Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/alpkeskin/mosint
An automated e-mail OSINT tool
https://github.com/alpkeskin/mosint
automation data-breach email email-checker go hacking information-gathering osint osint-tool pentest pwn python-hacking social-media socmint verification-service
Last synced: 7 days ago
JSON representation
An automated e-mail OSINT tool
- Host: GitHub
- URL: https://github.com/alpkeskin/mosint
- Owner: alpkeskin
- License: mit
- Created: 2020-09-27T14:55:26.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2024-02-02T13:10:43.000Z (10 months ago)
- Last Synced: 2024-11-28T13:05:42.390Z (14 days ago)
- Topics: automation, data-breach, email, email-checker, go, hacking, information-gathering, osint, osint-tool, pentest, pwn, python-hacking, social-media, socmint, verification-service
- Language: Go
- Homepage:
- Size: 591 KB
- Stars: 4,858
- Watchers: 82
- Forks: 561
- Open Issues: 22
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- 42-resources - Mosint
- awesome-starz - alpkeskin/mosint - An automated e-mail OSINT tool (Go)
- stars - alpkeskin/mosint - An automated e-mail OSINT tool (Go)
- awesome-golang-repositories - mosint - mail OSINT tool (Repositories)
- awesome-hacking-lists - alpkeskin/mosint - An automated e-mail OSINT tool (Go)
- AiTreasureBox - alpkeskin/mosint - 12-07_4870_-1](https://img.shields.io/github/stars/alpkeskin/mosint.svg)|An automated e-mail OSINT tool| (Repos)
README
Features •
Installation •
Services •
Usage •
Docker •
Config •
ScreenMosint is an automated email osint tool written in Go that allows you investigate for target emails in a fast and efficient manner. It consolidates numerous services, enabling security researchers to swiftly access a wealth of information.
# Features
- Fast and simple email-based scanning
- Optimized for ease of use and **lightweight** on resources
- Email verification and validation
- Checking **Social Media** Accounts
- Checking **data breaches** and **password leaks**
- Finding **related** emails and domains
- Scanning **pastebin dumps**
- Google Search
- DNS/IP Lookup
- Output to **JSON** file
- Print coffee with `--coffee` flag!# Installation
```sh
go install -v github.com/alpkeskin/mosint/v3/cmd/mosint@latest
```# Services
| Service | Function | Status |
| :--- | :--- | :--- |
| [ipapi.co](https://ipapi.co/) - Public | More Information About Domain | :white\_check\_mark: |
| [hunter.io](https://hunter.io/) - Public | Related Emails | :white\_check\_mark: :key: |
| [emailrep.io](https://emailrep.io/) - Public | Breached Sites Names | :white\_check\_mark: :key: |
| [scylla.so](https://scylla.so/) - Public | Database Leaks | :construction: |
| [psbdmp.ws](https://psbdmp.ws/) - Public | Pastebin Dumps | :white\_check\_mark: :key: |
| [Intelligence X](https://intelx.io/)| Password Leaks | :white\_check\_mark: :key: |
| [BreachDirectory](https://breachdirectory.org/)| Password Leaks | :white\_check\_mark: :key: |
| [HaveIBeenPwned](https://haveibeenpwned.com/)| Password Leaks | :white\_check\_mark: :key: |:key: API key required
# Configuration file
Mosint supports config file as default located at `$HOME/.mosint.yaml`. It allows you to define API keys for services.
**You must set the config file for mosint to run! To specify a configuration file located in a directory other than the home directory, you can use the `--config` flag.**
# Usage
```sh
mosint [email protected]
```
Call the help (`-h`) flag for more information on usage.# Docker
Build a docker image
```sh
docker build -t mosint .
```
Run the docker container using the image
```sh
docker run mosint --help
```# Screen
[![mosint](https://asciinema.org/a/609038.svg)](https://asciinema.org/a/609038)