Omnisci3nt: Website Hacking & Reconnaissance Tool

spyboy's avatarPosted by

Omnisci3nt equips users with a comprehensive toolkit for conducting web reconnaissance with precision and efficiency.


Omnisci3nt is a powerful web reconnaissance tool designed to unravel the concealed intricacies of the online realm. With a comprehensive array of capabilities, Omnisci3nt offers users the means to delve into various aspects of a target domain, including IP lookup, domain information, SSL certificate details, DNS enumeration, subdomain enumeration, port scanning, web crawling, analysis of technologies utilized, Wayback Machine exploration, DMARC record examination, social media link discovery, and more.

Whether you’re a cybersecurity professional, researcher, or individual seeking to gain insights into a particular domain, Omnisci3nt’s versatile toolkit offers a comprehensive solution for navigating the intricate landscape of the web.

☁️ Run It Instantly on Google Colab (No Installation Needed)

Open In Colab

💡 For full functionality and better performance, a local installation is recommended.


⚙️ Key Features

Feature Description
IP Lookup Retrieve geolocation and ISP data
WHOIS Lookup Get domain registration information
HTTP Header Analysis Analyze response headers
SSL Inspection Fetch and inspect SSL certificate
DNS Enumeration Gather DNS, Reverse, and Shared DNS records
Subdomain Discovery Identify subdomains using various techniques
Port Scanning Scan and detect open ports
Directory Brute-Force Discover hidden files and directories
Web Crawling Fetch links, robots.txt, and sitemap.xml
Tech Detection Detect technologies used by the website
Wayback Machine View archived pages over time
DMARC Analysis Check domain email authentication (SPF, DKIM, DMARC)
Social Media Discovery Extract social profiles and emails
Admin Panel Detection Identify admin login portals
Reverse DNS Lookup Get hostnames from IP addresses
Shared DNS Lookup Discover other domains on the same DNS server
vulnerabilities Scanner Scan for common vulnerabilitie
Full Recon Mode Run all modules for deep analysis

🖥️ OS Compatibility

   

🧰 Requirements

 


🧪 Installation

git clone https://github.com/spyboy-productions/omnisci3nt.git
cd omnisci3nt
pip3 install -r requirements.txt
python3 -m omnisci3nt.omnisci3nt -h

⭔ Example Usage :

python -m omnisci3nt.omnisci3nt -whois example.com

🚀 pipx Installation (Recommended)

Install via pipx for isolated, global access:

Step 1: Install pipx

python3 -m pip install --user pipx
python3 -m pipx ensurepath

Step 2: Install Omnisci3nt

pipx install git+https://github.com/spyboy-productions/omnisci3nt.git

💡 Example Usage

omnisci3nt -whois example.com

🧭 All Command Options

Command Description
-ip <domain> IP geolocation info
-headers <domain> Show HTTP headers
-whois <domain> WHOIS lookup
-ssl <domain> SSL certificate analysis
-dns <domain> DNS enumeration
-reversedns <domain> Reverse DNS lookup
-shareddns <domain> Domains on the same DNS
-subdomains <domain> Subdomain enumeration
-dmarc <domain> DMARC record validation
-crawl <domain> Crawl and fetch links
-robots <domain> Fetch robots.txt and sitemap.xml
-tech <domain> Detect technologies used
-wayback <domain> Archive data from Wayback Machine
-social <domain> Extract social media/email
-dirscan <domain> Directory brute-force
-portscan <domain> Port scanning
-admin <domain> Admin panel finder
-vulnscan <domain> Run vulnerability scanner
-all <domain> Run all tools in one go

Optional command for pipx:

🔄 To upgrade from GitHub
pipx upgrade omnisci3nt

# If you originally installed using a local directory (pipx install .), then use:
pipx install . --force

❌ To uninstall
pipx uninstall omnisci3nt

# Bonus: Check where it's installed
pipx list

🤝 Contribute

Pull requests and issues are welcome! Found a bug? Have an idea? Let’s collaborate to improve Omnisci3nt.

💬 If having an issue Chat here

Discord Server

⭔ Snapshots:



Discover more from Spyboy blog

Subscribe to get the latest posts sent to your email.

Leave a comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.