Files
OSINT-with-LLM/README.md
2025-11-20 10:54:34 +01:00

88 lines
1.7 KiB
Markdown

# POC : OSINT with LLM
This repository demonstrates domain, IP, and email reconnaissance with **LLM-powered** security reporting..
---
## Overview
The project is divided into **two main components**:
1. **Recon Modules**
2. **LLM Analysis and reporting**
---
## Recon Modules
### **Purpose**
Gathering information about an ip, domain or email
### **Approach**
- **Domain OSINT:**
* WHOIS Lookup
* Shodan Info Gathering
* SSL Certificate Validation
* VirusTotal "malicious/clean" status
- **IP Recon:**
* AbuseIPDB score & classification
- **Email Recon:**
* Breach/exposure lookup
### **LLM Analysis and reporting**
* Converts technical OSINT into human-readable summaries
* Extracts key findings & risk insights
* Generates reports
## **Required API keys for OSINT modules**
* VT_API_KEY=your_virustotal_api_key
* ABUSEIPDB_KEY=your_abuseipdb_api_key
* SHODAN_KEY=your_shodan_api_key
## **Usage**
### **Install dependencies**
```bash
pip3 install -r requirements.txt
```
### **Demo**
```bash
python3 main.py
```
When finished:
* OSINT recon runs
* LLM analyzes results
* A report is saved in /reports/
#### **Demo with domain**
![Project Logo](images/llm_domain_1.png)
![Project Logo](images/llm_domain_2.png)
#### **Demo with ip**
![Project Logo](images/llm_ip_1.png)
![Project Logo](images/llm_ip_2.png)
#### **Demo with email**
![Project Logo](images/ll_email_1.png)
![Project Logo](images/llm_email_2.png)
## Notes
* The scripts are designed to be run locally, in a Python 3.13+ environment with the listed dependencies.
* Install Ollama on your machine and add the MISTRAL model.
* This poc is only for education purpose.