This commit is contained in:
Hadi
2026-04-06 15:12:34 +02:00
commit 4989225671
117 changed files with 11454 additions and 0 deletions

22
.github/docs/tools/breachdirectory.md vendored Normal file
View File

@@ -0,0 +1,22 @@
# `breachdirectory`
Data breach search via BreachDirectory — checks if an email, username, or phone appears in known data breaches and returns exposed passwords/hashes.
**Source / documentation:** [https://breachdirectory.org](https://breachdirectory.org)
## Input types
- `email`
- `username`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `api_key` | `string` | **yes** | - | RapidAPI key for BreachDirectory (required — get one at rapidapi.com/rohan-patra/api/breachdirectory) |
---
[← Back to tools index](../tools.md)

17
.github/docs/tools/crt.sh.md vendored Normal file
View File

@@ -0,0 +1,17 @@
# `crt.sh`
SSL/TLS certificate transparency log search via crt.sh — enumerates subdomains and certificates issued for a domain.
**Source / documentation:** [https://crt.sh](https://crt.sh)
## Input types
- `domain`
## Configuration
This tool requires no configuration.
---
[← Back to tools index](../tools.md)

24
.github/docs/tools/dig.md vendored Normal file
View File

@@ -0,0 +1,24 @@
# `dig`
DNS lookup querying A, AAAA, MX, NS, TXT, and SOA records for a domain, or reverse DNS (PTR) for an IP.
**Source / documentation:** [https://linux.die.net/man/1/dig](https://linux.die.net/man/1/dig)
## Input types
- `domain`
- `ip`
## External dependencies
The following binaries must be installed and available in `$PATH`:
- `dig`
## Configuration
This tool requires no configuration.
---
[← Back to tools index](../tools.md)

30
.github/docs/tools/github-recon.md vendored Normal file
View File

@@ -0,0 +1,30 @@
# `github-recon`
GitHub OSINT reconnaissance tool. Gathers profile info, social links, organisations, SSH/GPG keys, commits, and more from a GitHub username or email.
**Source / documentation:** [https://github.com/anotherhadi/nur-osint](https://github.com/anotherhadi/nur-osint)
## Input types
- `username`
- `email`
## External dependencies
The following binaries must be installed and available in `$PATH`:
- `github-recon`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `token` | `string` | - | - | GitHub personal access token (enables higher rate limits and more data) |
| `deepscan` | `bool` | - | `false` | Enable deep scan (slower - scans all repositories for authors/emails) |
| `spoof_email` | `bool` | - | `false` | Include email spoofing check (email mode only, requires token) |
---
[← Back to tools index](../tools.md)

23
.github/docs/tools/gravatar-recon.md vendored Normal file
View File

@@ -0,0 +1,23 @@
# `gravatar-recon`
Gravatar OSINT tool. Extracts public profile data from a Gravatar account: name, bio, location, employment, social accounts, phone, and more.
**Source / documentation:** [https://github.com/anotherhadi/gravatar-recon](https://github.com/anotherhadi/gravatar-recon)
## Input types
- `email`
## External dependencies
The following binaries must be installed and available in `$PATH`:
- `gravatar-recon`
## Configuration
This tool requires no configuration.
---
[← Back to tools index](../tools.md)

21
.github/docs/tools/ipinfo.md vendored Normal file
View File

@@ -0,0 +1,21 @@
# `ipinfo`
IP geolocation via ipinfo.io — returns city, region, country, coordinates, ASN/org, timezone, and hostname.
**Source / documentation:** [https://ipinfo.io](https://ipinfo.io)
## Input types
- `ip`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `token` | `string` | - | - | ipinfo.io API token (optional — free tier allows 50k req/month without one) |
---
[← Back to tools index](../tools.md)

23
.github/docs/tools/leakcheck.md vendored Normal file
View File

@@ -0,0 +1,23 @@
# `leakcheck`
Data breach lookup via LeakCheck.io — searches 7B+ leaked records for email addresses, usernames, and phone numbers across hundreds of breaches.
**Source / documentation:** [https://leakcheck.io](https://leakcheck.io)
## Input types
- `email`
- `username`
- `phone`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `api_key` | `string` | **yes** | - | LeakCheck API key (required — get one at leakcheck.io) |
---
[← Back to tools index](../tools.md)

27
.github/docs/tools/maigret.md vendored Normal file
View File

@@ -0,0 +1,27 @@
# `maigret`
Username OSINT across 3000+ sites. Searches social networks, forums, and online platforms for an account matching the target username.
**Source / documentation:** [https://github.com/soxoj/maigret](https://github.com/soxoj/maigret)
## Input types
- `username`
## External dependencies
The following binaries must be installed and available in `$PATH`:
- `maigret`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `all_sites` | `bool` | - | `false` | Scan all sites in the database instead of just the top 500 (slower) |
---
[← Back to tools index](../tools.md)

29
.github/docs/tools/user-scanner.md vendored Normal file
View File

@@ -0,0 +1,29 @@
# `user-scanner`
🕵️‍♂️ (2-in-1) Email & Username OSINT suite. Analyzes 195+ scan vectors (95+ email / 100+ username) for security research, investigations, and digital footprinting.
**Source / documentation:** [https://github.com/kaifcodec/user-scanner](https://github.com/kaifcodec/user-scanner)
## Input types
- `email`
- `username`
## External dependencies
The following binaries must be installed and available in `$PATH`:
- `user-scanner`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `allow_loud` | `bool` | - | `false` | Enable scanning sites that may send emails/notifications (password resets, etc.) |
| `only_found` | `bool` | - | `true` | Only show sites where the username/email was found |
---
[← Back to tools index](../tools.md)

17
.github/docs/tools/wappalyzer.md vendored Normal file
View File

@@ -0,0 +1,17 @@
# `wappalyzer`
Web technology fingerprinting via wappalyzergo — detects CMS, frameworks, web servers, analytics, CDN, and 1500+ other technologies running on a domain.
**Source / documentation:** [https://github.com/projectdiscovery/wappalyzergo](https://github.com/projectdiscovery/wappalyzergo)
## Input types
- `domain`
## Configuration
This tool requires no configuration.
---
[← Back to tools index](../tools.md)

24
.github/docs/tools/whois.md vendored Normal file
View File

@@ -0,0 +1,24 @@
# `whois`
WHOIS lookup for domain registration and IP ownership information.
**Source / documentation:** [https://en.wikipedia.org/wiki/WHOIS](https://en.wikipedia.org/wiki/WHOIS)
## Input types
- `domain`
- `ip`
## External dependencies
The following binaries must be installed and available in `$PATH`:
- `whois`
## Configuration
This tool requires no configuration.
---
[← Back to tools index](../tools.md)

23
.github/docs/tools/whoisfreaks.md vendored Normal file
View File

@@ -0,0 +1,23 @@
# `whoisfreaks`
Reverse WHOIS lookup via WhoisFreaks — find all domains registered by an email, owner name, or keyword across 3.6B+ WHOIS records.
**Source / documentation:** [https://whoisfreaks.com](https://whoisfreaks.com)
## Input types
- `email`
- `name`
- `domain`
## Configuration
Configure globally via the Tools page or override per profile.
| Field | Type | Required | Default | Description |
|-------|------|:--------:|---------|-------------|
| `api_key` | `string` | **yes** | - | WhoisFreaks API key (required — free account at whoisfreaks.com) |
---
[← Back to tools index](../tools.md)