Full Code of C3n7ral051nt4g3ncy/WebOSINT for AI

master 8ae384e7057b cached
8 files
26.7 KB
8.0k tokens
16 symbols
1 requests
Download .txt
Repository: C3n7ral051nt4g3ncy/WebOSINT
Branch: master
Commit: 8ae384e7057b
Files: 8
Total size: 26.7 KB

Directory structure:
gitextract_nlucj111/

├── .github/
│   └── FUNDING.yml
├── LICENSE
├── README.md
├── config.json
├── dockerfile
├── requirements.txt
├── webosint.py
└── webosint_screenshots.md

================================================
FILE CONTENTS
================================================

================================================
FILE: .github/FUNDING.yml
================================================
# These are supported funding model platforms

github: C3n7ral051nt4g3ncy
patreon: # Replace with a single Patreon username
open_collective: # Replace with a single Open Collective username
ko_fi: tacticalintelanalyst
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
liberapay: # Replace with a single Liberapay username
issuehunt: # Replace with a single IssueHunt username
otechie: # Replace with a single Otechie username
lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']


================================================
FILE: LICENSE
================================================
MIT License

Copyright (c) 2022 OSINT Tactical
https://github.com/C3n7ral051nt4g3ncy/
https://twitter.com/OSINT_Tactical

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
SOFTWARE.


================================================
FILE: README.md
================================================
<div align="center">
 
<img src="https://img.shields.io/badge/Python-purple?style=for-the-badge&logo=python&logoColor=white"/> 
<a href="https://github.com/C3n7ral051nt4g3ncy"> <img alt="GitHub" src="https://img.shields.io/badge/GitHub-purple?style=for-the-badge&logo=github&logoColor=white"/>
<a href="https://ko-fi.com/tacticalintelanalyst"> <img alt="Kofi" src="https://img.shields.io/badge/Ko--fi-purple?style=for-the-badge&logo=ko-fi&logoColor=white">
<a href="https://user-images.githubusercontent.com/104733166/171052611-1f76b07c-832f-4a4a-9a0a-2f94595c28c9.png"/><img alt="BTC" src="https://img.shields.io/badge/Bitcoin-purple?style=for-the-badge&logo=bitcoin&logoColor=white">

<br>
<br>
  
<a href="https://github.com/C3n7ral051nt4g3ncy/webosint/blob/master/LICENSE"/> <img alt="Licence" src="https://img.shields.io/badge/LICENCE-MIT-purple">
</div>
  
<br>

<div align="center">
<img width="633" src="https://user-images.githubusercontent.com/104733166/185790639-b1f09747-aea3-4f64-a52f-d70efd820a22.png"></div>


<br>
<br>
<br>


# WebOSINT 🌐
**WebOSINT** is a Python script to gather (passive) domain intelligence.

<br>

  
# Requirements 🐍
- [Python 3](https://www.python.org/downloads/)
- Don't forget to install `requirements.txt`
- You will be limited in your search requests with the Hacker Target free API, you can purchase a Hacker Target membership and your API here: (https://hackertarget.com/scan-membership/)
- For the WhoisXML API; this is an easy process and free, simply create an account and use the `trial 500 free API requests`  (Once you have used the 500 requests you will need to make a purchase, and if you don't want a yearly or monthly membership you can make one-time payments, `5000 queries for 100,00$ USD` or `1000 queries for 30,00$ USD`  :(https://whois.whoisxmlapi.com)

<br>

# Running the script with Docker 🐳
```
docker run -it scorpix06/webosint
```


# Installation ⚙️

```
git clone https://github.com/C3n7ral051nt4g3ncy/webosint
```
  
```
cd webosint
```
 
```
pip3 install -r requirements.txt
```
  
```
python3 webosint.py
```
<br>

Once the script starts, you won't have much typing to do: 
``` 
- Domain format example: google.com
- To choose between yes and no: Type Y or y for Yes  |  N or n for No
- Choose between a free search and search with your API Key: Type -F or f for the free search | Type -API or api for the search with your API keys
```  


