sn0int - is a semi-automatic OSINT for IT security professionals and bug hunters
"sn0int (pronounced /snoɪnt/) is a semi-automatic OSINT framework and package manager. It was built for IT security professionals and bug hunters to gather intelligence about a given target or about yourself. sn0int is enumerating attack surface by semi-automatically processing public information and mapping the results in a unified format for followup investigations.
Among other things, sn0int is currently able to:
- Harvest subdomains from certificate transparency logs and passive dns
- Enrich ip addresses with asn and geoip info
- Harvest emails from pgp keyservers and whois
- Discover compromised logins in breaches
- Find somebody's profiles across the internet
- Enumerate local networks with unique techniques like passive arp
- Gather information about phonenumbers
- Attempt to bypass cloudflare with shodan
- Harvest data and images from instagram profiles
- Scan images for nudity
sn0int is heavily inspired by recon-ng and maltego, but remains more flexible and is fully opensource. None of the investigations listed above are hardcoded in the source, instead those are provided by modules that are executed in a sandbox. You can easily extend sn0int by writing your own modules and share them with other users by publishing them to the sn0int registry. This allows you to ship updates for your modules on your own since you don't need to send a pull request."
docker run --rm --init -it -v "$PWD/.cache:/cache" -v "$PWD/.data:/data" kpcyrd/sn0int
Open-source intelligence - Wikipedia
Open Source sn0int Alternatives | AlternativeTo
@hillside502 Any experience/recommendations with any of these?
I was looking at https://nmap.org/ too but then it wants a bunch of other stuff installed and my attention-span for all those things is limited.
Sorry, I'm an (interested) lurker on this subject, but thought I'd share any research as it arises --- no experience unfortunately.
To be fair, sn0int runs nicely locally, the only reason to package would be running from your VPS for some semi-anonymity.