Public sources only · Full provenance · Strict compliance
Relay builds accurate digital footprints exclusively from publicly available sources — open web, public records, indexed data — while maintaining complete traceability and legal compliance.
Designed for security professionals, researchers, and organizations that need reliable intelligence without legal or ethical risk.
- Cross-identifier correlation (usernames · emails · phones · aliases)
- Geolocation inference from public metadata and activity
- Automated exposure & risk scoring with confidence levels
- Full source attribution — every result links to original public location
- Conservative matching logic to minimize false positives
- Extensible public-source connectors
Relay operates in two primary modes, each optimized for different reconnaissance scopes:
🧑 Personal OSINT
Targeted scanning of an individual's online footprint.
Starts with guided questions (name, known usernames, email domains, approximate location, etc.) to initiate focused, ethical collection of public traces, social media metadata, leaks, and visibility risks.
🏢 Company OSINT
Comprehensive profiling of an organization.
Collects public company data (domains, subsidiaries, key personnel, filings, exposed assets) and associated personal footprints of executives/employees — all from open sources — to reveal corporate exposure, supply-chain links, and potential attack surface.
Both modes enforce strict public-source-only rules and full result provenance.
- GDPR-native design — minimization, audit logs, no unnecessary retention
- Public-data exclusivity — no dark web access, no credential stuffing, no restricted/toS-violating scraping; however, if publicly indexed breach notifications, researcher-published leak indexes, or openly available dump mirrors (e.g. clear-web pastes or public HIBP-style aggregators) contain relevant data about the subject, Relay will collect and analyze that information
- End-to-end traceability — provenance chain included with every finding
- High-performance engine — C++ correlation + Python orchestration
- Dual-purpose utility — effective for both red-team recon and blue-team defense
- Accuracy-first approach — prioritizes quality and verifiability over volume
Closed alpha stage.
Planned public releases (non-code content):
- Architecture & data-flow documentation
- Ethical sourcing & compliance framework
- Mode-specific example workflows
- Beta access waitlist opening
Star this repository to be notified when documentation is published.