<br>

# API Keys 🔑
In the `Config.json` file, just paste your API Keys inside the quotation marks `"API Key"` (see photo below)
- It's **not an obligation** to pay for a **Hacker Target** API key, you can leave it how it is, just choose the free search by typing  `-F` each time the tool asks you to choose between the Free search and the search using your API key.
- It's an **obligation** ✅ to get yourself a **WhoisXML** Api key, this is free (`500 searches free`), just go to the WhoisXML website and get an account to get your API key: (https://whois.whoisxmlapi.com)
- It's also an **obligation** ✅ to get yourself a **WhoisFreaks** Api key, this is free (`100 searches free`), just go to the WhoisFreaks website and sign up to get your API key: (https://whoisfreaks.com), and by the way, once your 100 free searches are used, you can purchase 5000 API Calls for only 19,00$ USD


<br>

  <img width="266" height="180" src="https://user-images.githubusercontent.com/104733166/188323393-f47155f7-f9de-48f0-b90c-15693ddf2447.png">



<br>
<br>
  
# Tool Sequence ⛓️

### [1]
``` 
Checking if the domain is registered
```
### [2]
``` 
Get the domain ip address and location data, Version, ASN (Tool updated 16 July 2022, now with double IP verification)
```
### [3]
``` 
Reverse ip search to extract all domains with the same ip (HackerTarget free and paid API)
``` 
### [4]
``` 
DNS records with HackerTarget free and Paid API 
```  
### [5]
``` 
Whois domain information
```
### [6]
``` 
Domain CERT (Certificate) search using CRT.SH
```   

### [7]
``` 
Domain reputation scan with WhoisXML free API
```   

### [8]
``` 
Subdomain Scanner 
```   

### [9]
``` 
Historical Whois Search with WhoisFreaks free API (100 Free API Calls)
```   


<br>

# Terminal Scrollback Buffer 🔣
Be aware that for the reverse IP search using the Hacker Target API, you are going to get a few hundred results for some websites, make sure that your Terminal Scrollback preferences are set to `unlimited scrollback` so that you can scroll back up to see all results!

<p align="center">
<img width="333" src="https://user-images.githubusercontent.com/104733166/179029659-f1591798-d0e9-45d9-8dbb-c7de0a82585f.png"></p>


<br>

# Potential Issues and Errors ❌
Before making this repository public, I gave private access to a few people, some were getting an error right at the beginning of the script and websites that were `Registered` were being shown as `Not Registered`. Found the problem/issue, some people have both `whois` and  `python-whois` modules, and they were conflicting with each other. Fixing the issue will be:
``` 
pip3 uninstall whois
```   
``` 
pip3 uninstall python-whois
``` 
Make a clean install: 
``` 
pip 3 install python-whois
```   

<br>
  
Or simply use `virtualenv` 🧠

<br>

# Disclaimer ⚠️

`This tool is for the OSINT and Cyber community, don't use it for wrong, immoral, or illegal reasons.`

<br>

# Tool Improvements 🔧
Feel free to contribute and to change some code within the tool, submit a PR (Pull Request), or submit your thoughts here on github in the [Webosint discussions](https://github.com/C3n7ral051nt4g3ncy/webosint/discussions)
<br>
<br>

# License ⚖️
[MIT](https://choosealicense.com/licenses/mit/)
 
<br>
  
# Support 💜
If you like this simple Python tool, feel free to donate to my work by clicking on the **KO-FI** Badge or the **BITCOIN** Badge at the top of this  `README.md` file, you can also scan my BTC QR Code directly to get my BTC Address. 

<br>

# Mention 🔊
Thank you to [Hacker Target](https://hackertarget.com) for their API and great work which makes this tool possible, thank you also to [WHOisXML](https://main.whoisxmlapi.com) for their API as they make a free API (500 searches) which provides a great opportunity for the people in the Cyber community, and thanks to [Whois Freaks](https://whoisfreaks.com)for their free 100 search API Trial.
Thanks to [@cipher387](https://github.com/cipher387)/[@cyb_detective](https://twitter.com/cyb_detective) and to [Euler Neto](https://github.com/netoeuler) for testing the script before release and finding 2 minor corrections.
  
<br>
  
<p align="center"><img width="233" height="133" src="https://user-images.githubusercontent.com/104733166/178512035-bb81cafc-f785-4426-9268-6634d3c2152d.png"></p>

<br>
  
 <p align="center"><img width="433" height="66" src="https://user-images.githubusercontent.com/104733166/178512622-949c845e-6170-4994-ac5b-d3eaeb2cbd4b.png"></p>
 
 <br>
 
 <p align="center"><img width="166" height="133" src="https://user-images.githubusercontent.com/104733166/185790948-bc101640-be75-47d3-b437-9adf4737d3fa.png"></p>
 




================================================
FILE: config.json
================================================
{
      "WHOIS_XML_API_KEY": "paste WhoisXML api here" ,

"HACKERTARGET_API_KEY": "paste hacker target api here" ,
      
      "WHOIS_FREAKS_API_KEY": "paste your Whois Freaks api here"

}


================================================
FILE: dockerfile
================================================
FROM python:3

COPY . .
RUN pip install --no-cache-dir -r requirements.txt


CMD [ "python", "./webosint.py" ]





================================================
FILE: requirements.txt
================================================
python-whois
requests
pycrtsh


================================================
FILE: webosint.py
================================================
#!/usr/bin/env python3
# File name   : webosint.py
# Tool name   : W3b0s1nt (WebOSINT)
# Author      : @C3n7ral051nt4g3ncy
# Version     : V2.1
# Licence     : MIT
# Script Info : WebOSINT is a passive Domain Intelligence recon tool, a Swiss army knife with 8 modules


# Py Libs
import re
import whois
import socket
import requests
import time
import sys
# import readline
import json
from pprint import pprint
from pycrtsh import Crtsh
from dateutil.parser import parse
from requests import get


class MyCrtsh:
    def search(self, query, timeout=None):
        """
        Search crt.sh with the give query
        Query can be domain, sha1, sha256...
        """
        r = requests.get('https://crt.sh/', params={'q': query, 'output': 'json'}, timeout=timeout)
        nameparser = re.compile("([a-zA-Z]+)=(\"[^\"]+\"|[^,]+)")
        certs = []
        try:
            for c in r.json():
                if not c['entry_timestamp']:
                    continue
                certs.append({
                    'id': c['id'],
                    'logged_at': parse(c['entry_timestamp']),
                    'not_before': parse(c['not_before']),
                    'not_after': parse(c['not_after']),
                    'name': c['name_value'],
                    'ca': {
                        'caid': c['issuer_ca_id'],
                        'name': c['issuer_name'],
                        'parsed_name': dict(nameparser.findall(c['issuer_name']))
                    }
                })
        except json.decoder.JSONDecodeError:
            pass
        return certs


# W3b0s1nt Banner
print("""\033[0;35m
*═════════════════════════════════════════════════════════════════════*                                                               
█  ██╗    ██╗██████╗ ██████╗  ██████╗ ███████╗ ██╗███╗   ██╗████████╗ █
█  ██║    ██║╚════██╗██╔══██╗██╔═████╗██╔════╝███║████╗  ██║╚══██╔══╝ █
█  ██║ █╗ ██║ █████╔╝██████╔╝██║██╔██║███████╗╚██║██╔██╗ ██║   ██║    █
█  ██║███╗██║ ╚═══██╗██╔══██╗████╔╝██║╚════██║ ██║██║╚██╗██║   ██║    █
█  ╚███╔███╔╝██████╔╝██████╔╝╚██████╔╝███████║ ██║██║ ╚████║   ██║    █
█   ╚══╝╚══╝ ╚═════╝ ╚═════╝  ╚═════╝ ╚══════╝ ╚═╝╚═╝  ╚═══╝   ╚═╝    █
█ V1.1.4                                                              █
█ W3b0s1nt: Domain Intelligence                                       █                                                         
*═════════════════════════════════════════════════════════════════════*\033[0m\033[0;32m 
  ╔═══════════════════════════════════════════════════════════════╗
  ║ by C3n7ral051nt4g3ncy                                         ║      
  ║ Github.com/C3n7ral051nt4g3ncy                                 ║                                                                            
  ║ Contributions(BTC):bc1q66awg48m2hvdsrf62pvev78z3vkamav7chusde ║
  ║ Licence:MIT                                                   ║
  ╚═══════════════════════════════════════════════════════════════╝
  \033[0m""")
time.sleep(3)

