A comprehensive digital investigation and OSINT toolkit designed for cybersecurity professionals, researchers, and ethical hackers. Perform advanced digital investigations with our all-in-one command-line interface and Python API.
- Python 3.8 or higher
- pip (Python package manager)
- Git
# Clone the repository
git clone https://github.com/516hackers/516-Digital-Investigation-Tools.git
cd 516-Digital-Investigation-Tools
# Install dependencies
pip install -r requirements.txt
# Install the package
pip install -e .# Test installation
python -m pytest tests/
# Run basic examples
python examples/basic_usage.py| Tool | Command | Description |
|---|---|---|
| π Username Investigation | investigate516 |
Search across 50+ social media platforms |
| πΈ Instagram Analysis | ig516 |
Extract and analyze Instagram profile data |
| πΌοΈ Image Metadata Analysis | meta516 |
Analyze and clean image EXIF metadata |
| π¬ Image Forensics | image516 |
Image similarity detection and comparison |
| π Social Media Mapping | social516 |
Cross-platform social media presence mapping |
| π§ Email Intelligence | email516 |
Email validation and pattern analysis |
| π Domain Research | domain516 |
WHOIS lookup, DNS analysis, and HTTP inspection |
| π Report Generator | report516 |
Unified report generation in multiple formats |
# Run the interactive menu
chmod +x 516-investigator.sh
./516-investigator.sh
# Username investigation
investigate516 username
# Instagram profile analysis
ig516 instagram_username
# Image metadata analysis
meta516 image.jpg
# Domain research
domain516 example.com
# Email analysis
email516 [email protected]
# Generate reports
report516from scripts import Sherlock516, Instagram516, MetadataAnalyzer516
# Username investigation
investigator = Sherlock516("target_user")
investigator.check_standard_sites()
results = investigator.save_results()
# Instagram analysis
ig = Instagram516()
profile_data = ig.get_profile_info("instagram_user")
# Metadata analysis
analyzer = MetadataAnalyzer516()
metadata = analyzer.extract_metadata("image.jpg")Search for usernames across multiple social media platforms.
Features:
- 50+ social media platforms
- Rate limiting protection
- JSON/CSV export
- Custom platform support
Usage:
investigate516 username -o outputs/Output:
username_profiles.json- Detailed platform results- Summary report in terminal
Extract and analyze Instagram profile data.
Features:
- Profile information extraction
- Engagement metrics calculation
- Follower/following analysis
- Post statistics
Usage:
ig516 username --download-postsOutput:
instagram_username.json- Profile data and analysisinstagram_username.csv- Tabular data export
Analyze and clean image metadata (EXIF data).
Features:
- EXIF data extraction
- Metadata cleaning
- Batch processing
- Hash generation
Usage:
# Single image analysis
meta516 image.jpg
# Clean metadata
meta516 image.jpg --clean
# Batch process directory
meta516 directory/ --batchOutput:
metadata_analysis_*.json- Extracted metadata- Cleaned image files (with
--clean)
Image similarity detection and forensic analysis.
Features:
- Perceptual hashing
- Image comparison
- Duplicate detection
- Hash-based similarity
Usage:
# Compare two images
image516 compare image1.jpg image2.jpg
# Find similar images in directory
image516 find-similar images/ -t 5
# Calculate image hashes
image516 hash image.jpgOutput:
- Similarity scores and comparison results
- Hash values for images
Map social media presence across platforms.
Features:
- 8 major social platforms
- Response time tracking
- Discovery rate calculation
- Comprehensive reporting
Usage:
social516 usernameOutput:
social_map_username_*.json- Platform presence data- Summary with discovery rate
Email validation and intelligence gathering.
Features:
- Email format validation
- Domain MX record checking
- Pattern analysis
- Bulk processing
Usage:
# Single email analysis
email516 [email protected]
# Bulk analysis from file
email516 -f emails.txtOutput:
- Validation results
- Pattern analysis
- Domain information
Comprehensive domain investigation.
Features:
- WHOIS information lookup
- DNS record analysis
- HTTP header inspection
- IP information
Usage:
domain516 example.comOutput:
domain_research_*.json- Complete domain analysis- WHOIS, DNS, and HTTP data
Generate unified reports from multiple investigations.
