Skip to content

A comprehensive OSINT and media analysis toolkit curated by 516 Hackers for digital investigations, social media intelligence, and forensic analysis.

License

Notifications You must be signed in to change notification settings

516hackers/516-Digital-Investigation-Tools

πŸ” 516 Digital Investigation Tools

516 Hackers Python License Version Platform OSINT Forensics

A comprehensive digital investigation and OSINT toolkit designed for cybersecurity professionals, researchers, and ethical hackers. Perform advanced digital investigations with our all-in-one command-line interface and Python API.

πŸš€ Quick Start

Prerequisites

  • Python 3.8 or higher
  • pip (Python package manager)
  • Git

Installation

# Clone the repository
git clone https://github.com/516hackers/516-Digital-Investigation-Tools.git
cd 516-Digital-Investigation-Tools

# Install dependencies
pip install -r requirements.txt

# Install the package
pip install -e .

Verify Installation

# Test installation
python -m pytest tests/

# Run basic examples
python examples/basic_usage.py

πŸ› οΈ Available Tools

Tool Command Description
πŸ” Username Investigation investigate516 Search across 50+ social media platforms
πŸ“Έ Instagram Analysis ig516 Extract and analyze Instagram profile data
πŸ–ΌοΈ Image Metadata Analysis meta516 Analyze and clean image EXIF metadata
πŸ”¬ Image Forensics image516 Image similarity detection and comparison
🌐 Social Media Mapping social516 Cross-platform social media presence mapping
πŸ“§ Email Intelligence email516 Email validation and pattern analysis
🌍 Domain Research domain516 WHOIS lookup, DNS analysis, and HTTP inspection
πŸ“Š Report Generator report516 Unified report generation in multiple formats

🎯 Usage Guide

Method 1: Interactive Hacker Interface (Recommended)

# Run the interactive menu
chmod +x 516-investigator.sh
./516-investigator.sh
image

Method 2: Command Line Tools

# Username investigation
investigate516 username

# Instagram profile analysis
ig516 instagram_username

# Image metadata analysis
meta516 image.jpg

# Domain research
domain516 example.com

# Email analysis
email516 [email protected]

# Generate reports
report516

Method 3: Python API

from scripts import Sherlock516, Instagram516, MetadataAnalyzer516

# Username investigation
investigator = Sherlock516("target_user")
investigator.check_standard_sites()
results = investigator.save_results()

# Instagram analysis
ig = Instagram516()
profile_data = ig.get_profile_info("instagram_user")

# Metadata analysis
analyzer = MetadataAnalyzer516()
metadata = analyzer.extract_metadata("image.jpg")

πŸ“– Detailed Tool Documentation

πŸ” Username Investigation (investigate516)

Search for usernames across multiple social media platforms.

Features:

  • 50+ social media platforms
  • Rate limiting protection
  • JSON/CSV export
  • Custom platform support

Usage:

investigate516 username -o outputs/

Output:

  • username_profiles.json - Detailed platform results
  • Summary report in terminal

πŸ“Έ Instagram Analysis (ig516)

Extract and analyze Instagram profile data.

Features:

  • Profile information extraction
  • Engagement metrics calculation
  • Follower/following analysis
  • Post statistics

Usage:

ig516 username --download-posts

Output:

  • instagram_username.json - Profile data and analysis
  • instagram_username.csv - Tabular data export

πŸ–ΌοΈ Image Metadata Analysis (meta516)

Analyze and clean image metadata (EXIF data).

Features:

  • EXIF data extraction
  • Metadata cleaning
  • Batch processing
  • Hash generation

Usage:

# Single image analysis
meta516 image.jpg

# Clean metadata
meta516 image.jpg --clean

# Batch process directory
meta516 directory/ --batch

Output:

  • metadata_analysis_*.json - Extracted metadata
  • Cleaned image files (with --clean)

πŸ”¬ Image Forensics (image516)

Image similarity detection and forensic analysis.

Features:

  • Perceptual hashing
  • Image comparison
  • Duplicate detection
  • Hash-based similarity

Usage:

# Compare two images
image516 compare image1.jpg image2.jpg

# Find similar images in directory
image516 find-similar images/ -t 5

# Calculate image hashes
image516 hash image.jpg

Output:

  • Similarity scores and comparison results
  • Hash values for images

🌐 Social Media Mapping (social516)

Map social media presence across platforms.

Features:

  • 8 major social platforms
  • Response time tracking
  • Discovery rate calculation
  • Comprehensive reporting

Usage:

social516 username

Output:

  • social_map_username_*.json - Platform presence data
  • Summary with discovery rate

πŸ“§ Email Intelligence (email516)

Email validation and intelligence gathering.

Features:

  • Email format validation
  • Domain MX record checking
  • Pattern analysis
  • Bulk processing

Usage:

# Single email analysis
email516 [email protected]

# Bulk analysis from file
email516 -f emails.txt

Output:

  • Validation results
  • Pattern analysis
  • Domain information

🌍 Domain Research (domain516)

Comprehensive domain investigation.

Features:

  • WHOIS information lookup
  • DNS record analysis
  • HTTP header inspection
  • IP information

Usage:

domain516 example.com

Output:

  • domain_research_*.json - Complete domain analysis
  • WHOIS, DNS, and HTTP data

πŸ“Š Report Generator (report516)

Generate unified reports from multiple investigations.

