Back to feed

elementalsouls/Claude-OSINT

elementalsouls/Claude-OSINT
256
+14/day
42
Python

From the README

claude-osint

2 paired Claude skills · 90+ recon modules · 48 secret-regex patterns · 80+ dorks · 9 read-only credential validators · 27 attack-path templates · 5,500+ lines of structured tradecraft. Drop-in SKILL.md files that turn Claude into a god-mode external recon operator for authorized red-team and bug-bounty engagements.

Built by ElementalSoul — GenAI Security Research.

What is this?

claude-osint is a paired set of skills for the Claude skills system. Each skill is a structured SKILL.md file that primes Claude with expert-level methodology for one half of the offensive recon problem:

  • osint-methodology - how to think. Strategic + procedural. Asset-graph discipline, severity rubric, time budgeting, identity-fabric mapping, deliverable templates.
  • offensive-osint - what to reach for. Tactical arsenal. Probe paths, regexes, payloads, scoring rules, curl one-liners, tool URLs.

Drop both into your Claude environment and it behaves like a senior recon analyst: it knows the techniques, the tooling, the edge cases, and the escalation paths — and it stays in scope.

~5,500 lines of structured tradecraft · 96.9% PASS on a 32-prompt self-evaluation · ~85–90% practitioner coverage for the recon phase of authorized engagements.

Structure

claude-osint/
├── skills/
│   ├── osint-methodology/SKILL.md     # how to think  (1,694 lines)
│   └── offensive-osint/
│       ├── SKILL.md                   # what to reach for (4,168 lines)
│       └── scripts/secret_scan.py     # stdlib-only secret scanner
├── docs/                              # architecture · coverage · install · usage
├── examples/                          # 4 end-to-end engagement walk-throughs
├── tests/smoke-test-prompts.md        # 32-prompt self-evaluation
└── assets/banner.png

Each skill directory is self-contained. Drop into ~/.claude/skills/ and Claude auto-triggers on relevant phrases.

Skill Index

90+ capabilities across 12 domains. Categorized like Claude-Red — pick a domain to drill in.

Reconnaissance & Asset Discovery

| Capability | Skill | |---|---| | 5-stage external recon pipeline + time-budget profiles (1h / 4h / 1d / 1w) | methodology | | Subdomain-source stack (crt.sh + 7-source fallback chain when crt.sh 502s) | arsenal | | Common-prefix subdomain sweep (100+ ordered prefixes, PowerShell + bash) | arsenal | | Wayback CDX deep mining + legacy-app pivot (.asp/.php/.jsp/.cfm) | arsenal | | WHOIS / RDAP / historical-WHOIS + reverse-WHOIS pivots | arsenal | | Public records (OpenCorporates · SEC EDGAR · GSXT · Rusprofile · Companies House) | arsenal | | Bulk IP → ASN (Cymru / RIPEstat / bgp.tools) | arsenal |

Identity & SSO Mapping

| Capability | Skill | |---|---| | Microsoft Entra (Azure AD) tenant fingerprint + GUID extraction | arsenal | | M365 deep enum (Teams federation · SharePoint · OneDrive · OAuth · device-code phishing) | arsenal | | Autodiscover IP correlation (passive M365 confirm eve