π Advanced Open Source Intelligence Platform for Digital Investigations
π Built with β€οΈ by Scayar
ScayNum is a comprehensive OSINT (Open Source Intelligence) platform designed for digital investigators, security researchers, and cybersecurity professionals. It provides advanced capabilities for gathering intelligence from various digital sources through an intuitive, modern interface.
- π± Phone Number Intelligence - Comprehensive analysis and social media discovery
- π IP Address Intelligence - Network analysis and threat detection
- π Web Search Intelligence - Multi-engine search with smart categorization
- πΈ Social Media Intelligence - Instagram profile analysis and monitoring
- π€ Username Intelligence - Cross-platform username verification
flowchart TD
Start([π User Launches ScayNum]) --> Init[π Initialization<br/>Load Modules & Dependencies]
Init --> Banner[π¨ Display Banner<br/>& Welcome Screen]
Banner --> UpdateCheck{π Check for<br/>Updates?}
UpdateCheck -->|Yes| Update[π¦ Update System<br/>Git Pull & Dependencies]
UpdateCheck -->|No| Menu
Update --> Menu[π Main Menu<br/>Display Options]
Menu --> Option1[1οΈβ£ Phone Intelligence]
Menu --> Option2[2οΈβ£ IP Intelligence]
Menu --> Option3[3οΈβ£ Web Intelligence]
Menu --> Option4[4οΈβ£ Social Intelligence]
Menu --> Option5[5οΈβ£ Username Intelligence]
Menu --> Option6[6οΈβ£ Batch Processing]
Menu --> Option7[7οΈβ£ Update System]
Menu --> Option8[8οΈβ£ Exit]
Option1 --> Input1[π Get Phone Number Input<br/>Format: +CountryCode Number]
Input1 --> Validate1{β
Validate<br/>Phone Format?}
Validate1 -->|Invalid| Error1[β Show Error<br/>Return to Menu]
Validate1 -->|Valid| Process1[π Process Phone Intelligence]
Option2 --> Input2[π Get IP Address Input<br/>Format: IPv4 or IPv6]
Input2 --> Validate2{β
Validate<br/>IP Format?}
Validate2 -->|Invalid| Error2[β Show Error<br/>Return to Menu]
Validate2 -->|Valid| Process2[π Process IP Intelligence]
Option3 --> Input3[π Get Search Query Input]
Input3 --> Process3[π Process Web Intelligence]
Option4 --> Input4[πΈ Get Instagram Username]
Input4 --> Process4[π Process Social Intelligence]
Option5 --> Input5[π€ Get Username to Search]
Input5 --> Process5[π Process Username Intelligence]
Option6 --> BatchMenu[π Batch Processing Menu]
BatchMenu --> BatchType{Select Type}
BatchType -->|Phones| Batch1[π Batch Phone Processing<br/>Read CSV File]
BatchType -->|IPs| Batch2[π Batch IP Processing<br/>Read CSV File]
Batch1 --> Process1
Batch2 --> Process2
Process1 --> Collect1[π‘ Collect Data from:<br/>β’ Phone APIs<br/>β’ Social Media<br/>β’ Data Breach DBs<br/>β’ Geolocation Services]
Process2 --> Collect2[π‘ Collect Data from:<br/>β’ IP Geolocation APIs<br/>β’ Threat Intelligence<br/>β’ DNS Servers<br/>β’ Network Analysis]
Process3 --> Collect3[π‘ Collect Data from:<br/>β’ DuckDuckGo<br/>β’ Bing Search<br/>β’ Google Fallback]
Process4 --> Collect4[π‘ Collect Data from:<br/>β’ Instagram API<br/>β’ Profile Analysis<br/>β’ Post Analytics]
Process5 --> Collect5[π‘ Collect Data from:<br/>β’ 20+ Social Platforms<br/>β’ Platform APIs<br/>β’ Username Checks]
Collect1 --> Analyze1[π§ Analyze Data:<br/>β’ Risk Assessment<br/>β’ Pattern Recognition<br/>β’ Threat Detection]
Collect2 --> Analyze2[π§ Analyze Data:<br/>β’ Network Analysis<br/>β’ Threat Indicators<br/>β’ Risk Scoring]
Collect3 --> Analyze3[π§ Analyze Data:<br/>β’ Result Categorization<br/>β’ Relevance Ranking<br/>β’ Content Extraction]
Collect4 --> Analyze4[π§ Analyze Data:<br/>β’ Engagement Metrics<br/>β’ Fake Account Detection<br/>β’ Content Analysis]
Collect5 --> Analyze5[π§ Analyze Data:<br/>β’ Visibility Scoring<br/>β’ Privacy Assessment<br/>β’ Risk Evaluation]
Analyze1 --> Display1[πΊ Display Results<br/>Terminal Output]
Analyze2 --> Display2[πΊ Display Results<br/>Terminal Output]
Analyze3 --> Display3[πΊ Display Results<br/>Terminal Output]
Analyze4 --> Display4[πΊ Display Results<br/>Terminal Output]
Analyze5 --> Display5[πΊ Display Results<br/>Terminal Output]
Display1 --> Report1[π Generate Reports]
Display2 --> Report2[π Generate Reports]
Display3 --> Report3[π Generate Reports]
Display4 --> Report4[π Generate Reports]
Display5 --> Report5[π Generate Reports]
Report1 --> Save1[πΎ Save to Results Folder:<br/>β’ CSV Report<br/>β’ PDF Report<br/>β’ HTML Report<br/>β’ Interactive Map]
Report2 --> Save2[πΎ Save to Results Folder:<br/>β’ CSV Report<br/>β’ PDF Report<br/>β’ HTML Report<br/>β’ Interactive Map]
Report3 --> Save3[πΎ Save to Results Folder:<br/>β’ CSV Report<br/>β’ PDF Report<br/>β’ HTML Report]
Report4 --> Save4[πΎ Save to Results Folder:<br/>β’ CSV Report<br/>β’ PDF Report<br/>β’ HTML Report<br/>β’ Profile Images]
Report5 --> Save5[πΎ Save to Results Folder:<br/>β’ CSV Report<br/>β’ PDF Report<br/>β’ HTML Report]
Save1 --> Continue{π Continue?}
Save2 --> Continue
Save3 --> Continue
Save4 --> Continue
Save5 --> Continue
Error1 --> Continue
Error2 --> Continue
Continue -->|Yes| Menu
Continue -->|No| End([π Exit ScayNum])
Option7 --> Update
Option8 --> End
style Start fill:#667eea,stroke:#764ba2,stroke-width:3px,color:#fff
style Menu fill:#2196F3,stroke:#1976D2,stroke-width:3px,color:#fff
style Process1 fill:#E91E63,stroke:#C2185B,stroke-width:2px,color:#fff
style Process2 fill:#FF9800,stroke:#F57C00,stroke-width:2px,color:#fff
style Process3 fill:#9C27B0,stroke:#7B1FA2,stroke-width:2px,color:#fff
style Process4 fill:#00BCD4,stroke:#0097A7,stroke-width:2px,color:#fff
style Process5 fill:#795548,stroke:#5D4037,stroke-width:2px,color:#fff
style Analyze1 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
style Analyze2 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
style Analyze3 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
style Analyze4 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
style Analyze5 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
style Save1 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
style Save2 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
style Save3 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
style Save4 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
style Save5 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
style End fill:#f44336,stroke:#d32f2f,stroke-width:3px,color:#fff
graph LR
subgraph Input["π₯ INPUT LAYER"]
A1[Phone Number<br/>+1234567890]
A2[IP Address<br/>8.8.8.8]
A3["Search Query<br/>John Doe"]
A4[Instagram Username<br/>@username]
A5[Username<br/>username123]
end
subgraph Validation["β
VALIDATION LAYER"]
B1[Format Validation<br/>Phone Number Parser]
B2[Format Validation<br/>IP Address Validator]
B3[Query Processing<br/>Smart Variations]
B4[Username Validation<br/>Format Check]
B5[Username Validation<br/>Format Check]
end
subgraph Collection["π‘ DATA COLLECTION LAYER"]
C1[API Calls<br/>Phone Lookup Services<br/>Social Media APIs<br/>Data Breach DBs]
C2[API Calls<br/>IP Geolocation<br/>Threat Intelligence<br/>DNS Resolution]
C3[Web Scraping<br/>DuckDuckGo Search<br/>Bing Search<br/>Google Fallback]
C4[Instagram API<br/>Instaloader<br/>Profile Data<br/>Post Analytics]
C5[Platform Checks<br/>20+ Social Platforms<br/>URL Verification<br/>Status Checking]
end
subgraph Processing["π§ ANALYSIS LAYER"]
D1[Risk Assessment<br/>Social Media Presence<br/>Breach Detection<br/>Geolocation Analysis]
D2[Threat Analysis<br/>Risk Scoring<br/>Network Analysis<br/>DNS Records]
D3[Result Ranking<br/>Categorization<br/>Relevance Scoring<br/>Content Extraction]
D4[Engagement Analysis<br/>Fake Detection<br/>Hashtag Analysis<br/>Content Patterns]
D5[Visibility Scoring<br/>Privacy Assessment<br/>Risk Evaluation<br/>Footprint Mapping]
end
subgraph Output["π€ OUTPUT LAYER"]
E1[Terminal Display<br/>Colored Output<br/>Formatted Tables]
E2[CSV Reports<br/>Spreadsheet Format<br/>Data Export]
E3[PDF Reports<br/>Professional Docs<br/>Printable Format]
E4[HTML Reports<br/>Interactive Web<br/>Visualizations]
E5[Interactive Maps<br/>Geolocation Display<br/>Coordinate Mapping]
end
A1 --> B1 --> C1 --> D1 --> E1
A1 --> B1 --> C1 --> D1 --> E2
A1 --> B1 --> C1 --> D1 --> E3
A1 --> B1 --> C1 --> D1 --> E4
A1 --> B1 --> C1 --> D1 --> E5
A2 --> B2 --> C2 --> D2 --> E1
A2 --> B2 --> C2 --> D2 --> E2
A2 --> B2 --> C2 --> D2 --> E3
A2 --> B2 --> C2 --> D2 --> E4
A2 --> B2 --> C2 --> D2 --> E5
A3 --> B3 --> C3 --> D3 --> E1
A3 --> B3 --> C3 --> D3 --> E2
A3 --> B3 --> C3 --> D3 --> E3
A3 --> B3 --> C3 --> D3 --> E4
A4 --> B4 --> C4 --> D4 --> E1
A4 --> B4 --> C4 --> D4 --> E2
A4 --> B4 --> C4 --> D4 --> E3
A4 --> B4 --> C4 --> D4 --> E4
A5 --> B5 --> C5 --> D5 --> E1
A5 --> B5 --> C5 --> D5 --> E2
A5 --> B5 --> C5 --> D5 --> E3
A5 --> B5 --> C5 --> D5 --> E4
style Input fill:#E3F2FD,stroke:#1976D2,stroke-width:2px
style Validation fill:#FFF3E0,stroke:#F57C00,stroke-width:2px
style Collection fill:#F3E5F5,stroke:#7B1FA2,stroke-width:2px
style Processing fill:#E8F5E9,stroke:#388E3C,stroke-width:2px
style Output fill:#FFEBEE,stroke:#C62828,stroke-width:2px
graph TB
subgraph User["π€ USER INTERFACE"]
UI1[Command Line Interface<br/>Terminal/Console]
UI2[Interactive Menu<br/>Option Selection]
UI3[Real-time Feedback<br/>Progress Display]
end
subgraph Core["π§ CORE SYSTEM"]
C1[Main Entry Point<br/>main.py]
C2[Core Module<br/>core.py<br/>Menu & Navigation]
C3[Error Handling<br/>Exception Management]
C4[Update System<br/>Git Integration]
end
subgraph Modules["π§ INTELLIGENCE MODULES"]
M1[Phone Intelligence<br/>Phone Lookup<br/>Social Discovery<br/>Breach Check]
M2[IP Intelligence<br/>Geolocation<br/>Threat Intel<br/>DNS Analysis]
M3[Web Intelligence<br/>Multi-Engine Search<br/>Categorization<br/>Content Extraction]
M4[Social Intelligence<br/>Instagram Analysis<br/>Profile Analytics<br/>Engagement Metrics]
M5[Username Intelligence<br/>Platform Checking<br/>Visibility Scoring<br/>Privacy Assessment]
end
subgraph Data["π‘ DATA SOURCES"]
D1[Phone APIs<br/>Carrier Info<br/>Geolocation]
D2[Social Media APIs<br/>Profile Data<br/>Public Records]
D3[Search Engines<br/>DuckDuckGo<br/>Bing<br/>Google]
D4[Threat Intelligence<br/>AbuseIPDB<br/>VirusTotal<br/>OTX]
D5[DNS Servers<br/>Record Resolution<br/>Reverse Lookup]
D6[Instagram API<br/>Instaloader<br/>Profile & Posts]
end
subgraph Processing["βοΈ DATA PROCESSING"]
P1[Data Collection<br/>API Requests<br/>Web Scraping]
P2[Data Validation<br/>Format Checking<br/>Error Handling]
P3[Data Analysis<br/>Pattern Recognition<br/>Risk Assessment]
P4[Data Enrichment<br/>Cross-referencing<br/>Correlation]
end
subgraph Reports["π REPORT GENERATION"]
R1[CSV Generator<br/>Spreadsheet Format]
R2[PDF Generator<br/>FPDF Library]
R3[HTML Generator<br/>Jinja2 Templates]
R4[Map Generator<br/>Folium Maps]
end
subgraph Output["πΎ OUTPUT"]
O1[Results Folder<br/>Organized Storage]
O2[CSV Files<br/>Data Export]
O3[PDF Reports<br/>Documentation]
O4[HTML Reports<br/>Interactive View]
O5[Map Files<br/>Geolocation Display]
end
UI1 --> C1
UI2 --> C1
UI3 --> C1
C1 --> C2
C2 --> C3
C2 --> C4
C2 --> M1
C2 --> M2
C2 --> M3
C2 --> M4
C2 --> M5
M1 --> D1
M1 --> D2
M2 --> D2
M2 --> D4
M2 --> D5
M3 --> D3
M4 --> D6
M5 --> D2
M1 --> P1
M2 --> P1
M3 --> P1
M4 --> P1
M5 --> P1
P1 --> P2
P2 --> P3
P3 --> P4
P4 --> R1
