Mr.Holmes is a information gathering tool (OSINT)

Overview

🔍 Mr.Holmes

Mr.Holmes is a information gathering tool (OSINT). Is main purpose is to gain information about domains,username and phone numbers with the help of public source avaiable on the internet also it use the google dorks attack for specific researchers. It also use proxies for make your requests completley anonymous and a WhoIS Api for getting more information about a domain.


DISCLAIMER

This Tool is Not 100% Precise so it can fail somtimes. Also this tool is made for educational and research purposes only..use it wisely


SCREENSHOT

Screenshot


✔️ INSTALLATION LINUX/MAC:

git clone https://github.com/Lucksi/Mr.Holmes
cd Mr.Holmes
sudo chmod +x install.sh
sudo ./install.sh

✔️ INSTALLATION WINDOWS:

git clone https://github.com/Lucksi/Mr.Holmes
open Cmd as An administrator
cd Mr.Holmes
Install.cmd

✔️ INSTALLATION TERMUX:

pkg install proot
git clone https://github.com/Lucksi/Mr.Holmes
cd Mr.Holmes
proot -0 chmod +x install_Termux.sh
./install_Termux.sh

USAGE LINUX/MAC:

sudo python3 MrHolmes.py

USAGE TERMUX/WINDOWS:

python3 MrHolmes.py

API KEY LINK:

https://whois.whoisxmlapi.com

SETTINGS FOLDER:

Configuration/Configuration.ini

ATTENTION

DATABASE NOT AVAIABLE ON TERMUX AND WINDOWS


ATTENTION ON WINDOWS

IF PYTHON WONT INSTALL YOU HAVE TO DOWNLOAD IT MANUALLY:


VERSIONS LIST:

https://lucksi.github.io/Mr.Holmes/Pages/versions.html

✔️ GUI DARK/LIGHT MODE:

cd GUI
cd Theme
edit Mode.json
write:Light=(Light-Mode)
write:Dark=(Dark-Mode) 
write:High-Contrast(High-Contrast-Mode)
write:Uchiha(Uchiha-Mode)

Mode.json CODE EXAMPLE:

{
    "Color": {
        "Background": "Light"
    }
}

✔️ GUI/USERNAME/PASSWORD:

cd GUI
cd Credentials
edit Login.json
write:Status=Active/Deactive
edit Users.json
write:Username=Your Username
write:Password=Your Password

Login.json CODE EXAMPLE:

{
    "Database": {
        "Status": "Active"
    }
}

Users.json CODE EXAMPLE

{
    "Users":[
        {
            "Username": "Your Username",
            "Password": "Your Password"
        }
    ]
}

✔️ LANGUAGE SETTINGS:

cd GUI
cd Language
edit Language.json
write:Italian
write:English 
write:François

Language.json CODE EXAMPLE:

{
    "Language": {
        "Preference": "English"
    }
}

DEFAULT USERNAME AND PASSWORD:

Username:Admin
Password:Qwerty123

INTERACTIVE MAP HAS BEEN MADE WITH:

Leaflet: https://leafletjs.com


🌗 DARK MODE:

Screenshot



🌕 LIGHT MODE:

Screenshot



🌗 HIGH-CONTRAST MODE:

Screenshot



Uchiha MODE:

Screenshot



MADE WITH ❤️ BY LUCKSI IN 🇮🇹

LICENSE: GPL-3.0 License
COPYRIGHT: © 2021 Lucksi

You might also like...
Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率。
Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率。

0x00 介绍 tig Threat Intelligence Gathering 威胁情报收集,旨在提高蓝队拿到攻击 IP 后对其进行威胁情报信息收集的效率,目前已集成微步、IP 域名反查、Fofa 信息收集、ICP 备案查询、IP 存活检测五个模块,现已支持以下信息的查询: ✅ 微步标签 ✅ I

SpiderFoot automates OSINT collection so that you can focus on analysis.
SpiderFoot automates OSINT collection so that you can focus on analysis.

SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of m

Sentinel-1 SAR time series analysis for OSINT use

SARveillance Sentinel-1 SAR time series analysis for OSINT use. Description Generates a time lapse GIF of the Sentinel-1 satellite images for the loca

Web-eyes - OSINT tools for website research
Web-eyes - OSINT tools for website research

WEB-EYES V1.0 web-eyes: OSINT tools for website research, 14 research methods ar

Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone
Yesitsme - Simple OSINT script to find Instagram profiles by name and e-mail/phone

Simple OSINT script to find Instagram profiles by name and e-mail/phone

OSINT Cybersecurity Tools
OSINT Cybersecurity Tools

OSINT Cybersecurity Tools Welcome to the World of OSINT: An ongoing collection of awesome tools and frameworks, best security software practices, libr

A Python tool to automate some dorking stuff to find information disclosures.
A Python tool to automate some dorking stuff to find information disclosures.

WebDork v1.0.3 A open-source tool to find publicly available sensitive information about Companies/Organisations! WebDork A Python tool to automate so

A traceroute tool that also displays IP information
A traceroute tool that also displays IP information

infotr A traceroute tool that also displays IP information. This tool has only been tested on Linux. Quick Start First, install this tool from PyPI. p

This tool ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes.

This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that are being or will be used in their codes, providing information that allows them to know in advance if this library complies with processes. secure development, if currently supported, possible backdoors (malicious embedded code), typosquatting analysis, the history of versions and reported vulnerabilities (CVEs) of the package.

Comments
  • Android error while installing

    Android error while installing

    The new update of Mr.holmes broke the installation on my android device I get this error

    [email protected]  ~/Mr.Holmes   master ±  ./install_Termux.sh ./install_Termux.sh: line 6: /etc/os-release: No such file or directory ./install_Termux.sh: line 79: syntax error near unexpected token "${GREEN}\n[+]${WHITE}SKIPPING..."' ./install_Termux.sh: line 79: printf("${GREEN}\n[+]${WHITE}SKIPPING...")'

    Any help ?

    Device : S20+ Android version : 12

    opened by momo-AUX1 7
  • Mr.Holmes$ python3 MrHolmes.py

    Mr.Holmes$ python3 MrHolmes.py

    ciao o visto il tuo video e o voluto provare il tuo tool ma non parte puoi aiutarmi a risolvere grazie.

    Traceback (most recent call last): File "MrHolmes.py", line 6, in from Core.Support import Menu File "/home/ale/Mr.Holmes/Core/Support/Menu.py", line 9, in from Core import Searcher File "/home/ale/Mr.Holmes/Core/Searcher.py", line 17, in from Core.Support import Banner_Selector as banner File "/home/ale/Mr.Holmes/Core/Support/Banner_Selector.py", line 7, in import tkinter ModuleNotFoundError: No module named 'tkinter'

    opened by allelive 3
  • Project dependencies may have API risk issues

    Project dependencies may have API risk issues

    Hi, In Mr.Holmes, inappropriate dependency versioning constraints can cause risks.

    Below are the dependencies and version constraints that the project is using

    phonenumbers==8.12.25
    requests==2.25.1
    beautifulsoup4==4.9.3
    

    The version constraint == will introduce the risk of dependency conflicts because the scope of dependencies is too strict. The version constraint No Upper Bound and * will introduce the risk of the missing API Error because the latest version of the dependencies may remove some APIs.

    After further analysis, in this project, The version constraint of dependency phonenumbers can be changed to >=5.9b1,<=8.12.50. The version constraint of dependency requests can be changed to >=0.2.1,<=0.2.3. The version constraint of dependency requests can be changed to >=0.7.0,<=2.24.0. The version constraint of dependency requests can be changed to ==2.26.0. The version constraint of dependency beautifulsoup4 can be changed to >=4.10.0,<=4.11.1.

    The above modification suggestions can reduce the dependency conflicts as much as possible, and introduce the latest version as much as possible without calling Error in the projects.

    The invocation of the current project includes all the following methods.

