Site icon API Security Blog

D4TA-HUNTER – GUI Osint Framework With Kali Linux

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-M-X1JCaDmMj4GsQRXbmjqT1J6F-dMSoRJXgdBEKguFNLVyWUTWkUIbgrAF6RDtVXDLEp2pBpCdVu1WC-0ZM78_EImFffW16VMJYnuWhp5XObbrVEhbSrM7rr7lJhpBty4xDfuGM3QlV8P6HGuSok90KgxlFBR1hGv9sZ2g6aDcmuYiR_tWIV_2wKtw/w640-h324/D4TA-HUNTER_1.gif)]()

D4TA-HUNTER is a tool created in order to automate the collection of information about the employees of a company that is going to be audited for ethical hacking.

In addition, in this tool we can find in the “search company” section by inserting the domain of a company, [emails]( “emails” ) of employees, [subdomains]( “subdomains” ) and IP’s of servers.

# GET API KEY

Register on

# Install

git clone https://github.com/micro-joan/D4TA-HUNTER
cd D4TA-HUNTER/
chmod +x run.sh
./run.sh

After executing the application launcher you need to have all the components installed, the launcher will check one by one, and in the case of not having any component installed it will show you the statement that you must enter to install it:

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiDQ71xAKu7Rxm3Ta_zHbtmiW59MwefqMAItL9BikDSPfvGKRbhk0yQ0k300FcRr3U0cL6uwFyuGyHC6Lk5g0LIHAgNHRnG6-Tzlz_zPdbxYEIi7x286vjU2uj4fVndH0CXHSgQT2nsHtaz6w_R_nPh3E4iV69vA3RCSycxAibWmCGX4lE9yvXGdJBlA/w640-h324/D4TA-HUNTER_3.gif)]()

# Use

First you must have a free or paid api-key from BreachDirectory.org, if you don’t have one and do a search D4TA-HUNTER provides you with a guide on how to get one.

Once you have the api-key you will be able to search for emails, with the advantage of showing you a list of all the password hashes ready for you to copy and paste into one of the online resources provided by D4TA-HUNTER to crack [passwords]( “passwords” ) 100 % free.

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpR61vWeGWNvTMe0owv-ZF9A6MEFGtb5VKp6JZ8vAhutMt11fj2yntQvtzH4xKi_cswUttPRkN41RsvutI7IKdaU4vQeftD7prGbOOiwgvTsd6Em6JuUHF7_CkH3ZQM6iCqgxPRDGkvV3bwYAinObWgcDG-KAYBEM7L0kqzPkg6vDHZVVikCoxeiOIhg/w640-h366/D4TA-HUNTER_4.gif)]()

You can also insert a domain of a company and D4TA-HUNTER will search for employee emails, subdomains that may be of interest together with IP’s of machines found:

[![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIZwKLOFWPuyHuvcBYPNE139VtBEYs_TPAbXPSHIMwKhljPeRJGFgYlYZfJJazP770-aBphflhJzKdoIGRnY6YxJq5DxC_S6gZZY365HwsyLYDIL20ETWhj7VWYKTVkugm1pyHJsnikI3ODfFcGaFx2cVLmQM9KNH_Df2kZYSSGPByPBi6vkP7DWMJfQ/w640-h324/D4TA-HUNTER_5.gif)]()

# Apis and tools

Service | Functions | Status
—|—|—
BreachDirectory.org | Email, phone or nick leaks |

✅



(free plan)
[TheHarvester]( “TheHarvester” ) | Domains and emails of company |

✅

Free
[Kalitorify]( “Kalitorify” ) | Tor search |

✅

Free

Video Demo:
My website:
My blog:
Buy me a coffee:

# DISCLAIMER

This [toolkit]( “toolkit” ) contains materials that can be potentially damaging or dangerous for social media. Refer to the laws in your province/country before accessing, using,or in any other way utilizing this in a wrong way.

This Tool is made for educational purposes only. Do not attempt to violate the law with anything contained here. If this is your intention, then Get the hell out of here!

**[Download D4TA-HUNTER]( “Download D4TA-HUNTER” )**Read More

Exit mobile version