r/osinttools

GitHub has a serious fake engagement problem and I wanted to see how visible it actually is through the public API, its worse than I thought after I went down that rabbit hole...
▲ 238 r/osinttools+16 crossposts

GitHub has a serious fake engagement problem and I wanted to see how visible it actually is through the public API, its worse than I thought after I went down that rabbit hole...

Turns out: very visible. Yesterday's scan found 185 out of 185 engagers on a single repo were bots. Not 90%. Not "mostly suspicious". Every single one. The repo had zero legitimate stars.

What I built

phantomstars is a Python tool that runs daily via GitHub Actions (free, no servers):

  1. Scrapes GitHub Trending and searches for repos created in the last 7 days with sudden star spikes
  2. Pulls star and fork events from the last 24 hours per repo
  3. Bulk-fetches every engager's profile via the GraphQL API (account creation date, follower counts, repo history)
  4. Scores each account on a weighted model: account age (35%), profile completeness (30%), repo patterns (25%), activity history (10%)
  5. Detects coordinated campaigns using timestamp clustering and union-find: groups of 4+ suspicious accounts that engaged within a 3-hour window
  6. Files an issue directly on the targeted repo so the maintainer knows what's happening

Campaign IDs are deterministic SHA-256 fingerprints of the sorted member set, so the same group of bots gets the same ID across runs. You can track a farm across multiple days even as individual accounts get suspended.

What the pattern actually looks like

It's remarkably consistent. A fake engagement campaign in the raw data:

  • 40-200 accounts, all created within the same 1-2 week window
  • Zero original repositories, or only forks they never touched
  • No bio, no location, no followers, no following
  • All of them starring the same repo within a 90-minute window
  • The target repo usually has a name implying it's a tool, hack, executor, or generator

Today's scan: 53 active campaigns across 3,560 accounts profiled. 798 classified as likely_fake. The repos being targeted are mostly low-quality AI tools and "executor" software that needs manufactured credibility fast.

Notifying the affected repo

When a repo hits a 40%+ fake engagement ratio or a campaign is detected, phantomstars opens an issue on that repo with the full suspect table: account logins, creation dates, composite scores, campaign membership. The maintainer sees it in their own issue tracker without having to find this project first.

Worth noting: a lot of these repos have issues disabled, which is a red flag on its own. Those get skipped silently.

Why I built this

Stars are how developers decide what to evaluate, what to depend on, what to recommend. When that signal is bought, it affects real decisions downstream. This started as curiosity about how measurable the problem was. The answer was more measurable than I expected.

It's part of broader research into AI slop distribution at JS Labs: https://labs.jamessawyer.co.uk/ai-slop-intelligence-dashboards/

The fake engagement problem and the AI content quality problem are really the same problem. Fake stars are the distribution layer that gets garbage in front of real users.

All open source. The data is append-only JSONL committed back to the repo after every run, queryable with jq.

Repo: https://github.com/tg12/phantomstars

Findings are probabilistic, false positives exist, the README explains the full scoring model. If your account shows up and you're a real person, there's a false positive process.

Questions welcome on the detection approach, GraphQL batching, or campaign ID stability.

github.com
u/SyntaxOfTheDamned — 23 hours ago
▲ 58 r/osinttools+5 crossposts

I built a free alternative to Epieos [pip install mailaccess]

Tired of paying $99/month for email OSINT. Built my own.

Checks 800+ platforms, breach exposure, infostealer logs, DNS/WHOIS, the works. But the part I'm actually proud of: instead of dumping a raw hit list, it builds an identity graph and tells you *why* something is high confidence, shared username, same avatar, matching display name across platforms. No other free tool does this.

Exports to STIX 2.1, Maltego, JSON, PDF. Pipeline-ready too.

pip install mailaccess

mailaccess investigate email@example.com

https://github.com/KatrielMoses/MailAccess

fully open source, happy to answer questions.

u/LockInternational893 — 23 hours ago
▲ 1 r/osinttools+2 crossposts

I made a tool to aggregate public permit data from Los Angeles

Here is my issue, I can't connect a name and phone number to an address without creating a paid account through Property Radar or some other tool.
My goal is to have as much information as I can get about homeowners including name, phone and email so I can call the homeowner and pitch a free consultation for my friends electrical company.
I can dork the info with google but it takes too much time to make the list and it isn't organized
Anybody has any creative solutions?

reddit.com
u/Do0r2 — 1 day ago

I built a tool to preserve online evidence before it gets deleted or edited, creating a permanent, tamper-proof record

Hi everyone,

I wanted to share a tool I've been working on that might be useful for your investigation and archiving workflows.

When you're doing OSINT work or digital journalism, one of the biggest headaches is source volatility. You find a crucial post, or a social media thread, and you take a screenshot. But hours or days later, the owner deletes the page, edits the text, or the site goes down entirely. If someone challenges your findings, a standard image file doesn't offer much backing because there is no independent proof of when or how it was actually captured.