    The calling methods from the phonenumbers
    phonenumbers.geocoder.country_name_for_number
    phonenumbers.timezone.time_zones_for_number
    phonenumbers.is_valid_number
    phonenumbers.parse
    phonenumbers.format_number
    phonenumbers.carrier.name_for_number
    phonenumbers.geocoder.description_for_number
    phonenumbers.region_code_for_country_code
    phonenumbers.is_possible_number
    
    The calling methods from the requests
    requests.get
    
    The calling methods from the beautifulsoup4
    bs4.BeautifulSoup
    
    The calling methods from the all methods
    phonenumbers.geocoder.country_name_for_number
    Config.modify_recipient
    email.mime.multipart.MIMEMultipart.attach
    os.remove
    Phone_search.lookup
    Web.Banner
    successfullName.append
    MrHolmes.Controll
    email.mime.base.MIMEBase.set_payload
    json.loads.replace
    Core.Support.Phone.Numbers.Phony.Number
    title.replace.replace
    print
    os.geteuid
    random.choice
    video.find_all.replace
    Web.Robots
    MrHolmes.Yandex_dork
    filename.open.write
    bs4.BeautifulSoup.read
    logging.getLogger
    Core.Searcher_phone.Phone_search.searcher
    str.replace
    int
    Core.Support.Username.Get_Posts.Downloader.Twitter
    os.getuid
    random.choice.split
    urllib.request.urlopen.replace
    os.getcwd
    datetime.datetime.now.strftime
    exit
    os.popen
    format.replace
    info.find
    os.mkdir
    phonenumbers.format_number
    info.Get_Url
    Core.Support.Username.Get_Posts.Downloader.TikTok
    socket.socket.close
    phonenumbers.geocoder.description_for_number
    Mail_search.searcher
    phonenumbers.timezone.time_zones_for_number
    info.Profile_Pic
    Temp.replace
    phonenumbers.geocoder.description_for_number.split
    Core.Support.Username.Scraper.info.MixCloud
    requests.get
    Config.Banner
    reader.find.replace
    os.system
    item.find.replace
    Core.Support.Username.Scraper.info.Minecraft
    Phone_search.Yandex_dork
    Ports_List.append
    Web.Ports
    Mail_search.Yandex_dork
    Core.Support.Requests_Search.Search.search
    socket.socket
    str
    urllib.request.urlopen.read
    Open_Ports.append
    smtplib.SMTP.login
    configparser.ConfigParser.set
    open.close
    sites.rstrip
    Core.Support.Agree.One_time.Agreement
    report.replace
    ScraperSites.append
    Main.banner
    f.read.rstrip
    range
    Core.Support.Username.Scraper.info.Dockerhub
    phonenumbers.is_valid_number
    Core.Support.Creds.Sender.mail
    item.find
    Main.Checker
    Core.Searcher_website.Web.search
    configparser.ConfigParser
    data.find.replace
    image.find.replace
    LangFile.Language.Translation.Translate_Language.format
    timezoneResult.split
    Ports.Banner
    d.read.strip
    reader.find.strip
    smtplib.SMTP.sendmail
    Web.Reputation
    MrHolmes.Google_dork
    location.strip.replace
    Core.Support.Database.Controller.Gui
    Config.modify_destination
    shutil.rmtree
    open.readlines
    MrHolmes.Banner
    Core.Support.Mail.Mail_Validator.Validator.Mail
    Config.modify_Database_Visibility
    Name.parser.replace
    info.find_all.get_text
    Core.Support.Username.Get_Posts.Downloader.Instagram
    Core.Support.Language.Translation.Translate_Language
    city2.street2.format.replace
    line.replace
    Main.Controll_Display
    Main.Mobile_Banner
    bs4.BeautifulSoup.find_all
    Config.main
    email.mime.base.MIMEBase.add_header
    smtplib.SMTP.ehlo
    phonenumbers.PhoneNumberFormat.INTERNATIONAL.Phone.phonenumbers.format_number.split
    Core.Support.Username.Scraper.info.Disqus
    Mail_search.Google_dork
    time.sleep
    Config.modify_path
    Core.Support.Websites.Scanner.Port.Scan
    getpass.getpass
    format.find
    arr_name.append
    Web.yandex_dork
    Core.Support.Username.Scraper.info.Instagram
    Downloader.Update
    re.fullmatch
    email.mime.multipart.MIMEMultipart.as_string
    Web.google_dork
    Core.Support.Username.Scraper.info.Ngl
    json.load
    Main.main
    phonenumbers.region_code_for_country_code
    smtplib.SMTP.close
    open
    profile_pic1.replace
    open.write
    info.Get_Url.replace
    sites.replace
    successfull.append
    os.path.isfile
    smtplib.SMTP
    Main.Menu
    os.path.isdir
    input
    Core.E_Mail.Mail_search.Search
    Core.Support.Notification.Notifier.Start
    json.load.append
    phonenumbers.carrier.name_for_number
    float
    Core.Support.Language.Translation.Get_Language
    Config.modify_Log
    data1.sites.replace
    Core.Support.Clear.Screen.Clear
    logging.getLogger.setLevel
    smtplib.SMTP.starttls
    logging.basicConfig
    footer.get_text.strip
    site.replace.replace
    datetime.datetime.now
    stat.select_one.strip
    os.popen.read
    robot.open.write
    reader.find_all.append
    email.mime.base.MIMEBase
    Web.trace
    Config.modify_update_pass
    filename.Language.Translation.Translate_Language.format
    Web.whois_lookup
    socket.socket.getsockname
    email.mime.multipart.MIMEMultipart
    socket.socket.connect_ex
    Core.Support.Map.Creation.mapPhone
    phonenumbers.parse
    configparser.ConfigParser.read
    Core.Support.Map.Creation.mapWeb
    Config.modify_Language
    phonenumbers.PhoneNumberFormat.E164.Phone.phonenumbers.format_number.replace
    Port.Get_Port
    reportImage.open.write
    phonenumbers.is_possible_number
    info.find_all
    os.path.exists
    file2.seek
    username.replace.replace
    json.loads
    configparser.ConfigParser.write
    Core.Support.Username.Scraper.info.Binarysearch
    target.append
    email.encoders.encode_base64
    Core.Support.Username.Scraper.info.Kik
    Config.modify_Email_Status
    file.seek
    logging.shutdown
    json.dump
    Core.Support.Username.Scraper.info.Twitter
    Core.Support.Username.Scraper.info.Wattpad
    Core.Support.Username.Scraper.info.Github
    format
    urllib.request.urlopen
    Core.config.Config.main
    bs4.BeautifulSoup
    Config.modify_port
    socket.gethostbyname
    Core.Support.Username.Scraper.info.GitLab
    reader2.find.replace
    Core.Support.Username.Scraper.info.Imgur
    One_time.Agreement
    jsonfile.replace.replace
    os.chdir
    socket.socket.connect
    MrHolmes.Main.Menu
    email.mime.text.MIMEText
    Core.Searcher.MrHolmes.search
    Core.Port_Scanner.Ports.Main
    Core.Support.Username.Scraper.info.Pr0gramm
    Config.modify_password
    Core.Support.Logs.Log.Checker
    Core.Support.Map.Creation.mapPost
    Phone_search.Google_dork
    len
    reader.find.find
    info.find.strip
    Core.Support.Banner_Selector.Random.Get_Banner
    Phone_search.Banner
    jsonfile.replace
    Mail_search.Banner
    bs4.BeautifulSoup.find
    data.find
    reader2.find.find_all
    Core.Support.Dorks.Search.dork
    Core.Support.Username.Scraper.info.TikTok
    Config.modify_proxy
    stat.select_one
    Core.Update.Downloader.Check_Creds
    Config.modify_key
    open.read
    image.open.write
    Phony.Get_GeoLocation
    socket.socket.settimeout
    Config.modify_server
    Core.Support.Menu.Main.main
    

