Introduction to Mosint
Mosint is a powerful, automated tool designed to perform Open Source Intelligence (OSINT) on target email addresses. Developed using the Go programming language, Mosint leverages various online services to rapidly gather a comprehensive set of data associated with an email address. It's particularly beneficial for security researchers who need to access a multitude of resources within a short time frame.
Features
Mosint offers a range of compelling features that make email investigations both fast and straightforward. Some of the key features include:
- Quick and Easy Email Scanning: Mosint efficiently scans target emails with minimal resource consumption.
- Email Verification and Validation: It checks the authenticity of email addresses.
- Social Media Account Detection: The tool can identify associated social media profiles.
- Data Breach and Password Leak Checker: Mosint checks if the email has been compromised in any data breaches.
- Related Emails and Domains Finder: It locates emails and domains linked to the target email.
- Pastebin Dumps Scanning: The tool can search for the email in pastes on Pastebin.
- Google Search Integration: Mosint uses Google's search to find more information.
- DNS/IP Lookup: It performs lookups to gather more domain-related information.
- JSON Output: Results can be exported to a JSON file for documentation purposes.
- Fun Feature: There is even a lighthearted feature to 'print coffee' with the
--coffee
flag.
Installation
Installing Mosint is straightforward. Simply run the following command to add it to your Go environment:
go install -v github.com/alpkeskin/mosint/v3/cmd/mosint@latest
Services
Mosint integrates with a variety of online services to provide its wide range of features. Some of these services include:
- IPAPI.co: Provides detailed information about domains.
- Hunter.io: Finds related emails.
- EmailRep.io: Lists breached sites.
- Scylla.so: Accesses database leaks (note: still under construction).
- Psbdmp.ws: Retrieves pastes from Pastebin.
- Intelligence X, BreachDirectory, HaveIBeenPwned: All these services help uncover password leaks.
Many of these services require an API key to access additional features.
Configuration
To run Mosint, a configuration file is necessary. By default, this config file is located at $HOME/.mosint.yaml
. It is essential to input API keys for the various services that Mosint interfaces with. If your configuration file is not in the home directory, use the --config
flag to designate the correct file.
Usage
To start using Mosint, simply run the tool with the target email:
mosint [email protected]
Use the help flag (-h
) for more detailed usage instructions.
Docker
Mosint can also be run within a Docker container, providing additional flexibility in how you deploy the tool. To set this up:
- Build the Docker image:
docker build -t mosint .
- Run the Docker container using the built image:
docker run mosint --help
Screen
For a visual representation of how Mosint operates, there is an available video demonstration that shows the tool in action. This can be viewed here.
In conclusion, Mosint is a versatile OSINT tool that simplifies the process of email investigations, making it an invaluable resource for anyone involved in security research or digital forensics.