SpiderFoot is a reconnaissance tool that automatically queries over 100 public data sources (OSINT) to gather intelligence on IP addresses, domain names, e-mail addresses, names and more. You simply specify the target you want to investigate, pick which modules to enable and then SpiderFoot will collect data to build up an understanding of all the entities and how they relate to each other.
OSINT (Open Source Intelligence) is data available in the public domain which might reveal interesting information about your target. This includes DNS, Whois, Web pages, passive DNS, spam blacklists, file meta data, threat intelligence lists as well as services like SHODAN, HaveIBeenPwned? and more. See the full list of data sources SpiderFoot utilises.
The data returned from a SpiderFoot scan will reveal a lot of information about your target, providing insight into possible data leaks, vulnerabilities or other sensitive information that can be leveraged during a penetration test, red team exercise or for threat intelligence. Try it out against your own network to see what you might have exposed!
Written in Python and hosted on Github.
Has both an interactive web-based interface or a powerful command-line interface.
A growing list of modules that extract data from different OSINT sources and perform analysis.
Thanks to Python, run it virtually anywhere.
Rich, interactive visualisations in your browser.
Installation, usage and writing modules for SpiderFoot is fully documented.
Finely tune what data to collect and how.
Want a cloud-hosted solution with more functionality? Check out SpiderFoot HX.