Tookie-osint has a simple-to-use UI and is really straightforward. The main idea of Tookie-osint is to discover usernames that are requested from an input.
Tookie-osint is similar to the tool called Sherlock. It discovers all the user accounts across different websites and Tookie-osint is successful at this task almost 80% of the time.
Our tool was created by me and the community and is available for your use.
I do not take responsibility for any malicious actions and/or responsibility caused by my tool. ( Please note that Tookie-osint was created to help new programmers or pentesters get into the world of OSINT.
My end term goal is to make Tookie-osint as perfect as I can and make it easy for new programmers to understand.
Also take note that Tookie-osint is optimized for Python 3.12. If you want to contribute, make a fork and make a pull request to submit your changes.
The requirements will be automatically installed.
git clone https://github.com/alfredredbird/tookie-osint
cd tookie-osint && sudo pip3 install -r requirements.txt
python3 tookie-osint download the latest release from: https://github.com/alfredredbird/tookie-osint/releases.
then extract the zip or tar.gz
cd tookie-osint && sudo pip3 install -r requirements.txt
python3 tookie-osint termux-setup-storage
ln -s storage/downloads Downloads
git clone https://github.com/alfredredbird/tookie-osint
cd tookie-osint && pip3 install -r requirements.txt
python3 tookie-osint | Operative system | Version |
|---|---|
| MacOS | Monterey 12.6.7 |
| Windows | 11/10 |
| Termux | 0.118.0 |
| Kali linux | Rolling / Sana |
| Parrot OS | 3.1 |
| Ubuntu | 22.04/20.04 |
| Debian | 10.00 |
| Alpine | 3.10 |
| Fedora | v33 |
| Arch Linux | 2021.07.01 |
| Manjaro | 21 |
| Void | Rolling Release |
There Is A Lot Lol
(we need translators )
(They Are Great First Issues :D)
For more information click here.
What is a Software Supply Chain Attack? A software supply chain attack occurs when a…
When people ask how UDP works, the simplest answer is this: UDP sends data quickly…
Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…
A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…
How Does a Firewall Work Step by Step? What Is a Firewall and How Does…
People trying to securely connect to work are being tricked into doing the exact opposite.…