My new open source python OSINT framework, skiptracer was released @ HushCon East on June 1st. Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining results. Using some basic python webscraping of PII paywall sites to compile passive information on a target. The modules will allow queries for phone/email/screen names/real names/addresses/IP/Hostname/breach credentials etc.. It will help you collect relevant information about a target to help expand your attack surface.`Everyone should be encourage to submit new ideas/modules. You can get the code here: feel free to submit new modules or code fixes.

Bookmark the permalink.

3 Responses to skiptracer

  1. Neal says:

    It’s been pulled from github. (Why???) Any other places to get a copy?

  2. dave says:

    where can we get another copy? its been pulled

  3. update says:

    Hi I am interesting in seeing what osint: skip tracer would look like in python3.

    I hope it can be possible soon, I hope the information below helps in some way.

    Update Exception Handling: In Python 3, except Exception, e: would need to be replaced with except Exception as e:.
    Dict.iteritems(): This method was removed in Python 3. You can use dict.items() instead.
    Replace xrange with range: The function xrange() is not available in Python 3 and range() is the equivalent.

    # some code
    except Exception, e:
    print e

    # some code
    except Exception as e:

    my_dict = {“one”: 1, “two”: 2}
    for key, value in my_dict.iteritems():
    print key, value

    my_dict = {“one”: 1, “two”: 2}
    for key, value in my_dict.items():
    print(key, value)
    Replace xrange with range:
    Python 2: for i in xrange(10): print i
    Python 3: for i in range(10): print(i)

Leave a Reply

Your email address will not be published. Required fields are marked *