Skip to content

OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.

License

Notifications You must be signed in to change notification settings

GONZOsint/gitrecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

30 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

gitrecon

OSINT tool to get information from a Github or Gitlab profile and find user's email addresses leaked on commits.

📚 How does this work?

GitHub uses the email address associated with a GitHub account to link commits and other activity to a GitHub profile. When a user makes commits to public repos their email address is usually published in the commit and becomes publicly accessible, if you know where to look.

GitHub provide some instructions on how to prevent this from happening, but it seems that most GitHub users either don't know or don't care that their email address may be exposed.

Finding a GitHub user's email address is often as simple as looking at their recent events via the GitHub API.

Idea and text from Nick Drewe.

Source: https://thedatapack.com/tools/find-github-user-email/

❗ Disclaimer

As @pielco11 warned, emails and other data can be spoofed in commits.


✔️ Prerequisites


🛠️ Installation

git clone https://github.com/GONZOsint/gitrecon.git
cd gitrecon/
python3 -m pip install -r requirements.txt

It is possible to use a Github access token by editing line 3 of the modules/github_recon.py file. This will prevent a possible API ban.

It is possible to use a Gitlab access token by editing line 3 of the modules/gitlab_recon.py file. This will prevent a possible API ban.

token = '<Access token here>'

🔎 Usage

usage: gitrecon.py [-h] -s {github,gitlab} [-a] [-o] username

positional arguments:
  username

optional arguments:
  -h, --help          show this help message and exit
  -s {github,gitlab}  sites selection
  -a, --avatar        download avatar pic
  -o, --output        save output

Results are saved in results/<username>/ path.


⚔️ Features

  • Gitlab and Github leaked emails on commits

  • Gitlab and Github SSH keys

Github SSH keys Gitlab SSH keys
ID
Tittle
Created at
Expires at
Key Key
  • Gitlab and Github profile info

Github profile info Gitlab profile info
Username Username
Name Name
User ID User ID
State
Status
Avatar url Avatar url
Email Email
Location Location
Bio Bio
Company Organization
Organizations
Job title
Work information
Blog Web
Gravatar ID
Twitter Twitter
Skype
Linkedin
Followers Followers
Following Following
Created at Created at
Updated at

🔒 Prevention

Configurations on Github:

Configurations on Gitlab:

About

OSINT tool to get information from a Github and Gitlab profile and find user's email addresses leaked on commits.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages