
# I Know You
**Self-hosted OSINT aggregation platform**
Run dozens of open-source intelligence tools against a single target in parallel; all from one clean web interface.
[](https://go.dev)
[](https://astro.build)
[](LICENSE)
[](https://github.com/anotherhadi/iknowyou)
---
## What is it?
IKY (iknowyou) is a **self-hosted OSINT (Open-Source Intelligence) platform** that centralises reconnaissance tools into a single reactive web interface. Instead of juggling terminals, browser tabs, and disconnected CLI tools, you type a target once and get results streaming in real time.
Designed for security researchers, penetration testers, and OSINT investigators who need speed and visibility without compromising on control.
**Supported target types:** `email`, `username`, `domain`, `IP`, `phone`, ...
## Features
- **Parallel execution**: all tools run simultaneously; results stream in as they arrive
- **Profile system**: create named profiles to enable/disable specific tools or override their config per investigation type (quick recon vs. thorough sweep)
- **Per-tool configuration**: set API keys, rate limits, and options globally or per profile
- **Tool availability checks**: tools that depend on an external binary report their status; the interface shows which tools are ready, which need config, and which are unavailable
- **Search history**: completed searches are kept in memory; results can be reviewed without re-running
- **Extensible architecture**: adding a new tool is a single Go file implementing one interface, registered in one line
- **Production-ready**: The configuration is YAML-based and read-only mode is supported (for Nix-managed deployments). A NixOS module is available.
## Profiles
Profiles let you tailor which tools run and how, without touching the global config.
| Profile | Type | Description |
| ---------- | -------- | ---------------------------------------------------------------------------- |
| `default` | Built-in | All tools active, default settings |
| `hard` | Built-in | All tools active, including those that may leave traces at the target |
| _(custom)_ | User | Your own combination of enabled/disabled tools and per-tool config overrides |
Create and manage custom profiles from the **Profiles** page.
## Useful Links
- [See the list of tools](.github/docs/tools.md)
- [Learn how it works](.github/docs/how-it-works.md)
- [Learn how to contribute](.github/CONTRIBUTING.md)
## Deployment