Overview of the tool:
- Performs OSINT on a domain/email/username/phone and find out information from different sources.
- Correlate and collaborate the results, show them in a consolidated manner.
- Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target.
- Use specific script / launch automated OSINT for consolidated data.
- Performs Active Scans on collected data.
- Generates HTML, JSON reports along with text files.
Basic Usage:
____/ /____ _ / /_ ____ _ _____ ____ / /____ (_)/ /_
/ __ // __ `// __// __ `// ___// __ \ / // __ \ / // __/
/ /_/ // /_/ // /_ / /_/ /(__ )/ /_/ // // /_/ // // /_
\__,_/ \__,_/ \__/ \__,_//____// .___//_/ \____//_/ \__/
/_/
Open Source Assistant for #OSINT
website: www.datasploit.info
Usage: domainOsint.py [options]
Options:
-h, --help show this help message and exit
-d DOMAIN, --domain=DOMAIN Domain name against which automated Osint
is to be performed.
Required Setup:
- Python 2.7 (because bunch of dependencies do not support Python 3.0)
- Bunch of python libraries (use requirements.txt)
- In Kali Linux, please install the requirements using the command
pip install --upgrade --force-reinstall -r requirements.txt
Detailed Tool Documentation:
https://datasploit.github.io/datasploit/
Lead Developers
- Shubham Mittal - https://github.com/upgoingstar
- Sudhanshu Chauhan - https://github.com/sudhanshuc
- Kunal Aggarwal - https://github.com/KunalAggarwal