Thursday, 27 October 2016

datasploit - A tool to perform various OSINT techniques

A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.

Overview of the tool:

  • Performs OSINT on a domain / email / username / phone and find out information from different sources.
  • Correlates and collaborate the results, show them in a consolidated manner.
  • Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target.
  • Use specific script / launch automated OSINT for consolidated data.
  • Available in both GUI and Console.

Basic Usage:

____/ /____ _ / /_ ____ _ _____ ____ / /____ (_)/ /_
/ __ // __ `// __// __ `// ___// __ \ / // __ \ / // __/
/ /_/ // /_/ // /_ / /_/ /(__ )/ /_/ // // /_/ // // /_
\__,_/ \__,_/ \__/ \__,_//____// .___//_/ \____//_/ \__/
/_/

Open Source Assistant for #OSINT
website: www.datasploit.info

Usage: domainOsint.py [options]

Options:
-h, --help show this help message and exit
-d DOMAIN, --domain=DOMAIN Domain name against which automated Osint
is to be performed.

Required Setup:
  • Bunch of python libraries (use requirements.txt)
  • MongoDb, Django, Celery and RabbitMq (Refer to setup guide).

Detailed Tool Documentation:
http://datasploit.readthedocs.io/en/latest/