Comprehensive Open-Source Intelligence Gathering & Reconnaissance Framework
Features β’ Installation β’ Tools β’ Usage β’ Techniques
OSINT Recon Suite is a professional-grade framework for conducting comprehensive open-source intelligence gathering and reconnaissance operations. This toolkit consolidates the most effective OSINT tools, automates reconnaissance workflows, and provides structured methodologies for information gathering across digital footprints.
Enable security professionals, investigators, and researchers to efficiently gather, analyze, and correlate publicly available information from diverse sources while maintaining operational security and ethical standards.
- Personal OSINT - People, emails, usernames, social media
- Corporate OSINT - Companies, employees, infrastructure
- Technical OSINT - Domains, IPs, networks, certificates
- Social Media OSINT - Profiles, connections, content
- Dark Web OSINT - Hidden services, marketplaces, forums
- Geospatial OSINT - Locations, imagery, mapping
- Financial OSINT - Transactions, companies, registrations
- Threat Intelligence - IOCs, malware, campaigns
| Category | Tools | Description |
|---|---|---|
| Username Enumeration | 10+ tools | Find accounts across 500+ platforms |
| Email Investigation | 8+ tools | Email validation, breach data, SMTP info |
| Domain Reconnaissance | 15+ tools | Subdomains, DNS, WHOIS, certificates |
| Social Media OSINT | 12+ tools | Profile analysis, relationship mapping |
| IP/Network Intel | 10+ tools | Geolocation, ASN, port scanning |
| People Search | 8+ tools | Public records, social profiles, data leaks |
| Company Research | 6+ tools | Corporate data, employees, infrastructure |
| Dark Web Monitoring | 5+ tools | Onion sites, marketplaces, forums |
| Image/Video OSINT | 7+ tools | Reverse search, metadata, geolocation |
| Automated Workflows | 20+ scripts | End-to-end reconnaissance automation |
# Clone the repository
git clone https://github.com/Panda1847/osint-recon-suite.git
cd osint-recon-suite
# Run automated setup
chmod +x scripts/setup.sh
./scripts/setup.sh
# Configure API keys
cp configs/api_keys.example configs/api_keys.conf
# Edit configs/api_keys.conf with your API keys
# Run your first recon
./scripts/recon.sh --target example.com- Python 3.8+
- Git
- Internet connection
- API keys (optional but recommended)
# Install system dependencies
sudo apt install python3 python3-pip git curl wget
# Install Python requirements
pip3 install -r requirements.txt
# Install Go tools
./scripts/install_go_tools.sh
# Verify installation
python3 scripts/verify.py# Find username across 400+ sites
sherlock username
# Export results
sherlock username --output results.txt# Web-based username search
python3 tools/whatsmyname.py username# Advanced username OSINT
maigret username --all-sites# Deep social media analysis
python3 tools/social_analyzer.py --username target_user# Email harvesting from search engines
theHarvester -d example.com -b all
# Specific sources
theHarvester -d example.com -b google,linkedin,bing# Find email addresses
python3 tools/hunter.py --domain example.com
# Verify email
python3 tools/hunter.py --verify email@example.com# Check emails in data breaches
h8mail -t target@email.com
# Bulk check
h8mail -t emails.txt# Check email account registrations
holehe target@email.com# Subfinder - Fast passive discovery
subfinder -d example.com -o subdomains.txt
# Amass - Comprehensive enumeration
amass enum -d example.com -o amass_results.txt
# Assetfinder
assetfinder --subs-only example.com
