alpkeskin / mosint

An automated e-mail OSINT tool
MIT License
4.72k stars 549 forks source link
automation data-breach email email-checker go hacking information-gathering osint osint-tool pentest pwn python-hacking social-media socmint verification-service

mosint

FeaturesInstallationServicesUsageDockerConfigScreen

Mosint is an automated email osint tool written in Go that allows you investigate for target emails in a fast and efficient manner. It consolidates numerous services, enabling security researchers to swiftly access a wealth of information.

Features

mosint

Installation

go install -v github.com/alpkeskin/mosint/v3/cmd/mosint@latest

Services

Service Function Status
ipapi.co - Public More Information About Domain :white_check_mark:
hunter.io - Public Related Emails :white_check_mark: :key:
emailrep.io - Public Breached Sites Names :white_check_mark: :key:
scylla.so - Public Database Leaks :construction:
psbdmp.ws - Public Pastebin Dumps :white_check_mark: :key:
Intelligence X Password Leaks :white_check_mark: :key:
BreachDirectory Password Leaks :white_check_mark: :key:
HaveIBeenPwned Password Leaks :white_check_mark: :key:

:key: API key required

Configuration file

Mosint supports config file as default located at $HOME/.mosint.yaml. It allows you to define API keys for services.

You must set the config file for mosint to run! To specify a configuration file located in a directory other than the home directory, you can use the --config flag.

Usage

mosint example@email.com

Call the help (-h) flag for more information on usage.

Docker

Build a docker image

docker build -t mosint .  

Run the docker container using the image

docker run mosint --help

Screen

mosint