In the vast realm of GitHub, the ability to glean information about users can be invaluable for various purposes.
‘OSGINT: A Deep Dive into GitHub User Information Retrieval’ introduces an innovative tool that harnesses the power of open-source intelligence to extract detailed profiles from GitHub usernames and emails.
Join us as we explore the features, requirements, and mechanics of this fascinating utility.
pip3 install -r requirements.txt
$ python3 osgint.py -h
.d88888b. d8b 888
d88P" "Y88b Y8P 888
888 888 888
888 888 .d8888b .d88b. 888 88888b. 888888
888 888 88K d88P"88b 888 888 "88b 888
888 888 "Y8888b. 888 888 888 888 888 888
Y88b. .d88P X88 Y88b 888 888 888 888 Y88b.
"Y88888P" 88888P' "Y88888 888 888 888 "Y888
888 v1.0.0
Y8b d88P
"Y88P"
By Hippie | https://twitter.com/hiippiiie
usage: osgint.py [-h] [-u USERNAME] [-e EMAIL] [--json]
options:
-h, --help show this help message and exit
-u USERNAME, --username USERNAME
Github username of the account to search for (default: None)
-e EMAIL, --email EMAIL
Email of the account to search for github username (default: None)
--json Return a json output (default: False)
$ ./osgint.py -u hippiiee
[+] login : hippiiee
[+] id : 41185722
[+] avatar_url : https://avatars.githubusercontent.com/u/41185722?v=4
[+] name : Hippie
[+] blog : https://hippie.cat
[+] bio : Hi !
[+] public_repos : 10
[+] public_gists : 0
[+] followers : 8
[+] following : 9
[+] created_at : 2018-07-13T08:28:00Z
[+] updated_at : 2022-08-21T13:11:36Z
[+] public_gists : https://gist.github.com/hippiiee
[+] GPG_keys : https://github.com/hippiiee.gpg
[+] GPG_key_id : 27cbb171ff857c58
[+] email : hquere@e3r4p3.42.fr hippolyte.q@gmail.com
$ ./osgint.py -u hippiiee --json
{
"GPG_key_id": "27cbb171ff857c58",
"GPG_keys": "https://github.com/hippiiee.gpg",
"avatar_url": "https://avatars.githubusercontent.com/u/41185722?v=4",
"bio": "Hi !",
"blog": "https://hippie.cat",
"created_at": "2018-07-13T08:28:00Z",
"email": [
"hquere@e3r4p3.42.fr",
"hippolyte.q@gmail.com"
],
"followers": 8,
"following": 9,
"id": 41185722,
"login": "hippiiee",
"name": "Hippie",
"public_gists": "https://gist.github.com/hippiiee",
"public_repos": 10,
"updated_at": "2022-08-21T13:11:36Z"
}
$ ./osgint.py -e chrisadr@gentoo.org
[+] username : ChrisADR
$ ./osgint.py -e chrisadr@gentoo.org --json
{
"username": "ChrisADR"
}
To get a user email, osingt is checking :
To get a user email, osgint is checking :
Tools and packages that are used for countering forensic activities, including encryption, steganography, and anything…
Avilla Forensics is located in first place in the award international Forensics 4:Cast, in the…
Comprehensive guide to leveraging Google Chrome's extensions for Open-Source Intelligence (OSINT) tasks. In this article,…
Embark on a journey into the realm of digital forensics with our exploration of 'Analisi-Digital-Forense.…
The intersection of intelligence, investigation, and mobility. In this comprehensive guide, we delve into the…
Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is…