Skip to content

Latest commit

 

History

History
64 lines (45 loc) · 3.49 KB

README.md

File metadata and controls

64 lines (45 loc) · 3.49 KB

ToolsWatch Best Tools

Arsenal-2017-EU

Arsenal-2017-US

Arsenal-2017-ASIA

Arsenal-2016-EU

Arsenal-2016-US

DEFCON 25 ReconVillage DEFCON 24 Demolabs

Join Datasploit Slack

Follow Datasploit on Twitter

Overview of the tool:

  • Performs OSINT on a domain / email / username / phone and find out information from different sources.
  • Correlate and collaborate the results, show them in a consolidated manner.
  • Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target.
  • Use specific script / launch automated OSINT for consolidated data.
  • Performs Active Scans on collected data.
  • Generates HTML, JSON reports along with text files.

Basic Usage:


	  ____/ /____ _ / /_ ____ _ _____ ____   / /____  (_)/ /_
	  / __  // __ `// __// __ `// ___// __ \ / // __ \ / // __/
	 / /_/ // /_/ // /_ / /_/ /(__  )/ /_/ // // /_/ // // /_  
	 \__,_/ \__,_/ \__/ \__,_//____// .___//_/ \____//_/ \__/  
	                               /_/                        
						
         	   Open Source Assistant for #OSINT            
                 website: www.datasploit.info               
	
Usage: domainOsint.py [options]

Options:
  -h,	    	--help			    show this help message and exit
  -d DOMAIN,	--domain=DOMAIN		Domain name against which automated Osint 
                                    is to be performed.

Required Setup:

  • Python 2.7 (because bunch of dependencies do not support Python 3.0)
  • Bunch of python libraries (use requirements.txt)
  • In Kali Linux, please install the requirements using the command pip install --upgrade --force-reinstall -r requirements.txt

Detailed Tool Documentation:

https://datasploit.github.io/datasploit/

Lead Developers

Social Media