    @developer Could please help me check this issue? May I pull a request to fix it? Thank you very much.

    opened by PyDeps 0
Releases(T.G.D-1.0.1)
Owner
Anime lover📙, Geek👨🏼‍💻 , Hoopefull for a future in the Cybersecurity world😁
Python-based proof-of-concept tool for generating payloads that utilize unsafe Java object deserialization.

Python-based proof-of-concept tool for generating payloads that utilize unsafe Java object deserialization.

Astro 9 Sep 27, 2022
Cobalt Strike < 4.4 dos CVE-2021-36798

CVE-2021-36798 CVE-2021-36798 Cobalt Strike 4.3 dos 用法 python3 CVE-2021-36798.py BeaconURL 打瘫Cobalt Strike 只需要一个包 已测试 4.3 4.2 参考: https://labs.sent

37 Nov 09, 2022
Scanning for CVE-2021-44228

Filesystem log4j_scanner for windows and Unix. Scanning for CVE-2021-44228, CVE-2021-45046, CVE-2019-17571 Requires a minimum of Python 2.7. Can be ex

Brett England 4 Jan 09, 2022
Facebook account cloning/hacking advanced tool + dictionary attack added | Facebook automation tool

loggef Facebook automation tool, Facebook account hacking and cloning advanced tool + dictionary attack added Warning Use this tool for educational pu

Md Josif Khan 149 Aug 10, 2022
A set of blender assets created for the $yb NFT project.

fyb-blender A set of blender assets created for the $yb NFT project. Install just as you would any other Blender Add-on (via Edit-Preferences-Add-on

Pedro Arroyo 1 May 06, 2022
Argument Injection in Dragonfly Ruby Gem

CVE-2021-33564 PoC Exploit script for CVE-2021-33564 (Argument Injection in Dragonfly Ruby Gem). Usage Arbitrary File Read python3 poc.py -u https://

Michael Tsai 12 Nov 09, 2022
Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user

About Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user Changed from sam-the-admin. Usage SAM THE ADMIN CVE-202

Evi1cg 500 Jan 06, 2023
Scarecrow is a tool written in Python3 allowing you to protect your Python3 scripts.

🕷️ Scarecrow 🕷️ Scarecrow is a tool written in Python3 allowing you to protect your Python3 scripts. It looks for processes with specific names to v

Billy 33 Sep 28, 2022
使用golang重写开源工具wafw00f

GO-WAFW00F 介绍 WAFW00F是一款优秀的web应用防火墙识别开源工具:https://github.com/EnableSecurity/wafw00f 使用Golang重写的原因:Python环境配置不便利,Golang打包生成可执行文件直接运行 目前还在开发阶段,规则解析存在小问题

80 Dec 30, 2021
集成crawlergo、xray、dirsearch、nmap等工具的src漏洞挖掘工具,使用docker封装运行;

tools下有几个工具,所以项目文件比较大,如果下载总是中断的话建议拆开下载各个项目然后直接拷贝dockefile和recon.py即可 0x01 hscan介绍 hscan是什么 hscan是一款旨在使用一条命令替代渗透前的多条扫描命令,通过集成crawlergo扫描和xray扫描、dirsear

102 Jan 04, 2023
MainCoon - an automated recon framework

MainCoon is an automated recon framework meant for gathering information during penetration testing of web applications.

Md. Nur habib 8 Aug 26, 2022
Python tool for dumping flash via uboot reliably

Reliable Uboot Flash Dumper is a Python tool for dumping flash via uboot reliably. If you've ever had to dump flash via uboot and a serial connection and became frustrated about doing it several time

SecurityJon 25 May 10, 2022
Steal Files on a Windows Machine

File-Stealer Steal Files on a Windows Machine About This Script will steal certain Files on a Windows Machine and sends them to a FTP Server. Preview

Marcel 5 Nov 17, 2022
Generate MIPS reverse shell shellcodes easily !

MIPS-Reverse MIPS-Reverse is a tool that can generate shellcodes for the MIPS architecture that launches a reverse shell where you can specify the IP

29 Jul 27, 2021
This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit

CVE-2021-40444 builders This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit. This repo is just for testing, re

ASL IT Security 168 Nov 09, 2022
POC for detecting the Log4Shell (Log4J RCE) vulnerability.

log4shell-poc-py POC for detecting the Log4Shell (Log4J RCE) vulnerability. Run on a system with python3 python3 log4shell-poc.py pathToTargetFile

BCC Risk Advisory 2 Dec 22, 2021
The Decompressoin tool for Vxworks MINIFS

MINIFS-Decompression The Decompression tool for Vxworks MINIFS filesystem. USAGE python minifs_decompression.py [target_firmware] The example of Mercu

8 Jan 03, 2023
An easy-to-use wrapper for NTFS-3G on macOS

ezNTFS ezNTFS is an easy-to-use wrapper for NTFS-3G on macOS. ezNTFS can be used as a menu bar app, or via the CLI in the terminal. Installation To us

Matthew Go 34 Dec 01, 2022
A simple Log4Shell Scan with python

🐞 Log4Scan 🔧 Log4Shell 简单的主动和被动扫描脚本 Log4scan 针对header头和fuzz参数的主动批量扫描,用于大批量黑盒检测

nul1 6 Aug 04, 2022