My new open source python OSINT framework, skiptracer was released @ HushCon East on June 1st. Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining results. Using some basic python webscraping of PII paywall sites to compile passive information on a target. The modules will allow queries for phone/email/screen names/real names/addresses/IP/Hostname/breach credentials etc.. It will help you collect relevant information about a target to help expand your attack surface.`Everyone should be encourage to submit new ideas/modules. You can get the code here: https://github.com/xillwillx/skiptracer feel free to submit new modules or code fixes.
skiptracer
Bookmark the permalink.
It’s been pulled from github. (Why???) Any other places to get a copy?
where can we get another copy? its been pulled
Hi I am interesting in seeing what osint: skip tracer would look like in python3.
I hope it can be possible soon, I hope the information below helps in some way.
Update Exception Handling: In Python 3, except Exception, e: would need to be replaced with except Exception as e:.
Dict.iteritems(): This method was removed in Python 3. You can use dict.items() instead.
Replace xrange with range: The function xrange() is not available in Python 3 and range() is the equivalent.
try:
# some code
except Exception, e:
print e
try:
# some code
except Exception as e:
print(e)
my_dict = {“one”: 1, “two”: 2}
for key, value in my_dict.iteritems():
print key, value
my_dict = {“one”: 1, “two”: 2}
for key, value in my_dict.items():
print(key, value)
Replace xrange with range:
Python 2: for i in xrange(10): print i
Python 3: for i in range(10): print(i)