This virtual machine image is intended for open source offensive reconnaissance. The iso image of the kali linux NetInstall operating system is taken as a basis. Other required packages were installed manually. The image includes the following packages.
alias py = 'python'
alias py3 = 'python3'
alias uu = 'apt update && apt upgrade -y'
Login: osint
Password: 22
Machine update, tools added (V2):
OSINT-SAN.
Parse Hub
YaSeeker.
Open Semantic Search. Containers already deployed, startup icon on top panel. Don't forget to start docker.service.
Working from root
Login: root
Password: 22
Over 27 GB
Machine update, tools added (V3):
Legion
sn1per
Reconftw
WikiLeaker
Spiderpig
Gitleaks
Getallurls
Metasploit-Framework
Login: root
Password: 22
Over 13.5 Gb
For update some tools in terminal:
Run some tools In terminal:
zen -h
waybackurls #url
whatbreach -h
waybackpack -h
vault
udork -h
striker @domain#
search4 -u #username
oneforall #domain# run
nullscan -H
nullinux -h
buster -e #email
evine
fgds #domain
gasmask -h
goohah #domain
holehe -h
infoga -h
lulzbuster -s #url
mosint -e #email
namechk #username
nicknamefinder
seosint #domain
osint -h
snoop -h
sitedorks -h
wiki
spiderpig
reconftw
r3con1z3r -h
raccoon -h
arachnid -h
gobuster -h
gosint -h
goca -h
gospider -h
lazygrandma -h
maigret #nickname
cd ~/opt/53R3N17Y
./serenity --help
cd ~/opt/deluxe
python3 deluxe.py -h
cd ~/opt/FinalRecon
python3 finalrecon.py -h
cd ~/opt/scriptnOsint
./osint -h
cd ~/opt/snoop/
snoop -h
cd ~/opt/sitedorks/
python3 sitedorks.py -h
cd ~/opt/URLextractor/
./extractor -H
docker pull simplysecurity/simplyemail
docker run --rm -ti simplysecurity/simplyemail -h
cd ~/opt/social-analyzer
sudo docker build -t social-analyzer . && sudo docker run -p 9005:9005 -it social-analyzer
export PORT=80
docker pull searx/searx
docker run --rm -d -v ${PWD}/searx:/etc/searx -p $PORT:8080 -e BASE_URL=http://localhost:$PORT/ searx/searx
docker pull jas9reet/grawler
docker run -d -p 8080:80 jas9reet/grawler
cd ~/opt/iKy
docker-compose up --build