Skip to content

osint-framework

The osint-framework plugin provides OSINT tool catalog and investigation skills — 1,064 free intelligence-gathering tools across 34 categories mapped from osintframework.com. It includes category-based skills, executable investigation pipelines, CLI tool execution, OPSEC-aware workflows, and a persistent entity graph for cross-investigation correlation.

v1.0.1 Security
/plugin install osint-framework@f5xc-salesdemos-marketplace

Run a full OSINT investigation against any target. Automatically detects the target type (email, domain, IP, username, company, person name) and routes to the correct category skills.

/osint-investigate robin.mordasiewicz@f5.com
/osint-investigate cloudflare.com
/osint-investigate 1.1.1.1
/osint-investigate robinmordasiewicz

Search the tool catalog for tools matching a capability query.

/osint-search subdomain enumeration
/osint-search email breach check
/osint-search satellite imagery

Browse the full tool catalog by category. Without arguments shows all 34 categories with tool counts.

/osint-catalog
/osint-catalog domain
/osint-catalog threat-intel

Top-level intent router. Auto-activates when you say “find information about”, “investigate”, “look up”, “background check”, or describe any open-source intelligence task. Routes to the correct category skill based on target type.

TargetRoutes To
Username or handleusername-recon
Email addressemail-recon
Domain namedomain-recon
IP addressip-address-recon
Person name + companypeople-search + business-records
Company / orgbusiness-records + domain-recon
Malware hashmalicious-file-analysis + threat-intelligence

Each category has a dedicated skill with CLI tools, web resources, investigation workflow, cross-category pivots, and OPSEC notes.

CategoryToolsKey CLI Tools
username-recon18sherlock, maigret, sylva
email-recon28holehe, h8mail, theHarvester
domain-recon131subfinder, amass, whois, dig
cloud-recon23cloud_enum, S3Scanner, ScoutSuite
ip-address-recon55nmap, masscan, checkip
images-videos89exiftool, exiv2, yt-dlp
social-networks63maigret, yt-dlp, Osintgram
threat-intelligence38iocextract, ioc_parser, pymisp
malicious-file-analysis33oletools, pdfid, Ghidra
search-engines73gitleaks, pagodo, gobuster
geolocation47Hyperlapse
opsec4747 web-based privacy tools
people-search18GitHub API, GitLab API
business-records28SEC EDGAR, OpenCorporates
(20 more categories)500+

Tool catalog browser. Provides access to the full tool registry, category index, investigation pipelines, rate-limit reference, and correlation engine documentation.

Autonomous multi-tool investigation orchestrator. Runs full investigation workflows — tool availability check, target type detection, sequential tool execution (passive first), result aggregation, and structured report generation with confidence levels and OPSEC classifications.

Integrates with the entity graph: each tool result creates entities and relationships in /tmp/osint-graph/ for cross-investigation correlation.

Read-only catalog lookup agent. Searches reference files to recommend the best tools for a given task. Never executes tools — only recommends and explains. Used internally by category skills for tool discovery.

Single-tool CLI execution agent. Runs one tool at a time with specific parameters, parses output, and returns structured results. Includes per-tool execution recipes for 20+ tools with exact flags, output formats, and jq parsing patterns.

All API calls use the osint_curl helper with built-in exponential backoff on HTTP 429/503. Key limits:

APIFree LimitEnv Var
ipinfo.io1,000/day
crt.sh60/min
NVD5/30s (no key)NVD_API_KEY
OpenCorporatesRequires keyOPENCORPORATES_API_KEY
Shodan1/secSHODAN_API_KEY
GitHub API60/hr (no auth)GH_TOKEN

APIs that require keys are automatically skipped with a clear message if the environment variable is not set.

The plugin includes a persistent JSON entity graph at /tmp/osint-graph/ that accumulates findings across investigations.

Terminal window
source plugins/osint-framework/scripts/osint-graph.sh
osint_graph_init
# Add entities
P=$(osint_entity_add "person" "Robin Mordasiewicz" --tool github-api)
C=$(osint_entity_add "company" "F5" --tool github-api)
# Link them
osint_rel_add "$P" "$C" "works_at" --tool github-api
# Query: all entities within 2 hops of the person
osint_graph_query "$P" 2
# Generate report
osint_graph_report

Confidence scoring uses multi-source fusion: confidence = 1 - product(1 - ci) for each confirming source. Two sources at 0.80 → 0.96 combined confidence.

All tools use only publicly available information. Users are responsible for ensuring compliance with applicable laws, regulations, and platform terms of service. Never use OSINT tools for unauthorized access, harassment, or any illegal activity.