OSINT

An automated OSINT data gathering tool

Python scripting for OSINT automation

Project URL: https://github.com/oliurrahmanoli/osint-tool

OSINT Data Gathering Tool - Documentation

OSINT Data Gathering Tool - Documentation

Introduction

In the ever-evolving field of cybersecurity, Open Source Intelligence (OSINT) plays a crucial role in gathering publicly available data for reconnaissance and threat analysis. To demonstrate my cybersecurity skills, I built an OSINT Data Gathering Tool, an automated Python script that retrieves essential information about a target domain or IP using WHOIS lookup, Shodan API, and more.

This project is part of my homelab cybersecurity portfolio, showcasing my expertise in ethical hacking, data intelligence, and Python automation.

Features of the OSINT Data Gathering Tool

  • ✅ WHOIS Lookup: Retrieves domain registration details such as owner, registrar, and expiration date.
  • ✅ Shodan API Integration: Fetches information about an IP, including open ports, organization, and known vulnerabilities.
  • ✅ Automated Report Generation: Saves gathered data in structured JSON format for easy analysis and reporting.

Installation and Setup

1. Clone the Repository

git clone https://github.com/yourgithub/osint-tool.git
cd osint-tool

2. Create a Virtual Environment (Optional)

python -m venv venv
source venv/bin/activate  # On Windows: venv\Scripts\activate

3. Install Dependencies

pip install requests shodan whois python-whois

4. Run the Script

python osint_tool.py

Example Output

{
    "WHOIS": {
        "Domain": "example.com",
        "Registrar": "GoDaddy",
        "Creation Date": "1995-08-13",
        "Expiration Date": "2025-08-13",
        "Name Servers": ["ns1.example.com", "ns2.example.com"]
    },
    "Shodan": {
        "IP": "8.8.8.8",
        "Organization": "Google LLC",
        "Operating System": "N/A",
        "Open Ports": [53],
        "Vulnerabilities": "None"
    }
}

How This Project Enhances My Cybersecurity Portfolio

  • Python scripting for cybersecurity automation.
  • API integration (Shodan, WHOIS, etc.).
  • OSINT techniques for ethical hacking and reconnaissance.
  • Threat intelligence gathering.

Future Enhancements

  • Email & subdomain enumeration using TheHarvester.
  • Reverse DNS lookups for deeper intelligence.
  • Markdown and PDF reporting for professional documentation.

Try It Yourself

Interested in cybersecurity and OSINT? You can try this tool by visiting my GitHub repository:

🔗 GitHub Repository

Conclusion

This project demonstrates my skills in cybersecurity, OSINT, and Python automation. It is part of my ongoing journey to enhance my expertise in ethical hacking and cybersecurity research.

📌 Portfolio Website: oliurrahman.tech

📌 GitHub: @oliurrahmanoli

If you found this project helpful, star the repository on GitHub ⭐ and share your feedback! 🚀