P4 --> R2
P4 --> R3
P4 --> R4
R1 --> O1
R2 --> O1
R3 --> O1
R4 --> O1
O1 --> O2
O1 --> O3
O1 --> O4
O1 --> O5
style User fill:#667eea,stroke:#764ba2,stroke-width:2px,color:#fff
style Core fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
style Modules fill:#FF9800,stroke:#F57C00,stroke-width:2px,color:#fff
style Data fill:#9C27B0,stroke:#7B1FA2,stroke-width:2px,color:#fff
style Processing fill:#00BCD4,stroke:#0097A7,stroke-width:2px,color:#fff
style Reports fill:#E91E63,stroke:#C2185B,stroke-width:2px,color:#fff
style Output fill:#795548,stroke:#5D4037,stroke-width:2px,color:#fff
sequenceDiagram
autonumber
participant User
participant Main as Main Entry Point
participant Core as Core Module
participant Module as Intelligence Module
participant API as External APIs
participant Analyzer as Data Analyzer
participant Reporter as Report Generator
participant FileSystem as File System
User->>Main: Launch ScayNum
Main->>Core: Initialize Application
Core->>User: Display Menu Options
User->>Core: Select Option (1-8)
Core->>Core: Validate Selection
alt Option 1-5: Intelligence Module
Core->>Module: Initialize Module
Module->>User: Request Input Data
User->>Module: Provide Input (Phone/IP/Query/Username)
Module->>Module: Validate Input Format
alt Invalid Input
Module->>User: Show Error Message
Module->>Core: Return to Menu
else Valid Input
Module->>API: Send API Request(s)
API-->>Module: Return Raw Data
loop Multiple Data Sources
Module->>API: Additional Requests
API-->>Module: Additional Data
end
Module->>Analyzer: Process Raw Data
Analyzer->>Analyzer: Data Cleaning
Analyzer->>Analyzer: Pattern Recognition
Analyzer->>Analyzer: Risk Assessment
Analyzer->>Analyzer: Correlation Analysis
Analyzer-->>Module: Analyzed Results
Module->>User: Display Results in Terminal
Module->>Reporter: Generate Reports
Reporter->>Reporter: Create CSV Report
Reporter->>Reporter: Create PDF Report
Reporter->>Reporter: Create HTML Report
Reporter->>Reporter: Create Interactive Map (if applicable)
Reporter->>FileSystem: Save All Reports
FileSystem-->>Reporter: Confirmation
Reporter-->>Module: Reports Generated
Module->>User: Show Save Location
end
else Option 6: Batch Processing
Core->>Module: Initialize Batch Module
Module->>User: Request CSV File Path
User->>Module: Provide File Path
Module->>FileSystem: Read CSV File
FileSystem-->>Module: File Data
loop Each Row in CSV
Module->>Module: Process Single Entry
Note over Module: Same flow as single entry
end
Module->>Reporter: Generate Batch Summary
Reporter->>FileSystem: Save Batch Reports
else Option 7: Update System
Core->>Core: Check Git Status
Core->>Core: Fetch Updates
Core->>User: Show Available Updates
User->>Core: Confirm Update
Core->>Core: Pull Latest Code
Core->>Core: Update Dependencies
Core->>User: Show Update Status
else Option 8: Exit
Core->>User: Display Thank You Message
Core->>Main: Exit Application
end
alt Continue Processing
Module->>Core: Return to Menu
else Exit
Module->>Main: Exit Application
end
Comprehensive Phone Number Analysis:
- β Social Media Discovery - Find profiles across 50+ platforms
- β Data Breach Verification - Check against 100+ known breaches
- β Messaging Platform Detection - Identify WhatsApp, Telegram, Signal usage
- β Geolocation Intelligence - Precise location mapping with coordinates
- β Owner Information Estimation - Name and demographic analysis
- β Interactive Geographic Visualization - Real-time map integration
- β Risk Assessment Engine - Threat level evaluation
- β Batch Processing Capability - Process thousands of numbers via CSV
Perfect for: Digital forensics, background checks, threat intelligence
Advanced IP Address Intelligence:
- β Comprehensive IP Profiling - Country, city, ISP, organization details
