AthenaOSINT is a comprehensive, modular OSINT (Open Source Intelligence) framework designed for security researchers, penetration testers, and investigators. It aggregates data from multiple sources, performs intelligent analysis, and generates actionable intelligence reports.
- π― Multi-Source Intelligence: Integrates 10+ OSINT tools and APIs
- π€ Intelligent Automation: Self-improving scans with entity correlation
- π Web Dashboard: Modern Flask-based interface with real-time updates
- π¬ Telegram Bot: Remote control via Telegram commands
- π Advanced Reporting: JSON, HTML, CSV, and Excel output formats
- π Recursive Scanning: Deep investigation with relationship mapping
- β‘ Async Operations: Fast, concurrent module execution
- π‘οΈ Privacy-Focused: All data stays local
-
Initialize Git & Push (Locally):
# Create a new repository on GitHub (e.g., AthenaOSINT) # Then run in this folder: git remote add origin https://github.com/YOUR_USERNAME/AthenaOSINT.git git branch -M main git push -u origin main
-
Install on Droplet (Remote Server):
- Connect to your Droplet via SSH.
- Clone your new repository:
git clone https://github.com/YOUR_USERNAME/AthenaOSINT.git cd AthenaOSINT - Run the deployment script:
chmod +x deploy.sh ./deploy.sh
- The script will install all dependencies (Python, Pip, System Tools).
- Start the Service:
# Start Web UI (Background) nohup python3 run_web.py > web.log 2>&1 & # Start 24/7 Daemon (Background) nohup python3 run_daemon.py > daemon.log 2>&1 &
# Clone the repository
git clone https://github.com/yourusername/AthenaOSINT.git
cd AthenaOSINT
# Create virtual environment
python -m venv venv
source venv/bin/activate # On Windows: venv\Scripts\activate
# Install dependencies
pip install -r requirements.txt
# Set up configuration
cp .env.example .env
# Edit .env with your API keysFor your 8GB RAM / 4 vCPU Ubuntu 22.04 droplet, use the included bootstrap script to install a local model runtime (Ollama) and a minimal web orchestrator.
Steps:
- Copy the bootstrap script to your server and run it as root:
scp scripts/bootstrap_agent.sh ubuntu@:/tmp/ ssh ubuntu@ sudo bash /tmp/bootstrap_agent.sh
- After it completes, access the orchestrator UI at:
http://:8081/
- Service management:
sudo systemctl status agent-orchestrator sudo systemctl restart agent-orchestrator
- Change default model (optional):
sudo systemctl edit agent-orchestrator
sudo systemctl daemon-reload && sudo systemctl restart agent-orchestrator
Notes:
- The script installs Ollama and pulls the "mistral" model for CPU. You can change to another local model later (e.g.,
qwen2.5), or import your own. - For strictly offline operation after bootstrap, disable outbound traffic with ufw and ensure your model files are present locally.
# Simple scan
python athena.py run email@example.com
# Specify modules
python athena.py run johndoe --modules sherlock,holehe,leak_checker
# Choose output format
python athena.py run example.com --format html
# Deep scan with intelligence
python athena.py deepscan johndoe --depth 2# Start web server
python run_web.py
# Open browser to http://localhost:5000# Start bot
python run_bot.py
# Use commands:
# /scan <target>
# /quickscan <target>
# /fullscan <target>
# /deepscan <target> <depth>| Module | Description | Input Type |
|---|---|---|
| Sherlock | Username enumeration across 300+ sites | Username |
| Holehe | Email account discovery | |
| TheHarvester | Email & domain reconnaissance | Domain/Email |
| Subfinder | Subdomain enumeration | Domain |
| Leak Checker | Data breach search (HIBP, Dehashed) | |
| ExifTool | File metadata extraction | File path |
| Social Scanner | Social media profile aggregation | Username/Email |
| DNS Recon | DNS records and zone transfers | Domain |
Create a .env file with your API keys:
# Required for leak checking
HIBP_API_KEY=your_hibp_key
DEHASHED_API_KEY=your_dehashed_key
INTELX_API_KEY=your_intelx_key
# Required for Telegram bot
TELEGRAM_BOT_TOKEN=your_bot_token
# Optional
SHODAN_API_KEY=your_shodan_key
VIRUSTOTAL_API_KEY=your_vt_key{
"target_query": "johndoe",
"scan_timestamp": "2025-12-17T10:30:00",
"usernames": {
"github": "johndoe",
"twitter": "johndoe89",
"instagram": "john_doe"
},
"emails": ["john@example.com"],
"breaches": [
{
"name": "Example Breach 2023",
"date": "2023-05-15",
"data_classes": ["Emails", "Passwords"]
}
]
}AthenaOSINT/
βββ athena.py # Main CLI entry point
βββ run_web.py # Web interface launcher
βββ run_bot.py # Telegram bot launcher
βββ config/
β βββ config.py # Configuration manager
β βββ __init__.py
βββ core/
β βββ engine.py # Main orchestrator
β βββ validators.py # Input validation
β βββ __init__.py
βββ modules/ # OSINT tool integrations
β βββ sherlock.py
β βββ holehe.py
β βββ theharvester.py
β βββ leak_checker.py
β βββ ...
βββ intelligence/ # AI/ML layer
β βββ analyzer.py # Pattern recognition
β βββ automator.py # Recursive scanning
β βββ __init__.py
βββ web/ # Flask application
β βββ routes.py
β βββ templates/
β βββ static/
βββ bot/ # Telegram integration
βββ bot_handler.py
βββ __init__.py
- This tool is for legal and ethical use only
- Always obtain proper authorization before investigating targets
- Respect privacy laws and regulations (GDPR, CCPA, etc.)
- Do not use for harassment, stalking, or illegal activities
- The developers are not responsible for misuse
Contributions are welcome! Please:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-module) - Commit your changes (
git commit -m 'Add amazing module') - Push to the branch (
git push origin feature/amazing-module) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
For questions or suggestions:
- GitHub Issues: Create an issue
- Email: security@example.com
Disclaimer: This software is provided "as is" without warranty. Use at your own risk.