To help solve this, I built VouchShot.

It is a Chrome extension that preserves webpages as tamper-evident screenshots.

What makes it different from a standard screenshot tool is that it automatically stamps a clear verification badge directly onto the captured image. The badge says "verified capture" and includes a unique QR code. If you share that screenshot in a report, on social media, or with a client, anyone can scan the QR code to verify the exact capture timestamp and metadata. Here is an example.

About pricing: I want to be completely transparent. VouchShot is currently a paid tool because of the server, AI analysis, and database costs associated with analyzing page mutations and hosting the permanent public proof portal. However, there is a free plan that gives you 10 captures every month. I designed this specifically so that casual researchers or people doing occasional investigations can use it without having to pay anything.

I would love to get your thoughts on this approach. Do you see a tool like this being useful for your research workflows, or are there specific features you think would make it more valuable for OSINT investigations?

Thanks

reddit.com
u/Perfect_Value_3978 — 1 day ago
▲ 1.1k r/osinttools+3 crossposts

Open Source Palantir on Git

Open Source Palantir

We're building OSIRIS - The Open-Source Palantir Alternative

Feel free to Pull Request the team will review and merge if applicable 🙏

Just launched at osirisai.live - a free, open-source global intelligence platform:

-Real-Time Tracking:

-10,000+ commercial, military and private aircraft live on a 3D globe

- 2,000+ satellites including ISS

- 1,400+ worldwide CCTV camera feeds

- Earthquakes, wildfires, nuclear facilities and severe weather

Built-In OSINT Tools (no installs needed):

Nmap port scanning from the browser

- DNS record lookup and enumeration

- WHOIS domain intelligence

- SSL/TLS certificate transparency

- BGP routing and ASN lookup

- Threat intelligence and IP reputation

All running on a 3D interactive globe with day/night cycle, 20+ live API feeds, and a SIGINT news aggregator.

Live: https://osirisai.live

GitHub: https://github.com/simplifaisoul/osiris

Free. Open Source. No sign-up required.

u/Gold-Comfortable-340 — 3 days ago

Is reverse searching email/phone number possible?

I want to reverse search my email and my phone number if it actually expose my identity, is this possible?

reddit.com
u/krsnt8 — 3 days ago

[OC] Free OSINT Mapping Tool

I made an open source OSINT mapping tool. It includes a node based system for linking and keeping track of information as well. There is a free OpenStreetMaps option for the map. Or if you want you can use the Google Map option which requires a Google Maps API key.

Go check it out:

https://github.com/anonymousRAID/OSINT-Mapping-Tool/

Edit: I forgot to mention that it's all local and web based. Nothing is stored on a cloud and all you need is a web browser and internet connection to get it working. Meaning it's accessible on every OS that supports a desktop.

u/Patient-Economy1454 — 3 days ago

So many people are claiming to be something they are not

In a time when everyone claims to be an expert at something to sell people on 'hopeium', I created an open-source tool that allows OSINT analysts, journalists, and researchers, and anyone who might be curious, to trace public claims back to preserved source evidence.

It's called ClaimTrace, and I hope it's the beginning of the end of exaggerated claims going unchecked without public evidence and proper due diligence.

Feel free to build on top of it and make your own protocol engine or contribute to this one to make it better.

https://github.com/machinesoul11/ClaimTrace

u/Global-Tradition-318 — 3 days ago
▲ 23 r/osinttools+7 crossposts

VoidAccess v1.3, dark web OSINT platform, significant update

v1.0 extracted entities from Tor. v1.3 adds IP reputation

(Feodo/C2IntelFeeds/AbuseIPDB), GreyNoise scanner suppression,

domain pipeline (crt.sh cert transparency, URLScan, Wayback),

hash behavioral analysis via Hybrid Analysis, email breach history

via HIBP, paste sites, GitHub/GitLab scraping, 20 security RSS

feeds, CIRCL passive DNS, infrastructure cluster detection.

the STIX/MISP/Sigma exports were broken in v1.0 (empty bundles).

fixed in v1.1.

https://github.com/KatrielMoses/voidaccess

u/LockInternational893 — 3 days ago
▲ 18 r/osinttools+4 crossposts

SeekYou, unified host intelligence across 15 sources

SeekYou – unified host intelligence across 15 sources, runs free on Cloudflare.
- Built a tool that takes any IP, domain, or ASN and queries 15 sources in parallel: open ports, CVEs, BGP, RDAP, cert history, passive DNS, 5 threat feeds, exposed buckets, Wayback snapshots — all in one report.
- 4-layer parallel execution (total time ≈ slowest source, not sum of all).
- KV caching per source, circuit breakers, per-IP rate limiting.
- Typed diff engine — get alerted when ports open, CVEs appear, or certs expire on monitored hosts.
- Runs entirely on Cloudflare free tier (~5k lookups/day).
Source: https://github.com/Teycir/SeekYou (https://github.com/Teycir/SeekYou)

u/tcoder7 — 3 days ago

will this post get deleted ?

