Initial attack vectors for recon usually involve utilizing pay-for-data/API (Recon-NG), or paying to utilize transforms (Maltego) to get data mining results. Skiptracer utilizes some basic python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget.
$ docker run -it --name skiptracer xshuden/skiptracer
OR
$ docker run --rm -it --name skiptracer xshuden/skiptracer # container is deleted when you're done
$ git clone https://github.com/xillwillx/skiptracer.git skiptracer
$ cd skiptracer
Install requirements
$ pip install -r requirements.txt
Run
$ python skiptracer.py
Full details on how to use Skiptracer are on the wiki located here
Skiptracer is intedned to be a community driven application. If you are interested in helping out drop us a note.
- Finish converting to Python3 - Py2 EoL is 1/1/20
- Add more API support
- More Options from other countries so not so U.S.-centric results
- Bypass some of the methods being used to block scapers, i.e. headless selenium
- Ideas?