Kali Linux

MOSINT – OSINT Tool For Emails

MOSINT is an OSINT Tool for emails. It helps you gather information about the target email.

Features

  • Verification Service { Check if email exist }
  • Check social accounts with Socialscan
  • Check data breaches
  • [need API] Find related emails
  • Find related phone numbers
  • Find related domains
  • Scan Pastebin Dumps
  • Google Search
  • DNS Lookup

You can turn features on off from the config.json

[
{
“verify-email.org API Key”: “set API KEY here”,
“hunter.io API Key”: “set API KEY here”,
“Breached Sites[leak-lookup.com API Key]”: “set API KEY here”,
“Social Scan”: “True”,
“Leaked DB”: “True”,
“Related Phone Numbers” : “True”,
“Related Domains” : “True”,
“Pastebin Dumps”: “True”,
“Google Search”: “True”,
“DNS Lookup”: “True”
}
]

API’s

[Not required to run the program]

ServiceFunctionStatus
verify-emailEmail Verification✅ 🔑
hunter.io – PublicRelated Emails✅ 🔑
leak-lookupBreached Sites Names✅ 🔑
scylla.shDatabase Leaks
hackertargetDNS Lookup
psbdmpPastebin Dumps

🔑 – API key required

  • For Use:

Save your API key in the config.json

Cloning

git clone https://github.com/alpkeskin/mosint.git

Usage

cd mosint
pip3 install -r requirements.txt

  • You can edit the config.json file

python3 mosint.py

  • Set Target Email

Also, you can exit by pressing the q key.

Screen

Tested On

  • Kali Linux
  • Parrot OS
  • MacOS (without SocialScan module)
R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

6 minutes ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

8 minutes ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

2 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago