frishtik/osint-tools-mcp-server
If you are the rightful owner of osint-tools-mcp-server and would like to certify it and/or have it hosted online, please leave a comment on the right or send an email to henry@mcphub.com.
The OSINT Tools MCP Server is a comprehensive server that integrates multiple OSINT tools, enabling AI assistants to perform advanced reconnaissance and information gathering tasks.
🔍 OSINT Tools MCP Server
A comprehensive MCP server that exposes multiple OSINT tools to AI assistants like Claude. This server allows AI to perform sophisticated reconnaissance and information gathering tasks using industry-standard OSINT tools.
🛠️ Available Tools
🔍 Sherlock - Username Search
Search for usernames across 399+ social media platforms and websites. Perfect for digital footprint analysis.
- Input: Username
- Output: List of platforms where username exists
📧 Holehe - Email Verification
Check if an email is registered on 120+ platforms. Lightning fast and accurate.
- Input: Email address
- Output: Platforms where email is registered
🕷️ SpiderFoot - Comprehensive OSINT
The Swiss Army knife of OSINT. Performs deep reconnaissance with automatic target type detection.
- Input: IP, domain, email, phone, username, person name, Bitcoin address, or network block
- Output: Comprehensive intelligence report
- ⚠️ Note: SpiderFoot can take 5-30 minutes to complete a full scan. Be patient!
🔎 GHunt - Google Account Intel
Extract information from Google accounts using email or Google ID.
- Input: Email or Google ID
- Output: Google account details and associated information
🌐 Maigret - Advanced Username Search
Search across 3000+ sites with false positive detection and detailed analysis.
- Input: Username
- Output: Detailed report with confidence scores
🌾 TheHarvester - Domain Intelligence
Gather emails, subdomains, hosts, employee names, and more from public sources.
- Input: Domain or company name
- Output: Comprehensive domain intelligence
🐦 Blackbird - Fast Username OSINT
Lightning-fast searches across 581 sites for username reconnaissance.
- Input: Username
- Output: Quick profile discovery results
🚀 Installation
MCP Server Setup
- Clone this repository:
git clone https://github.com/frishtik/osint-tools-mcp-server.git
cd osint-tools-mcp-server
- Install dependencies:
pip install -r requirements.txt
This will automatically install Sherlock, Holehe, Maigret, and TheHarvester.
- Configure Claude Desktop:
Add to your Claude Desktop configuration (~/Library/Application Support/Claude/claude_desktop_config.json
on macOS):
{
"mcpServers": {
"osint-tools": {
"command": "python",
"args": ["/path/to/osint-tools-mcp-server/src/osint_tools_mcp_server.py"],
"env": {
"PYTHONUNBUFFERED": "1"
}
}
}
}
- Restart Claude Desktop to load the new MCP server.
Prerequisites for Additional Tools
Some tools require manual installation due to their complexity:
SpiderFoot
git clone https://github.com/smicallef/spiderfoot.git /opt/spiderfoot
cd /opt/spiderfoot
pip install -r requirements.txt
GHunt
git clone https://github.com/mxrch/GHunt.git /opt/ghunt
cd /opt/ghunt
pip install -r requirements.txt
Blackbird
git clone https://github.com/p1ngul1n0/blackbird.git /opt/blackbird
cd /opt/blackbird
pip install -r requirements.txt
🎮 Usage Tips
Getting Started
Working with AI for OSINT is a bit of an art form. Here's how to get the best results:
Start Simple with Holehe
I recommend starting with the Holehe tool - it's fast, reliable, and gives you immediate results:
"Check if john.doe@example.com is registered on any platforms"
Level Up to Username Searches
Once you're comfortable, try username searches with Sherlock or Maigret:
"Search for the username 'johndoe123' across social media platforms"
Complex Orchestrations
Here's where it gets interesting. You can chain tools together:
"I found an email address contact@suspicious-site.com. Can you:
1. Check what platforms it's registered on
2. Extract the domain and search for subdomains and other emails
3. Search for any usernames associated with this domain"
Let the AI Be Smart
Sometimes the best approach is to give Claude context and let it decide:
"I'm investigating the digital footprint of username 'hackerman2024'.
Use your judgment to gather as much information as possible."
Pro Tips 🎯
-
Be Patient with SpiderFoot: It's incredibly thorough but can take up to 30 minutes for a full scan. Start it and grab a coffee!
-
Parallel Processing: Claude can run multiple tools simultaneously. Don't hesitate to ask for parallel searches:
"Search for 'johndoe' on both Sherlock and Maigret at the same time"
-
Know When to Hold the Leash:
- For specific investigations: Be explicit about which tools to use
- For exploratory research: Let Claude choose the tools
- For time-sensitive tasks: Avoid SpiderFoot, stick to faster tools
-
Cross-Reference Results: Different tools have different databases. Maigret might find accounts that Sherlock misses and vice versa.
-
Email First, Username Second: If you have an email, start there - it's usually more unique than usernames.
⚖️ Ethical Usage & Legal Compliance
🚨 IMPORTANT: This tool is for legitimate security research and OSINT investigations only.
You MUST:
- ✅ Only gather publicly available information
- ✅ Respect privacy laws in your jurisdiction (GDPR, CCPA, etc.)
- ✅ Follow platforms' Terms of Service
- ✅ Use findings responsibly and ethically
- ✅ Obtain proper authorization for any professional investigations
You MUST NOT:
- ❌ Use this for stalking, harassment, or any malicious purpose
- ❌ Violate any local, state, or federal laws
- ❌ Access private or protected information
- ❌ Use findings to harm individuals or organizations
🔧 Troubleshooting
Common Issues
Tools not found: Make sure all OSINT tools are installed and in your PATH:
which sherlock holehe maigret theharvester
SpiderFoot errors: Ensure SpiderFoot is installed in /opt/spiderfoot
or update the path in the code.
Timeout issues: Some tools may timeout on slow connections. Try increasing the timeout parameter:
"Search for username with a 30 second timeout"
Rate limiting: Some platforms rate-limit searches. If you're getting blocked, wait a bit and try again.
🏗️ Architecture
This MCP server uses Python's asyncio for non-blocking tool execution. Each tool runs in a subprocess, allowing for parallel execution and proper timeout handling.
Claude Desktop <-> MCP Protocol <-> OSINT MCP Server <-> OSINT Tools
🤝 Contributing
Found a bug? Want to add a new tool? Contributions are welcome!
- Fork the repository
- Create your feature branch (
git checkout -b feature/NewOSINTTool
) - Commit your changes (
git commit -m 'Add NewOSINTTool support'
) - Push to the branch (
git push origin feature/NewOSINTTool
) - Open a Pull Request
📚 Acknowledgments
Special thanks to these awesome projects:
- mcp-maigret - Inspiration for MCP implementation and README structure. Go give them a ⭐!
- Model Context Protocol - The protocol making all this possible
- All the incredible OSINT tool maintainers
📜 License
This project is licensed under the MIT License - see the file for details.
⚠️ Disclaimer
This tool is provided for educational and legitimate security research purposes only. The authors are not responsible for any misuse or damage caused by this program. Use at your own risk and always ensure you have proper authorization before conducting any investigations.
Remember: With great power comes great responsibility. Use these tools wisely and ethically! 🦸♂️
Built with ❤️ for the OSINT community