In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes.
‘OSGINT: A Deep Dive into GitHub User Information Retrieval’ introduces an innovative tool that harnesses the power of open-source intelligence to extract detailed profiles from GitHub usernames and emails.
Join us as we explore the features, requirements, and mechanics of this fascinating utility.
pip3 install -r requirements.txt
$ python3 osgint.py -h
.d88888b. d8b 888
d88P" "Y88b Y8P 888
888 888 888
888 888 .d8888b .d88b. 888 88888b. 888888
888 888 88K d88P"88b 888 888 "88b 888
888 888 "Y8888b. 888 888 888 888 888 888
Y88b. .d88P X88 Y88b 888 888 888 888 Y88b.
"Y88888P" 88888P' "Y88888 888 888 888 "Y888
888 v1.0.0
Y8b d88P
"Y88P"
By Hippie | https://twitter.com/hiippiiie
usage: osgint.py [-h] [-u USERNAME] [-e EMAIL] [--json]
options:
-h, --help show this help message and exit
-u USERNAME, --username USERNAME
Github username of the account to search for (default: None)
-e EMAIL, --email EMAIL
Email of the account to search for github username (default: None)
--json Return a json output (default: False)
$ ./osgint.py -u hippiiee
[+] login : hippiiee
[+] id : 41185722
[+] avatar_url : https://avatars.githubusercontent.com/u/41185722?v=4
[+] name : Hippie
[+] blog : https://hippie.cat
[+] bio : Hi !
[+] public_repos : 10
[+] public_gists : 0
[+] followers : 8
[+] following : 9
[+] created_at : 2018-07-13T08:28:00Z
[+] updated_at : 2022-08-21T13:11:36Z
[+] public_gists : https://gist.github.com/hippiiee
[+] GPG_keys : https://github.com/hippiiee.gpg
[+] GPG_key_id : 27cbb171ff857c58
[+] email : hquere@e3r4p3.42.fr hippolyte.q@gmail.com
$ ./osgint.py -u hippiiee --json
{
"GPG_key_id": "27cbb171ff857c58",
"GPG_keys": "https://github.com/hippiiee.gpg",
"avatar_url": "https://avatars.githubusercontent.com/u/41185722?v=4",
"bio": "Hi !",
"blog": "https://hippie.cat",
"created_at": "2018-07-13T08:28:00Z",
"email": [
"hquere@e3r4p3.42.fr",
"hippolyte.q@gmail.com"
],
"followers": 8,
"following": 9,
"id": 41185722,
"login": "hippiiee",
"name": "Hippie",
"public_gists": "https://gist.github.com/hippiiee",
"public_repos": 10,
"updated_at": "2022-08-21T13:11:36Z"
}
$ ./osgint.py -e chrisadr@gentoo.org
[+] username : ChrisADR
$ ./osgint.py -e chrisadr@gentoo.org --json
{
"username": "ChrisADR"
}
To get a user email, osingt is checking :
To get a user email, osgint is checking :
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…