# What the script does (Sequence)
print("[1]Domain Registration Check"
      "\n[2]Get Domain IP + Data"
      "\n[3]Reverse IP Search -extract Domains with same IP (HackerTarget API)"
      "\n[4]Get DNS Records (HackerTarget API)"
      "\n[5]Whois Domain Information"
      "\n[6]Domain CERT search (CRT.SH)"
      "\n[7]Domain Reputation search WhoisXML"
      "\n[8]Subdomain scan"
      "\n[9]Historical Whois")

with open('config.json', 'r') as f:
    config = json.load(f)

WHOIS_XML_API_KEY = config['WHOIS_XML_API_KEY']
HACKERTARGET_API_KEY = config['HACKERTARGET_API_KEY']
WHOIS_FREAKS_API_KEY = config['WHOIS_FREAKS_API_KEY']


# Checking if the domain is registered
def registrationstatus(domain_name):
    """
    Checking whether the domain is registered or not
    """

    try:
        dn = whois.whois(domain_name)
    except Exception:
        return False
    else:
        return bool(dn.domain_name)


print("\nLet's start by checking if the domain is registered!")
query = input("\n\033[0;35m\033[1mDomain Name: \033[0m")
domain = query
print(domain, "\033[0;32m...searching for domain registration\n")
print(domain, "\033[0;32m\033[1m is registered ✅ \033[0m" if registrationstatus(
    domain) else "\033[0;31m\033[1m is not registered ❌ \033[0m")


# Get domain IP Address
def domain_ip():
    """
    Find Domain ip address
    """

    website = query
    try:
        domain_ip = socket.gethostbyname(website)

    except Exception as e:
        return


    print("\n\033[0;35m\033[1mDomain IP: \033[1m\033[0;32m\n")
    print(domain_ip)

    ip_address = domain_ip
    response = requests.get(f'https://ipapi.co/{ip_address}/json/').json()
    print("\n\033[0;35m\033[1mIP Data:\n\033[0m\033[0;32m")
    pprint(response)

    print("\n\n\033[0;35m\033[1mDouble IP verification using IPinfo.io")
    print("\n\033[0;35m\033[1mResults:\033[0m\033[0;32m")

    response = requests.get(f'https://ipinfo.io/{ip_address}/json')
    data = json.loads(response.text)

    ip = data['ip']
    organization = data['org']
    city = data['city']
    region = data['region']
    country = data['country']
    location = data['loc']
    postal = data['postal']
    timezone = data['timezone']

    print("ip:", ip)
    print("organization:", organization)
    print("city:", city)
    print("region:", region),\
    print("country:", country)
    print("postal:", postal)
    print("location:", location)
    print("timezone", timezone)

    choice = input("\n\n\033[0;35m\033[1mExtract domains with the same IP?\033[0m y/n: ")
    if choice == "y" or choice == "Y":
        rev_ip(domain_ip, website)
    if choice == "n" or choice == "N":
        dns_records(website)
    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Reverse IP lookup intro - choice of limited free search or API Key
def rev_ip(domain_ip, domain):
    """
    Choose Reverse ip for free or with your API
    """

    print(
        "\n\n\033[1m!!! Hacker Target will give you a few tries for free, then you will need to change your ip or to use your API Key!!!\033[0m")

    choice = input(
        """\n\033[0;35m\033[1mType -F for Free Search, or Type -API for usage with your own API Key: \033[0m""")
    if choice == "-F" or choice == "-f" or choice == "F" or choice == "f":
        rev_ip_free(domain_ip, domain)
    if choice == "-API" or choice == "-api" or choice == "API" or choice == "api":
        rev_ip_api(domain_ip, domain)

    else:
        print(
            "You pressed the wrong key; choose -F for free search or -API for usage with your API Key, please start again")
        sys.exit(1)


# Reverse IP lookup using limited searches with the Hacker Target free test API to extract all domains using the same IP
def rev_ip_free(domain_ip, domain):
    """
    Reverse IP search for Free
    """

    # Returning and printing the status code
    print("\n\033[0;32mOne moment ...checking Hackertarget.com status\033[0m")
    URL = 'http://api.hackertarget.com/reverseiplookup'
    request = requests.get(URL)

    if request.status_code == 200:
        print(
            "\n\033[0;32mstatus code 200!\033[0m Hacker Target is \033[0;32m\033[1monline\033[0m\033[0;35m\033[1m\n\nReverse IP search results:\033[0m\033[0;32m\n")
    else:
        print('\033[0;32mResponse Failed, try again later')

    # Free Hacker Target API with limited searches
    ht_api = "http://api.hackertarget.com/reverseiplookup"
    domain_ip = {"q": domain_ip}
    response = requests.request("GET", ht_api, params=domain_ip)
    print(response.text)

    choice = input("\n\n\033[0;35m\033[1mContinue to DNS Records search?\033[0m y/n: ")
    if choice == "y" or choice == "Y":
        dns_records(domain)
    if choice == "n" or choice == "N":
        whois_search()

    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Reverse IP lookup using Hacker Target API to extract all domains using the same IP address
def rev_ip_api(domain_ip, domain):
    """
    Reverse IP search with API
    """

    # Returning and printing the status code (200 means the server was reached).
    print("\n\033[0;32mOne moment ...checking Hackertarget.com status\033[0m")
    URL = 'http://api.hackertarget.com/reverseiplookup'

    request = requests.get(URL)
    if request.status_code == 200:
        print(
            "\n\n\033[0;32mstatus code 200!\033[0m Hacker Target is \033[0;32m\033[1monline\033[0m\033[0;35m\033[1m\n\nReverse IP search results:\033[0m\033[0;32m\n")

    else:
        print('\033[0;32mResponse Failed, try again later')

    # Using your own Hacker Target API to avoid restrictions
    query = domain_ip
    domain_ip = {"q": query}
    api = f"https://api.hackertarget.com/reverseiplookup/?q={query}&apikey={HACKERTARGET_API_KEY}"
    response = requests.request("GET", api, params=domain_ip)
    print(response.text)

    choice = input("\n\n\033[0;35m\033[1mContinue to DNS Records search?\033[0m y/n: ")

    if choice == "y" or choice == "Y":
        dns_records(domain)
    if choice == "n" or choice == "N":
        whois_search()

    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Search DNS Records (choose Free Search or using Hacker Target API KEY)
def dns_records(domain):
    """
    Choose Free Search or API
    """

    choice = input(
        """\n\033[0;35m\033[1mType -F for Free Search, or Type -API for usage with your own API Key: \033[0m""")
    if choice == "-F" or choice == "-f" or choice == "F" or choice == "f":
        dns_records_free(domain)
    if choice == "-API" or choice == "-api" or choice == "API" or choice == "api":
        dns_records_api(domain)

    else:
        print(
            "You pressed the wrong key; choose -F for free search or -API for usage with your API Key, please start again")
        sys.exit(1)


# Search DNS Records free
def dns_records_free(domain):
    """
    DNS Records check
    """

    print("\n\033[0;35m\033[1mDNS Records search results:\033[0m\033[0;32m\n")
    dnsrecords_api = "https://api.hackertarget.com/dnslookup/"

    dns_records = {"q": domain}
    response = requests.request("GET", dnsrecords_api, params=dns_records)
    print(response.text)

    choice = input("\n\n\033[0;35m\033[1mDo a Whois scan? y/n: \033[0m")
    if choice == "y" or choice == "Y":
        whois_search()
    if choice == "n" or choice == "N":
        sys.exit(1)

    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Using your own Hacker Target API to avoid restrictions
def dns_records_api(domain):
    """
    DNS Records check with API
    """
    print("\n\033[0;35m\033[1mDNS Records search results:\033[0m\033[0;32m\n")
    dns_records = {"q": domain}
    api = f"https://api.hackertarget.com/dnslookup/?q={domain}&apikey={HACKERTARGET_API_KEY}"
    response = requests.request("GET", api, params=dns_records)
    print(response.text)

    choice = input("\n\n\033[0;35m\033[1mDo a Whois scan? y/n: \033[0m")
    if choice == "y" or choice == "Y":
        whois_search()
    if choice == "n" or choice == "N":
        sys.exit(1)

    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Search further domain information with the Whois module
def whois_search():
    """
    WHOis information search
    """

    print("\n\n\033[0;35m\033[1mLet's try and find more domain information!\033[0m")
    webdomain = query
    domain_name = webdomain
    whois_information = whois.whois(domain_name)

    # WHOis results easy to read.
    print("\n\033[0;32mDomain Name:", whois_information.domain_name)
    print("\nDomain registrar:", whois_information.registrar)
    print("\nWHOis server:", whois_information.whois_server)
    print("\nDomain creation date:", whois_information.creation_date)
    print("\nExpiration date:", whois_information.expiration_date)
    print("\nUpdated Date:", whois_information.updated_date)
    print("\nServers:", whois_information.name_servers)
    print("\nStatus:", whois_information.status)
    print("\nEmail Addresses:", whois_information.emails)
    print("\nName:", whois_information.name)
    print("\nOrg:", whois_information.org)
    print("\nAddress:", whois_information.address)
    print("\nCity:", whois_information.city)
    print("\nState:", whois_information.state)
    print("\nZipcode:", whois_information.zipcode)
    print("\nCountry:", whois_information.country)

    # Sleeping time so the user can view the results without the script moving too fast
    time.sleep(3)

    choice = input("\n\n\033[0;35m\033[1mCheck domain CERT (Certificate)?\033[0m y/n: ")
    if choice == "Y" or choice == "y":
        crt_sh(domain_name)
    if choice == "N" or choice == "n":
        domain_reputation(domain_name)

    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Site Certificate search with CRT.SH
def crt_sh(domain_name):
    c = MyCrtsh()
    certs = c.search(domain_name)
    print("\n\033[0;35m\033[1mWebsite cert. search results:\033[0m\n\033[0;32m")
    pprint(certs[:6])

    time.sleep(3)

    choice = input("\n\n\033[0;35m\033[1mDomain reputation scan?\033[0m y/n: ")
    if choice == "Y" or choice == "y":
        domain_reputation(domain_name)
    if choice == "N" or choice == "n":
        print("\n\n\n\033[0;35m\033[1mBye Bye 😈 !!! You have reached the end of your domain Recon journey...")
        sys.exit(1)

    else:
        print("You pressed the wrong key; choose Y or N, please start again")
        sys.exit(1)


# Domain Reputation Scan
def domain_reputation(domain_name):
    """
    Domain reputation scan
    """

    print("\n\033[0;35m\033[1mOK! Let's check domain reputation using WhoisXML API\n\033[0m")

    query = domain_name
    reputation = {"q": query}
    api = f"https://domain-reputation.whoisxmlapi.com/api/v2?apiKey={WHOIS_XML_API_KEY}&domainName={query}"
    response = requests.request("GET", api, params=reputation)

    print("\n\n\033[0;35m\033[1mDomain Reputation check results:\n\n\033[0;32m")
    pprint(response.text)

    time.sleep(3)

    choice = input("\n\n\033[0;35m\033[1mLet's do a subdomain scan?\033[0m y/n: ")
    if choice == "Y" or choice == "y":
        subdomain_scanner(domain_name)
    if choice == "N" or choice == "n":
        whois_history(domain_name)