Features:

  • Combine results from all tools
  • Multiple export formats (JSON, CSV, HTML, Excel)
  • Executive summaries
  • Risk assessment

Usage:

report516 -d outputs/

Output:

  • Unified reports in multiple formats
  • Executive summaries
  • Risk assessments

πŸ—οΈ Project Structure

516-Digital-Investigation-Tools/
β”œβ”€β”€ scripts/              # Main investigation tools
β”‚   β”œβ”€β”€ sherlock_wrapper.py      # Username investigation
β”‚   β”œβ”€β”€ enhanced_instaloader.py  # Instagram analysis
β”‚   β”œβ”€β”€ metadata_analyzer.py     # Image metadata
β”‚   β”œβ”€β”€ image_forensics.py       # Image comparison
β”‚   β”œβ”€β”€ social_media_mapper.py   # Social media mapping
β”‚   β”œβ”€β”€ email_analyzer.py        # Email intelligence
β”‚   β”œβ”€β”€ domain_research.py       # Domain research
β”‚   └── report_generator.py      # Report generation
β”œβ”€β”€ utils/               # Utility functions
β”‚   β”œβ”€β”€ helpers.py              # Common utilities
β”‚   β”œβ”€β”€ config_loader.py        # Configuration management
β”‚   β”œβ”€β”€ logger.py               # Logging utilities
β”‚   └── export_utils.py         # Data export functions
β”œβ”€β”€ config/              # Configuration files
β”‚   β”œβ”€β”€ default_config.json     # Main configuration
β”‚   β”œβ”€β”€ social_platforms.json   # Social media platforms
β”‚   └── user_agents.json        # HTTP user agents
β”œβ”€β”€ outputs/             # Analysis results and reports
β”œβ”€β”€ docs/                # Documentation
β”‚   β”œβ”€β”€ installation.md         # Installation guide
β”‚   β”œβ”€β”€ usage.md               # Usage instructions
β”‚   β”œβ”€β”€ examples.md            # Code examples
β”‚   └── api_reference.md       # API documentation
β”œβ”€β”€ tests/               # Test cases
β”œβ”€β”€ examples/            # Usage examples
└── 516-investigator.sh # Interactive hacker interface

πŸ”§ Configuration

Customizing Settings

Edit config/default_config.json to customize tool behavior:

{
    "settings": {
        "output_directory": "outputs",
        "request_timeout": 10,
        "max_workers": 5,
        "log_level": "INFO"
    },
    "social_media": {
        "enable_instagram": true,
        "enable_twitter": true,
        "enable_github": true
    }
}

Adding Social Media Platforms

Edit config/social_platforms.json to add custom platforms:

{
    "custom_platform": {
        "name": "Custom Platform",
        "url": "https://custom.com/{}",
        "check_type": "http_status"
    }
}

πŸ› Troubleshooting

Common Issues

Installation Errors:

# Fix permission issues
pip install --user -r requirements.txt

# Upgrade pip
pip install --upgrade pip

# Set Python path
export PYTHONPATH="${PYTHONPATH}:$(pwd)"

Tool-Specific Issues:

  • Instagram Rate Limiting: Tools include built-in rate limiting
  • WHOIS Lookup Failures: Some domains may restrict WHOIS access
  • Image Processing: Ensure Pillow supports your image format

Getting Help

  1. Check the logs in outputs/ directory
  2. Use --help with any command for options
  3. Review examples in examples/ directory
  4. Check existing issues on GitHub

🀝 Contributing

We welcome contributions! Please see our contributing guidelines:

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

Development Setup

# Set up development environment
git clone https://github.com/516hackers/516-Digital-Investigation-Tools.git
cd 516-Digital-Investigation-Tools
python -m venv venv
source venv/bin/activate  # Linux/macOS
# venv\Scripts\activate  # Windows
pip install -r requirements.txt
pip install -e .

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.

MIT License

Copyright (c) 2024 516 Hackers

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.

⚠️ Legal Disclaimer

This toolkit is intended for:

  • βœ… Legal digital investigations
  • βœ… Authorized penetration testing
  • βœ… Cybersecurity research
  • βœ… Educational purposes
  • βœ… Ethical hacking with proper authorization

Prohibited Uses:

  • ❌ Unauthorized access to systems
  • ❌ Illegal surveillance
  • ❌ Harassment or stalking
  • ❌ Any unlawful activities

Users are responsible for:

  • Ensuring they have proper authorization before conducting investigations
  • Complying with local laws and regulations
  • Using the tools ethically and responsibly

πŸ›‘οΈ Security Best Practices

  1. Authorization: Always obtain proper authorization before investigations
  2. Data Handling: Securely store and handle investigation results
  3. Rate Limiting: Respect API rate limits and terms of service
  4. Legal Compliance: Ensure compliance with relevant laws and regulations
  5. Ethical Use: Use tools for legitimate security research and investigations

🌟 Features Highlights

  • πŸ” Comprehensive OSINT: Multiple investigation techniques in one toolkit
  • 🎯 User-Friendly: Both CLI and interactive menu interfaces
  • πŸ“Š Multiple Formats: JSON, CSV, HTML, and Excel exports
  • ⚑ Fast & Efficient: Optimized for performance with rate limiting
  • πŸ”§ Extensible: Easy to add new platforms and tools
  • πŸ“ Well-Documented: Comprehensive guides and examples

πŸ“ž Support

  • Documentation: Check the docs/ directory for detailed guides
  • Issues: Create an issue on GitHub for bugs and feature requests
  • Examples: Review the examples/ directory for usage patterns

Made with ❀️ by 516 Hackers

516 Hackers Follow

For educational and authorized security research purposes only

About

A comprehensive OSINT and media analysis toolkit curated by 516 Hackers for digital investigations, social media intelligence, and forensic analysis.

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published