Scylla is an OSINT tool developed in Python 3.6. Scylla lets users perform advanced searches on Instagram & Twitter accounts, websites/webservers, phone numbers, and names. Scylla also allows users to find all social media profiles (main platforms) assigned to a certain username. In continuation, Scylla has shodan support so you can search for devices all over the internet, it also has in-depth geolocation capabilities.
Lastly, Scylla has a finance section which allows users to check if a credit/debit card number has been leaked/pasted in a breach and returns information on the cards IIN/BIN. This is the first version of the tool so please contact the developer if you want to help contribute and add more to Scylla.
Installation
git clone https://www.github.com/DoubleThreatSecurity/Scylla
cd Scylla
sudo python3 -m pip install -r requirments.txt
python3 scylla.py –help
Usage
python3 scylla.py –instagram davesmith –twitter davesmith
python3 scylla.py –username johndoe
python3 scylla.py –username johndoe -l=”john doe”
python3 scylla.py –info google.com
python3 scylla.py -r +14167777777
python3 scylla.py -s apache
python3 scylla.py -s webcamxp
python3 scylla.py -g 1.1.1.1
python3 scylla.py -c 123456789123456
Menu
Usage: scylla.py [-h] [-v] [-ig INSTAGRAM] [-tw TWITTER] [-u USERNAME]
[–info INFO] [-r REVERSE_PHONE_LOOKUP] [-l LOOKUP]
[-s SHODAN_QUERY] [-g GEO] [-c CARD_INFO]
Optional Arguments:
-h, –help show this help message and exit
-v, –version returns scyla’s version
-ig INSTAGRAM, –instagram INSTAGRAM
return the information associated with specified
instagram account
-tw TWITTER, –twitter TWITTER
return the information associated with specified
twitter account
-u USERNAME, –username USERNAME
find social media profiles (main platforms) associated
with given username
–info INFO return information about the specified website(WHOIS)
w/ geolocation
-r REVERSE_PHONE_LOOKUP, –reverse_phone_lookup REVERSE_PHONE_LOOKUP
return information about the specified phone number
(reverse lookup)
-l LOOKUP, –lookup LOOKUP
performs a google search of the 35 top items for the
argument given
-s SHODAN_QUERY, –shodan_query SHODAN_QUERY
performs a an in-depth shodan search on any simple
query (i.e, ‘webcamxp’, ‘voip’, ‘printer’, ‘apache’)
-g GEO, –geo GEO geolocates a given IP address. provides: longitude,
latitude, city, country, zipcode, district, etc.
-c CARD_INFO, –card_info CARD_INFO
check if the credit/debit card number has been pasted
in a breach…dumps sites. Also returns bank
information on the IIN
API NOTICE
The API used for the reverse phone number lookup (free package) has maximum 250 requests. The one used in the program right now will most definetely run out of uses in the near future. If you want to keep generating API keys, go to https://www.numverify.com, and select the free plan after creating an account. Then simply go scylla.py and replace the original API key with your new API key found in your account dashboard. Insert your new key into the keys[] array (at the top of the source). For the Shodan API key, it is just a sample key given to the program. The developer recommends creating a shodan account and adding your own API key to the shodan_api[] array at the top of the source (scylla.py).
Ethical Notice
The developer of this program, Josh Schiavone, written the following code for educational and OSINT purposes only. The information generated is not to be used in a way to harm, stalk or threaten others. Josh Schiavone is not responsible for misuse of this program. May God bless you all.
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…