forked from TermuxHackz/X-osint
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathxosint
1379 lines (1232 loc) · 55.4 KB
/
xosint
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
#!/usr/bin/python3
#XOSINT IS AN AUTOMATED OPEN SOURCE INTELLIGENT TOOL
#CREATED 2023 BY ANONYMINHACK5
#CREDITS TO SPIDER ANONGREYHAT, D3CRYPTOR, AND TERMUXHACKZ SOCIETY TEAM MEMBERS
#Credits to pixelbub
#Importing modules and libraries
from googlesearch import search
from smtplib import SMTP, SMTPRecipientsRefused, SMTPSenderRefused, SMTPResponseException
from email.mime.multipart import MIMEMultipart
import re
import os
import time
import socket
import requests
import ipaddress
import readline
import colorama
from colorama import *
from time import sleep
import sys
import json
from PIL import Image
from PIL.ExifTags import TAGS
import piexif
from prompt_toolkit import print_formatted_text, HTML
from pathlib import Path
import platform
from datetime import datetime
import phonenumbers
from phonenumbers import geocoder
import opencage
import folium
from bs4 import BeautifulSoup as bs
#29 modules
RED = "\033[91m"
GREEN = "\033[92m"
BLUE = "\033[94m"
WHITE = "\033[0;37m"
class bcolors:
OKGREEN = '\033[92m'
WARNING = '\033[93m'
FAIL = '\033[91m'
BOLD = '\033[1m'
ENDC = '\033[0m'
class colors:
CRED2 = "\33[91m"
CBLUE2 = "\33[94m"
ENDC = "\033[0m"
now = datetime.now()
current_time = now.strftime("%H:%M:%S")
banner = ("""
▒██ ██▒ ▒█████ ██████ ██▓ ███▄ █ ▄▄▄█████▓
▒▒ █ █ ▒░▒██▒ ██▒▒██ ▒ ▓██▒ ██ ▀█ █ ▓ ██▒ ▓▒
░░ █ ░▒██░ ██▒░ ▓██▄ ▒██▒▓██ ▀█ ██▒▒ ▓██░ ▒░
░ █ █ ▒ ▒██ ██░ ▒ ██▒░██░▓██▒ ▐▌██▒░ ▓██▓ ░
▒██▒ ▒██▒░ ████▓▒░▒██████▒▒░██░▒██░ ▓██░ ▒██▒ ░
▒▒ ░ ░▓ ░░ ▒░▒░▒░ ▒ ▒▓▒ ▒ ░░▓ ░ ▒░ ▒ ▒ ▒ ░░
░░ ░▒ ░ ░ ▒ ▒░ ░ ░▒ ░ ░ ▒ ░░ ░░ ░ ▒░ ░
░ ░ ░ ░ ░ ▒ ░ ░ ░ ▒ ░ ░ ░ ░ ░
░ ░ ░ ░ ░ ░ ░
An Open Source Intelligence Framework
Created by: AnonyminHack5
Team: TermuxHackz Society
Version: \033[1;92m2.1\033[0m
\033[1;97mPlatform: \033[0m\033[1;96m""" + platform.system())
for col in banner:
print(colors.CRED2 + col, end="")
sys.stdout.flush()
time.sleep(0.0025)
main_menu = ("""
\033[1;91m[??] Choose an option:
\033[1;91m[\033[1;33;40m1\033[0m\033[1;91m] \033[1;97m IP Address Information
\033[1;91m[\033[1;33;40m2\033[0m\033[1;91m] \033[1;97m Email Address Information \033[1;91m[\033[1;92mNOT WORKING FOR NOW!\033[0m\033[1;91m]
\033[1;91m[\033[1;33;40m3\033[0m\033[1;91m] \033[1;97m Phone Number Information \033[1;91m[\033[1;92mNOT WORKING FOR NOW!\033[0m\033[1;91m]
\033[1;91m[\033[1;33;40m4\033[0m\033[1;91m] \033[1;97m Host Search
\033[1;91m[\033[1;33;40m5\033[0m\033[1;91m] \033[1;97m Ports
\033[1;91m[\033[1;33;40m6\033[0m\033[1;91m] \033[1;97m Exploit CVE
\033[1;91m[\033[1;33;40m7\033[0m\033[1;91m] \033[1;97m Exploit Open Source Vulnerability Database
\033[1;91m[\033[1;33;40m8\033[0m\033[1;91m] \033[1;97m DNS Lookup
\033[1;91m[\033[1;33;40m9\033[0m\033[1;91m] \033[1;97m DNS Reverse
\033[1;91m[\033[1;33;40m10\033[0m\033[1;91m] \033[1;97mEmail Finder
\033[1;91m[\033[1;33;40m11\033[0m\033[1;91m] \033[1;97mExtract Metadata from image
\033[1;91m[\033[1;33;40m12\033[0m\033[1;91m]\033[1;97m Check Twitter Status
\033[1;91m[\033[1;33;40m13\033[0m\033[1;91m]\033[1;97m Subdomain Enumeration
\033[1;91m[\033[1;33;40m14\033[0m\033[1;91m]\033[1;97m Google Dork Hacking
\033[1;91m[\033[1;33;40m15\033[0m\033[1;91m]\033[1;97m SMTP Analysis
\033[1;91m[\033[1;33;40mNULL\033[0m\033[1;91m]\033[1;97m Movie Database OSINT
\033[1;91m[\033[1;33;40m17\033[0m\033[1;91m]\033[1;97m Dark Web Search
\033[1;91m[\033[1;33;40m18\033[0m\033[1;91m]\033[1;97m Next
\033[1;91m[\033[1;33;40m19\033[0m\033[1;91m]\033[1;97m Report bugs
\033[1;91m[\033[1;33;40m99\033[0m\033[1;91m]\033[1;97m Update X-osint
\033[1;91m[\033[1;33;40m100\033[0m\033[1;91m]\033[1;97m About
\033[1;91m[\033[1;33;40m00\033[0m\033[1;91m]\033[1;97m Quit
""")
about = """\033[1;90m
This is an osint tool which gathers useful and yet credible valid information about a phone number, user email address and ip address, \nVIN, Protonmail account and so much more, X-osint is an Open source intelligence framework, \nfeel free to clone this repo, if you have features you would like to add or any fixes please open an issue or create a merge
\033[0m"""
def traceip():
targetip = input("\033[1;91mEnter IP Address: \033[0m")
r = requests.get("http://ip-api.com/json/" + targetip)
print("\n\033[1;91m[*]\033[1;97m IP detail is given down below\n")
#print()
sleep(0.1)
print("\033[1;92m \033[1;91m➤\033[1;97m Status Code : " + str(r.status_code))
sleep(0.1)
if str(r.json() ['status']) == 'success':
print(" \033[1;91m➤\033[1;97m Status :\033[1;92m " + str(r.json() ['status']))
sleep(0.1)
elif str(r.json() ['status']) == 'fail':
print(" \033[1;91m➤\033[1;97m Status :\033[1;97m " + str(r.json() ['status']) + '\033[1;92m')
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Message : " + str(r.json() ['message']))
sleep(0.1)
if str(r.json() ['message']) == 'invalid query':
print('\n\033[1;91m[!] \033[1;97m' + targetip + ' is an invalid IP Address, So you can try another IP Address.\n')
exit()
elif str(r.json() ['message']) == 'private range':
print('\n\033[1;91m[!] \033[1;97m' + targetip + ' is a private IP Address, So This IP can not be traced.\n')
exit()
elif str(r.json() ['message']) == 'reserved range':
print('\n\033[1;91m[!] \033[1;97m' + targetip + ' is a reserved IP Address, So This IP can not be traced.\n')
exit()
else:
print('\nCheck your internet connection.\n')
exit()
print("\033[1;92m \033[1;91m➤\033[1;97m Target IP : " + str(r.json() ['query'] ))
sleep(0.1)
print("\033[1;92m \033[1;91m➤\033[1;97m Country: : " + str(r.json() ['country'] ))
sleep(0.1)
print(" \033[1;92m\033[1;97m➤\033[1;97m Country Code : " + str(r.json() ['countryCode']))
sleep(0.1)
print(" \033[1;92m\033[1;97m➤\033[1;97m City : " + str(r.json() ['city']))
sleep(0.1)
print(" \033[1;92m\033[1;97m➤\033[1;97m Timezone : " + str(r.json() ['timezone']))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Region Name : " + str(r.json() ['regionName'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Region : " + str(r.json() ['region'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m ZIP Code : " + str(r.json() ['zip'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Latitude : " + str(r.json() ['lat'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Longitude : " + str(r.json() ['lon'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m ISP : " + str(r.json() ['isp'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Organization : " + str(r.json() ['org'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m AS : " + str(r.json() ['as'] ))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Location : " + str(r.json() ['lat']) + ',' + str(r.json() ['lon']))
sleep(0.1)
print(" \033[1;91m➤\033[1;97m Google Map : \033[1;94mhttps://maps.google.com/?q=" + str(r.json() ['lat']) + ',' + str(r.json() ['lon']))
sleep(0.1)
print()
mapaddress = input("\033[1;91m[*]\033[1;97m Press ENTER To Open Location on Google maps or press any other key to quit: ")
if mapaddress == "":
print()
print("[*] Opening Location on google map")
print()
os.system("xdg-open https://maps.google.com/?q=" + str(r.json() ['lat']) + ',' + str(r.json() ['lon']) + " > /dev/null 2>&1")
print()
else:
print()
print("[*] Aborting.....")
print()
###email address information gathering
def email_info():
mailid = input("\033[1;91m Enter email address: \033[1;94m")
if not re.match(r"[^@]+@[^@]+\.[^@]+", mailid):
print("Please input a valid Email Address!")
