OSINT Omnibus Logo

OSINT Omnibus

0
Free
Visit Website

An Omnibus is defined as a volume containing several novels or other items previously published separately and that is exactly what the InQuest Omnibus project intends to be for Open Source Intelligence collection, research, and artifact management. By providing an easy to use interactive command line application, users are able to create sessions to investigate various artifacts such as IP addresses, domain names, email addresses, usernames, file hashes, Bitcoin addresses, and more as we continue to expand. This project has taken motivation from the greats that came before it such as SpiderFoot, Harpoon, and DataSploit. Much thanks to those great authors for contributing to the world of open source. The application is written with Python 2.7 in mind and has been successfully tested on OSX and Ubuntu 16.04 environments. This is a beta of the final application and as such, feedback is greatly appreciated.

FEATURES

ALTERNATIVES

A C/C++ tool for remote process injection, supporting x64 and x86 operations, with system call macros generated by SysWhispers script.

Pacu is an open-source AWS exploitation framework for offensive security testing against cloud environments.

Mortar is an evasion technique to defeat and divert detection and prevention of security products, including AV, EDR, and XDR solutions.

Emulates Docker HTTP API with event logging and AWS deployment script.

Repository of tools for testing iPhone messaging by Project Zero

C3 is a framework for creating custom C2 channels, integrating with existing offensive toolkits.

CTF toolkit for rapid exploit development and prototyping.

A digital archive of the internet, allowing users to capture and browse archived web pages.

PINNED