https://github.com/nhoya/gosint
OSINT Swiss Army Knife
https://github.com/nhoya/gosint
axfr bitbucket crawler forensics git github go golang haveibeenpwnd infosec osint pentest pgp scraper security shodan shodan-api spider telegram
Last synced: 4 months ago
JSON representation
OSINT Swiss Army Knife
- Host: GitHub
- URL: https://github.com/nhoya/gosint
- Owner: Nhoya
- License: gpl-3.0
- Created: 2017-08-16T12:12:09.000Z (over 7 years ago)
- Default Branch: develop
- Last Pushed: 2021-02-23T00:20:27.000Z (almost 4 years ago)
- Last Synced: 2024-11-01T09:34:30.388Z (4 months ago)
- Topics: axfr, bitbucket, crawler, forensics, git, github, go, golang, haveibeenpwnd, infosec, osint, pentest, pgp, scraper, security, shodan, shodan-api, spider, telegram
- Language: Go
- Homepage:
- Size: 3.9 MB
- Stars: 620
- Watchers: 36
- Forks: 79
- Open Issues: 19
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# gOSINT [](https://travis-ci.org/Nhoya/gOSINT) [](https://ci.appveyor.com/project/Nhoya/gosint) [](https://github.com/Nhoya/gOSINT/stargazers) [](https://github.com/Nhoya/gOSINT/network) [](https://twitter.com/intent/tweet?text=Wow:&url=https%3A%2F%2Fgithub.com%2FNhoya%2FgOSINT) [](https://goreportcard.com/report/github.com/Nhoya/gOSINT) [](https://www.codacy.com/app/Nhoya/gOSINT?utm_source=github.com&utm_medium=referral&utm_content=Nhoya/gOSINT&utm_campaign=Badge_Grade) [](https://github.com/enaqx/awesome-pentest)
OSINT Swiss Army Knife in Go
Take a look at the [develop branch](https://github.com/Nhoya/gOSINT/tree/develop) for more updates.
## Introduction
gOSINT is a multiplatform OSINT Swiss army knife in Golang. If you want, feel free to contribute and/or leave a feedback!
## Like my project? Please consider donation :)
[](https://www.paypal.me/Nhoya) [](https://pastebin.com/raw/nyDDPwaM) [](https://pastebin.com/raw/dNUFqwuC) [](https://pastebin.com/raw/S6XMmSiv)
## What gOSINT can do
Currently `gOSINT` has different modules:
- [x] git support for mail retriving (using github API, or plain clone and search)
- [x] Search for mails, aliases and KeyID in PGP Server
- [x] [haveibeenpwned.com/](http://haveibeenpwned.com/) search for mail in databreach
- [x] Retrieve Telegram Public Group Message History
- [x] Search for mail address in source
- [x] [shodan.io](https://shodan.io) search
- [x] Subdomain enumeration using [crt.sh](https://crt.sh)
- [x] Given a phone number, can retrieve the owner name
- [x] Search for password relatives to email address :P
- [x] Reverse Whois given Email Address or NameA complete features list and roadmap is available under [Projects Tab](https://github.com/Nhoya/gOSINT/projects)
## Installation
### Dependencies
gOSINT currently depends from [tesseract-ocr](https://github.com/tesseract-ocr/) so you need to install on your system `tesseract-ocr`, `libtesseract-dev` and `libleptonica-dev`
### Install on a go-dependent way (is the easier and faster way)
You can install `gOSINT` using `go get` with a simple
`go get github.com/Nhoya/gOSINT/cmd/gosint`
### Install On Windows
Check the AppVeyor Build page for builds
## Manual Building
### Building On Linux
Build gOSINT on linux is really easy, you just need to install [dep](https://github.com/golang/dep), clone the repository and `make` and `make install`
### Building On Windows
If you have `make` installed you can follow the Linux instructions (and skip `make install`) otherwise be sure to have [dep](https://github.com/golang/dep) installed, clone the directory and run
```bash
dep ensure
go build cmd/gosint.go
```### Running on Docker
gOSINT currently supports container only for the rolling release, after the 1.0.0 release we will start working on a versioned Dockerfile.
If you want to try it out:```
mkdir gOSINT
wget https://raw.githubusercontent.com/Nhoya/gOSINT/develop/build/package/Dockerfile
docker build gosint .
docker run gosint bash
```## Usage
```bash
usage: gOSINT [] [ ...]An Open Source INTelligence Swiss Army Knife
Flags:
--help Show context-sensitive help (also try --help-long and --help-man).
--json Enable JSON Output
--debug Enable Debug Output
--version Show application version.
--verify Verify URL Status CodeArgs:
Domain URLCommands:
help [...]
Show help.git []
Get Emails and Usernames from repositories--method=[clone|gh] Specify the API to use or plain clone
--recursive Search for each repository of the userpwd [] ...
Check dumps for Email address using haveibeenpwned.com--get-passwords Search passwords for mail
pgp ...
Get Emails, KeyID and Aliases from PGP Keyringshodan [] ...
Get info on host using shodan.io--new-scan Schedule a new shodan scan (1 Shodan Credit will be deducted)
--honeypot Get honeypot probabilityshodan-query
Send a query to shodan.ioaxfr [] ...
Subdomain enumeration using crt.sh--verify Verify URL Status Code
pni ...
Retrieve info about a give phone numbertelegram []
Telegram public groups and channels scraper--start=START Start message #
--end=END End message #
--grace=15 The number of messages that will be considered deleted before the scraper stops
--dump Creates and resume messages from dumpfilerev-whois
Find domains for name or email address```
## Configuration file
The default configuration file is in `$HOME/.config/gosint.toml` for linux environment and `./config/toml` for windows env
You can place it in different paths, load prioriy is:
- `.`
- `./config/ or $HOME/.config/`
- `/etc/gosint/`If some API Keys are missing insert it there
## PGP module Demo (**OUTDATED**)
[](https://asciinema.org/a/21PCpbgFqyHiTbPINexHKEywj)
## Pwnd module Demo (**OUTDATED**)
[](https://asciinema.org/a/x9Ap0IRcNNcLfriVujkNUhFSF)
## Telegram Crawler Demo (**OUTDATED**)
[](https://asciinema.org/a/nbRO9FNpjiYXAKeI87xn29j9z)
## Shodan module Demo (**OUTDATED**)
[](https://asciinema.org/a/9lfzAZ65n9MJCkrUrxoHZQYwP)