Features:
- Combine results from all tools
- Multiple export formats (JSON, CSV, HTML, Excel)
- Executive summaries
- Risk assessment
Usage:
report516 -d outputs/Output:
- Unified reports in multiple formats
- Executive summaries
- Risk assessments
516-Digital-Investigation-Tools/
βββ scripts/ # Main investigation tools
β βββ sherlock_wrapper.py # Username investigation
β βββ enhanced_instaloader.py # Instagram analysis
β βββ metadata_analyzer.py # Image metadata
β βββ image_forensics.py # Image comparison
β βββ social_media_mapper.py # Social media mapping
β βββ email_analyzer.py # Email intelligence
β βββ domain_research.py # Domain research
β βββ report_generator.py # Report generation
βββ utils/ # Utility functions
β βββ helpers.py # Common utilities
β βββ config_loader.py # Configuration management
β βββ logger.py # Logging utilities
β βββ export_utils.py # Data export functions
βββ config/ # Configuration files
β βββ default_config.json # Main configuration
β βββ social_platforms.json # Social media platforms
β βββ user_agents.json # HTTP user agents
βββ outputs/ # Analysis results and reports
βββ docs/ # Documentation
β βββ installation.md # Installation guide
β βββ usage.md # Usage instructions
β βββ examples.md # Code examples
β βββ api_reference.md # API documentation
βββ tests/ # Test cases
βββ examples/ # Usage examples
βββ 516-investigator.sh # Interactive hacker interface
Edit config/default_config.json to customize tool behavior:
{
"settings": {
"output_directory": "outputs",
"request_timeout": 10,
"max_workers": 5,
"log_level": "INFO"
},
"social_media": {
"enable_instagram": true,
"enable_twitter": true,
"enable_github": true
}
}Edit config/social_platforms.json to add custom platforms:
{
"custom_platform": {
"name": "Custom Platform",
"url": "https://custom.com/{}",
"check_type": "http_status"
}
}Installation Errors:
# Fix permission issues
pip install --user -r requirements.txt
# Upgrade pip
pip install --upgrade pip
# Set Python path
export PYTHONPATH="${PYTHONPATH}:$(pwd)"Tool-Specific Issues:
- Instagram Rate Limiting: Tools include built-in rate limiting
- WHOIS Lookup Failures: Some domains may restrict WHOIS access
- Image Processing: Ensure Pillow supports your image format
- Check the logs in
outputs/directory - Use
--helpwith any command for options - Review examples in
examples/directory - Check existing issues on GitHub
We welcome contributions! Please see our contributing guidelines:
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
# Set up development environment
git clone https://github.com/516hackers/516-Digital-Investigation-Tools.git
cd 516-Digital-Investigation-Tools
python -m venv venv
source venv/bin/activate # Linux/macOS
# venv\Scripts\activate # Windows
pip install -r requirements.txt
pip install -e .This project is licensed under the MIT License - see the LICENSE file for details.
MIT License
Copyright (c) 2024 516 Hackers
Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the "Software"), to deal
in the Software without restriction, including without limitation the rights
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
copies of the Software, and to permit persons to whom the Software is
furnished to do so, subject to the following conditions:
The above copyright notice and this permission notice shall be included in all
copies or substantial portions of the Software.
This toolkit is intended for:
- β Legal digital investigations
- β Authorized penetration testing
- β Cybersecurity research
- β Educational purposes
- β Ethical hacking with proper authorization
Prohibited Uses:
- β Unauthorized access to systems
- β Illegal surveillance
- β Harassment or stalking
- β Any unlawful activities
Users are responsible for:
- Ensuring they have proper authorization before conducting investigations
- Complying with local laws and regulations
- Using the tools ethically and responsibly
- Authorization: Always obtain proper authorization before investigations
- Data Handling: Securely store and handle investigation results
- Rate Limiting: Respect API rate limits and terms of service
- Legal Compliance: Ensure compliance with relevant laws and regulations
- Ethical Use: Use tools for legitimate security research and investigations
- π Comprehensive OSINT: Multiple investigation techniques in one toolkit
- π― User-Friendly: Both CLI and interactive menu interfaces
- π Multiple Formats: JSON, CSV, HTML, and Excel exports
- β‘ Fast & Efficient: Optimized for performance with rate limiting
- π§ Extensible: Easy to add new platforms and tools
- π Well-Documented: Comprehensive guides and examples
- Documentation: Check the
docs/directory for detailed guides - Issues: Create an issue on GitHub for bugs and feature requests
- Examples: Review the
examples/directory for usage patterns