In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes.
‘OSGINT: A Deep Dive into GitHub User Information Retrieval’ introduces an innovative tool that harnesses the power of open-source intelligence to extract detailed profiles from GitHub usernames and emails.
Join us as we explore the features, requirements, and mechanics of this fascinating utility.
pip3 install -r requirements.txt
$ python3 osgint.py -h
.d88888b. d8b 888
d88P" "Y88b Y8P 888
888 888 888
888 888 .d8888b .d88b. 888 88888b. 888888
888 888 88K d88P"88b 888 888 "88b 888
888 888 "Y8888b. 888 888 888 888 888 888
Y88b. .d88P X88 Y88b 888 888 888 888 Y88b.
"Y88888P" 88888P' "Y88888 888 888 888 "Y888
888 v1.0.0
Y8b d88P
"Y88P"
By Hippie | https://twitter.com/hiippiiie
usage: osgint.py [-h] [-u USERNAME] [-e EMAIL] [--json]
options:
-h, --help show this help message and exit
-u USERNAME, --username USERNAME
Github username of the account to search for (default: None)
-e EMAIL, --email EMAIL
Email of the account to search for github username (default: None)
--json Return a json output (default: False)
$ ./osgint.py -u hippiiee
[+] login : hippiiee
[+] id : 41185722
[+] avatar_url : https://avatars.githubusercontent.com/u/41185722?v=4
[+] name : Hippie
[+] blog : https://hippie.cat
[+] bio : Hi !
[+] public_repos : 10
[+] public_gists : 0
[+] followers : 8
[+] following : 9
[+] created_at : 2018-07-13T08:28:00Z
[+] updated_at : 2022-08-21T13:11:36Z
[+] public_gists : https://gist.github.com/hippiiee
[+] GPG_keys : https://github.com/hippiiee.gpg
[+] GPG_key_id : 27cbb171ff857c58
[+] email : hquere@e3r4p3.42.fr hippolyte.q@gmail.com
$ ./osgint.py -u hippiiee --json
{
"GPG_key_id": "27cbb171ff857c58",
"GPG_keys": "https://github.com/hippiiee.gpg",
"avatar_url": "https://avatars.githubusercontent.com/u/41185722?v=4",
"bio": "Hi !",
"blog": "https://hippie.cat",
"created_at": "2018-07-13T08:28:00Z",
"email": [
"hquere@e3r4p3.42.fr",
"hippolyte.q@gmail.com"
],
"followers": 8,
"following": 9,
"id": 41185722,
"login": "hippiiee",
"name": "Hippie",
"public_gists": "https://gist.github.com/hippiiee",
"public_repos": 10,
"updated_at": "2022-08-21T13:11:36Z"
}
$ ./osgint.py -e chrisadr@gentoo.org
[+] username : ChrisADR
$ ./osgint.py -e chrisadr@gentoo.org --json
{
"username": "ChrisADR"
}
To get a user email, osingt is checking :
To get a user email, osgint is checking :
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…
"My Awesome List" is a curated collection of tools, libraries, and resources spanning various domains…
CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, allowed attackers to execute arbitrary…
The blog post "Chrome Browser Exploitation, Part 1: Introduction to V8 and JavaScript Internals" provides…
The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…