I want to know a good platform to hire an osint expert. Do i break any rules for posting this ? A similar post i had was disabled by mods but i dont know what im doing wrong. What is the rule im braking ?

reddit.com
u/Specialist-tipi — 3 days ago

Has anyone determined which AI chatbot is the best 'OSINT assistant'?

For example getting it to suggest possibilities based on the data you give it, or getting it to geolocate an image, etc.

I'm just wondering if there's one that's better than the others.

reddit.com
u/TaxHegemony — 4 days ago
▲ 7 r/osinttools+5 crossposts

Response to Feedback: "I built a geopolitical intelligence aggregator that monitors 641 sources and clusters events with auditable confidence scoring"

https://panopsik.com/

Eight days ago, I posted this project Panopsik here and got some of the most useful feedback I've received since starting it. Thank you genuinely. The kind of criticism this sub gave would cost serious money from a consultant and you gave it for free.

I want to address the main points directly rather than just saying "we listened."

Basically...  you were right on almost everything. The event points were showing too little to be actionable, the intelligence assessments were AI-generated noise that wouldn't survive five seconds with a real analyst, and the related articles were embarrassingly off-topic. These have been the priority this week.

What's changed:

  • Added a landing page.
  • Broke down the main dashboard into multiple lighter dashboards.
  • Fixed a mountain of imperfections.
  • Added the infrastructure layer.
  • Currently in the process of allowing users to create their own dashboards depending on what information they want.

What's new:

You can now create an account. This lets you save searches, set alert thresholds for specific regions, and track how situations develop over time rather than getting a snapshot. It also means we can start understanding how people actually use this, which will drive what we fix next.

Still rough: clustering confidence on lower-tier sources, multilingual support, Southeast Asia coverage. We know.

If you tested it last week and wrote it off... fair. Come back and tell us if it's any better. If you haven't looked yet, now's a better time than eight days ago.

u/Ben_C17 — 4 days ago
▲ 4 r/osinttools+2 crossposts

BlindSite High Risk Investigations Platform and Forensic Browser

Free and open source. Anyone who contributes to the code is awarded cryptocurrency on our site. Currently our site is down for maintenance, but it will be back up in a few days. Let’s work together and change the world.

github.com
u/Fun_Telephone_8050 — 4 days ago

UserScanner v1.3.6 One of the Most Advanced Free Email OSINT Tools of 2026

GitHub: https://github.com/kaifcodec/user-scanner Hi everyone,

I’m one of the maintainers of user-scanner.

We started building this project around 7 months ago because many classic OSINT tools like became outdated or unmaintained, and there weren’t many solid free options left for email OSINT.

Since then, we’ve been adding sites one by one, continuously improving detection accuracy and maintaining support for platforms that frequently change their APIs and flows.

Today, user-scanner has grown into one of the most actively maintained free Email OSINT tools in 2026. While many web-based alternatives lock basic scans behind paywalls, our goal is to keep powerful email enumeration accessible to the open-source community.

Contributors are always welcome. Adding new sites is relatively straightforward, and even small contributions help a lot.

If you’re interested in OSINT, Python, scraping, automation, or just open-source projects in general, feel free to contribute and help improve the tool.

u/Then_Pace_5034 — 6 days ago

A publicly available AI tool that can find the locations of images.

Tool is Called GeoAxis AI, seems to be on the level of GeoSpy's, but its actually available to the public to use

u/Similar-Isopod5490 — 5 days ago

Botnet Mapping & Attack Pattern recognition- SpiderDox

https://spiderdox.com/

Hey there - I’m a backend engineer for the NetSec sector, and this is my pet project I’ve been on&off with for a couple years. I have a dozen or so custom sensors deployed globally, collecting data from “spiders”, scanners, botnets, script kiddies, and AI actors.

It all started because I was looking at GreyNoise.. and I realized I was detecting things were *obviously* malicious on my (at the time) singular sensor, that GN wasn’t reporting!

I realized I could stream live events from a distributed network, and do real-time interpretation myself.
To this day, I still capture novel IPs weeks before GreyNoise associates them with anything.

While the sensors are basic (they only collect HTTP and HTTPS), through time I’ve played with a bunch of different ways to extract useful context from them.

Most recently I’ve added the “groups” view, which aggregates and analyzes all the events at-scale, placing IPs into groups of semantically similar events.. allowing the view of groups, inter-connected patterns, and the occasional association with CVEs.

The project isn’t perfect, but someone mentioned I should share it here. The point is to make this data publicly available, so I guess it makes sense.

You can check out the main portal at
https://spiderdox.com

And if you want the API docs, its at
https://api.spiderdox.com/docs

(Auth is broken, so sorry about that, but you shouldnt need it)

The dataset is limited in various ways in what you can pull from it historically, but you’ll always be able to pull todays data - either the raw events, the unique IPs, or the groups.

Anyways, enjoy! Let me know if you find something interesting :)

u/aman2454 — 5 days ago