# WebOSINT Subscan (Subdomain Scanner)
def subdomain_scanner(domain_name):
    """
    Subdomain scan
    """

    subdomains_found = []

    sdsreq = requests.get(f'https://crt.sh/?q={domain_name}&output=json')

    if sdsreq.status_code == 200:
        print('\033[0;32m\033[1m\n\nScanning for subdomains now...')

    else:
        print("\033[0;32mThe subdomain scanner tool is currently offline, please try again in a few minutes!\033[0m")
        sys.exit(1)

    for (key, value) in enumerate(sdsreq.json()):
        subdomains_found.append(value['name_value'])

    print(
        f"\n\n\033[0;35m\033[1mYour chosen targeted Domain for the Subdomain scan:\033[0;32m{domain_name}\033[0m\033[0;32m\n")

    subdomains = sorted(set(subdomains_found))

    for sub_link in subdomains:
        print(f'\033[1m[✅ Subdomain Found]\033[0m\033[0;32m -->{sub_link}')

    print("\n\033[1m\033[0;35m\033[1mSubdomain Scan Completed!  \033[0;32m\033[1m- ALL Subdomains have been Found")

    time.sleep(3)

    choice = input("\n\n\033[0;35m\033[1mDo you want to finish with a Whois History search?\033[0m y/n: ")
    if choice == "Y" or choice == "y":
        whois_history(domain_name)
    if choice == "N" or choice == "n":
        print("\n\n\n\033[0;35m\033[1mBye Bye 😈 !!! You have reached the end of your domain Recon journey...")
        sys.exit(1)


# Whois History using your WhoisFreaks API Key
def whois_history(domain_name):
    """
    Whois History search
    """

    print("\n\033[0;35m\033[1mOK Let's do this and check Historical Whois using your Whois Freaks API ;-)\n\033[0m")

    time.sleep(2)

    print("\n\033[0;35m\033[1mHistorical Whois results:\n\n\033[0;32m")

    query = domain_name
    whoishistory = {"q": query}
    api = f"https://api.whoisfreaks.com/v1.0/whois?apiKey={WHOIS_FREAKS_API_KEY}&whois=historical&domainName={query}"
    response = requests.request("GET", api, params=whoishistory)
    pprint(response.text)

    time.sleep(3)

    # Farewell Goodbye End of Script Message
    print("\n\n\n\033[0;35m\033[1mBye Bye 😈 !!! You have reached the end of your domain Recon journey...")
    sys.exit(1)


# Choice to use Dig
choice = input("""\n\n\033[0;35m\033[1mFind domain IP?\033[0m  y/n: """)
if choice == "Y" or choice == "y":
    domain_ip()
if choice == "N" or choice == "n":
    dns_records(query)
else:
    print("\n\n\033[0;31m\033[1mDomain IP not found for:")
    print(domain)
    print("\033[0;32mThis means that you will now be taken straight to the Reverse DNS search module...")
    dns_records(domain)


# Main.
def main():
    registrationstatus()
    domain_ip()
    rev_ip()
    rev_ip_free()
    rev_ip_api()
    dns_records()
    dns_records_free()
    dns_records_api()
    whois_search()
    crt_sh()
    domain_reputation()
    subdomain_scanner()
    whois_history()


if __name__ == '__main__':
    main()


================================================
FILE: webosint_screenshots.md
================================================
<p align="center"

<br>
<img width="633" src="https://user-images.githubusercontent.com/104733166/179273029-12792d1a-57c0-4642-bbc8-1a8f36e17f52.png">

<br>
<br>

<img width="633" src="https://user-images.githubusercontent.com/104733166/179273191-96ac5f88-f120-4df0-8d94-f2c167025b1c.png">

<br>
<br>

<img width="633" src="https://user-images.githubusercontent.com/104733166/179273304-1b36e859-40cf-4b1b-bb4f-58a52dfe61da.png">

