kandi background
Explore Kits

Open Source Intelligence - Reusable Libraries

by abala Updated: Oct 2, 2021

Open Source Intelligence has played a pivotal role in key events like tracing Covid-19 origins, MH17 downing, the Boston Marathon bombing, and the Myanmar refugee crisis. Approximately 500 million tweets are published every day, totaling over 200 billion posts in a year. Facebook users upload 350 million photos per day. YouTube users add nearly 720,000 hours of new video every day. Almost all devices are online today in the connected world.

While monitoring messages was exclusive to intelligence agencies, the tons of information available in the public realm today has made it possible for general and security enthusiasts to look for insights that might not have been possible earlier. The U.S. Department of State defines OSINT as "intelligence that is produced from publicly available information and is collected, exploited, and disseminated promptly to an appropriate audience to address a specific intelligence requirement."

Designed correctly, OSINT can reduce risk across a variety of common risks such as weather conditions, disease outbreaks, corporate risk management, data privacy, reputation management, in addition to higher-order tasks like national security and cybersecurity. Do not construe this as legal advice, promotion, or authorization to indulge in any activity whatsoever.

OSINT Framework

The OSINT framework enables gathering information from free tools or resources. The below open source libraries introduce and enable gathering information based on the OSINT Framework.

OSINT-Frameworkby lockfale

JavaScript star image 3049 Version:Current

License: Permissive (MIT)

OSINT Framework

Support
Quality
Security
License
Reuse

OSINT-Frameworkby lockfale

JavaScript star image 3049 Version:Current License: Permissive (MIT)

OSINT Framework
Support
Quality
Security
License
Reuse

sherlockby sherlock-project

Python star image 30757 Version:Current

License: Permissive (MIT)

🔎 Hunt down social media accounts by username across social networks

Support
Quality
Security
License
Reuse

sherlockby sherlock-project

Python star image 30757 Version:Current License: Permissive (MIT)

🔎 Hunt down social media accounts by username across social networks
Support
Quality
Security
License
Reuse

OSINTby sinwindie

Python star image 653 Version:Current

License: No License (null)

Collections of tools and methods created to aid in OSINT collection

Support
Quality
Security
License
Reuse

OSINTby sinwindie

Python star image 653 Version:Current License: No License

Collections of tools and methods created to aid in OSINT collection
Support
Quality
Security
License
Reuse

Target Reconnaissance

Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source web-based reconnaissance quickly and thoroughly.

recon-ngby lanmaster53

Python star image 1514 Version:Current

License: Strong Copyleft (GPL-3.0)

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

Support
Quality
Security
License
Reuse

recon-ngby lanmaster53

Python star image 1514 Version:Current License: Strong Copyleft (GPL-3.0)

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
Support
Quality
Security
License
Reuse

recon-ng-marketplaceby lanmaster53

Python star image 99 Version:Current

License: Strong Copyleft (GPL-3.0)

Official module repository for the Recon-ng Framework.

Support
Quality
Security
License
Reuse

recon-ng-marketplaceby lanmaster53

Python star image 99 Version:Current License: Strong Copyleft (GPL-3.0)

Official module repository for the Recon-ng Framework.
Support
Quality
Security
License
Reuse

Information Collection

theHarvester and similar tools gather emails, names, subdomains, IPs and URLs using multiple public data sources.

theHarvesterby laramies

Python star image 6698 Version:4.0.3

License: Strong Copyleft (GPL-2.0)

E-mails, subdomains and names Harvester - OSINT

Support
Quality
Security
License
Reuse

theHarvesterby laramies

Python star image 6698 Version:4.0.3 License: Strong Copyleft (GPL-2.0)

E-mails, subdomains and names Harvester - OSINT
Support
Quality
Security
License
Reuse

pwnedhubby lanmaster53

JavaScript star image 68 Version:Current

License: Others (Non-SPDX)

Support
Quality
Security
License
Reuse

pwnedhubby lanmaster53

JavaScript star image 68 Version:Current License: Others (Non-SPDX)

Support
Quality
Security
License
Reuse

metagoofilby laramies

Python star image 626 Version:Current

License: Strong Copyleft (GPL-2.0)

Metadata harvester

Support
Quality
Security
License
Reuse

metagoofilby laramies

Python star image 626 Version:Current License: Strong Copyleft (GPL-2.0)

Metadata harvester
Support
Quality
Security
License
Reuse

Track Online Assets

Shodan and Amass enable researchers to see the exposed assets.

shodan-pythonby achillean

Python star image 1827 Version:1.27.0

License: Others (Non-SPDX)

The official Python library for Shodan

Support
Quality
Security
License
Reuse

shodan-pythonby achillean

Python star image 1827 Version:1.27.0 License: Others (Non-SPDX)

The official Python library for Shodan
Support
Quality
Security
License
Reuse

Amassby OWASP

Go star image 6903 Version:v3.19.1

License: Permissive (Apache-2.0)

In-depth Attack Surface Mapping and Asset Discovery

Support
Quality
Security
License
Reuse

Amassby OWASP

Go star image 6903 Version:v3.19.1 License: Permissive (Apache-2.0)

In-depth Attack Surface Mapping and Asset Discovery
Support
Quality
Security
License
Reuse

My-Shodan-Scriptsby random-robbie

Python star image 756 Version:Current

License: Permissive (MIT)

Collection of Scripts for shodan searching stuff.

Support
Quality
Security
License
Reuse

My-Shodan-Scriptsby random-robbie

Python star image 756 Version:Current License: Permissive (MIT)

Collection of Scripts for shodan searching stuff.
Support
Quality
Security
License
Reuse

Google Search

Google dorks provides information through the usage of operators, which are otherwise difficult to extract using simple searches.

pagodoby opsdisk

Python star image 1427 Version:v2.2.1

License: Strong Copyleft (GPL-3.0)

pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching

Support
Quality
Security
License
Reuse

pagodoby opsdisk

Python star image 1427 Version:v2.2.1 License: Strong Copyleft (GPL-3.0)

pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching
Support
Quality
Security
License
Reuse

BigBountyReconby Viralmaniar

C# star image 672 Version:v0.1

License: Permissive (MIT)

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.

Support
Quality
Security
License
Reuse

BigBountyReconby Viralmaniar

C# star image 672 Version:v0.1 License: Permissive (MIT)

BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Support
Quality
Security
License
Reuse

Fast-Google-Dorks-Scanby IvanGlinkin

Shell star image 272 Version:Current

License: No License (null)

The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.

Support
Quality
Security
License
Reuse

Fast-Google-Dorks-Scanby IvanGlinkin

Shell star image 272 Version:Current License: No License

The OSINT project, the main idea of which is to collect all the possible Google dorks search combinations and to find the information about the specific web-site: common admin panels, the widespread file types and path traversal. The 100% automated.
Support
Quality
Security
License
Reuse
  • © 2022 Open Weaver Inc.