Performs OSINT scan on email/domain/ip_address/organization using OSINT-SPY. It can be used by Data Miners, Infosec Researchers, Penetration Testers and cybercrime investigator in order to find deep information about their target.
File Name : README
Author : @sk_security
Version : 0.0.1
Website : osint-spy.com
Overview of this tool:
Perform scan on IP Address / domain / email address / BTC(bitcoin) address / device
Find out latest bitcoin block information
List out all the ciphers supported by particular website and server
Check whether a particular website is vulnerable to heartbleed or not?
Dump all the contacts and messages from skype database
Analyze malware or malicious file remotely
git clone https://github.com/SharadKumar97/OSINT-SPY.git
GENERATING API KEYS
We need some API Keys before using this tool.Following are the API’s which we are using this tool for a time being.
Register yourself at Clearbitand activate your account.
Once you login, you will find one section of API. Go there and copy your secret API Key and paste inside config.py file.
Config.py file can be found in modules directory of OSINT-SPY.
Register yourself at Shodan and activate your account.
Once you activated your account then login to Shodan.
Once you login, you will find an API key in overview tab.
Copy that key and paste inside config.py file.
Register yourself at Full Contact. You can sign up by using your email or you can Sign Up with Google.
Once you login, you will find your API Key on the front of your dashboard.
Just copy that key and paste it inside config.py file.
Register yourself at VirusTotal.
Once you login, you will find My API Key section in your profile menu. Just go there and copy your public API Key and paste in config.py file.
Register yourself at Email Hunter.
Once you login, go to API tab and click on EYE icon to view your API Key.
Copy your API Key in config.py file.
Search using OSINT
Search using OSINT
Usage: osint-spy.py [options]
-h, –help show this help message and exit.
–btc_block Find latest Bitcoin blockchain info.
–btc_date Find Bitcoin blockchain information from given date.
–btc_address Find out balance and transaction information of given bitcoin address.
–ssl_cipher List out all the ciphers used by given server.
–ssl_bleed Check whether server is vulnerable to heart bleed flaw or not.
–domain Get bunch of detail of given website or organization.
–email Gather information of a given email address.
–device Find out devices which are connected to internet.
–ip Enumerate information from given IP Addresss.
–skype_db Give the location of skype database in order to fetch all the information from that including chats and contacts.
–malware Find out whether a given file is infected by malware or not.
–carrier Give path of carrier file behind which you want to add text.
–setgo_text Enter text to hide behind carrier file.
–stego_find Give a stego file and it will try to find hidden text.
–btc_block parameter gives you the information of latest bitcoin block chain.
python osint-spy.py –btc_block
–btc_date parameter will give you an information of bitcoin block chain from given date.
python osint-spy.py –btc_date 20170620
–btc_address will give you an information about particular bitcoin owner.
python osint-spy.py –btc_address 1DST3gm6JthxhuoNKFqXrdpzPFfz1WgHpW
–ssl_cipher will show you all the ciphers supported by given website.
python osint-spy.py –ssl_cipher google.com
–ssl_bleed will find out whether given website is vulnerable to heartbleed or not ? .
python osint-spy.py –ssl_bleed google.com
–domain will give you in depth-information about particular domain including whois,dns,ciphers,location and so more.
python osint-spy.py –domain google.com
–email will gather information about given email address from various public sources.
python osint-spy.py –email email@example.com
—device will search for a given device from shodan and will list out all the available devices on public IP.
python osint-spy.py –device webcam
–ip will gather all the information of given IP Address from public sources.
python osint-spy.py –ip 127.0.0.1
–skype_db will find out all the contacts and message history from given skype database.This can be useful for forensics investigator.In Windows,Skype database can be found in AppData\Roaming\Skype\(Your username)\main.db and in Mac OSX , database can be found in /Users/(Your mac user anme)/Library/Support/Skype/(your skyoe username)/main.db
python osint-spy.py –skype_db main.db
–malware will send a given piece of file to virustotal and will give you a result whether given file is malware or not? .
python osint-spy.py –malware abc.exe
–carrier and –stego_text
–carrier and –stego_text are used to hide text behind any image.
–carrier will specify the image behind which you want to hide the text.
–stego_text will specify the text you want to add.
python osint-spy.py –carrier image.jpg –stego_text This_is_secre_text
–stego_find will find out hidden text behind any image.
python osint-spy.py –stego_find hidden.jpg