<br>
<br>

<img width="633" src="https://user-images.githubusercontent.com/104733166/179273385-d6fef370-6dc6-4fef-b9f5-0ef6c5b73d70.png">

<br>
<br>

<img width="633" src="https://user-images.githubusercontent.com/104733166/179273459-314a0c9e-33db-44c3-b945-e092c20e2750.png"> 

<br>

</p>
Download .txt
gitextract_nlucj111/

├── .github/
│   └── FUNDING.yml
├── LICENSE
├── README.md
├── config.json
├── dockerfile
├── requirements.txt
├── webosint.py
└── webosint_screenshots.md
Download .txt
SYMBOL INDEX (16 symbols across 1 files)

FILE: webosint.py
  class MyCrtsh (line 25) | class MyCrtsh:
    method search (line 26) | def search(self, query, timeout=None):
  function registrationstatus (line 96) | def registrationstatus(domain_name):
  function domain_ip (line 118) | def domain_ip():
  function rev_ip (line 174) | def rev_ip(domain_ip, domain):
  function rev_ip_free (line 196) | def rev_ip_free(domain_ip, domain):
  function rev_ip_api (line 230) | def rev_ip_api(domain_ip, domain):
  function dns_records (line 267) | def dns_records(domain):
  function dns_records_free (line 286) | def dns_records_free(domain):
  function dns_records_api (line 310) | def dns_records_api(domain):
  function whois_search (line 332) | def whois_search():
  function crt_sh (line 375) | def crt_sh(domain_name):
  function domain_reputation (line 396) | def domain_reputation(domain_name):
  function subdomain_scanner (line 421) | def subdomain_scanner(domain_name):
  function whois_history (line 461) | def whois_history(domain_name):
  function main (line 499) | def main():
Condensed preview — 8 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (31K chars).
[
  {
    "path": ".github/FUNDING.yml",
    "chars": 726,
    "preview": "# These are supported funding model platforms\n\ngithub: C3n7ral051nt4g3ncy\npatreon: # Replace with a single Patreon usern"
  },
  {
    "path": "LICENSE",
    "chars": 1145,
    "preview": "MIT License\n\nCopyright (c) 2022 OSINT Tactical\nhttps://github.com/C3n7ral051nt4g3ncy/\nhttps://twitter.com/OSINT_Tactical"
  },
  {
    "path": "README.md",
    "chars": 7056,
    "preview": "<div align=\"center\">\n \n<img src=\"https://img.shields.io/badge/Python-purple?style=for-the-badge&logo=python&logoColor=wh"
  },
  {
    "path": "config.json",
    "chars": 198,
    "preview": "{\r\n      \"WHOIS_XML_API_KEY\": \"paste WhoisXML api here\" ,\r\n\r\n\"HACKERTARGET_API_KEY\": \"paste hacker target api here\" ,\r\n "
  },
  {
    "path": "dockerfile",
    "chars": 114,
    "preview": "FROM python:3\n\nCOPY . .\nRUN pip install --no-cache-dir -r requirements.txt\n\n\nCMD [ \"python\", \"./webosint.py\" ]\n\n\n\n"
  },
  {
    "path": "requirements.txt",
    "chars": 30,
    "preview": "python-whois\nrequests\npycrtsh\n"
  },
  {
    "path": "webosint.py",
    "chars": 17380,
    "preview": "#!/usr/bin/env python3\n# File name   : webosint.py\n# Tool name   : W3b0s1nt (WebOSINT)\n# Author      : @C3n7ral051nt4g3n"
  },
  {
    "path": "webosint_screenshots.md",
    "chars": 720,
    "preview": "<p align=\"center\"\n\n<br>\n<img width=\"633\" src=\"https://user-images.githubusercontent.com/104733166/179273029-12792d1a-57c"
  }
]

About this extraction

This page contains the full source code of the C3n7ral051nt4g3ncy/WebOSINT GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 8 files (26.7 KB), approximately 8.0k tokens, and a symbol index with 16 extracted functions, classes, methods, constants, and types. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.

Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.

Copied to clipboard!