A user reconnaisance tool that extracts a target's information from Instagram, DockerHub & Github







A ?user ?reconnaisance tool that extracts a ⭕target’s information from Instagram, DockerHub & Github. Also ?searches for matching usernames on Github.

Features

  • extracts Instagram info
  • extracts DockerHub info
  • extracts Github info (including followers list and repositories)
  • searches related usernames on Github

Installation

Clone project:

git clone https:/github.com/rlyonheart/osinteye.git

cd osinteye

pip install -r requirements.txt

Usage

python osinteye --[SITENAME] [USERNAME]

Or give osintEye execution permission:

chmod +x osinteye

./osinteye --[SITENAME] [USERNAME]

Example .1;

python osinteye -v --instagram johndoe

Example .2;

./osinteye -v --instagram johndoe

Available Sources

  • Instagram
  • DockerHub
  • Github
Flag Usage
-I/--instagram get target’s Instagram information
-G/--github get target’s Github information
-D/--dockerhub get target’s DockerHub information
-X/--all get target’s information from all available sources

Optional Arguments

Flag Usage
-sG/--github-search search username on Github
-r/--raw [OPTIONAL] return output in raw json format
-v/--verbose [RECOMMENDED] run osintEye in verbose mode (returns network logs, errors and warnings)

Disclaimer

This tool should not be used in environments withouth legal authorization.
The author Richard Mwewa will not be responsible for the damages that might be done with it.
*

LICENSE

About author

Contact author

GitHub

View Github