Skip to content

drackyjr/WEBCAPTURE

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛰️ webcapture - The OSINT Tool

An elite command-line reconnaissance framework for automated Open Source Intelligence gathering.
Crafted for cybersecurity professionals, red teamers, and digital investigators who walk the line between shadows and signals.


🚀 Overview

This project is an Advanced OSINT Tool designed to gather and analyze publicly available intelligence from a given website or domain.
It automates key reconnaissance and scanning tasks such as:

  • Email, phone number, and hyperlink extraction
  • WHOIS information retrieval
  • IP address intelligence
  • Subdomain enumeration
  • Exposure to info-stealer malware (Cavalier check)

Built for efficiency, modularity, and stealth.


🧩 Project Structure


.
├── main.py                 # Entry point of the tool
├── core/                   # Core modules
│   ├── banner.py           # Displays fancy ASCII banner
│   ├── connection.py       # Internet connectivity checker
│   ├── validation.py       # URL validation
│   ├── scraper.py          # Scrapes emails, phones, and links
│   ├── save.py             # Saves results locally
├── osint/                  # OSINT-specific modules
│   ├── whois\_lookup.py     # WHOIS data retrieval
│   ├── ip\_info.py          # IP info extraction
│   ├── subdomain\_enum.py   # Subdomain enumeration
│   ├── cavalier\_check.py   # Checks for info-stealer exposure
├── test/                   # Placeholder for test scripts
├── requirements.txt        # Python dependencies


⚙️ Installation

Clone the repository and install dependencies:

git clone https://github.com/your-username/advanced-osint-tool.git
cd advanced-osint-tool
pip install -r requirements.txt

💡 Usage

Run the tool from the terminal with desired flags:

python main.py --url https://example.com \
               --emails \
               --phones \
               --links \
               --whois \
               --ipinfo \
               --subdomains \
               --check-stealer \
               --save output_folder

🔍 Available Flags

Flag Description
--url Target domain or website
--emails Extract email addresses
--phones Extract phone numbers
--links Extract hyperlinks
--whois Perform WHOIS lookup
--ipinfo Fetch IP address details
--subdomains Enumerate subdomains
--check-stealer Check exposure to info-stealer malware
--save Save results to specified folder

🛡️ Features

  • 🔍 Deep scraping of targets
  • 🌐 WHOIS + IP intelligence
  • 🕵️ Subdomain discovery
  • ☣️ Info-stealer threat exposure checks
  • 📁 Output saving to local storage
  • 💻 CLI-native with modular architecture

🧠 Ideal For

  • Security Analysts
  • Red Team Operators
  • OSINT Investigators
  • Threat Intelligence Researchers

📦 Dependencies

  • requests
  • beautifulsoup4
  • python-whois

Install all via:

pip install -r requirements.txt

⚔️ Future Enhancements

  • Integration with Shodan or Censys API
  • Passive DNS collection
  • PDF & CSV reporting
  • GUI frontend (optional)

👨‍💻 Author

Built by Dracky — Crafted with stealth, precision, and code. “Think like a hacker. Act like a ghost.”


📜 License

This project is licensed under the MIT License.


🧭 Disclaimer

This tool is intended for educational and authorized penetration testing only. Unauthorized use against targets without explicit permission is strictly prohibited.


About

automated Open Source Intelligence gathering

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages