Convert Figma logo to code with AI

smicallef logospiderfoot

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.

12,645
2,205
12,645
188

Top Related Projects

E-mails, subdomains and names Harvester - OSINT

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

10,895

Incredibly fast crawler designed for OSINT.

A Tool for Domain Flyovers

11,780

In-depth attack surface mapping and asset discovery

Fast passive subdomain enumeration tool.

Quick Overview

SpiderFoot is an open-source intelligence (OSINT) automation tool. It helps security professionals and researchers gather information about targets by integrating with various data sources and APIs. SpiderFoot can be used for footprinting, intelligence gathering, and mapping digital assets.

Pros

  • Extensive module library with over 200 OSINT modules
  • User-friendly web interface for easy operation
  • Highly customizable and extensible
  • Active development and community support

Cons

  • Can be resource-intensive for large scans
  • Some modules require API keys or subscriptions
  • Learning curve for advanced features and custom module development
  • Potential for false positives in scan results

Getting Started

  1. Clone the repository:

    git clone https://github.com/smicallef/spiderfoot.git
    cd spiderfoot
    
  2. Install dependencies:

    pip install -r requirements.txt
    
  3. Run SpiderFoot:

    python3 ./sf.py -l 127.0.0.1:5001
    
  4. Access the web interface at http://127.0.0.1:5001 in your browser.

  5. Start a new scan by clicking "New Scan" and entering a target.

Note: Some modules may require additional configuration or API keys. Refer to the documentation for more detailed setup instructions.

Competitor Comparisons

E-mails, subdomains and names Harvester - OSINT

Pros of theHarvester

  • Lightweight and focused specifically on email harvesting and subdomain enumeration
  • Simpler to use and configure for targeted reconnaissance tasks
  • Faster execution for specific information gathering objectives

Cons of theHarvester

  • More limited in scope compared to SpiderFoot's comprehensive OSINT capabilities
  • Fewer data sources and integrations available out-of-the-box
  • Less extensive reporting and visualization features

Code Comparison

SpiderFoot:

class sfp_example(SpiderFootPlugin):
    def handleEvent(self, event):
        eventName = event.eventType
        srcModuleName = event.module
        eventData = event.data
        # Plugin logic here

theHarvester:

class SearchEngine:
    def __init__(self, word, limit, start):
        self.word = word
        self.limit = limit
        self.start = start
    # Search engine logic here

SpiderFoot offers a more modular plugin-based architecture, while theHarvester uses a class-based approach for different search engines. SpiderFoot's design allows for easier extension and integration of new data sources, whereas theHarvester's structure is more focused on specific search functionalities.

Both tools serve different purposes within the OSINT landscape. SpiderFoot provides a comprehensive framework for diverse intelligence gathering tasks, while theHarvester excels in targeted email and subdomain enumeration. The choice between them depends on the specific requirements of the reconnaissance or information gathering project at hand.

Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.

Pros of recon-ng

  • More focused on reconnaissance and information gathering
  • Modular architecture allows for easy extension with custom modules
  • Command-line interface provides faster workflow for experienced users

Cons of recon-ng

  • Steeper learning curve for beginners
  • Less comprehensive out-of-the-box functionality compared to Spiderfoot
  • Smaller community and fewer third-party modules

Code Comparison

recon-ng:

from recon.core.module import BaseModule

class Module(BaseModule):
    def module_run(self):
        self.alert('Custom module executed')

Spiderfoot:

from spiderfoot import SpiderFootPlugin, SpiderFootEvent

class sfp_custom(SpiderFootPlugin):
    def handleEvent(self, event):
        self.sf.debug("Received event, " + event.eventType)

Both projects use Python and have a modular structure, but recon-ng's modules are more tightly integrated with the core framework, while Spiderfoot's plugins are more loosely coupled. recon-ng's modules directly extend the BaseModule class, whereas Spiderfoot's plugins implement specific methods within the SpiderFootPlugin class.

recon-ng's code structure is more oriented towards command-line usage, while Spiderfoot's design supports both CLI and web interface interactions. This difference reflects their respective focuses on reconnaissance (recon-ng) and broader OSINT gathering (Spiderfoot).

10,895

Incredibly fast crawler designed for OSINT.

Pros of Photon

  • Lightweight and fast, focusing specifically on OSINT and web reconnaissance
  • Easy to use with a simple command-line interface
  • Supports custom regex patterns for targeted data extraction

Cons of Photon

  • Limited scope compared to SpiderFoot's comprehensive feature set
  • Less active development and community support
  • Fewer integrations with external tools and services

Code Comparison

Photon:

def photon(url, level, threadCount, delay, timeout, cookies, headers):
    # Main function implementation
    # ...

SpiderFoot:

class SpiderFoot:
    def __init__(self, options):
        # Initialization and setup
        # ...

    def run(self):
        # Main execution logic
        # ...

Summary

Photon is a lightweight and focused tool for web reconnaissance, offering simplicity and speed. It excels in targeted data extraction but has a narrower scope compared to SpiderFoot. SpiderFoot, on the other hand, provides a more comprehensive OSINT framework with extensive features, integrations, and active community support. The choice between the two depends on the specific requirements of the user, with Photon being suitable for quick, targeted scans and SpiderFoot offering a more robust and versatile solution for in-depth OSINT investigations.

A Tool for Domain Flyovers

Pros of Aquatone

  • Focused on web-based reconnaissance and screenshot capture
  • Faster execution for targeted domain enumeration
  • User-friendly HTML report generation with visual results

Cons of Aquatone

  • Limited scope compared to SpiderFoot's comprehensive OSINT capabilities
  • Fewer data sources and modules for information gathering
  • Less frequent updates and maintenance

Code Comparison

Aquatone (Go):

func main() {
    sess := core.NewSession()
    agents := core.NewAgents(sess)
    agents.RunAll()
    report.GenerateHtml(sess)
}

SpiderFoot (Python):

def main():
    sf = SpiderFoot(opts)
    module = sfp_subdomain_takeover(sf, None)
    module.start()
    sf.outputEvent(module.watchedEvents())

Summary

Aquatone excels in quick, visual domain reconnaissance, making it ideal for web-focused tasks. SpiderFoot offers a more comprehensive OSINT toolkit with broader data sources and modules. Aquatone's simplicity and speed are advantageous for specific use cases, while SpiderFoot's versatility and extensive feature set make it suitable for in-depth investigations. The choice between the two depends on the specific requirements of the reconnaissance or information gathering task at hand.

11,780

In-depth attack surface mapping and asset discovery

Pros of Amass

  • More focused on DNS enumeration and network mapping
  • Highly customizable with extensive configuration options
  • Supports multiple data sources and integrations

Cons of Amass

  • Steeper learning curve due to complexity
  • Less user-friendly interface compared to SpiderFoot
  • Primarily command-line based, which may not suit all users

Code Comparison

Amass (Go):

func (e *Enumeration) executeAlterations(ctx context.Context, req *requests.DNSRequest) {
    if req == nil || req.Name == "" || e.Config.Alterations == nil {
        return
    }
    e.Config.Alterations.Gen(ctx, req.Name, e.sendAlteredName)
}

SpiderFoot (Python):

def scanName(self, name):
    if not name:
        return
    for module in self.modules:
        if module.watchedEvents() and 'DOMAIN_NAME' in module.watchedEvents():
            module.handleEvent(SpiderFootEvent("DOMAIN_NAME", name, self.__name__))

Both projects focus on information gathering and reconnaissance, but Amass specializes in DNS enumeration and network mapping, while SpiderFoot offers a broader range of OSINT capabilities. Amass provides more advanced features and customization options, making it suitable for experienced users. SpiderFoot, on the other hand, offers a more user-friendly interface and a wider array of modules, making it accessible to a broader audience. The code comparison highlights the different approaches: Amass uses Go and focuses on DNS alterations, while SpiderFoot uses Python and employs a modular event-driven architecture.

Fast passive subdomain enumeration tool.

Pros of Subfinder

  • Focused specifically on subdomain enumeration, making it more efficient for this task
  • Supports multiple data sources and APIs for comprehensive subdomain discovery
  • Faster execution time for subdomain enumeration compared to SpiderFoot

Cons of Subfinder

  • Limited to subdomain enumeration, while SpiderFoot offers a broader range of OSINT capabilities
  • Less extensive reporting and visualization features compared to SpiderFoot's web interface

Code Comparison

Subfinder (Go):

func (s *Source) Run(ctx context.Context, domain string, session *subscraping.Session) <-chan subscraping.Result {
    results := make(chan subscraping.Result)
    go func() {
        defer close(results)
        // Subdomain enumeration logic
    }()
    return results
}

SpiderFoot (Python):

def handleEvent(self, sfEvent):
    eventName = sfEvent.eventType
    srcModuleName = sfEvent.module
    eventData = sfEvent.data
    
    # Event handling and data processing logic

The code snippets highlight the different approaches: Subfinder focuses on subdomain enumeration, while SpiderFoot has a more general event-driven architecture for various OSINT tasks.

Convert Figma logo designs to code with AI

Visual Copilot

Introducing Visual Copilot: A new AI model to turn Figma designs to high quality code using your components.

Try Visual Copilot

README

License Python Version Stable Release CI status Last Commit Codecov Twitter Follow Discord

SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate.

SpiderFoot has an embedded web-server for providing a clean and intuitive web-based interface but can also be used completely via the command-line. It's written in Python 3 and MIT-licensed.

FEATURES

  • Web based UI or CLI
  • Over 200 modules (see below)
  • Python 3.7+
  • YAML-configurable correlation engine with 37 pre-defined rules
  • CSV/JSON/GEXF export
  • API key export/import
  • SQLite back-end for custom querying
  • Highly configurable
  • Fully documented
  • Visualisations
  • TOR integration for dark web searching
  • Dockerfile for Docker-based deployments
  • Can call other tools like DNSTwist, Whatweb, Nmap and CMSeeK
  • Actively developed since 2012!

WANT MORE?

Need more from SpiderFoot? Check out SpiderFoot HX for:

  • 100% Cloud-based and managed for you
  • Attack Surface Monitoring with change notifications by email, REST and Slack
  • Multiple targets per scan
  • Multi-user collaboration
  • Authenticated and 2FA
  • Investigations
  • Customer support
  • Third party tools pre-installed & configured
  • Drive it with a fully RESTful API
  • TOR integration built-in
  • Screenshotting
  • Bring your own Python SpiderFoot modules
  • Feed scan data to Splunk, ElasticSearch and REST endpoints

See the full set of differences between SpiderFoot HX and the open source version here.

USES

SpiderFoot can be used offensively (e.g. in a red team exercise or penetration test) for reconnaissance of your target or defensively to gather information about what you or your organisation might have exposed over the Internet.

You can target the following entities in a SpiderFoot scan:

  • IP address
  • Domain/sub-domain name
  • Hostname
  • Network subnet (CIDR)
  • ASN
  • E-mail address
  • Phone number
  • Username
  • Person's name
  • Bitcoin address

SpiderFoot's 200+ modules feed each other in a publisher/subscriber model to ensure maximum data extraction to do things like:

INSTALLING & RUNNING

To install and run SpiderFoot, you need at least Python 3.7 and a number of Python libraries which you can install with pip. We recommend you install a packaged release since master will often have bleeding edge features and modules that aren't fully tested.

Stable build (packaged release):

 wget https://github.com/smicallef/spiderfoot/archive/v4.0.tar.gz
 tar zxvf v4.0.tar.gz
 cd spiderfoot-4.0
 pip3 install -r requirements.txt
 python3 ./sf.py -l 127.0.0.1:5001

Development build (cloning git master branch):

 git clone https://github.com/smicallef/spiderfoot.git
 cd spiderfoot
 pip3 install -r requirements.txt
 python3 ./sf.py -l 127.0.0.1:5001

Check out the documentation and our asciinema videos for more tutorials.

COMMUNITY

Whether you're a contributor, user or just curious about SpiderFoot and OSINT in general, we'd love to have you join our community! SpiderFoot now has a Discord server for seeking help from the community, requesting features or just general OSINT chit-chat.

WRITING CORRELATION RULES

We have a comprehensive write-up and reference of the correlation rule-set introduced in SpiderFoot 4.0 here.

Also take a look at the template.yaml file for a walk through. The existing 37 rules are also quite readable and good as starting points for additional rules.

MODULES / INTEGRATIONS

SpiderFoot has over 200 modules, most of which don't require API keys, and many of those that do require API keys have a free tier.

NameDescriptionType
AbstractAPILook up domain, phone and IP address information from AbstractAPI.Tiered API
abuse.chCheck if a host/domain, IP address or netblock is malicious according to Abuse.ch.Free API
AbuseIPDBCheck if an IP address is malicious according to AbuseIPDB.com blacklist.Tiered API
Abusix Mail IntelligenceCheck if a netblock or IP address is in the Abusix Mail Intelligence blacklist.Tiered API
Account FinderLook for possible associated accounts on over 500 social and other websites such as Instagram, Reddit, etc.Internal
AdBlock CheckCheck if linked pages would be blocked by AdBlock Plus.Tiered API
AdGuard DNSCheck if a host would be blocked by AdGuard DNS.Free API
AhmiaSearch Tor 'Ahmia' search engine for mentions of the target.Free API
AlienVault IP ReputationCheck if an IP or netblock is malicious according to the AlienVault IP Reputation database.Free API
AlienVault OTXObtain information from AlienVault Open Threat Exchange (OTX)Tiered API
Amazon S3 Bucket FinderSearch for potential Amazon S3 buckets associated with the target and attempt to list their contents.Free API
Apple iTunesSearch Apple iTunes for mobile apps.Free API
Archive.orgIdentifies historic versions of interesting files/pages from the Wayback Machine.Free API
ARINQueries ARIN registry for contact information.Free API
Azure Blob FinderSearch for potential Azure blobs associated with the target and attempt to list their contents.Free API
Base64 DecoderIdentify Base64-encoded strings in URLs, often revealing interesting hidden information.Internal
BGPViewObtain network information from BGPView API.Free API
Binary String ExtractorAttempt to identify strings in binary content.Internal
BinaryEdgeObtain information from BinaryEdge.io Internet scanning systems, including breaches, vulnerabilities, torrents and passive DNS.Tiered API
Bing (Shared IPs)Search Bing for hosts sharing the same IP.Tiered API
BingObtain information from bing to identify sub-domains and links.Tiered API
Bitcoin FinderIdentify bitcoin addresses in scraped webpages.Internal
Bitcoin Who's WhoCheck for Bitcoin addresses against the Bitcoin Who's Who database of suspect/malicious addresses.Tiered API
BitcoinAbuseCheck Bitcoin addresses against the bitcoinabuse.com database of suspect/malicious addresses.Free API
BlockchainQueries blockchain.info to find the balance of identified bitcoin wallet addresses.Free API
blocklist.deCheck if a netblock or IP is malicious according to blocklist.de.Free API
BotScoutSearches BotScout.com's database of spam-bot IP addresses and e-mail addresses.Tiered API
botvrij.euCheck if a domain is malicious according to botvrij.eu.Free API
BuiltWithQuery BuiltWith.com's Domain API for information about your target's web technology stack, e-mail addresses and more.Tiered API
C99Queries the C99 API which offers various data (geo location, proxy detection, phone lookup, etc).Commercial API
CallerNameLookup US phone number location and reputation information.Free API
CensysObtain host information from Censys.io.Tiered API
Certificate TransparencyGather hostnames from historical certificates in crt.sh.Free API
CertSpotterGather information about SSL certificates from SSLMate CertSpotter API.Tiered API
CINS Army ListCheck if a netblock or IP address is malicious according to Collective Intelligence Network Security (CINS) Army list.Free API
CIRCL.LUObtain information from CIRCL.LU's Passive DNS and Passive SSL databases.Free API
CleanBrowsing.orgCheck if a host would be blocked by CleanBrowsing.org DNS content filters.Free API
CleanTalk Spam ListCheck if a netblock or IP address is on CleanTalk.org's spam IP list.Free API
ClearbitCheck for names, addresses, domains and more based on lookups of e-mail addresses on clearbit.com.Tiered API
CloudFlare DNSCheck if a host would be blocked by CloudFlare DNS.Free API
CoinBlocker ListsCheck if a domain appears on CoinBlocker lists.Free API
CommonCrawlSearches for URLs found through CommonCrawl.org.Free API
Comodo Secure DNSCheck if a host would be blocked by Comodo Secure DNS.Tiered API
Company Name ExtractorIdentify company names in any obtained data.Internal
Cookie ExtractorExtract Cookies from HTTP headers.Internal
Country Name ExtractorIdentify country names in any obtained data.Internal
Credit Card Number ExtractorIdentify Credit Card Numbers in any dataInternal
Crobat APISearch Crobat API for subdomains.Free API
Cross-ReferencerIdentify whether other domains are associated ('Affiliates') of the target by looking for links back to the target site(s).Internal
CRXcavatorSearch CRXcavator for Chrome extensions.Free API
Custom Threat FeedCheck if a host/domain, netblock, ASN or IP is malicious according to your custom feed.Internal
CyberCrime-Tracker.netCheck if a host/domain or IP address is malicious according to CyberCrime-Tracker.net.Free API
DebounceCheck whether an email is disposableFree API
DehashedGather breach data from Dehashed API.Commercial API
Digital Ocean Space FinderSearch for potential Digital Ocean Spaces associated with the target and attempt to list their contents.Free API
DNS Brute-forcerAttempts to identify hostnames through brute-forcing common names and iterations.Internal
DNS Common SRVAttempts to identify hostnames through brute-forcing common DNS SRV records.Internal
DNS for FamilyCheck if a host would be blocked by DNS for Family.Free API
DNS Look-asideAttempt to reverse-resolve the IP addresses next to your target to see if they are related.Internal
DNS Raw RecordsRetrieves raw DNS records such as MX, TXT and others.Internal
DNS ResolverResolves hosts and IP addresses identified, also extracted from raw content.Internal
DNS Zone TransferAttempts to perform a full DNS zone transfer.Internal
DNSDBQuery FarSight's DNSDB for historical and passive DNS data.Tiered API
DNSDumpsterPassive subdomain enumeration using HackerTarget's DNSDumpsterFree API
DNSGrepObtain Passive DNS information from Rapid7 Sonar Project using DNSGrep API.Free API
DroneBLQuery the DroneBL database for open relays, open proxies, vulnerable servers, etc.Free API
DuckDuckGoQuery DuckDuckGo's API for descriptive information about your target.Free API
E-Mail Address ExtractorIdentify e-mail addresses in any obtained data.Internal
EmailCrawlrSearch EmailCrawlr for email addresses and phone numbers associated with a domain.Tiered API
EmailFormatLook up e-mail addresses on email-format.com.Free API
EmailRepSearch EmailRep.io for email address reputation.Tiered API
Emerging ThreatsCheck if a netblock or IP address is malicious according to EmergingThreats.net.Free API
Error String ExtractorIdentify common error messages in content like SQL errors, etc.Internal
Ethereum Address ExtractorIdentify ethereum addresses in scraped webpages.Internal
EtherscanQueries etherscan.io to find the balance of identified ethereum wallet addresses.Free API
File Metadata ExtractorExtracts meta data from documents and images.Internal
FlickrSearch Flickr for domains, URLs and emails related to the specified domain.Free API
FocsecLook up IP address information from Focsec.Tiered API
FortiGuard AntispamCheck if an IP address is malicious according to FortiGuard Antispam.Free API
FraudguardObtain threat information from Fraudguard.ioTiered API
F-Secure Riddler.ioObtain network information from F-Secure Riddler.io API.Commercial API
FullContactGather domain and e-mail information from FullContact.com API.Tiered API
FullHuntIdentify domain attack surface using FullHunt API.Tiered API
GithubIdentify associated public code repositories on Github.Free API
GLEIFLook up company information from Global Legal Entity Identifier Foundation (GLEIF).Tiered API
Google MapsIdentifies potential physical addresses and latitude/longitude coordinates.Tiered API
Google Object Storage FinderSearch for potential Google Object Storage buckets associated with the target and attempt to list their contents.Free API
Google SafeBrowsingCheck if the URL is included on any of the Safe Browsing lists.Free API
GoogleObtain information from the Google Custom Search API to identify sub-domains and links.Tiered API
GravatarRetrieve user information from Gravatar API.Free API
Grayhat WarfareFind bucket names matching the keyword extracted from a domain from Grayhat API.Tiered API
GreensnowCheck if a netblock or IP address is malicious according to greensnow.co.Free API
grep.appSearch grep.app API for links and emails related to the specified domain.Free API
GreyNoise CommunityObtain IP enrichment data from GreyNoise Community APITiered API
GreyNoiseObtain IP enrichment data from GreyNoiseTiered API
HackerOne (Unofficial)Check external vulnerability scanning/reporting service h1.nobbd.de to see if the target is listed.Free API
HackerTargetSearch HackerTarget.com for hosts sharing the same IP.Free API
Hash ExtractorIdentify MD5 and SHA hashes in web content, files and more.Internal
HaveIBeenPwnedCheck HaveIBeenPwned.com for hacked e-mail addresses identified in breaches.Commercial API
Hosting Provider IdentifierFind out if any IP addresses identified fall within known 3rd party hosting ranges, e.g. Amazon, Azure, etc.Internal
Host.ioObtain information about domain names from host.io.Tiered API
Human Name ExtractorAttempt to identify human names in fetched content.Internal
Hunter.ioCheck for e-mail addresses and names on hunter.io.Tiered API
Hybrid AnalysisSearch Hybrid Analysis for domains and URLs related to the target.Free API
IBAN Number ExtractorIdentify International Bank Account Numbers (IBANs) in any data.Internal
Iknowwhatyoudownload.comCheck iknowwhatyoudownload.com for IP addresses that have been using torrents.Tiered API
IntelligenceXObtain information from IntelligenceX about identified IP addresses, domains, e-mail addresses and phone numbers.Tiered API
Interesting File FinderIdentifies potential files of interest, e.g. office documents, zip files.Internal
Internet Storm CenterCheck if an IP address is malicious according to SANS ISC.Free API
ipapi.coQueries ipapi.co to identify geolocation of IP Addresses using ipapi.co APITiered API
ipapi.comQueries ipapi.com to identify geolocation of IP Addresses using ipapi.com APITiered API
IPInfo.ioIdentifies the physical location of IP addresses identified using ipinfo.io.Tiered API
IPQualityScoreDetermine if target is malicious using IPQualityScore APITiered API
ipregistryQuery the ipregistry.co database for reputation and geo-location.Tiered API
ipstackIdentifies the physical location of IP addresses identified using ipstack.com.Tiered API
JsonWHOIS.comSearch JsonWHOIS.com for WHOIS records associated with a domain.Tiered API
Junk File FinderLooks for old/temporary and other similar files.Internal
KeybaseObtain additional information about domain names and identified usernames.Free API
KoodousSearch Koodous for mobile apps.Tiered API
LeakIXSearch LeakIX for host data leaks, open ports, software and geoip.Free API
Leak-LookupSearches Leak-Lookup.com's database of breaches.Free API
MaltiverseObtain information about any malicious activities involving IP addressesFree API
MalwarePatrolSearches malwarepatrol.net's database of malicious URLs/IPs.Tiered API
MetaDefenderSearch MetaDefender API for IP address and domain IP reputation.Tiered API
Mnemonic PassiveDNSObtain Passive DNS information from PassiveDNS.mnemonic.no.Free API
multiproxy.org Open ProxiesCheck if an IP address is an open proxy according to multiproxy.org open proxy list.Free API
MySpaceGather username and location from MySpace.com profiles.Free API
NameAPICheck whether an email is disposableTiered API
NetworksDBSearch NetworksDB.io API for IP address and domain information.Tiered API
NeutrinoAPISearch NeutrinoAPI for phone location information, IP address information, and host reputation.Tiered API
numverifyLookup phone number location and carrier information from numverify.com.Tiered API
Onion.linkSearch Tor 'Onion City' search engine for mentions of the target domain using Google Custom Search.Free API
Onionsearchengine.comSearch Tor onionsearchengine.com for mentions of the target domain.Free API
OnypheCheck Onyphe data (threat list, geo-location, pastries, vulnerabilities) about a given IP.Tiered API
Open Bug BountyCheck external vulnerability scanning/reporting service openbugbounty.org to see if the target is listed.Free API
OpenCorporatesLook up company information from OpenCorporates.Tiered API
OpenDNSCheck if a host would be blocked by OpenDNS.Free API
OpenNIC DNSResolves host names in the OpenNIC alternative DNS system.Free API
OpenPhishCheck if a host/domain is malicious according to OpenPhish.com.Free API
OpenStreetMapRetrieves latitude/longitude coordinates for physical addresses from OpenStreetMap API.Free API
Page InformationObtain information about web pages (do they take passwords, do they contain forms, etc.)Internal
PasteBinPasteBin search (via Google Search API) to identify related content.Tiered API
PGP Key ServersLook up domains and e-mail addresses in PGP public key servers.Internal
PhishStatsCheck if a netblock or IP address is malicious according to PhishStats.Free API
PhishTankCheck if a host/domain is malicious according to PhishTank.Free API
Phone Number ExtractorIdentify phone numbers in scraped webpages.Internal
Port Scanner - TCPScans for commonly open TCP ports on Internet-facing systems.Internal
Project Honey PotQuery the Project Honey Pot database for IP addresses.Free API
ProjectDiscovery ChaosSearch for hosts/subdomains using chaos.projectdiscovery.ioCommercial API
PsbdmpCheck psbdmp.cc (PasteBin Dump) for potentially hacked e-mails and domains.Free API
PulsediveObtain information from Pulsedive's API.Tiered API
PunkSpiderCheck the QOMPLX punkspider.io service to see if the target is listed as vulnerable.Free API
Quad9Check if a host would be blocked by Quad9 DNS.Free API
ReverseWhoisReverse Whois lookups using reversewhois.io.Free API
RIPEQueries the RIPE registry (includes ARIN data) to identify netblocks and other info.Free API
RiskIQObtain information from RiskIQ's (formerly PassiveTotal) Passive DNS and Passive SSL databases.Tiered API
RobtexSearch Robtex.com for hosts sharing the same IP.Free API
searchcodeSearch searchcode for code repositories mentioning the target domain.Free API
SecurityTrailsObtain Passive DNS and other information from SecurityTrailsTiered API
SeonQueries seon.io to gather intelligence about IP Addresses, email addresses, and phone numbersCommercial API
SHODANObtain information from SHODAN about identified IP addresses.Tiered API
Similar Domain FinderSearch various sources to identify similar looking domain names, for instance squatted domains.Internal
SkymemLook up e-mail addresses on Skymem.Free API
SlideShareGather name and location from SlideShare profiles.Free API
SnovGather available email IDs from identified domainsTiered API
Social LinksQueries SocialLinks.io to gather intelligence from social media platforms and dark web.Commercial API
Social Media Profile FinderTries to discover the social media profiles for human names identified.Tiered API
Social Network IdentifierIdentify presence on social media networks such as LinkedIn, Twitter and others.Internal
SORBSQuery the SORBS database for open relays, open proxies, vulnerable servers, etc.Free API
SpamCopCheck if a netblock or IP address is in the SpamCop database.Free API
Spamhaus ZenCheck if a netblock or IP address is in the Spamhaus Zen database.Free API
spur.usObtain information about any malicious activities involving IP addresses foundCommercial API
SpyOnWebSearch SpyOnWeb for hosts sharing the same IP address, Google Analytics code, or Google Adsense code.Tiered API
SSL Certificate AnalyzerGather information about SSL certificates used by the target's HTTPS sites.Internal
StackOverflowSearch StackOverflow for any mentions of a target domain. Returns potentially related information.Tiered API
Steven Black HostsCheck if a domain is malicious (malware or adware) according to Steven Black Hosts list.Free API
Strange Header IdentifierObtain non-standard HTTP headers returned by web servers.Internal
Subdomain Takeover CheckerCheck if affiliated subdomains are vulnerable to takeover.Internal
Sublist3r PassiveDNSPassive subdomain enumeration using Sublist3r's APIFree API
SURBLCheck if a netblock, IP address or domain is in the SURBL blacklist.Free API
Talos IntelligenceCheck if a netblock or IP address is malicious according to TalosIntelligence.Free API
TextMagicObtain phone number type from TextMagic APITiered API
Threat JammerCheck if an IP address is malicious according to ThreatJammer.comTiered API
ThreatCrowdObtain information from ThreatCrowd about identified IP addresses, domains and e-mail addresses.Free API
ThreatFoxCheck if an IP address is malicious according to ThreatFox.Free API
ThreatMinerObtain information from ThreatMiner's database for passive DNS and threat intelligence.Free API
TLD SearcherSearch all Internet TLDs for domains with the same name as the target (this can be very slow.)Internal
Tool - CMSeeKIdentify what Content Management System (CMS) might be used.Tool
Tool - DNSTwistIdentify bit-squatting, typo and other similar domains to the target using a local DNSTwist installation.Tool
Tool - nbtscanScans for open NETBIOS nameservers on your target's network.Tool
Tool - NmapIdentify what Operating System might be used.Tool
Tool - NucleiFast and customisable vulnerability scanner.Tool
Tool - onesixtyoneFast scanner to find publicly exposed SNMP services.Tool
Tool - Retire.jsScanner detecting the use of JavaScript libraries with known vulnerabilitiesTool
Tool - snallygasterFinds file leaks and other security problems on HTTP servers.Tool
Tool - testssl.shIdentify various TLS/SSL weaknesses, including Heartbleed, CRIME and ROBOT.Tool
Tool - TruffleHogSearches through git repositories for high entropy strings and secrets, digging deep into commit history.Tool
Tool - WAFW00FIdentify what web application firewall (WAF) is in use on the specified website.Tool
Tool - WappalyzerWappalyzer indentifies technologies on websites.Tool
Tool - WhatWebIdentify what software is in use on the specified website.Tool
TOR Exit NodesCheck if an IP adddress or netblock appears on the Tor Metrics exit node list.Free API
TORCHSearch Tor 'TORCH' search engine for mentions of the target domain.Free API
TrashpandaQueries Trashpanda to gather intelligence about mentions of target in pastesitesTiered API
TrumailCheck whether an email is disposableFree API
TwilioObtain information from Twilio about phone numbers. Ensure you have the Caller Name add-on installed in Twilio.Tiered API
TwitterGather name and location from Twitter profiles.Free API
UCEPROTECTCheck if a netblock or IP address is in the UCEPROTECT database.Free API
URLScan.ioSearch URLScan.io cache for domain information.Free API
VenmoGather user information from Venmo API.Free API
ViewDNS.infoIdentify co-hosted websites and perform reverse Whois lookups using ViewDNS.info.Tiered API
VirusTotalObtain information from VirusTotal about identified IP addresses.Tiered API
VoIP Blacklist (VoIPBL)Check if an IP address or netblock is malicious according to VoIP Blacklist (VoIPBL).Free API
VXVault.netCheck if a domain or IP address is malicious according to VXVault.net.Free API
Web Analytics ExtractorIdentify web analytics IDs in scraped webpages and DNS TXT records.Internal
Web Framework IdentifierIdentify the usage of popular web frameworks like jQuery, YUI and others.Internal
Web Server IdentifierObtain web server banners to identify versions of web servers being used.Internal
Web SpiderSpidering of web-pages to extract content for searching.Internal
WhatCMSCheck web technology using WhatCMS.org API.Tiered API
WhoisologyReverse Whois lookups using Whoisology.com.Commercial API
WhoisPerform a WHOIS look-up on domain names and owned netblocks.Internal
WhoxyReverse Whois lookups using Whoxy.com.Commercial API
WiGLEQuery WiGLE to identify nearby WiFi access points.Free API
WikileaksSearch Wikileaks for mentions of domain names and e-mail addresses.Free API
Wikipedia EditsIdentify edits to Wikipedia articles made from a given IP address or username.Free API
XForce ExchangeObtain IP reputation and passive DNS information from IBM X-Force Exchange.Tiered API
Yandex DNSCheck if a host would be blocked by Yandex DNS.Free API
ZetalyticsQuery the Zetalytics database for hosts on your target domain(s).Tiered API
ZoneFile.ioSearch ZoneFiles.io Domain query API for domain information.Tiered API
Zone-H Defacement CheckCheck if a hostname/domain appears on the zone-h.org 'special defacements' RSS feed.Free API

DOCUMENTATION

Read more at the project website, including more complete documentation, blog posts with tutorials/guides, plus information about SpiderFoot HX.

Latest updates announced on Twitter.