โก Warning: This tool/app/code has been provided for educational purposes only. Use on systems you own or have explicit permission to test.
๐ฒ A multi-language OSINT (Open-Source Intelligence) system designed for educational use in security research and ethical hacking studies.
USING THIS SOFTWARE FOR EDUCATIONAL PURPOSES ONLY IS MANDATORY USE RESPONSIBLY.
BEFORE USING THIS TOOL:
1. ๐ซ DO NOT use on systems without explicit written permission
2. ๐ซ DO NOT use for illegal or malicious activities
3. ๐ซ DO NOT violate privacy laws or terms of service
4. โ
DO use only for educational and research purposes
5. โ
DO ensure compliance with local laws and regulations
6. โ
DO obtain proper authorization before testing
The authors assume NO liability for misuse of this software.
Use at your own risk and responsibility.
A world-class, multi-language OSINT (Open-Source Intelligence) system designed for professional reconnaissance operations. This platform combines AI-powered analysis with military-grade operational security.
- Pattern Recognition: ML-based username analysis and classification using models in
brain/AI(powered bySecurePatternAnalyzer). - Behavior Prediction: Predictive analytics for target behavior.
- Risk Assessment: Intelligent threat scoring with confidence levels (powered by
SecureThreatAssessor). - Anomaly Detection: Automated detection of suspicious patterns.
- Scrapy Integration: Advanced web crawling capabilities (details in
muscle). - SpiderFoot Integration: Comprehensive intelligence gathering.
- Multi-Platform Checking: 50+ social media platforms.
- Real-time Monitoring: Live intelligence feeds.
- Zero Forensic Footprint: No plaintext data in logs (see
brain/main.py). - Hashed Operations: Secure target referencing (SHA256 hashing in
brain/main.py). - Plausible Deniability: Clean operational manifests.
- Adaptive Rate Limiting: Anti-detection mechanisms.
# Clone the repository
git clone https://github.com/FJ-cyberzilla/OSINT-System-.git
cd OSINT-System-
# Start all services
docker-compose up -d
# Access the system
curl http://localhost:8080/api/v1/health# 1. Install dependencies
make build-python
make build-go
make build-java
make build-cpp
# 2. Set ENV variables
cp .env.example .env
nano .env
# 3. Start the BRAIN (AI) service
python brain/main.py
# 4. Start the API service
make docker-build
make docker-test# Run on mobile devices
pkg update && pkg upgrade
pkg install python clang make openjdk-17 go
make termux# Single target investigation
curl -X POST http://localhost:8080/api/v1/investigate \
-H "Content-Type: application/json" \
-d '{"target": "username", "priority": "high"}'
# Check operation status
curl http://localhost:8080/api/v1/operations/status?id=op_123456# Process multiple targets
echo -e "target1\ntarget2\ntarget3" > targets.txt
python launch.py --batch targets.txt --output jsonThis example demonstrates how to use the analyze_pattern function to analyze a given target (e.g., a username).
First, you need to send a JSON message to the AI Brain service (running on tcp://*:5555):
{
"action": "analyze_pattern",
"target": "johndoe123"
}You can send this message using zmq or any other suitable tool. Here's an example using netcat:
echo '{"action": "analyze_pattern", "target": "johndoe123"}' | nc localhost 5555The AI Brain service will respond with a JSON message containing the analysis results:
{
"pattern_type": "human",
"anomaly_score": -0.25,
"complexity": 0.7,
"behavior_profile": "active on social media, interested in technology",
"confidence": 0.85
}This example demonstrates how to use the final_analysis function to correlate intelligence from multiple sources and assess the overall threat level.
First, you need to gather intelligence data from various sources. This data should be in a structured format (e.g., a list of dictionaries).
Then, you need to send a JSON message to the AI Brain service:
{
"action": "final_analysis",
"target": "johndoe123",
"data_sources": [
{"source": "Twitter", "activity": "Frequent tweets about cybersecurity"},
{"source": "LinkedIn", "profile": "Security Analyst at Acme Corp"}
]
}The AI Brain service will respond with a JSON message containing the correlated intelligence, threat assessment, predictions, and confidence score:
{
"correlated_intel": "User is a Security Analyst at Acme Corp and frequently tweets about cybersecurity, indicating a professional interest in the field.",
"threat_assessment": "Low",
"predictions": "Likely to attend cybersecurity conferences and engage in related online communities.",
"confidence_score": 0.9
}import requests
response = requests.post(
"http://localhost:8080/api/v1/investigate",
json={"target": "username", "priority": "high"},
headers={"X-API-Key": "your_api_key"}
)# Copy example configuration
cp .env.example .env
# Edit your settings
nano .env# Security
API_KEY=your_secure_api_key
JWT_SECRET=your_jwt_secret
ENCRYPTION_KEY=your_encryption_key
# Services
BRAIN_PORT=5555
BRAIN_HOST=0.0.0.0
BRAIN_URL=localhost:5555
ORCHESTRATOR_URL=localhost:5558
API_URL=http://localhost:8080
# Operations
LOG_LEVEL=INFO
ENVIRONMENT=productionThe brain directory contains the AI/ML logic of the OSINT System. It uses ZeroMQ for inter-process communication and implements OPSEC-compliant logging.
brain/main.py: Main entry point for the AI Brain service. Sets up the ZeroMQ socket, configures secure logging, and processes requests.brain/AI/Machine-Learning-Layer.py: Implements the core AI/ML logic, including pattern recognition, anomaly detection, and behavioral prediction.brain/pattern_analysis.py: Implements secure pattern analysis techniques.brain/threat_assessment.py: Implements secure threat assessment techniques.
The Brain service communicates with other components using ZeroMQ. It listens for requests on tcp://*:5555 and responds with JSON messages.
The Brain service uses OPSEC-compliant logging. It hashes target information and stores logs in ops/logs/brain_operations.log.
- POST /api/v1/investigate - Start new investigation
- GET /api/v1/operations/{id} - Get operation status
- GET /api/v1/health - System health check
- GET /api/v1/stats - Operational statistics
{
"operation_id": "op_1700000000_abc123",
"target": "username",
"status": "completed",
"risk_score": 0.72,
"findings_count": 23,
"platforms_checked": 15,
"recommendations": ["Monitor activity", "Verify identity"]
}- No plaintext usernames in logs
- Hashed target references
- Secure operational manifests
- Forensic awareness
- Encrypted communications
- Secure storage
- Clean data handling
- Regular security audits
- ๐ Documentation
- ๐ฝ Issue Tracker
- ๐ฌ Discussions
- ๐ง Email: [email protected]
- Scrapy - Web scraping framework
- SpiderFoot - OSINT automation
- Spring Boot - Java web framework
- Docker - Containerization platform
- GitHub Actions - CI/CD automation
- ZeroMQ - Inter-process communication
Thanks for your consideration. FJโข Cybertronic Systemsยฎ - MMXXVI