# Sublist3r
python3 tools/Sublist3r/sublist3r.py -d example.com# DNSRecon
dnsrecon -d example.com -t std
# Fierce
fierce --domain example.com
# DNSDumpster
python3 tools/dnsdumpster.py example.com# crt.sh search
python3 tools/crtsh.py example.com
# Censys certificates
python3 tools/censys_certs.py example.com# WHOIS lookup
whois example.com
# Historical WHOIS
python3 tools/whois_history.py example.com# Search Shodan
python3 tools/shodan_search.py --ip 1.2.3.4
# Search by query
python3 tools/shodan_search.py --query "apache country:US"# IP lookup
python3 tools/censys.py --ip 1.2.3.4
# Certificate search
python3 tools/censys.py --cert example.com# IP geolocation and details
python3 tools/ipinfo.py 1.2.3.4# Port scanning
nmap -sV -sC -oA scan_results 1.2.3.4
# Full scan
nmap -p- -A -oA full_scan 1.2.3.4# Instaloader (from social-media-downloader)
instaloader --metadata-json username
# Osintgram
python3 tools/Osintgram/main.py username# Twint
twint -u username --followers
# TweetScraper
python3 tools/tweetscraper.py username# LinkedIn scraper
python3 tools/linkedin_scraper.py company_name
# Employee enumeration
python3 tools/linkedin_employees.py "Company Name"# Facebook graph search
python3 tools/facebook_osint.py --profile username# Scan onion service
onionscan http://example.onion# Search dark web
python3 tools/ahmia_search.py "search query"# Dark web search engine
python3 tools/darksearch.py "keyword"# TinEye
python3 tools/tineye.py image.jpg
# Google Images
python3 tools/google_images.py image.jpg
# Yandex Images
python3 tools/yandex_images.py image.jpg# ExifTool
exiftool image.jpg
# Batch processing
exiftool -r /path/to/images/# Extract GPS coordinates
python3 tools/image_gps.py image.jpg
# Map location
python3 tools/image_gps.py image.jpg --map./scripts/domain_recon.sh example.comWhat it does:
- Subdomain enumeration (5 tools)
- DNS records collection
- Certificate transparency search
- WHOIS information
- IP resolution and geolocation
- Port scanning (top 1000)
- Web technology detection
- Email harvesting
- Social media accounts
- Generate comprehensive report
./scripts/person_recon.sh "John Doe" john.doe@email.comWhat it does:
- Username enumeration
- Social media profiles
- Email breach checks
- Public records search
- Professional profiles (LinkedIn)
- Domain ownership
- Related accounts
- Timeline analysis
- Relationship mapping
- Generate dossier
./scripts/company_recon.sh "Example Corp"What it does:
- Corporate registration data
- Domain infrastructure
- Employee enumeration
- Social media presence
- Technology stack
- IP ranges and ASNs
- Email patterns
- Data breaches
- News and mentions
- Competitive analysis
Define scope, objectives, and legal boundaries
Document authorization and rules of engagement
# Gather information without direct interaction
./scripts/passive_recon.sh target.com# Direct interaction with target systems
./scripts/active_recon.sh target.com# Correlate and analyze gathered intelligence
python3 tools/analyze.py --input recon_data/# Generate professional report
python3 tools/generate_report.py --target target.com --output report.pdfTarget: example.com
Scan Date: 2026-01-14
[+] Subdomains Found: 47
- www.example.com (1.2.3.4)
- mail.example.com (1.2.3.5)
- api.example.com (1.2.3.6)
...
[+] Email Addresses: 23
- john@example.com
- admin@example.com
...
[+] Technologies Detected:
- Web Server: nginx/1.21.0
- Framework: React 18.2.0
- CDN: Cloudflare
...
[+] Social Media:
- Twitter: @example
- LinkedIn: /company/example
...
