-
Notifications
You must be signed in to change notification settings - Fork 184
/
osint-spy.py
101 lines (85 loc) · 4.11 KB
/
osint-spy.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
import argparse
from modules import (get_bitcoin_data, get_ciphers, heart_bleed,
get_company_detail, fetch_email, get_device, ip_details, VirusTotal)
parser = argparse.ArgumentParser()
parser.add_argument("--btc_block", help="Get latest bitcoin block info.", action="store_true")
parser.add_argument("--btc_date", help="Get bitcoin block info by date, example - 20190614", type=int)
parser.add_argument("--btc_address", help="Get info of any bitcoin wallet address")
parser.add_argument("--ssl_cipher", help="List out supported SSL ciphers used by any domain")
parser.add_argument("--ssl_bleed", help="Check whether server is vulnerable to heart bleed or not")
parser.add_argument("--domain", help="Do domain recon")
parser.add_argument("--email", help="Do email recon")
parser.add_argument("--device", help="Explore the Internet of Things. Example - opensips,asterisk,juniper,windows10")
parser.add_argument("--ip", help="WHOIS IP Lookup")
parser.add_argument("--malware", help="Send files to VirusTotal for malware analysis")
parser.add_argument("--json", help="Show output in JSON format", action="store_true")
args = parser.parse_args()
if args.btc_block:
url = 'https://chain.api.btc.com/v3/block/latest'
get_bitcoin_data(url, args.json)
exit()
elif args.btc_date:
date = args.btc_date
url = f'https://chain.api.btc.com/v3/block/date/{date}'
get_bitcoin_data(url, args.json)
exit()
elif args.btc_address:
address = args.btc_address
url = f'https://chain.api.btc.com/v3/address/{address}'
get_bitcoin_data(url, args.json)
exit()
elif args.ssl_cipher:
server = args.ssl_cipher
get_ciphers(server)
exit()
elif args.ssl_bleed:
server = args.ssl_bleed
heart_bleed(server)
exit()
elif args.domain:
domain = args.domain
get_company_detail(domain, args.json)
exit()
elif args.email:
email_id = args.email
fetch_email(email_id, args.json)
exit()
elif args.device:
device_name = args.device
get_device(device_name, args.json)
exit()
elif args.ip:
ip = args.ip
ip_details(ip, args.json)
exit()
elif args.malware:
mal_path = args.malware
api = VirusTotal()
api.send_malware(mal_path, args.json)
exit()
else:
print("""
@@@@@@@@@ @@@@@@@@@ | @@ @ 88888|88888 @@@@@@@@@ 8@@@@@@@@ 8 @
88888888888 | | @ @ @ | | 8 @ 8 @
@@@@@@@@@@@ | | @ @ @ | | 8 @ 8 @
88888888888 |@@@@@@@@ | @ @ @ | ---- |@@@@@@@@ 8@@@@@@@@ 8 @
@@@@@@@@@@@ | | @ @ @ | | 8 @
@@@@@@@@@@@ | | @ @ @ | | 8 @
888888888 @@@@@@@@| | @ @@ | @@@@@@@@| 8 @
Search using OSINT
Website: https://docs.osint-spy.io
Usage: osint-spy.py [options]
Options:
-h, --help show this help message and exit
--btc_block Get latest bitcoin block info
--btc_date Get bitcoin block info by date, example - 20190614
--btc_address Get info of any bitcoin wallet address
--ssl_cipher List out supported SSL ciphers used by any domain
--ssl_bleed Check whether server is vulnerable to heart bleed or not
--domain Do domain recon
--email Do email recon
--device Explore the Internet of Things. Example - opensips,asterisk,juniper,windows10
--ip WHOIS IP Lookup
--malware Send files to VirusTotal for malware analysis
--json Show output in JSON format
""")