DataSploit – Performs automated OSINT techniques

  • 249
  •  
  •  
  •  
  •  
  •  
  •  
  •  
    249
    Shares

DataSploit is a simple tool used to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.

It is useful for Pen-testers, product companies, defensive security professionals, cyber investigators and etc. The tool tries to find out credentials, api-keys, tokens, sub-domains, domain history, legacy portals and many more related to the target. It is available in both GUI and Console.

Requirement:

  • Bunch of python libraries (use requirements.txt)
  • MongoDb, Django, Celery and RabbitMq (Refer to setup guide).

 

Basic Usage:

 

      ____/ /____ _ / /_ ____ _ _____ ____   / /____  (_)/ /_
      / __  // __ `// __// __ `// ___// __ \ / // __ \ / // __/
     / /_/ // /_/ // /_ / /_/ /(__  )/ /_/ // // /_/ // // /_  
     \__,_/ \__,_/ \__/ \__,_//____// .___//_/ \____//_/ \__/  
                                   /_/                        

               Open Source Assistant for #OSINT            
                 website: www.datasploit.info               

Usage: domainOsint.py [options]

Options:
  -h,           --help              show this help message and exit
  -d DOMAIN,    --domain=DOMAIN     Domain name against which automated Osint 
                                    is to be performed.

For more information regarding tool documentation visit datasploit.readthedocs.io

Download now: datasploit

The following two tabs change content below.

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Leave a Reply