Is an Automated OSINT Reconnaissance Tool
FahamuOSINT is a Python-based OSINT tool that helps red teamers, pentesters and security researchers gather information about domains efficiently. It performs WHOIS lookups, IP & Shodan scans, subdomain enumeration and social media scraping. Results can be exported in CSV or JSON format.
WHOIS Lookup: Get domain registration informations.
IP and Shodan Scan: Resolve domain to IP and check exposed services.
Subdomain Enumeration: Using crt.sh, local/online wordlists or custom wordlists.
Social Media Scraper: Checks top 50 social media platforms for usernames and default common ones.
Export Results: CSV or JSON output for easy analysis.
Rich Console Output: Colorful and readable results.
Python 3.10+
Pip packages: requests, python-whois, shodan, rich, pandas
Shodan API Key (for Shodan scans)
-
Clone the repository
git clone https://github.com/Ish3ng0m4/FahamuOSINT.git
cd FahamuOSINT
-
Set up Python virtual environment (optional but highly recommended)
python3 -m venv Fahamuvenv
source Fahamuvenv/bin/activate
-
Install dependencies
pip install -r requirements.txt
Command: python3 -m scripts.fahamu -d example.com -o csv
Flag | Description | Default |
---|---|---|
-d, --domain |
Target domain | Required |
-o, --output |
Output format (csv or json ) |
csv |
python3 -m scripts.fahamu -d example.com -o csv
example.com_results_1.csv
→ WHOIS
example.com_results_2.csv
→ IP info
example.com_results_3.csv
→ Shodan
example.com_results_4.csv
→ Subdomains
example.com_results_5.csv
→ Social Media Profiles
- Uses local 1,613,291-entry wordlist found on
common-crawl-subdomains-10000.txt
which is a default wordlist - Optionally, users can provide custom wordlists.
- Online sources fallback: crt.sh
- Checks top 50 platforms including Twitter (X), Facebook, LinkedIn, GitHub, Instagram, etc.
- Users can provide a username, otherwise uses common usernames.
Under MIT & ICTC License free for personal and professional use.
Gabriel D Ishengoma | GitHub