https://github.com/coalfire-research/git-scrapers
Collect OSINT from git repositories
https://github.com/coalfire-research/git-scrapers
developers git github osint
Last synced: 6 months ago
JSON representation
Collect OSINT from git repositories
- Host: GitHub
- URL: https://github.com/coalfire-research/git-scrapers
- Owner: Coalfire-Research
- License: other
- Created: 2018-11-15T17:53:12.000Z (almost 7 years ago)
- Default Branch: main
- Last Pushed: 2021-04-06T23:11:44.000Z (over 4 years ago)
- Last Synced: 2025-04-01T18:11:39.693Z (8 months ago)
- Topics: developers, git, github, osint
- Language: Ruby
- Homepage:
- Size: 17.6 KB
- Stars: 20
- Watchers: 4
- Forks: 8
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
git-user.rb
======
Patrick Hurd, Coalfire Federal
---
OSINT tool specifically for targetting developers.
What you get:
- Profile information
- Commit authorship information
- See options list for non-default output
Setup
-----
1. `sudo apt install ruby`
2. `sudo gem install httparty`
3. `sudo apt install aha` (Required for mine output)
4. `sudo apt install whois` (Required for whois output)
4. [Add your GitHub username/password/token to your gitconfig](https://stackoverflow.com/a/51327559) if you plan on mining private repos
Usage:
------
```
Usage: git-user.rb [options]
-h, --help Show this help banner
-u, --user USERNAME User to gather info from
-o, --organization ORGANIZATION Organization to scrape
-r, --repo REPO The repo whom's contributors to scrape
--local ABSOLUTE_PATH Perform scrape on a repo local to your filesystem
--name NAME Name to refer to a --local repo in report filenames
-a, --auth Authenticate with HTTP basic auth
-t, --token TOKEN Use specified GitHub personal access token
-s, --stackoverflow Try to find users' accounts on StackOverflow
-p, --pwned Search for relevant data breaches using haveibeenpwned
-e, --extra_checking Do extra checking on email addresses
-m, --mine Mine the repo or user/organization's repos for secrets
--whois Perform whois lookup on domains found in profile information
-l, --loud Perform active recon on users (scrape their personal site)
--html Output main report to an HTML document
-w, --wordlist Generate wordlist for use in password attacks
-c, --csv Export discovered accounts to a GoPhish-importable CSV file
```
Add the following line to your `.bashrc` or `.zshrc` if you're using zsh to enable argument autocompletion (optional):
```bash
complete -W "--help --user --organization --repo --auth --token --stackoverflow --pwned --extra_checking --mine --html --wordlist --whois --loud --csv --local --name" git-user.rb
```
Example command:
`./git-user.rb -t deadb33f... -o Coalfire-Research -r Git-Scrapers -s -p -e -m --html -c`
If you have two-factor authentication enabled on your GitHub account, you will need to [create](https://help.github.com/en/articles/creating-a-personal-access-token-for-the-command-line) and use an application token instead of your password (using `-t TOKEN` instead of `-a`).
Repo mining will skip forked repos.
How you can help:
-----
Check out the issues