return
eml = requests.get("https://ipqualityscore.com/api/json/email/pPiATkSdtLn3xgKW7a7HikZeZ4HMNa2R/" + mailid)
if str(eml.json()['success']) == "False":
print(eml.json()['message'])
return
print()
sleep(1)
print()
print("\033[1;91m[~]\033[1;97m E-mail Details are given down below")
print()
print("\033[1;91m➤\033[1;97m Target E-mail : " + str(mailid) )
sleep(0.1)
print("\033[1;91m➤\033[1;97m Status Code : " + str(eml.status_code) )
sleep(0.1)
print("\033[1;91m➤\033[1;97m Valid : " + str(eml.json() ['valid']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Catch All : " + str(eml.json() ['catch_all']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Common : " + str(eml.json() ['common']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Deliverability : " + str(eml.json() ['deliverability']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Disposable : " + str(eml.json() ['disposable']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m DNS Valid : " + str(eml.json() ['dns_valid']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Fraud Score : " + str(eml.json() ['fraud_score']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Frequent Complainer : " + str(eml.json() ['frequent_complainer']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Generic : " + str(eml.json() ['generic']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Honeypot : " + str(eml.json() ['honeypot']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Leaked : " + str(eml.json() ['leaked']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Message : " + str(eml.json() ['message']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Over All Score : " + str(eml.json() ['overall_score']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Recent Abuse : " + str(eml.json() ['recent_abuse']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Request ID : " + str(eml.json() ['request_id']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Sanitized E-mail : " + str(eml.json() ['sanitized_email']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m SMTP Score : " + str(eml.json() ['smtp_score']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Spam Trap Score : " + str(eml.json() ['spam_trap_score']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Success : " + str(eml.json() ['success']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Suggested Domain : " + str(eml.json() ['suggested_domain']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Suspect : " + str(eml.json() ['suspect']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Timed Out : " + str(eml.json() ['timed_out']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m First Name : " + str(eml.json() ['first_name']))
sleep(0.1)
print()
print("\033[1;91m[~]\033[1;94m Domain Age")
print()
sleep(0.1)
print("\033[1;91m➤\033[1;97m Human : " + str(eml.json() ['domain_age'] ['human']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m ISO : " + str(eml.json() ['domain_age'] ['iso']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Time Stamp : " + str(eml.json() ['domain_age'] ['timestamp']))
sleep(0.1)
print()
print("\033[1;91m[~]\033[1;94m First Seen")
print()
sleep(0.1)
print("\033[1;91m➤\033[1;97m Human : " + str(eml.json() ['first_seen'] ['human']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m ISO : " + str(eml.json() ['first_seen'] ['iso']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Time Stamp : " + str(eml.json() ['first_seen'] ['timestamp']))
sleep(0.1)
print()
### Phone number info
def phone_info():
mobileno = input("\033[1;91m [+]\033[1;92m Enter phone number with country code: \033[1;97m")
try:
parse = phonenumbers.parse(mobileno)
except:
print('\033[1;91m[!]\033[1;97mPlease add "+" sign to the country code\033[0m\n')
time.sleep(1)
phone_info()
if phonenumbers.is_valid_number(parse) is False:
print(Fore.RED + "[!]" + Fore.WHITE + "You have just entered an invalid phone number!!dammit!!\n")
time.sleep(1)
phone_info()
from phonenumbers import geocoder
pepnumber = phonenumbers.parse(mobileno)
location = geocoder.description_for_number(pepnumber, 'en')
#print(location)
from opencage.geocoder import OpenCageGeocode
if os.path.exists("./opencage_api.txt") and os.path.getsize("./opencage_api.txt") > 0:
with open('opencage_api.txt', 'r') as file:
opencage_api=file.readline().rstrip('\n')
else:
file = open("opencage_api.txt", "w")
opencage_api = input("""\n[+] Please enter a valid Opencage API key (Get from opencagedata.com): """)
file.write(opencage_api)
print("[+] File written: ./opencage_api.txt")
file.close()
key = opencage_api ##I may change this and replace it with a tempporary API
#API_KEY
geocoder = OpenCageGeocode(key)
query = str(location)
results = geocoder.geocode(query)
phe = requests.get("https://ipqualityscore.com/api/json/phone/pPiATkSdtLn3xgKW7a7HikZeZ4HMNa2R/" + mobileno )
sleep(1)
print()
time.sleep(3)
print("\033[1;97mIf you get an error it is likely due to the number of request going into the server so try again later\033[0m")
print()
print("\033[1;91m[~]\033[1;97m Phone Number Details are given down below")
print()
print("\033[1;91m➤\033[1;97m Target Number : " + mobileno)
sleep(0.1)
print("\033[1;91m➤\033[1;97m Status Code : " + str(phe.status_code))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Valid : " + str(phe.json() ['valid']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m VOIP : " + str(phe.json() ['VOIP']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Active : " + str(phe.json() ['active']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Active Status : " + str(phe.json() ['active_status']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Carrier : " + str(phe.json() ['carrier']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m City : " + str(phe.json() ['city']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Country : " + str(phe.json() ['country']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Dialing Code : " + str(phe.json() ['dialing_code']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Line Type : " + str(phe.json() ['line_type']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Local Format : " + str(phe.json() ['local_format']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m MCC : " + str(phe.json() ['mcc']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Name : " + str(phe.json() ['name']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Prepaid : " + str(phe.json() ['prepaid']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m SMS Domain : " + str(phe.json() ['sms_domain']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m SMS E-mail : " + str(phe.json() ['sms_email']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Spammer : " + str(phe.json() ['spammer']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Success : " + str(phe.json() ['success']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m TimeZone : " + str(phe.json() ['timezone']))
sleep(0.1)
print("\033[1;91m➤\033[1;97m Zip Code : " + str(phe.json() ['zip_code']))
sleep(0.1)
print()
print("\033[1;91m➤\033[1;97m Success : " + str(phe.json() ['success']))
sleep(0.1)
print()
print("\033[1;91m➤\033[1;97m VIP INFO \033[0m")
sleep(0.1)
#print(results) #printresult from geocoder
lat = results[0]['geometry']['lat']
lng = results[0]['geometry']['lng']
print('\033[1;91m➤\033[1;97m Location: ', lat, lng)
myMap = folium.Map(location=[lat, lng], zoom_start=9)
folium.Marker([lat, lng], popup=location).add_to(myMap)
##Save the html newly generated file
myMap.save("target_location.html")
open_result = input("""\n Do you want to open result in your brower? [Y] or [N]: """)
if open_result == "Y" or "y":
try:
os.system("xdg-open target_location.html")
time.sleep(1)
sys.exit(1)
except KeyboardInterrupt:
print('CTRL C Detected..Quitting')
exit()
elif open_result == "N" or "n":
sys.exit(1)
#### Update script
def update():
os.system("clear")
print(banner)
print()
print("\033[1;91m➤\033[1;97m Searching for updates...-> \033[0m\033[1;94mFound")
sleep(0.1)
print("\033[1;91m➤\033[1;97m Updating.. \033[0m")
sleep(0.1)
print()
print()
print("\033[1;91m\tSelect your terminal for update \033[0m\n")
print("\033[1;91m\t[!] PLEASE MAKE SURE YOU CHOOSE CORRECTLY [!] \033[0m\n\n")
print("\033[1;34m\t\t[\033[0m\033[1;77m1\033[0m\033[1;34m]\033[0m\033[1;93mTermux\033[0m")
print("\033[1;34m\t\t[\033[0m\033[1;77m2\033[0m\033[1;34m]\033[0m\033[1;93mLinux\033[0m\n")
update_terminal = input("\033[1;94mChoose: \033[0m")
if update_terminal == "1":
print("\033[1;97m[+] Updating for termux......\033[0m")
print()
sleep(0.1)
os.system("cd $HOME")
os.system("cd $PREFIX/bin && rm xosint")
print("\033[1;97m[+] Validating installation....\033[0m\n")
sleep(0.1)
path_to_file = '/$PREFIX/bin/xosint'
path = Path(path_to_file)
if path.is_file():
print(f'The file {path_to_file} exists, Validation failed, Kindly update manually')
time.sleep(1)
exit()
else:
print(f'The file {path_to_file} doesnt exists, Validation Successful')
time.sleep(0.5)
print("\033[1;91m[!]\033[0m\033[1;97mAutomatic update Completed\0330m\n")
time.sleep(0.9)
os.system("cd $HOME")
os.system("git clone https://github.com/TermuxHackz/X-osint")
print("\033[1;97m[+] Granting permissions.....\033[0m\n")
os.system("cd $HOME && cd X-osint")
os.system("chmod +x *")
sleep(0.5)
print("\033[1;97m[+] Preparing Setup file.....\033[0m\n")
sleep(0.5)
print("\033[1;97m[+] Setup file ready!!.....Starting in 2s...\033[0m\n")
print("\033[1;97m[+] Update completed.....\033[0m\n")
sleep(2)
os.system("cd $HOME ")
os.system("cd X-osint && bash setup.sh")
elif update_terminal == "2":
print("\033[1;97m[+] Updating for linux......\033[0m")
print()
sleep(0.1)
os.system("cd $HOME")
os.system("cd /usr/local/bin && sudo rm xosint")
print("\033[1;97m[+] Validating installation....\033[0m\n")
sleep(0.5)
path_to_file = '/usr/local/bin/xosint'
path = Path(path_to_file)
if path.is_file():
print(f'The file {path_to_file} exists, Validation failed, Kindly update manually')
time.sleep(1)
exit()
else:
os.system("cd $HOME")
os.system("git clone https://github.com/TermuxHackz/X-osint")
print("")
print("\033[1;97m[+] Granting permissions.....\033[0m\n")
os.system("cd X-osint")
os.system("sudo chmod +x *")
sleep(0.5)
print("\033[1;97m[+] Preparing Setup file.....\033[0m\n")
sleep(0.5)
print("\033[1;97m[+] Setup file ready!!.....Starting in 2s...\033[0m\n")
print("\033[1;97m[+] Update completed.....\033[0m\n")
sleep(2)
os.system("cd $HOME")
os.system("cd X-osint && bash setup.sh")
else:
print("Invalid input....KINDLY UPDATE...quiting..")
sleep(0.5)
exit
#### STart main script
### 4, 5, 6, 7
os.system("clear")
print(banner)
print(main_menu)
option = input("\033[1;91mxosint>> \033[1;97m")
if option == "1":
traceip()
elif option == "2":
email_info()
elif option == "3":
phone_info()
elif option == "4":
def shodan_host():
if os.path.exists("./api.txt") and os.path.getsize("./api.txt") > 0:
with open('api.txt', 'r') as file:
shodan_api=file.readline().rstrip('\n')
else:
file = open('api.txt', 'w')
shodan_api = input("[+] Please enter a valid Shodan API key (Shodan.io): ")
file.write(shodan_api)
print("[+] File written: ./api.txt")
file.close()
host_ip = input("\033[1;91m[+]\033[0m\033[1;97mShodan Host Search (IP): \033[0m")
url = "https://api.shodan.io/shodan/host/"+ host_ip +"?key=" + shodan_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
shodan_host()
elif option == "5":
def shodan_ports():
if os.path.exists("./api.txt") and os.path.getsize("./api.txt") > 0:
with open('api.txt', 'r') as file:
shodan_api=file.readline().rstrip('\n')
else:
file = open('api.txt', 'w')
shodan_api = input("[+] Please enter a valid Shodan API key (Shodan.io): ")
file.write(shodan_api)
print("[+] File written: ./api.txt")
file.close()
url = "https://api.shodan.io/shodan/ports?key=" + shodan_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
shodan_ports()
elif option == "6":
def shodan_exploit_cve():
if os.path.exists("./api.txt") and os.path.getsize("./api.txt") > 0:
with open('api.txt', 'r') as file:
shodan_api=file.readline().rstrip('\n')
else:
file = open('api.txt', 'w')
shodan_api = input("[+] Please enter a valid Shodan API key (Shodan.io): ")
file.write(shodan_api)
print("[+] File written: ./api.txt")
file.close()
exploit_cve = input("\033[1;91m[+]\033[0m\033[1;97mExploit CVE: \033[0m")
url = "https://exploits.shodan.io/api/search?query="+ "cve:" + exploit_cve +"&key=" + shodan_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
shodan_exploit_cve()
elif option == "7":
def shodan_exploit_osvdb():
if os.path.exists("./api.txt") and os.path.getsize("./api.txt") > 0:
with open('api.txt', 'r') as file:
shodan_api=file.readline().rstrip('\n')
else:
file = open('api.txt', 'w')
shodan_api = input("[+] Please enter a valid Shodan API key (Shodan.io): ")
file.write(shodan_api)
print("[+] File written: ./api.txt")
file.close()
exploit_osvdb = input("\033[1;91m[+]\033[0m\033[1;97mExploit Open Source Vulnerability Database: \033[0m")
url = "https://exploits.shodan.io/api/search?query="+ "osvdb:" + exploit_osvdb +"&key=" + shodan_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
shodan_exploit_osvdb()
elif option == "8":
def shodan_dns_lookup():
if os.path.exists("./api.txt") and os.path.getsize("./api.txt") > 0:
with open('api.txt', 'r') as file:
shodan_api=file.readline().rstrip('\n')
else:
file = open('api.txt', 'w')
shodan_api = input("[+] Please enter a valid Shodan API key (Shodan.io): ")
file.write(shodan_api)
print("[+] File written: ./api.txt")
file.close()
hostnames = input("\033[1;91m[+]\033[0m\033[1;97mDNS Lookup: \033[0m")
url = "https://api.shodan.io/dns/resolve?hostnames="+ hostnames +"&key=" + shodan_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
shodan_dns_lookup()
elif option == "9":
def shodan_dns_reverse():
if os.path.exists("./api.txt") and os.path.getsize("./api.txt") > 0:
with open('api.txt', 'r') as file:
shodan_api=file.readline().rstrip('\n')
else:
file = open('api.txt', 'w')
shodan_api = input("[+] Please enter a valid Shodan API key (Shodan.io): ")
file.write(shodan_api)
print("[+] File written: ./api.txt")
file.close()
ips = input("\033[1;91m[+]\033[0m\033[1;97mDNS Reverse: \033[0m")
url = "https://api.shodan.io/dns/reverse?ips="+ ips +"&key=" + shodan_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
shodan_dns_reverse()
elif option == "10":
def hunter_email_finder():
email_domain = input("\033[1;91m[+]\033[0m\033[1;97mDomain: \033[0m")
first_name = input("\033[1;91m[+]\033[0m\033[1;97mFirst Name: \033[0m")
last_name = input("\033[1;91m[+]\033[0m\033[1;97mLast Name: \033[0m")
url = "https://api.hunter.io/v2/email-finder?domain="+ email_domain + "&first_name=" + first_name +"&last_name=" + last_name +"&api_key=" + hunter_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
if os.path.exists("./hunter_io_api.txt") and os.path.getsize("./hunter_io_api.txt") > 0:
with open('hunter_io_api.txt', 'r') as file:
hunter_api=file.readline().rstrip('\n')
else:
file = open('hunter_io_api', 'w')
hunter_api = input("[+] Please enter a valid Hunter API key to continue (Get from Hunter.io): ")
file.write(hunter_api)
print("[+] File written: ./hunter_io_api.txt")
file.close()
hunter_email_finder()
def hunter_email_finder():
email_domain = input("\033[1;91m[+]\033[0m\033[1;97mDomain: \033[0m")
first_name = input("\033[1;91m[+]\033[0m\033[1;97mFirst Name: \033[0m")
last_name = input("\033[1;91m[+]\033[0m\033[1;97mLast Name: \033[0m")
url = "https://api.hunter.io/v2/email-finder?domain="+ email_domain + "&first_name=" + first_name +"&last_name=" + last_name +"&api_key=" + hunter_api
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
elif option == "11":
print("\033[1;91m[!]NOTICE:\033[0m\033[1;93m To get a better metadata of the image please do not use images from whatsapp or social media platforms as they strip away metadata from images, also do not use screenshot images, USE IMAGES TAKEN FROM A DEVICE CAMERA THANK YOU [!]\033[0m")
print()
imagename = input("\033[1;91m[+]\033[0m\033[1;97m Enter Correct path of the image (JPEG ONLY): \033[0m")
print("")
print()
# open the image
exif_dict = piexif.load(imagename)
print(f'Metadata for {imagename}:')
for ifd in exif_dict:
print(f'{ifd}:')
for tag in exif_dict[ifd]:
tag_name = piexif.TAGS[ifd][tag]["name"]
tag_value = exif_dict[ifd][tag]
if isinstance(tag_value, bytes):
tag_value = tag_value[:10]
print(f'\t{tag_name:25}: {tag_value}')
print()
elif option == "12":
email_add = input("\033[1;91m[+]\033[0m\033[1;97mEnter email: \033[0m")
url = "https://api.twitter.com/i/users/email_available.json?email=" + email_add
request = requests.get(url)
txt = request.text
parsed = json.loads(txt)
print(json.dumps(parsed, indent=2, sort_keys=True))
elif option == "13":
import resolver
import threading
domain = input("\033[1;91m[+]\033[0m\033[1;97mEnter domain name (without www): \033[0m")
file_path = input("\033[1;91m[+]\033[0m\033[1;97mPath of subdomains lists (Get from my github): \033[0m")
def check_host(self, host):
is_valid = False
Resolver = dns.resolver.Resolver()
Resolver.nameservers = ['1.1.1.1', '1.0.0.1']
self.lock.acquire()
try:
ip = Resolver.query(host, 'A')[0].to_text()
if ip:
if self.verbose:
self_print_("%s%: %s%" % (R, self.engine_name, W, host))
is_valid = True
self.live_subdomains.append(host)
except:
pass
self.lock.release()
return is_valid
sub_list = open(file_path).read()
subs = sub_list.splitlines()
for sub in subs:
domain = f"http://{sub}.{domain}"
try:
requests.get(domain)
except requests.ConnectionError:
pass
else:
print("\033[1;94m[+]\033[0m Valid Subdomain: ",domain)
def domain(self):
sleep(0.2)
def __domain__(self):
t.threading.Thread(target=self.domain)
t.start()
#### Google Dorking Hacking
elif option == "14":
try:
## print_formatted_text(HTML('<b><u>;GOOGLE DORK HACKING </u></b>'))
dork = input('\033[1;91m\n[+]\033[0m\033[1;97mEnter The Dork Search Query (eg: intext:"Index of /" +passwd): \033[0m')
amount = input("\033[1;91m[+]\033[0m\033[1;97mEnter The Number Of sites To dork (eg: 4): \033[0m")
print ("\n ")
requ = 0
counter = 0
for results in search(dork, tld="com", lang="en", num=int(amount), start=0, stop=None, pause=2):
counter = counter + 1
print ("[+] ", counter, results)
time.sleep(0.1)
requ += 1
if requ >= int(amount):
break
data = (counter, results)
time.sleep(0.1)
print("\n")
file = input('\033[1;91m[!]\033[0m\033[1;94mEnter name to save output as (eg: output.txt): \033[0m')
original_stdout = sys.stdout
try:
with open(file, 'w') as f:
sys.stdout = f
print(data)
print("\n")
sys.stdout = original_stdout
print("\033[1;97m[+]\033[0mFile has been saved as \033[0m" + file)
except:
print("\033[1;91m[!]Please enter a name to save the file as [!]\033[0m")
sys.exit(1)
except KeyboardInterrupt:
print ("\n")
print ("\033[1;91m[!] User Interruption Detected..!\033[0")
time.sleep(0.5)
print ("[•] Done... Exiting...")
sys.exit(1)
elif option == "19":
print("\033[1;91m[+]\033[1;97m Kindly take a screenshot or screenrecord of the error faced and mail them \nto me and i would give you feedback based on those bugs you have \nreported to me and fix them, Thank you \033[0m")
print("")
try:
report = input('\033[1;95mReport bug (y/n): \033[0m')
if report == "y":
try:
import webbrowser
webbrowser.open('mailto:[email protected]&subject=X-osint-bugs', new=1)
except ImportError:
print("\033[1;91m[!] Webbrowser module not found!!, Install using \033[0m\033[1;97mpip install webbrowser\033[0m")
print("[+] Try reporting bugs again ")
time.sleep(0.9)
sys.exit(1)
elif report == "n":
print("[+] Seems there wasnt any bugs for you to report, so why bother choosing to report bugs, lol ")
time.sleep(0.5)
sys.exit(1)
else:
print("\033[1;91m[!] Invalid Command!!!\033[0m")
time.sleep(0.1)
sys.exit(1)
except KeyboardInterrupt:
print ("\n")
print ("\033[1;91m[!] User Interruption Detected..!\033[0")
time.sleep(0.5)
sys.exit(1)
elif option == "15":
def spoof(target,ports):
TestedPorts = []
if ("ports"=="*"):
TestedPorts = ['25','465','587','2525']
ports = "25, 465, 587 and 2525"
else:
TestedPorts = list(ports.split(","))
testuser = "[email protected]"
message = MIMEMultipart()
message["From"] = testuser
message["To"] = testuser
message["Subject"] = "test"
text = message.as_string()
print("\033[1;91m{}[!]\033[0m\033[1;97mLooking For Email Spooffing Vulnerability on port {}..... \033[0m\033[1;91m[!]\033[0m\n\033[94m".format(WHITE,ports))
for port in TestedPorts:
print("{} Testing Email Spoofing on port {}.....\n\033[94m".format(WHITE,port))
try:
SMTP(target,port).sendmail(testuser,testuser,text)
print("{} The SMTP Server Targeted : {} is potentialy vulnerable to mail spoofing. Authentification don't seem to be required on port {} \033[0;37m \n".format(GREEN,target,port))
except (SMTPRecipientsRefused, SMTPSenderRefused, SMTPResponseException):
print("{} Recipient error encountered. The SMTP Server Targeted: {} don't seem to be vunlerable to mail spoofing on port {} \033[0;37m \n ".format(BLUE,target,port))
except ConnectionRefusedError:
print("{} Connection refused by host {}. It don't seem to be vunlerable to mail spoofing on port {} \033[0;37m \n".format(BLUE,target,port))
except Exception:
print("{} Exception Occured on host {}. It don't seem to be vunlerable to mail spoofing on port {} \033[0;37m \n".format(BLUE,target,port))
except KeyboardInterrupt:
print("Stopping...")
exit()
def userenum (target,ports):
TestedPorts = []
if (ports =="*"):
TestedPorts = ['25','465','587','2525']
ports = "25, 465, 587 and 2525"
else:
TestedPorts = list(ports.split(","))
print("\033[1;91m{}[!]\033[0m\033[1;97m Looking For user enumeration vulnerability on port {}..... \033[0m\n\033[94m".format(WHITE,ports))
for port in TestedPorts:
print("\033[1;91m{}[!]\033[0m\033[1;997m Testing user enumeration on port {}.....\033[0m\n\033[94m".format(WHITE,port))
try:
verify = SMTP(target, port).verify("")
if verify[0] in [250, 252]:
print("{} The SMTP Server Targeted: {} is potentialy vulnerable to user enumeration on port {}. VRFY query responded status : {} \033[0;37m \n".format(GREEN,target,port,verify[0]))
else:
print("{} The SMTP Server Targeted: {} don't seem to be vulberable to user enumeration on port {}. VRFY query responded statys : {} \033[0;37m \n".format(BLUE,target,port,verify[0]))
except Exception:
print("{} Exception Occured on host {}. It don't seem to be vunlerable to user enumeration on port {}. \033[0;37m \n".format(BLUE,target,port))
except KeyboardInterrupt:
print("Stopping...")
exit()
target = input("\033[1;91m[+]\033[0m\033[1;97mEnter SMTP Server: \033[0m")
port = input('\033[1;91m[+]\033[0m\033[1;97mEnter port or type "*" to use all ports: \033[0m')
spoof(target,port)
userenum(target,port)
#### DEEP WEB SCRAPING OSINT
elif option == "17":
W = '\033[0m'
C = '\033[36m'
R = '\033[31m'
G = '\033[32m'
try:
import subprocess as subp
except ImportError:
print("Required Module not installed...exiting")
exit()
def service():
print('\n' + C + "[~]Checking for tor service...." + W + '\n')
if platform.system() == "Linux":
cmd = 'systemctl is-active tor.service && tor'
co = subp.Popen(cmd, shell=True,stdout=subp.PIPE).communicate()[0]
if 'inactive' in str(co):
print(R + '[!] Tor Service is not Running ' + W + '\n')
print(R + '[!] Tor Service is required to Run this feature... ')
print(R + '[!] Type' + W + " tor " + R + 'if your using termux or type' + W + " service tor start " + R + 'if your using linux\n')
print(C + '[*] After doing that run ' + W + " xosint " + C + 'again ')
exit()
else:
print(C + '[+] Tor Service is running....' + W + '\n')
else:
command = "tor"
os.system(command)
print(C + '[+] Tor Service is running...' + W + '\n')
def scrap():
r = "http://icanhazip.com"
page = requests.get(r)
print(R + '[+]' + G + ' Connected to Tor....')
print(R + '[->]' + G + 'Your tor ip --> ' + page.text)
def main():
from bs4 import BeautifulSoup
session = requests.session()
#session.proxies["http"] = "127.0.0.1:9050"
#session.proxies["https"] = "127.0.0.1:9050"
query = input('\033[1;91m[+]\033[0m\033[1;94mEnter keyword to search: \033[0m')
URL = f"https://ahmia.fi/search/?q={query}"
page = requests.get(URL)
request = requests.get(URL)
if request.status_code == 200:
print('\n' + G + '[!] Request went through \n')
time.sleep(0.5)
print(G + '[+] Getting .onion links for you: [+] \033[0m\n')
time.sleep(0.5)
soup = BeautifulSoup(page.content, "html.parser")
for a_href in soup.find_all("a", href=True):
print(a_href["href"])
time.sleep(0.5)
choice = input('\033[1;91m[+]\033[0m\033[1;94mOpen results in browser? (y/n): \033[0m')
if choice == "y":
import webbrowser
webbrowser.open(f"https://ahmia.fi/search/?q={query}")
time.sleep(0.5)
print("If it doesnt open, its most likely your using Termux")
elif choice == "n":
sys.exit(1)
else:
print("Wrong input")
exit()
else:
print(R + '[!] Request didnt go through please check your network or try again later \n')
exit(1)
service()
scrap()
main()
elif option == "18":
os.system("clear")
print(banner)
second_main_menu = ("""
\033[1;91m[??] Choose an option:
\033[1;91m[\033[1;33;40m18\033[0m\033[1;91m] \033[1;97m Protonmail OSINT
\033[1;91m[\033[1;33;40m19\033[0m\033[1;91m] \033[1;97m Vehicle Identification Number OSINT
\033[1;91m[\033[1;33;40m20\033[0m\033[1;91m] \033[1;97m Basic Github OSINT
\033[1;91m[\033[1;33;40m21\033[0m\033[1;91m] \033[1;97m Vehicle License plate OSINT \033[1;91m[\033[0m\033[1;96mUNDER DEVELOPMENT\033[0m\033[1;91m]\033[0m
\033[1;91m[\033[1;33;40mG\033[0m\033[1;91m] \033[1;97m Go back
""") ##I would still add more here
print(second_main_menu)
second_input = input('\033[1;91mxosint>> \033[0m')
if second_input == "18":
def extract_timestamp(mail, source_code):
try:
timestamp = re.sub(':', '', re.search(':[0-9]{10}::', source_code.text)[0])
return datetime.frontimestamp(int(timestamp))
except AttributeError:
return None
# CHecks if its a business mail address
# Protonmail account validity check
def protonmailaccountcheck():
invalidEmail = True
regexEmail = "([a-zA-Z0-9_.+-]+@[a-zA-Z0-9-]+\.[a-zA-Z0-9-.]+)"
print("\n\nYou want to know if a protonmail email is real or not?")
while invalidEmail:
mail = input("\033[1;91m[+]\033[1;97m Enter the email(protonmail accounts only!!): \033[0m")
print("")
if(re.search(regexEmail,mail)):
invalidEmail = False
else:
print("Invalid Email")
invalidEmail = True
#Check if the protonmail exist : valid / not valid
requestProton = requests.get('https://api.protonmail.ch/pks/lookup?op=index&search='+str(mail))
bodyResponse = requestProton.text
protonNoExist = "info:1:0" #not valid
protonExist = "info:1:1" #valid
if protonNoExist in bodyResponse:
print("\033[1;91m[!]\033[0m\033[1;97m Protonmail email is \033[0m" + f"{bcolors.FAIL}not valid{bcolors.ENDC}")
if protonExist in bodyResponse:
print("\033[1;91m[+]\033[0m\033[1;97m Protonmail email is \033[0m" + f"{bcolors.OKGREEN}valid{bcolors.ENDC}")
regexPattern1 = "2048:(.*)::" #RSA 2048-bit (Older but faster)
regexPattern2 = "4096:(.*)::" #RSA 4096-bit (Secure but slow)
regexPattern3 = "22::(.*)::" #X25519 (Modern, fastest, secure)
try:
timestamp = int(re.search(regexPattern1, bodyResponse).group(1))
dtObject = datetime.fromtimestamp(timestamp)
print("")
print("\033[1;91m[+]\033[0m\033[1;97m Date and time of the creation:\033[0m", dtObject)
print("")
print("\033[1;91m[+]\033[0m\033[1;97m Encryption : RSA 2048-bit (Older but faster)\033[0m")
except:
try:
timestamp = int(re.search(regexPattern2, bodyResponse).group(1))
dtObject = datetime.fromtimestamp(timestamp)
print("\033[1;91m[+]\033[0m\033[1;97m Date and time of the creation:\033[0m\n", dtObject)
print("\033[1;91m[+]\033[0m\033[1;97m Encryption : RSA 4096-bit (Secure but slow)\033[0m")
except:
timestamp = int(re.search(regexPattern3, bodyResponse).group(1))
dtObject = datetime.fromtimestamp(timestamp)
print("\033[1;91m[+]\033[0m\033[1;97m Date and time of the creation:\033[0m", dtObject)
print("\033[1;91m[+]\033[0m\033[1;97m Encryption : X25519 (Modern, fastest, secure)\033[0m")
#Download the public key attached to the email
invalidResponse = True
print("\n\033[1;91m[?]\033[0m\033[1;97mDo you want to download the public key attached to the email ?\033[0m")
while invalidResponse:
#Input
responseFromUser = input("""Please enter "yes" or "no": """)
#Text if the input is valid
if responseFromUser == "yes":
invalidResponse = False
requestProtonPublicKey = requests.get('https://api.protonmail.ch/pks/lookup?op=get&search='+str(mail))
bodyResponsePublicKey = requestProtonPublicKey.text
print(bodyResponsePublicKey)
elif responseFromUser == "no":
invalidResponse = False
else:
print("Invalid Input")
invalidResponse = True
#Email Search OSINT footprint
def emailtraces():
headers = {'User-Agent': 'Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_5)\
AppleWebKit/537.36 (KHTML, like Gecko) Safari/537.36'}
print("Checking Server Status\n")
response = requests.get('https://google.com', headers)
print(response)
if response.status_code == 200:
print("Status: \033[1;94mSuccess!\033[0m\n")
elif response.status_code == 404:
print("\033[1;91m404 Not Found, please try again!!\033[0m")
searchfor = input("""\033[1;91m[+]\033[0m\033[1;94m Enter email with quotation marks eg "[email protected]": \n\033[0m""")