An elite command-line reconnaissance framework for automated Open Source Intelligence gathering.
Crafted for cybersecurity professionals, red teamers, and digital investigators who walk the line between shadows and signals.
This project is an Advanced OSINT Tool designed to gather and analyze publicly available intelligence from a given website or domain.
It automates key reconnaissance and scanning tasks such as:
- Email, phone number, and hyperlink extraction
- WHOIS information retrieval
- IP address intelligence
- Subdomain enumeration
- Exposure to info-stealer malware (Cavalier check)
Built for efficiency, modularity, and stealth.
.
├── main.py # Entry point of the tool
├── core/ # Core modules
│ ├── banner.py # Displays fancy ASCII banner
│ ├── connection.py # Internet connectivity checker
│ ├── validation.py # URL validation
│ ├── scraper.py # Scrapes emails, phones, and links
│ ├── save.py # Saves results locally
├── osint/ # OSINT-specific modules
│ ├── whois\_lookup.py # WHOIS data retrieval
│ ├── ip\_info.py # IP info extraction
│ ├── subdomain\_enum.py # Subdomain enumeration
│ ├── cavalier\_check.py # Checks for info-stealer exposure
├── test/ # Placeholder for test scripts
├── requirements.txt # Python dependencies
Clone the repository and install dependencies:
git clone https://github.com/your-username/advanced-osint-tool.git
cd advanced-osint-tool
pip install -r requirements.txt
Run the tool from the terminal with desired flags:
python main.py --url https://example.com \
--emails \
--phones \
--links \
--whois \
--ipinfo \
--subdomains \
--check-stealer \
--save output_folder
Flag | Description |
---|---|
--url |
Target domain or website |
--emails |
Extract email addresses |
--phones |
Extract phone numbers |
--links |
Extract hyperlinks |
--whois |
Perform WHOIS lookup |
--ipinfo |
Fetch IP address details |
--subdomains |
Enumerate subdomains |
--check-stealer |
Check exposure to info-stealer malware |
--save |
Save results to specified folder |
- 🔍 Deep scraping of targets
- 🌐 WHOIS + IP intelligence
- 🕵️ Subdomain discovery
- ☣️ Info-stealer threat exposure checks
- 📁 Output saving to local storage
- 💻 CLI-native with modular architecture
- Security Analysts
- Red Team Operators
- OSINT Investigators
- Threat Intelligence Researchers
requests
beautifulsoup4
python-whois
Install all via:
pip install -r requirements.txt
- Integration with Shodan or Censys API
- Passive DNS collection
- PDF & CSV reporting
- GUI frontend (optional)
Built by Dracky — Crafted with stealth, precision, and code. “Think like a hacker. Act like a ghost.”
This project is licensed under the MIT License.
This tool is intended for educational and authorized penetration testing only. Unauthorized use against targets without explicit permission is strictly prohibited.