mirror of
https://github.com/mouna23/OSINT-with-LLM.git
synced 2026-02-12 12:42:44 +00:00
0b7412631efaff4b619d4e9533b5645b00126df0
POC : OSINT with LLM
This repository demonstrates domain, IP, and email reconnaissance with LLM-powered security reporting..
Overview
The project is divided into two main components:
- Recon Modules
- LLM Analysis and reporting
Recon Modules
Purpose
Gathering information about an ip, domain or email
Approach
-
Domain OSINT:
-
WHOIS Lookup
-
Shodan Info Gathering
-
SSL Certificate Validation
-
VirusTotal "malicious/clean" status
-
-
IP Recon:
- AbuseIPDB score & classification
-
Email Recon:
- Breach/exposure lookup
LLM Analysis and reporting
-
Converts technical OSINT into human-readable summaries
-
Extracts key findings & risk insights
-
Generates reports
Required API keys for OSINT modules
- VT_API_KEY=your_virustotal_api_key
- ABUSEIPDB_KEY=your_abuseipdb_api_key
- SHODAN_KEY=your_shodan_api_key
Usage
Install dependencies
pip3 install -r requirements.txt
Demo
python3 main.py
When finished:
-
OSINT recon runs
-
LLM analyzes results
-
A report is saved in /reports/
Demo with domain
Demo with ip
Demo with email
Notes
- The scripts are designed to be run locally, in a Python 3.13+ environment with the listed dependencies.
- Install Ollama on your machine and add the MISTRAL model.
- This poc is only for education purpose.
Description
Languages
Python
100%





