A set of BASH commands in two scripts for OSINT and Passive Recon. Will Save results to files for further processing as necessary.
Includes passive scanning using Nmap. Essential to run these through Kali Linux in VirtualBox. Written by Nathan Jones nathan.jones@arcadeusops.com.
git clone https://github.com/ArcadeusOPS/OSINT.git
cd OSINT
sudo chmod 755 *.sh
sudo ./install.sh
rm install.sh
NOTE: Make sure that torrc is configured to SOCKS_PORT localhost:9050. Use your own APIs for Shodan, theHarvester, MOSINT, Sherlock and Twint.
install.sh installs a few extras. up.sh updates the base, installed Kali OS.
osint.sh and osint1.sh run the individual commands and saves output to local storage. Follow the instruction in the osint.sh and osint1.sh file comments.
Use port 1965 or higher if you want to be extra security minded. Use UFW firewall.
You can install Lynis, ufw, apparmor, artillery, fail2ban - for added security.
Run Lynis and follow the recommendations.
./osint.sh is to search a given Domain, follow the prompts.
./osint1.sh is to search a given Username/Email, follow the prompts.
See install.sh for notes.
The original code is written by ArcadeusOPS, who are not responsible for misuse of this data gathering tool.
Do not use these scripts to navigate websites/devices that take part in any activity that is identified as illegal under the laws and regulations of your government. STAY LEGAL !!
MIT License Copyright (c) ArcadeusOPS
Collate all output to a single XML or HTML file and email to designated user.
Send issues to info@arcadeusops.com stating nature of issue. A screenshot will help too. Thanks.
Part of EC-Council ECE/CPD Credits