- β Reverse DNS Resolution - Complete domain name analysis
- β DNS Records Intelligence - A, AAAA, MX, TXT, NS records
- β Threat Intelligence Integration - Check against 50+ threat databases
- β Network Infrastructure Analysis - ASN, hosting, proxy detection
- β Geographic Visualization - Interactive mapping with coordinates
- β Security Risk Assessment - Automated threat evaluation
- β Bulk IP Analysis - Process multiple IPs simultaneously
Perfect for: Network security, incident response, threat hunting
Advanced Web Search Intelligence:
- β Multi-Engine Search - DuckDuckGo, Bing, Google with fallback
- β Smart Result Categorization - Automatic content classification
- β Social Media Profile Detection - Identify social accounts
- β Contact Information Extraction - Emails, phones, addresses
- β Threat Intelligence Analysis - Security indicator detection
- β Comprehensive Reporting - CSV, PDF, HTML with visualizations
- β Advanced Filtering - Relevance and source-based filtering
- β Real-time Data Processing - Live result analysis
Perfect for: Digital investigations, competitive intelligence, research
Instagram Profile Intelligence:
- β Comprehensive Profile Analysis - Bio, followers, posts, engagement
- β Fake Account Detection - AI-powered suspicious profile identification
- β Engagement Rate Calculation - Automated metrics analysis
- β Hashtag Intelligence - Popular hashtags and trend analysis
- β Real-time Monitoring - Live profile tracking capabilities
- β Visual Report Generation - Beautiful PDF/HTML reports
- β Content Analysis - Post patterns and content categorization
- β Network Mapping - Connection and interaction analysis
Perfect for: Social media investigations, influencer analysis, brand protection
Cross-Platform Username Intelligence:
- β Multi-Platform Verification - Check 20+ major platforms
- β Visibility Score Calculation - Online presence quantification
- β Risk Level Assessment - Automated security evaluation
- β Privacy Recommendations - Personalized protection advice
- β Comprehensive Reporting - Detailed CSV, PDF, HTML reports
- β Real-time Platform Checking - Live availability verification
- β Brand Protection Analysis - Username squatting detection
- β Digital Footprint Mapping - Complete online presence overview
Perfect for: Brand protection, identity verification, digital footprint analysis
- Python 3.7 or higher
- pip (Python package manager)
- Git (for updates)
Method 1: One-Click Installation (Recommended)
# Download and extract ScayNum
# Double-click on run_ScayNum.batMethod 2: PowerShell Installation
# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum
# Install dependencies
.\run_ScayNum.ps1 -Install
# Launch ScayNum
.\run_ScayNum.ps1Method 3: Command Prompt Installation
# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum
# Install dependencies
pip install -r requirements.txt
# Launch ScayNum
python main.pyMethod 1: Terminal Installation (Recommended)
# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum
# Make script executable
chmod +x run_ScayNum.sh
# Install dependencies
./run_ScayNum.sh install
# Launch ScayNum
./run_ScayNum.shMethod 2: Makefile Installation
# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum
# Install and launch
make install && make runMethod 1: Quick Installation
# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum
# Install dependencies
sudo apt update
sudo apt install python3-pip
pip3 install -r requirements.txt
# Launch ScayNum
python3 main.py-
Launch ScayNum:
python main.py
-
Select a module from the menu:
1- Phone Number OSINT2- IP Address Lookup3- Web Search4- Instagram OSINT5- Username Search6- Batch Processing7- Update ScayNum8- Exit
