A powerful Open-Source Intelligence Gathering (OSINT) tool designed for security professionals and researchers. With gOSINT, you can gather information about individuals, organizations, or entities from publicly available sources.
Search for emails in git commits using various git APIs.
Search for email addresses in the PGP key server.
Search for breaches where a given email address is involved.
Search for emails in source code (recursively) and pass results to other modules.
Crawl public telegram groups and retrieve message history.
Retrieve Shodan services report for a host IP, including honeypot probability.
Use the following command-line options:
-m <module_name>
: Choose a module to run (e.g., git
, pgp
, sourceSearch
, etc.).--url <URL>
: Specify the URL or repository to search for emails.--gitAPI <github|bitbucket>
: Choose the git API to use (default is GitHub).-f
: Pass results from one module to another.--ask-confirmation
: Ask for confirmation before adding emails to search results.--dumpfile
: Store output in a file and resume from last ID if the file already exists.--tgroup <public_group_name>
: Specify the public telegram group name to crawl.-g <public_group_name>
: Alternate way to specify the public telegram group name.--s <messageID>
: Set start message ID for scraping.--e <messageID>
: Set end message ID for scraping.-t <HOST IP>
: Specify the host IP to retrieve Shodan services report for.Run gOSINT with various options and modules:
gOSINT -m git --url=https://github.com/user/repo.git
gOSINT -m pwnd [email protected]
gOSINT -m sourceSearch --path=/path/to/source
gOSINT -m telegram --tgroup=PublicGroupName
PGP module demo Telegram Crawler module demo Shodan module demo
> Visit gOSINT Website <