OSINT Tools & Frameworks

Tools

A comprehensive collection of tools for automating intelligence gathering, data analysis, and reconnaissance workflows.

API Keys

Many OSINT tools require API keys for full functionality. Create free accounts on services like Shodan, Censys, VirusTotal, and SecurityTrails to unlock their full potential.

OSINT Frameworks

SpiderFoot

Framework
Docs

Automated OSINT reconnaissance tool with 200+ data sources and web UI.

Installation

bash
pip install spiderfoot && spiderfoot -l 127.0.0.1:5001

Recon-ng

Framework
Docs

Full-featured web reconnaissance framework with modular architecture.

Installation

bash
pip install recon-ng

Maltego

Framework
Docs

Visual link analysis tool for mining and gathering information.

Installation

bash
# Download from maltego.com - CE version is free

theHarvester

Framework
Docs

E-mail, subdomain, hostname, and banner harvester.

Installation

bash
pip install theHarvester

OWASP Amass

Framework
Docs

In-depth attack surface mapping and asset discovery.

Installation

bash
go install -v github.com/owasp-amass/amass/v4/...@master

reconFTW

Framework
Docs

Automated reconnaissance workflow with multiple tools.

Installation

bash
git clone https://github.com/six2dez/reconftw.git && ./install.sh

Domain & DNS Tools

Subfinder

Subdomain
Docs

Fast passive subdomain enumeration from multiple sources.

Installation

bash
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest

Assetfinder

Subdomain
Docs

Find domains and subdomains related to a given domain.

Installation

bash
go install github.com/tomnomnom/assetfinder@latest

Findomain

Subdomain
Docs

Cross-platform subdomain enumerator with monitoring.

Installation

bash
cargo install findomain

DNSRecon

DNS
Docs

DNS enumeration script with multiple query types.

Installation

bash
pip install dnsrecon

MassDNS

DNS
Docs

High-performance DNS stub resolver for bulk lookups.

Installation

bash
git clone https://github.com/blechschmidt/massdns.git && make

Fierce

DNS
Docs

DNS reconnaissance tool for locating non-contiguous IP space.

Installation

bash
pip install fierce

People & Social Media

Sherlock

Username
Docs

Hunt down social media accounts by username across 400+ sites.

Installation

bash
pip install sherlock-project

Maigret

Username
Docs

Collect person's data from thousands of sites (enhanced Sherlock).

Installation

bash
pip install maigret

GHunt

Google
Docs

Investigate Google accounts with email addresses.

Installation

bash
pip install ghunt

Holehe

Email
Docs

Check if email is registered on different sites.

Installation

bash
pip install holehe

Social-Analyzer

Social
Docs

API and CLI for analyzing social media profiles.

Installation

bash
pip install social-analyzer

CrossLinked

LinkedIn
Docs

LinkedIn enumeration to extract employee names.

Installation

bash
pip install crosslinked

Infrastructure & Search

Shodan CLI

Search
Docs

Search engine for Internet-connected devices.

Installation

bash
pip install shodan && shodan init YOUR_API_KEY

Censys CLI

Search
Docs

Internet-wide scanning data and certificate search.

Installation

bash
pip install censys

Httpx

Probing
Docs

Fast HTTP probing with technology detection.

Installation

bash
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest

WhatWeb

Tech
Docs

Next-gen web scanner for technology identification.

Installation

bash
gem install whatweb

waybackurls

History
Docs

Fetch URLs from the Wayback Machine.

Installation

bash
go install github.com/tomnomnom/waybackurls@latest

gau

History
Docs

GetAllUrls - fetch known URLs from multiple sources.

Installation

bash
go install github.com/lc/gau/v2/cmd/gau@latest

Email & Breach Hunting

h8mail

Breach
Docs

Email OSINT and breach hunting tool.

Installation

bash
pip install h8mail

EmailFinder

Email
Docs

Find company emails from various public sources.

Installation

bash
pip install emailfinder

Infoga

Email
Docs

Email information gathering from public sources.

Installation

bash
git clone https://github.com/m4ll0k/Infoga.git

Buster

Email
Docs

Email to social media link tool.

Installation

bash
pip install buster

Framework Usage Examples

SpiderFoot

spiderfoot-usage.sh
bash
# Start SpiderFoot web UI
spiderfoot -l 127.0.0.1:5001
# Navigate to http://localhost:5001

# CLI scan
spiderfoot -s target.com -t all -o html -H report.html

# Specific module scan
spiderfoot -s target.com -m sfp_dnsresolve,sfp_shodan -o json

# Scan with API keys (configure in ~/.spiderfoot/settings)
spiderfoot -s target.com -t all

# Docker deployment
docker run -p 5001:5001 spiderfoot

Recon-ng

recon-ng-usage.sh
bash
# Start Recon-ng
recon-ng

# Create workspace for target
workspaces create target_company
db insert domains target.com

# Set API keys
keys add shodan_api YOUR_KEY
keys add censys_id YOUR_ID
keys add censys_secret YOUR_SECRET

# Load and run modules
modules load recon/domains-hosts/hackertarget
run

modules load recon/domains-hosts/certificate_transparency
run

modules load recon/domains-contacts/whois_pocs
run

# Search for modules
modules search subdomain
modules search email

# Export results
modules load reporting/html
options set FILENAME /tmp/report.html
run

# List gathered data
show hosts
show contacts

OWASP Amass

amass-usage.sh
bash
# Passive enumeration (safe, no direct contact)
amass enum -passive -d target.com -o passive_subs.txt

# Active enumeration (includes DNS resolution)
amass enum -active -d target.com -o active_subs.txt

# Brute force subdomain discovery
amass enum -brute -d target.com -w /path/to/wordlist.txt

# Intel gathering (reverse WHOIS)
amass intel -d target.com -whois

# Track changes over time
amass track -d target.com

# Visualize results
amass viz -d3 -d target.com

# Full configuration file scan
amass enum -config config.ini -d target.com

# Output to database for later analysis
amass enum -d target.com -dir ./amass_output

reconFTW

reconftw-usage.sh
bash
# Full reconnaissance
./reconftw.sh -d target.com -r

# Subdomain enumeration only
./reconftw.sh -d target.com -s

# Full recon with all modules
./reconftw.sh -d target.com -a

# Multiple targets from file
./reconftw.sh -l targets.txt -r

# Output in specific directory
./reconftw.sh -d target.com -r -o /path/to/output

# Custom configuration
./reconftw.sh -d target.com -r -c custom_config.cfg

Practice Labs & CTFs

External Resources