An automated e-mail OSINT tool
Features • Installation • Services • Usage • Docker • Config • Screen
Mosint is an automated email osint tool written in Go that allows you investigate for target emails in a fast and efficient manner. It consolidates numerous services, enabling security researchers to swiftly access a wealth of information.
--coffee
flag!go install -v github.com/alpkeskin/mosint/v3/cmd/mosint@latest
Service | Function | Status |
---|---|---|
ipapi.co - Public | More Information About Domain | :white_check_mark: |
hunter.io - Public | Related Emails | :white_check_mark: :key: |
emailrep.io - Public | Breached Sites Names | :white_check_mark: :key: |
scylla.so - Public | Database Leaks | :construction: |
psbdmp.ws - Public | Pastebin Dumps | :white_check_mark: :key: |
Intelligence X | Password Leaks | :white_check_mark: :key: |
BreachDirectory | Password Leaks | :white_check_mark: :key: |
HaveIBeenPwned | Password Leaks | :white_check_mark: :key: |
:key: API key required
Mosint supports config file as default located at $HOME/.mosint.yaml
. It allows you to define API keys for services.
You must set the config file for mosint to run! To specify a configuration file located in a directory other than the home directory, you can use the --config
flag.
mosint [email protected]
Call the help (-h
) flag for more information on usage.
Build a docker image
docker build -t mosint .
Run the docker container using the image
docker run mosint --help