A user reconnaisance tool that extracts a target's information from Instagram, DockerHub & Github. Also searches for matching usernames on Github.
Features
- extracts Instagram info
- extracts DockerHub info
- extracts Github info (including followers list and repositories)
- searches related usernames on Github
Installation
Clone project:
git clone https:/github.com/rlyonheart/osinteye.git
cd osinteye
pip install -r requirements.txt
Usage
python osinteye --[SITENAME] [USERNAME]
Or give osintEye execution permission:
chmod +x osinteye
./osinteye --[SITENAME] [USERNAME]
Example .1;
python osinteye --instagram johndoe
Example .2;
./osinteye --instagram johndoe
Available Sources
- DockerHub
- Github
Flag | Usage |
---|---|
-I/--instagram | get target's Instagram information |
-G/--github | get target's Github information |
-D/--dockerhub | get target's DockerHub information |
-X/--all | get target's information from all available sources |
Optional Arguments
Flag | Usage |
---|---|
-sG/--github-search | search username on Github |
-r/--raw | return output in raw json format |
-v/--verbose | run osintEye in verbose mode (returns network logs, errors and warnings) |
Disclaimer
This tool should not be used in environments withouth legal authorization. The author Richard Mwewa will not be responsible for the damages that might be done with it.*