Advanced reconnaissance and security analysis tool for OSINT investigations and penetration testing
π Language / Idioma:
- π Key Features
- π Installation
- π» Basic Usage
- π Commands
- π‘οΈ Security
- π€ Contributing
- π License
|
|
|
|
Python 3.13+ | pip | pipx (recommended)
# Install using pipx
pipx install moriarty-project
# Verify installation
moriarty --help
# Global installation
pip install moriarty-project
# User installation
pip install --user moriarty-project
# Clone repository
git clone https://github.com/DonatoReis/moriarty.git
cd moriarty
# Create virtual environment
python -m venv venv
source venv/bin/activate # Windows: venv\Scripts\activate
# Install in development mode
pip install -e .
pip install -r requirements-dev.txt
moriarty [GLOBAL_OPTIONS] COMMAND [ARGUMENTS] [OPTIONS]
Option | Description | Default |
---|---|---|
--verbose |
Detailed logs | False |
--quiet |
Suppress output | False |
--concurrency INT |
Concurrent tasks | 50 |
--timeout FLOAT |
Timeout (seconds) | 8.0 |
--proxy URL |
HTTP/SOCKS proxy | - |
--format |
Output format | table |
--output PATH |
Save to file | - |
email check - Validate email address
# Basic usage
moriarty email check [email protected]
# With options
moriarty email check --verbose [email protected] --format json --output result.json
email investigate - Deep investigation
# Investigate across multiple sources
moriarty email investigate [email protected] --verbose
user enum - Enumerate username
# Check availability
moriarty user enum username
# On specific sites
moriarty user enum username --sites github,twitter,instagram --output results.json
domain scan - Complete scan
# Full scan
moriarty domain scan example.com --stealth 2 --threads 50
# Specific modules
moriarty domain scan example.com --modules dns,ports,ssl
Options:
--modules
: all, dns, subdiscover, wayback, ports, ssl, crawl, fuzzer, template-scan, vuln-scan, waf-detect--stealth
: Stealth level (0-4)--threads
: Concurrent threads--timeout
: Timeout in seconds
domain recon - Passive reconnaissance
moriarty domain recon example.com --output results.json
intel ioc - IOC analysis
moriarty intel ioc --file iocs.txt --output report.html
Command | Description |
---|---|
network dns |
Advanced DNS queries |
network tls |
TLS/SSL analysis |
network rdap |
RDAP queries |
Command | Description |
---|---|
tools template |
Template management |
tools waf |
WAF detection tests |
# 1. Basic scan with stealth
moriarty domain scan example.com --stealth 2 --threads 50
# 2. Complete passive reconnaissance
moriarty domain recon example.com --output results.json --format json
# 3. Email verification with investigation
moriarty email check [email protected] --verbose
moriarty email investigate [email protected]
# 4. IOC analysis with HTML report
moriarty intel ioc --file iocs.txt --output report.html
# 5. Username enumeration on social networks
moriarty user enum johndoe --sites github,twitter,linkedin
moriarty --professional-mode domain scan example.com
- β Encrypted connections (HTTPS/TLS)
- β Automatic PII redaction
- β Proxy and Tor support
- β Digital signature of results
- β Advanced stealth mode
Contributions are welcome! π
- Fork the repository
- Create a branch (
git checkout -b feature/NewFeature
) - Commit your changes (
git commit -m 'Add: New feature'
) - Push to the branch (
git push origin feature/NewFeature
) - Open a Pull Request
- Follow the Style Guide
- Add tests for new features
- Update documentation
- Keep code clean and documented
Distributed under the MIT License. See LICENSE
for more information.
Thanks to all contributors who help make Moriarty better!
Developed with β€οΈ by the community