","[↑](#-Table-of-Contents) Other Tools","[↑](#-table-of-contents) Other Tools","[↑](#contents) Other Tools","Domain and Network Recon","Pentesting","Programming/Comp Sci/SE Things"],"sub_categories":["Open Redirect","\u003ca id=\"375a8baa06f24de1b67398c1ac74ed24\"\u003e\u003c/a\u003e信息收集\u0026\u0026侦查\u0026\u0026Recon\u0026\u0026InfoGather","[↑](#-Table-of-Contents) Telegram","[↑](#-table-of-contents) Telegram","[↑](#contents) LinkedIn","[↑](#contents) Telegram","XSS","[↑](#-table-of-contents) GitHub","Programs and Web Applications","OSINT - Open Source INTelligence","OSINT (Open Source Intelligence)"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FDataSploit%2Fdatasploit","html_url":"https://awesome.ecosyste.ms/projects/github.com%2FDataSploit%2Fdatasploit","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2FDataSploit%2Fdatasploit/lists"}