Target: John Doe (john.doe@email.com)
Investigation Date: 2026-01-14
[+] Online Presence:
- Twitter: @johndoe (10K followers)
- LinkedIn: /in/johndoe (Software Engineer at TechCorp)
- GitHub: github.com/johndoe (250 repos)
- Instagram: @john.doe (Private)
[+] Professional Information:
- Current: Software Engineer at TechCorp (2020-Present)
- Previous: Developer at StartupXYZ (2018-2020)
- Education: BS Computer Science, MIT (2018)
[+] Digital Footprint:
- Domains Owned: johndoe.com, johndoe.dev
- Email Breaches: 2 (LinkedIn 2021, Adobe 2013)
- Public Repositories: 250
- Stack Overflow: 15K reputation
[+] Geolocation:
- Current: San Francisco, CA (based on social media)
- Previous: Boston, MA
- π Use VPN/Tor - Route traffic through privacy networks
- π Separate Identities - Use dedicated OSINT accounts
- π« Avoid Direct Interaction - Prefer passive techniques
- π Document Everything - Maintain detailed logs
- β° Timing - Blend in with normal traffic patterns
- π Rotate Infrastructure - Change IPs and accounts regularly
# Use Tor for anonymity
torsocks python3 tools/osint_tool.py
# Use ProxyChains
proxychains python3 tools/osint_tool.py
# VPN connection
sudo openvpn config.ovpn- Publicly available information only
- Authorized investigations
- Security research
- Due diligence
- Background checks (with consent)
- Threat intelligence
- Unauthorized access
- Harassment or stalking
- Identity theft
- Doxxing
- Privacy violations
- Illegal surveillance
- GDPR - Respect EU privacy regulations
- CCPA - California privacy laws
- COPPA - Children's privacy protection
- Terms of Service - Respect platform policies
This suite follows the OSINT Framework methodology:
1. Requirements β 2. Collection β 3. Processing
β
4. Analysis β 5. Production β 6. Dissemination
Each phase has dedicated tools and workflows.
- OSINT Framework - https://osintframework.com
- IntelTechniques - https://inteltechniques.com
- Bellingcat - https://www.bellingcat.com
- SANS OSINT Summit - Annual conference
- "Open Source Intelligence Techniques" by Michael Bazzell
- "OSINT Handbook" by i-intelligence
- "Social Media Intelligence" by Nihad Hassan
- "The Art of Invisibility" by Kevin Mitnick
- SANS SEC487 - Open-Source Intelligence Gathering
- TCM Security OSINT - Practical OSINT
- Udemy OSINT - Various courses
Many tools require API keys for full functionality:
# Edit configs/api_keys.conf
SHODAN_API_KEY=your_key_here
CENSYS_API_ID=your_id_here
CENSYS_API_SECRET=your_secret_here
HUNTER_API_KEY=your_key_here
VIRUSTOTAL_API_KEY=your_key_here
TWITTER_API_KEY=your_key_here
GOOGLE_API_KEY=your_key_hereCustomize tool behavior in configs/tools.yaml:
shodan:
timeout: 30
max_results: 100
subfinder:
sources:
- crtsh
- virustotal
- censys
timeout: 10
theHarvester:
engines:
- google
- bing
- linkedin
limit: 500Comprehensive documentation in docs/:
| Document | Description |
|---|---|
| SETUP.md | Installation guide |
| TOOLS.md | Tool reference |
| WORKFLOWS.md | Automated workflows |
| METHODOLOGY.md | OSINT methodology |
| OPSEC.md | Operational security |
| LEGAL.md | Legal guidelines |
| API.md | API documentation |
Contributions welcome! We need:
- π§ New tools
- π Documentation improvements
- π Bug reports
- π‘ Feature suggestions
- π― New workflows
- π Case studies
See CONTRIBUTING.md for guidelines.
- β 100+ OSINT tools integrated
- β 20+ automated workflows
- β Comprehensive documentation
- β API integration
- β OpSec guidelines
v1.1 (Q2 2026)
- Web interface
- Real-time monitoring
- Machine learning analysis
- Collaborative features
v2.0 (Q4 2026)
- AI-powered correlation
- Automated reporting
- Threat intelligence feeds
- Mobile app
MIT License - see LICENSE for details.
- OSINT Community - Tools and techniques
- Bellingcat - Investigative methods
- IntelTechniques - Resources and training
- Tool Authors - All the amazing creators
- π Documentation
- π Issues
- π¬ Discussions
π Intelligence Through Open Sources π
Gather Responsibly. Investigate Ethically. Respect Privacy.