File OSINT is an automated reconnaissance tool that scans websites to detect 115+ file types. It helps ethical hackers and pentesters identify exposed assets, improve footprinting, and perform faster, more efficient OSINT investigations.
- Scan websites for 115+ file types
- Identify exposed and sensitive files
- Fast and automated reconnaissance
- Useful for OSINT and footprinting
- Easy to use CLI-based tool
git clone https://github.com/yourusername/file-osint.git
cd file-osint
## Usage
usage: fileosint.py [-h] -d DOMAIN [-t TYPES] [--all] [--docs] [--data] [--backup] [--code] [--config] [--media] [--certs] [-o OUTPUT] [--json] [--silent]
options:
-h, --help
usage: fileosint.py -d DOMAIN [OPTIONS]
OSINT Filetype Discovery Tool
Discover publicly exposed files of multiple types from a target website.
Designed for reconnaissance and OSINT investigations.
------------------------------------------------------------
TARGET OPTIONS
------------------------------------------------------------
-d, --domain DOMAIN
Target domain to scan
Example:
-d example.com
-d axximuminfosolutions.com
------------------------------------------------------------
FILETYPE SELECTION
------------------------------------------------------------
-t, --types TYPES
Scan specific file types (comma-separated)
Example:
-t pdf,sql,zip
-t env,log,config
--all Scan ALL supported file types
--docs Document files
--data Spreadsheet & structured data files
--backup Archive & backup files
--code Source code files
--config Config, env & log files
--media Image, audio & video files
--certs Certificate & key files
------------------------------------------------------------
OUTPUT OPTIONS
------------------------------------------------------------
-o, --output FILE
Save results to a file
--json
Save output in JSON format
--silent
Silent mode (no banner)
------------------------------------------------------------
EXAMPLES (HOW TO USE)
------------------------------------------------------------
Basic document scan:
python fileosint.py -d example.com --docs
Full OSINT scan (ALL filetypes):
python fileosint.py -d example.com --all
Backup & config leaks:
python fileosint.py -d example.com --backup --config
Custom sensitive search:
python fileosint.py -d example.com -t env,sql,zip,log
Real target (educational):
python fileosint.py -d certifiedhacker.com --docs
------------------------------------------------------------
SUPPORTED FILE TYPES (ALL)
------------------------------------------------------------
Documents:
pdf, doc, docx, odt, rtf, txt, tex, wps
Spreadsheets & Data:
xls, xlsx, csv, ods, tsv, xml, json, yaml, yml
Presentations:
ppt, pptx, odp, key
Archives & Backups:
zip, rar, 7z, tar, gz, tgz, bz2, xz, iso, bak, backup, old
Databases & Dumps:
sql, db, sqlite, sqlite3, mdb, accdb, dump
Images:
jpg, jpeg, png, gif, bmp, tiff, svg, webp, ico
Audio:
mp3, wav, ogg, flac, aac, m4a
Video:
mp4, avi, mkv, mov, wmv, flv, webm
Source Code:
php, asp, aspx, jsp, js, ts, py, rb, java, go, c, cpp, h, cs, sh, bat, ps1
Config & Logs:
env, ini, cfg, conf, config, log, properties, htaccess
Certificates & Keys:
pem, key, crt, cer, pfx, p12, jks, keystore
Email Files:
eml, msg, pst, mbox
Web Files:
html, htm, xhtml, css, scss, less, md, markdown
Miscellaneous:
apk, exe, msi, dmg, pkg, deb, rpm, swp, tmp, lock
------------------------------------------------------------
DISCLAIMER
------------------------------------------------------------
This tool is intended for educational and authorized OSINT research only.
Scan only domains you own or have explicit permission to analyze.
-d, --domain DOMAIN Target domain
-t, --types TYPES Comma-separated file types
--all
--docs
--data
--backup
--code
--config
--media
--certs
-o, --output OUTPUT Save output to file
--json
--silent

