Skip to content

varungor365/AthenaOSINT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

66 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” AthenaOSINT - Advanced Open Source Intelligence Framework

Version Python License

πŸ“‹ Overview

AthenaOSINT is a comprehensive, modular OSINT (Open Source Intelligence) framework designed for security researchers, penetration testers, and investigators. It aggregates data from multiple sources, performs intelligent analysis, and generates actionable intelligence reports.

✨ Key Features

  • 🎯 Multi-Source Intelligence: Integrates 10+ OSINT tools and APIs
  • πŸ€– Intelligent Automation: Self-improving scans with entity correlation
  • 🌐 Web Dashboard: Modern Flask-based interface with real-time updates
  • πŸ’¬ Telegram Bot: Remote control via Telegram commands
  • πŸ“Š Advanced Reporting: JSON, HTML, CSV, and Excel output formats
  • πŸ”— Recursive Scanning: Deep investigation with relationship mapping
  • ⚑ Async Operations: Fast, concurrent module execution
  • πŸ›‘οΈ Privacy-Focused: All data stays local

☁️ Deployment on DigitalOcean Droplet via GitHub

  1. Initialize Git & Push (Locally):

    # Create a new repository on GitHub (e.g., AthenaOSINT)
    # Then run in this folder:
    git remote add origin https://github.com/YOUR_USERNAME/AthenaOSINT.git
    git branch -M main
    git push -u origin main
  2. Install on Droplet (Remote Server):

    • Connect to your Droplet via SSH.
    • Clone your new repository:
      git clone https://github.com/YOUR_USERNAME/AthenaOSINT.git
      cd AthenaOSINT
    • Run the deployment script:
      chmod +x deploy.sh
      ./deploy.sh
    • The script will install all dependencies (Python, Pip, System Tools).
    • Start the Service:
      # Start Web UI (Background)
      nohup python3 run_web.py > web.log 2>&1 &
      
      # Start 24/7 Daemon (Background)
      nohup python3 run_daemon.py > daemon.log 2>&1 &

πŸš€ Quick Start

Installation

# Clone the repository
git clone https://github.com/yourusername/AthenaOSINT.git
cd AthenaOSINT

# Create virtual environment
python -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate

# Install dependencies
pip install -r requirements.txt

# Set up configuration
cp .env.example .env
# Edit .env with your API keys

Basic Usage

Deploy Agent Orchestrator on Ubuntu Droplet

For your 8GB RAM / 4 vCPU Ubuntu 22.04 droplet, use the included bootstrap script to install a local model runtime (Ollama) and a minimal web orchestrator.

Steps:

  1. Copy the bootstrap script to your server and run it as root:

scp scripts/bootstrap_agent.sh ubuntu@:/tmp/ ssh ubuntu@ sudo bash /tmp/bootstrap_agent.sh

  1. After it completes, access the orchestrator UI at:

http://:8081/

  1. Service management:

sudo systemctl status agent-orchestrator sudo systemctl restart agent-orchestrator

  1. Change default model (optional):

sudo systemctl edit agent-orchestrator

Add or update: Environment=AGENT_MODEL=mistral

sudo systemctl daemon-reload && sudo systemctl restart agent-orchestrator

Notes:

  • The script installs Ollama and pulls the "mistral" model for CPU. You can change to another local model later (e.g., qwen2.5), or import your own.
  • For strictly offline operation after bootstrap, disable outbound traffic with ufw and ensure your model files are present locally.

Command Line Interface

# Simple scan
python athena.py run email@example.com

# Specify modules
python athena.py run johndoe --modules sherlock,holehe,leak_checker

# Choose output format
python athena.py run example.com --format html

# Deep scan with intelligence
python athena.py deepscan johndoe --depth 2

Web Interface

# Start web server
python run_web.py

# Open browser to http://localhost:5000

Telegram Bot

# Start bot
python run_bot.py

# Use commands:
# /scan <target>
# /quickscan <target>
# /fullscan <target>
# /deepscan <target> <depth>

🧩 Modules

Module Description Input Type
Sherlock Username enumeration across 300+ sites Username
Holehe Email account discovery Email
TheHarvester Email & domain reconnaissance Domain/Email
Subfinder Subdomain enumeration Domain
Leak Checker Data breach search (HIBP, Dehashed) Email
ExifTool File metadata extraction File path
Social Scanner Social media profile aggregation Username/Email
DNS Recon DNS records and zone transfers Domain

βš™οΈ Configuration

Create a .env file with your API keys:

# Required for leak checking
HIBP_API_KEY=your_hibp_key
DEHASHED_API_KEY=your_dehashed_key
INTELX_API_KEY=your_intelx_key

# Required for Telegram bot
TELEGRAM_BOT_TOKEN=your_bot_token

# Optional
SHODAN_API_KEY=your_shodan_key
VIRUSTOTAL_API_KEY=your_vt_key

πŸ“Š Output Examples

JSON Report

{
  "target_query": "johndoe",
  "scan_timestamp": "2025-12-17T10:30:00",
  "usernames": {
    "github": "johndoe",
    "twitter": "johndoe89",
    "instagram": "john_doe"
  },
  "emails": ["john@example.com"],
  "breaches": [
    {
      "name": "Example Breach 2023",
      "date": "2023-05-15",
      "data_classes": ["Emails", "Passwords"]
    }
  ]
}

πŸ—οΈ Architecture

AthenaOSINT/
β”œβ”€β”€ athena.py              # Main CLI entry point
β”œβ”€β”€ run_web.py             # Web interface launcher
β”œβ”€β”€ run_bot.py             # Telegram bot launcher
β”œβ”€β”€ config/
β”‚   β”œβ”€β”€ config.py          # Configuration manager
β”‚   └── __init__.py
β”œβ”€β”€ core/
β”‚   β”œβ”€β”€ engine.py          # Main orchestrator
β”‚   β”œβ”€β”€ validators.py      # Input validation
β”‚   └── __init__.py
β”œβ”€β”€ modules/               # OSINT tool integrations
β”‚   β”œβ”€β”€ sherlock.py
β”‚   β”œβ”€β”€ holehe.py
β”‚   β”œβ”€β”€ theharvester.py
β”‚   β”œβ”€β”€ leak_checker.py
β”‚   └── ...
β”œβ”€β”€ intelligence/          # AI/ML layer
β”‚   β”œβ”€β”€ analyzer.py        # Pattern recognition
β”‚   β”œβ”€β”€ automator.py       # Recursive scanning
β”‚   └── __init__.py
β”œβ”€β”€ web/                   # Flask application
β”‚   β”œβ”€β”€ routes.py
β”‚   β”œβ”€β”€ templates/
β”‚   └── static/
└── bot/                   # Telegram integration
    β”œβ”€β”€ bot_handler.py
    └── __init__.py

πŸ”’ Security & Ethics

⚠️ Important Notice:

  • This tool is for legal and ethical use only
  • Always obtain proper authorization before investigating targets
  • Respect privacy laws and regulations (GDPR, CCPA, etc.)
  • Do not use for harassment, stalking, or illegal activities
  • The developers are not responsible for misuse

🀝 Contributing

Contributions are welcome! Please:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-module)
  3. Commit your changes (git commit -m 'Add amazing module')
  4. Push to the branch (git push origin feature/amazing-module)
  5. Open a Pull Request

πŸ“ License

This project is licensed under the MIT License - see the LICENSE file for details.

πŸ™ Acknowledgments

πŸ“§ Contact

For questions or suggestions:


Disclaimer: This software is provided "as is" without warranty. Use at your own risk.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors