Most OSINT workflows look the same.
holehe → copy username → sherlock → browser for HIBP → WHOIS tab → take notes → repeat.
Every tool is a silo. Every pivot is manual.
I built OpenOSINT to fix that.
You type a target. The agent chains the tools, pivots on what it finds, and saves a structured report. No manual switching.
9 tools out of the box: holehe, sherlock (300+ platforms), HaveIBeenPwned, WHOIS, ipinfo, sublist3r, phoneinfoga, Pastebin dumps, Google dorks.
The key design decision: uses Anthropic's native tool use API so the model never generates tool results — it only reads real output from real binaries. Hallucination is structurally impossible.
Also ships as an MCP server for Claude Code / Claude Desktop. Supports Ollama for local models — no API key required.
MIT license. Python 3.10+. Authorized use only.

Top comments (0)