All Projects → i3visio → Osrframework

i3visio / Osrframework

Licence: agpl-3.0
OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.

Programming Languages

python
139335 projects - #7 most used programming language
python3
1442 projects

Projects that are alternatives of or similar to Osrframework

Iky
OSINT Project
Stars: ✭ 203 (-61.99%)
Mutual labels:  osint, hacking
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+535.02%)
Mutual labels:  osint, hacking
Sitedorks
Search Google/Bing/Ecosia/DuckDuckGo/Yandex/Yahoo for a search term with a default set of websites, bug bounty programs or a custom collection.
Stars: ✭ 221 (-58.61%)
Mutual labels:  osint, hacking
Bbrecon
Python library and CLI for the Bug Bounty Recon API
Stars: ✭ 169 (-68.35%)
Mutual labels:  osint, hacking
Vault
swiss army knife for hackers
Stars: ✭ 346 (-35.21%)
Mutual labels:  osint, hacking
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+332.96%)
Mutual labels:  osint, hacking
Linkedin2username
OSINT Tool: Generate username lists for companies on LinkedIn
Stars: ✭ 504 (-5.62%)
Mutual labels:  osint, hacking
Onionsearch
OnionSearch is a script that scrapes urls on different .onion search engines.
Stars: ✭ 135 (-74.72%)
Mutual labels:  osint, pypi
Osint tips
OSINT
Stars: ✭ 322 (-39.7%)
Mutual labels:  osint, hacking
Vajra
Vajra is a highly customizable target and scope based automated web hacking framework to automate boring recon tasks and same scans for multiple target during web applications penetration testing.
Stars: ✭ 269 (-49.63%)
Mutual labels:  osint, hacking
Urlcrazy
Generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage.
Stars: ✭ 150 (-71.91%)
Mutual labels:  osint, hacking
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-20.04%)
Mutual labels:  osint, hacking
Offensive Dockerfiles
Offensive tools as Dockerfiles. Lightweight & Ready to go
Stars: ✭ 150 (-71.91%)
Mutual labels:  osint, hacking
Mosint
An automated e-mail OSINT tool
Stars: ✭ 184 (-65.54%)
Mutual labels:  osint, hacking
Burpsuite Xkeys
A Burp Suite Extension to extract interesting strings (key, secret, token, or etc.) from a webpage.
Stars: ✭ 144 (-73.03%)
Mutual labels:  osint, hacking
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints 🔎
Stars: ✭ 252 (-52.81%)
Mutual labels:  osint, hacking
Socialpwned
SocialPwned is an OSINT tool that allows to get the emails, from a target, published in social networks such as Instagram, Linkedin and Twitter to find possible credentials leaks in PwnDB.
Stars: ✭ 104 (-80.52%)
Mutual labels:  osint, hacking
H8mail
Email OSINT & Password breach hunting tool, locally or using premium services. Supports chasing down related email
Stars: ✭ 2,163 (+305.06%)
Mutual labels:  osint, hacking
Osintgram
Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
Stars: ✭ 312 (-41.57%)
Mutual labels:  osint, hacking
Email2phonenumber
A OSINT tool to obtain a target's phone number just by having his email address
Stars: ✭ 379 (-29.03%)
Mutual labels:  osint, hacking

OSRFramework

OSRFramework: Open Sources Research Framework

Copyright (C) 2014-2020 F. Brezo and Y. Rubio, i3visio

Version in PyPI License

1 - Description

OSRFramework is a GNU AGPLv3+ set of libraries developed by i3visio to perform Open Source Intelligence collection tasks. They include references to a bunch of different applications related to username checking, DNS lookups, information leaks research, deep web search, regular expressions extraction and many others. At the same time, by means of ad-hoc Maltego transforms, OSRFramework provides a way of making these queries graphically as well as several interfaces to interact with like OSRFConsole or a Web interface.

2 - License: GNU AGPLv3+

This is free software, and you are welcome to redistribute it under certain conditions.

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU Affero General Public License for more details.

You should have received a copy of the GNU Affero General Public License
along with this program.  If not, see <http://www.gnu.org/licenses/>.

For more details on this issue, check the COPYING file.

3 - Installation

Fast way to do it on any system for a user with administration privileges:

pip3 install osrframework

You can upgrade to the latest release of the framework with:

pip3 install osrframework --upgrade

This will manage all the dependencies for you and install the latest version of the framework.

If you needed further information on how to install OSRFramework on certain systems, note that you may need to add export PATH=$PATH:$HOME/.local/bin to your ~/.bashrc_profile). This has been confirmed in some distributions, including MacOS. In any case, we recommend you yo have a look at the INSTALL.md file where we provide additional details for these cases.

4 - Basic usage

If everything went correctly (we hope so!), it's time for trying usufy., mailfy and so on. But where are they locally? They are installed in your path meaning that you can open a terminal anywhere and typing the name of the program (seems to be an improvement from previous installations...). Examples:

osrf --help
usufy -n i3visio febrezo yrubiosec -p twitter facebook
searchfy -q "i3visio"
mailfy -n i3visio

Type -h or --help to get more information about which are the parameters of each application.

The tools installed in this package include:

  • alais_generator. Generates candidate nicknames based on known info about the target. Input: information about the target. Output: list of possible nicknames.
  • checkfy. Guesses possible emails based on a list of candidate nicknames and a pattern. Input: list of nicknames and an email pattern. Output. list of emails matching the pattern..
  • domainfy. Finds domains that currently resolve using a given word or nickname. Input: liat of words. Output: domains using that word that currently resolve.
  • mailfy. Find more information about emails taken as a reference either a nickname (to generate a list of possible emails) or the email list. Input: list of nicknames or emails. Output: found information about the email.
  • osrf. Shared wrapper for the rest of the applications. All commands can also be used as osrf usufy…, osrf mailfy…, etc.
  • phonefy. Recovers information about mobile phones linked to known spam practices. Inputs: list of phones. Outputs: Phones linked to spam.
  • searchfy. Finds profiles linked to a fullname. Inputs: list of phones. Outputs: Known profiles linked to the query.
  • usufy. Identifies socialmedia profiles using a given nickname. Inputs: list of nicknames. Outputs: Known profiles in socialmedia using those nicknames.

You can find the configuration files in a folder created in your user home to define the default behaviour of the applications:

# Configuration files for Linux and MacOS
~/.config/OSRFramework/
# Configuration files for Windows
C:\Users\<User>\OSRFramework\

OSRFramework will look for the configuration settings for each application stored there. You can add new credentials there and if something goes wrong, you can always restore the files stored in the defaults subfolder.

If you are experiencing problems, you might fight relevant information in the (FAQ Section)[doc/FAQ.md].

5 - HACKING

If you want to extend the functionalities of OSRFramework and you do not know where to start from, check the HACKING.md file.

6 - AUTHORS

More details about the authors in the AUTHORS.md file.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].