-
Follow the prompts to enter your query
-
View results in the terminal and check the generated reports in the results folder
python main.py
# Select option 1: Phone Number OSINT
# Enter phone number: +1234567890python main.py
# Select option 2: IP Address Lookup
# Enter IP address: 8.8.8.8python main.py
# Select option 3: Web Search
# Enter query: "John Doe cybersecurity"# Create CSV file with targets
echo "phone_number" > phones.csv
echo "+1234567890" >> phones.csv
echo "+9876543210" >> phones.csv
# Run batch processing
python main.py
# Select option 6: Batch Processing
# Select option 1: Phone Numbers (CSV)
# Enter file path: phones.csvScayNum/
βββ main.py # π Main entry point
βββ scripts/
β βββ core.py # π§ Core application logic
β βββ phone_intelligence.py # π± Phone OSINT module
β βββ ip_intelligence.py # π IP intelligence module
β βββ web_intelligence.py # π Web search module
β βββ social_intelligence.py # πΈ Social media module
β βββ username_intelligence.py # π€ Username search module
βββ requirements.txt # π¦ Dependencies
βββ setup.py # βοΈ Package configuration
βββ README.md # π Documentation
βββ LICENSE # π License information
βββ Makefile # π§ Build automation
βββ .gitignore # π« Git ignore rules
βββ run_ScayNum.bat # πͺ Windows launcher
βββ run_ScayNum.ps1 # π» PowerShell launcher
βββ run_ScayNum.sh # π§ Shell launcher
- pyfiglet - ASCII art and banners
- colorama - Terminal color support
- tabulate - Beautiful table formatting
- requests - HTTP client library
- beautifulsoup4 - HTML parsing
- phonenumbers - Phone number validation
- folium - Interactive maps
- instaloader - Instagram API
- fpdf - PDF generation
- jinja2 - HTML templating
- dnspython - DNS resolution
- googlesearch-python - Google search integration
Install all dependencies:
pip install -r requirements.txt- β No Data Storage - All data processed locally
- β Encrypted Communications - Secure API connections
- β Rate Limiting - Respectful API usage
- β User Agent Rotation - Anti-detection measures
- β Proxy Support - Anonymous browsing capabilities
- This tool is for educational and research purposes only
- Users are responsible for complying with local laws and regulations
- Respect privacy and terms of service of target platforms
- Use responsibly and ethically
We welcome contributions from the community! Here's how you can help:
- Use the Issues page
- Provide detailed error descriptions
- Include system information and logs
- Submit feature ideas via Issues
- Describe use cases and benefits
- Consider implementation complexity
- Fork the repository
- Create a feature branch
- Make your changes
- Add tests if applicable
- Submit a pull request
- Improve README sections
- Add code comments
- Create tutorials and guides
This project is licensed under the MIT License - see the LICENSE file for details.
Scayar
- π Website: Scayar.com
- π§ Email: Scayar.exe@gmail.com
- π¬ Telegram: @im_scayar
- βοΈ Buy Me a Coffee: buymeacoffee.com/scayar
- Open Source Community - For amazing libraries and tools
- OSINT Community - For knowledge sharing and collaboration
- Contributors - For code improvements and bug fixes
- Users - For feedback and feature suggestions
- OSINT Framework - For comprehensive intelligence gathering
- Maltego - For graph-based intelligence visualization
- Shodan - For internet-wide intelligence gathering
- TheHarvester - For email and domain intelligence
This project would not be possible without the amazing open-source community and the tools they've created. Thank you to all the developers and contributors who make projects like this possible.
If you find this project helpful, please consider giving it a star β
Made with β€οΈ by Scayar