Bugfixes in email module
In case you encounter any bug or error in the program, please include a log / error message and raise an issue. I will get back to you ASAP and try my best to fix the bug.
auto_osint_py - automate external scanning for red teams
usage: autosint [-h] [--modules MODULES] [--timeout TIMEOUT] [--input INPUT]
[--infile INFILE] [--stdout] [-o OUTPUT_DIR] [--mode MODE]
automate osint activity
optional arguments:
-h, --help show this help message and exit
--modules MODULES domain, ip, debug
--timeout TIMEOUT time to wait before terminating subprocess (default=0)
--input INPUT comma seperated list of domains and/or ip addresses
--infile INFILE file containing newline seperated list of domains and/or ip addresses
--stdout write output to stdout
-o OUTPUT\_DIR output directory. by default writes output to current directory
--mode MODE LIMITED OR UNLIMITED for API calls
auto_osint_py --modules [MODULES] --input / --infile [INPUTS]
auto_osint_py is an OSINT automation script to assist in external scans for red teams by summarizing information on domains, IP addresses, web-servers and email accounts / personnel
The input to the tool is a comma seperated list of domains and/or IP addresses and the output is a directory containing subdirectories for each module specified.
Gather subdomains of a given root domain. Inputs can be specified via the
--inputargument which accept a comma seperated list of domains or via the--infileargument which accepts the path of a file containing a newline seperated list of domains.auto_osint_py --modules domain --input example.com,test.org -o ~/scans auto_osint_py --modules domain --infile domains.txt -o ~/scans
Perform TCP scans of the specified input IP addresses and (if specified along with the domain module) of the IP addresses associated with the subdomains found by the
domainmodule.auto_osint_py --modules ip --input 192.168.1.21,127.0.0.1 auto_osint_py --modules domain,ip --input example.com,test.org
This module must be run in conjunction with the
ipmodule. Thewebmodule looks for web-servers running on the the specified input IP addresses and performs the following scans on them:-
- Sslscan if ssl is found
- Identify backend technology using whatweb
- Unlisted directories with Gobuster
The email module uses the HunterIO and EmailRep API to find email addresses associated with a particular domain and provides additional information like data sources, social media accounts and records of data breaches.
auto_osint_py --modules email --input example.com auto_osint_py --modules domain,email --input example.com
Type: Required Accepts a comma seperated list of modules to be run. Modules include
domain,ip,web,emailOptionally,allcan be specified to run all modules. #####Example--modules all --modules domain,ip,web,email
Type: Required Accepts a comma seperated list of domains and IP addresses
--input example.com,192.168.1.21
Type: Required Accepts a path to a file containing a newline seperated list of domains and IP addresses. #####Example
--infile input.txt cat input.txt example.com 192.168.1.21
Type: Optional If specified, prints output to stdout in addition to saving it in a file. #####Example
auto_osint_py \[ARGS\] --stdout
Type: Optional Specifies timeout (in seconds) for the tool. If any subprocess takes longer than timeout, it is terminated. #####Example
--timeout 100
Type: Optional Specified output directory. #####Example
-o /tmp/output
The api.keys file contains the API keys required for the tool to make calls to the API service. Syntax
cat api.keys hunterio:<API KEY> emailrep:<API KEY>