tookie-osint
→ View on GitHubAI Summary: Tookie-OSINT is an open-source tool designed for username discovery across multiple online platforms, offering a straightforward user interface for ease of use. It aims to facilitate operational security and intelligence gathering for new programmers and penetration testers, achieving an approximately 80% success rate in finding user accounts. Notable features include full reimplementation for enhanced performance and multilingual support.
README
(Tookie-OSINT V4 is here!)
Tookie-OSINT has been re-written 100% from scratch for ultimate performance! Translations are still not ready yet. The wiki and readme are going through some changes.
🌐 Language
Select your language / 言語を選択してください / 选择你的语言 / Sélectionnez votre langue / Seleccione su idioma / Wählen Sie Ihre Sprache / Выберите язык / اختر لغتك / زبان خود را انتخاب کنید / Selecione seu idioma / Scegli la tua lingua / 선택 언어 / Pilih bahasa Anda / בחר את השפה שלך / अपनी भाषा चुनें / Valitse kieli / 選擇您的語言
| English | 日本語 | 简体中文 | 繁體中文 | Français | Español | Deutsch | Русский | Português | Italiano | فارسی | العربية | हिन्दी | Suomi | עברית | | Bahasa Indonesia |
🔎 Overview
Tookie-osint has a simple-to-use UI and is really straightforward.
The main idea of Tookie-osint is to discover usernames that are requested from an input.
Tookie-osint is similar to the tool called Sherlock. It discovers all the user accounts across different websites and Tookie-osint is successful at this task almost 80% of the time.
Our tool was created by me and the community and is available for your use.
I do not take responsibility for any malicious actions and/or responsibility caused by my tool. :(
Please note that Tookie-osint was created to help new programmers or pentesters get into the world of OSINT. My end term goal is to make Tookie-osint as perfect as I can and make it easy for new programmers to understand. Also take note that Tookie-osint is optimized for Python 3.12. If you want to contribute, make a fork and make a pull request to submit your changes. :D
📦 Linux Installation
The requirements will be automatically installed.
git clone https://github.com/alfredredbird/tookie-osint.git
cd tookie-osint
chmod +x install.sh
sudo ./install.sh
📦 Manual Install
download the latest release from: https://github.com/alfredredbird/tookie-osint/releases.
then extract the zip or tar.gz
cd tookie-osint
chmod +x install.sh
sudo ./install.sh
tookie-osint
📦 Other Installations
You can find more install instructions on the Wiki.
git clone https://github.com/alfredredbird/tookie-osint
cd tookie-osint
python3 -m venv venv
source venv/bin/activate
pip3 install -r requirements.txt
python3 brib.py
💻 Tested OS
| Operative system | Version |
|---|---|
| MacOS | Monterey 12.6.7 |
| Windows | 11/10 |
| Termux | 0.118.0 |
| Kali linux | Rolling / Sana |
| Parrot OS | 3.1 |
| Ubuntu | 22.04/20.04 |
| Debian | 10.00 |
| Alpine | 3.10 |
| Fedora | v33 |
| Arch Linux | 2021.07.01 |
| Manjaro | 21 |
| Void | Rolling Release |
📖 Requirements
There Is A Lot Lol
- colorama
- requests
- argparse
- selenium
- webdriver-manager
🗣️Supported Languages
(we need translators 😭) (The following languages are ready but not implemented.)
- English
- Italian
- Hebrew
- Spanish
- French
- Arabic
- German
- Hindi
- Russian
- Portuguese
- Indonesian
- Finnish
- Chinese traditional
- Chinese Simplified
- Japanese
- Farsi
- Turkish
📕 Upcoming Features
(They Are Great First Issues :D)
- Tor Searching (planned)
- WebUi (planned)
- Webscraper
- Phone Number OSINT
- Custom Plugins
- Detailed Reports (in beta)
- Email OSINT (in beta)
- CSV
- Url Brute Forcing
- GUI
- More Accurate Results
- Auto Open Discovered URLs
- Web Hooks
- Headless mode
- Automation
- Threading
🍿 Showcase
Tookie-osint has a wide variety of options to use.
Using -h shows the help menu.
⁉️ Need Help?
Check out https://github.com/alfredredbird/tookie-osint/issues or the WiKi for help. Still Need Help? Contact And Discord Server Below :D
🤔 Cant Find The WebSite Your Looking For?
Make a pull request or a bug report with the site and we will add it. :D
📗 Info:
| Wiki | https://github.com/alfredredbird/tookie-osint/wiki |
|---|---|
| Releases | https://github.com/alfredredbird/tookie-osint/releases |
| Contributors | https://github.com/alfredredbird/tookie-osint/graphs/contributors |
📙 Articles
There has been several articles written about our tool. Feal free to check them out :D Theses articles belong to their respectful owners.
| Habr | https://habr.com/ru/news/757502/ |
|---|---|
| Habr | https://habr.com/ru/amp/publications/769690/ |
| Speka Media | https://speka.media/rozrobniki-predstavili-alfred-vidkritu-utilitu-dlya-osint-pygwkp |
| Sibnet | https://info.sibnet.ru/article/646445/ |
| NetRunner | https://blog.netrunner.lol/alfred-advanced-osint-info-gathering-tool-afc1a7afd8a3 |
| gebutcher | https://gebutcher.blogspot.com/2023/10/Osintalfred.html?m=1 |
| Iguru | https://iguru.gr/alfred-ena-proigmeno-osint-programma/ |
| Medevel | https://medevel.com/31-osint-tools/ |
| Medium | https://medium.com/age-of-awareness/osint-unleashed-the-5-best-tools-for-cyber-investigators-8ff08fe9a4ba |
| TechnoNews | https://techno-news.net/2023/08/28/news_7132/ |
| Xhref | https://xhref.blogspot.com/2023/10/alfred-utilitas-open-source-untuk-osint.html |
| JOEE txt | https://www.joeetxt.com/2023/10/alfred-utilitas-open-source-untuk-osint.html |
| internet intelligence | https://internetintelligence.eu/alfred-a-powerful-osint-tool-for-social-media-account-discovery/ |
| Kali Linux Tutorials | https://kalilinuxtutorials.com/tookie-osint/ |
| Hacks.gr | https://en.hacks.gr/tookie-osint-ergaleio-sullogis-kai-analysis-dimosion-dedomenon/ |
| JJ Gallego | https://medium.com/cyberscribers-exploring-cybersecurity/osint-for-nicknames-tookie-osint-1364a3c87acf |
🎬 Official Tutorials
📘 Contact
- Twitter: https://twitter.com/alfredredbird1
🛠 Other Tools
Other tools in the fleet:
- Bibi-Bird (beta): https://github.com/alfredredbird/Bibi-Bird
- Open-Wrecks: https://github.com/Alfredredbird/Open-Wrecks
🤝 Partnership
Want to partner with the tookie-osint project? Feel free to reach out.
Partners: