Hey infosec folks 👋

I’ve been working on **GhostIntel** — a free, open-source OSINT & threat-intelligence CLI framework written in Python.

MIT licensed — fork it, modify it, integrate it into your workflow.

The idea was simple: during investigations I kept jumping between multiple OSINT sites and tools, so I started building a CLI that could enrich indicators directly from the terminal.

Drop almost anything into GhostIntel and it will try to figure it out automatically:

→ username · email · phone · domain · IP

What it can do right now:

👤 Username → checks 100+ platforms in parallel
📱 Phone → carrier + region intelligence (ID · US · UK · MY · IN)
📧 Email → MX · SPF · DMARC · Gravatar · disposable detection
🌐 Domain → DNS records + HTTP status inspection
🌍 IP → geolocation · reverse DNS · RDAP (ARIN · RIPE · APNIC · LACNIC · AFRINIC) · proxy detection

📊 Reports → export investigation results to JSON · HTML · TXT

Async-powered so lookups can run concurrently.

No API keys required.
No configuration needed.
Everything uses publicly available OSINT sources.

Built from Indonesia 🇮🇩 for the global OSINT / infosec community.

If anyone here works in:

• threat intelligence
• OSINT investigations
• SOC / DFIR
• bug bounty research

I’d genuinely appreciate your feedback.

→ What sources should be added?
→ What would improve your investigation workflow?
→ Anything broken or behaving weirdly?

Suggestions, criticism, and PRs are all welcome.

🔗 https://github.com/ruyynn/GhostIntel

#OSINT #infosec #threatintel #opensource

GitHub - ruyynn/GhostIntel: GhostIntel is a Python-based OSINT framework for digital investigation using public data such as username, email, domain, IP address, and phone number.

GhostIntel is a Python-based OSINT framework for digital investigation using public data such as username, email, domain, IP address, and phone number. - ruyynn/GhostIntel

GitHub