Skip to content
/ ScayNum Public

Advanced OSINT Intelligence Platform for Digital Investigations | Phone Intelligence | IP Analysis | Web Search | Social OSINT | Username Search

License

Notifications You must be signed in to change notification settings

Scayar/ScayNum

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

4 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸš€ ScayNum - Advanced OSINT Intelligence Platform

Python License Version Platform Made with Love

πŸ” Advanced Open Source Intelligence Platform for Digital Investigations

🌟 Built with ❀️ by Scayar


πŸ“‹ Table of Contents


🎯 Overview

ScayNum is a comprehensive OSINT (Open Source Intelligence) platform designed for digital investigators, security researchers, and cybersecurity professionals. It provides advanced capabilities for gathering intelligence from various digital sources through an intuitive, modern interface.

Key Capabilities

  • πŸ“± Phone Number Intelligence - Comprehensive analysis and social media discovery
  • 🌐 IP Address Intelligence - Network analysis and threat detection
  • πŸ” Web Search Intelligence - Multi-engine search with smart categorization
  • πŸ“Έ Social Media Intelligence - Instagram profile analysis and monitoring
  • πŸ‘€ Username Intelligence - Cross-platform username verification

πŸ—οΈ Architecture & How It Works

Complete System Workflow

flowchart TD
    Start([πŸš€ User Launches ScayNum]) --> Init[πŸ“‹ Initialization<br/>Load Modules & Dependencies]
    Init --> Banner[🎨 Display Banner<br/>& Welcome Screen]
    Banner --> UpdateCheck{πŸ”„ Check for<br/>Updates?}
    
    UpdateCheck -->|Yes| Update[πŸ“¦ Update System<br/>Git Pull & Dependencies]
    UpdateCheck -->|No| Menu
    Update --> Menu[πŸ“‹ Main Menu<br/>Display Options]
    
    Menu --> Option1[1️⃣ Phone Intelligence]
    Menu --> Option2[2️⃣ IP Intelligence]
    Menu --> Option3[3️⃣ Web Intelligence]
    Menu --> Option4[4️⃣ Social Intelligence]
    Menu --> Option5[5️⃣ Username Intelligence]
    Menu --> Option6[6️⃣ Batch Processing]
    Menu --> Option7[7️⃣ Update System]
    Menu --> Option8[8️⃣ Exit]
    
    Option1 --> Input1[πŸ“ž Get Phone Number Input<br/>Format: +CountryCode Number]
    Input1 --> Validate1{βœ… Validate<br/>Phone Format?}
    Validate1 -->|Invalid| Error1[❌ Show Error<br/>Return to Menu]
    Validate1 -->|Valid| Process1[πŸ” Process Phone Intelligence]
    
    Option2 --> Input2[🌐 Get IP Address Input<br/>Format: IPv4 or IPv6]
    Input2 --> Validate2{βœ… Validate<br/>IP Format?}
    Validate2 -->|Invalid| Error2[❌ Show Error<br/>Return to Menu]
    Validate2 -->|Valid| Process2[πŸ” Process IP Intelligence]
    
    Option3 --> Input3[πŸ”Ž Get Search Query Input]
    Input3 --> Process3[πŸ” Process Web Intelligence]
    
    Option4 --> Input4[πŸ“Έ Get Instagram Username]
    Input4 --> Process4[πŸ” Process Social Intelligence]
    
    Option5 --> Input5[πŸ‘€ Get Username to Search]
    Input5 --> Process5[πŸ” Process Username Intelligence]
    
    Option6 --> BatchMenu[πŸ“Š Batch Processing Menu]
    BatchMenu --> BatchType{Select Type}
    BatchType -->|Phones| Batch1[πŸ“ž Batch Phone Processing<br/>Read CSV File]
    BatchType -->|IPs| Batch2[🌐 Batch IP Processing<br/>Read CSV File]
    Batch1 --> Process1
    Batch2 --> Process2
    
    Process1 --> Collect1[πŸ“‘ Collect Data from:<br/>β€’ Phone APIs<br/>β€’ Social Media<br/>β€’ Data Breach DBs<br/>β€’ Geolocation Services]
    Process2 --> Collect2[πŸ“‘ Collect Data from:<br/>β€’ IP Geolocation APIs<br/>β€’ Threat Intelligence<br/>β€’ DNS Servers<br/>β€’ Network Analysis]
    Process3 --> Collect3[πŸ“‘ Collect Data from:<br/>β€’ DuckDuckGo<br/>β€’ Bing Search<br/>β€’ Google Fallback]
    Process4 --> Collect4[πŸ“‘ Collect Data from:<br/>β€’ Instagram API<br/>β€’ Profile Analysis<br/>β€’ Post Analytics]
    Process5 --> Collect5[πŸ“‘ Collect Data from:<br/>β€’ 20+ Social Platforms<br/>β€’ Platform APIs<br/>β€’ Username Checks]
    
    Collect1 --> Analyze1[🧠 Analyze Data:<br/>β€’ Risk Assessment<br/>β€’ Pattern Recognition<br/>β€’ Threat Detection]
    Collect2 --> Analyze2[🧠 Analyze Data:<br/>β€’ Network Analysis<br/>β€’ Threat Indicators<br/>β€’ Risk Scoring]
    Collect3 --> Analyze3[🧠 Analyze Data:<br/>β€’ Result Categorization<br/>β€’ Relevance Ranking<br/>β€’ Content Extraction]
    Collect4 --> Analyze4[🧠 Analyze Data:<br/>β€’ Engagement Metrics<br/>β€’ Fake Account Detection<br/>β€’ Content Analysis]
    Collect5 --> Analyze5[🧠 Analyze Data:<br/>β€’ Visibility Scoring<br/>β€’ Privacy Assessment<br/>β€’ Risk Evaluation]
    
    Analyze1 --> Display1[πŸ“Ί Display Results<br/>Terminal Output]
    Analyze2 --> Display2[πŸ“Ί Display Results<br/>Terminal Output]
    Analyze3 --> Display3[πŸ“Ί Display Results<br/>Terminal Output]
    Analyze4 --> Display4[πŸ“Ί Display Results<br/>Terminal Output]
    Analyze5 --> Display5[πŸ“Ί Display Results<br/>Terminal Output]
    
    Display1 --> Report1[πŸ“„ Generate Reports]
    Display2 --> Report2[πŸ“„ Generate Reports]
    Display3 --> Report3[πŸ“„ Generate Reports]
    Display4 --> Report4[πŸ“„ Generate Reports]
    Display5 --> Report5[πŸ“„ Generate Reports]
    
    Report1 --> Save1[πŸ’Ύ Save to Results Folder:<br/>β€’ CSV Report<br/>β€’ PDF Report<br/>β€’ HTML Report<br/>β€’ Interactive Map]
    Report2 --> Save2[πŸ’Ύ Save to Results Folder:<br/>β€’ CSV Report<br/>β€’ PDF Report<br/>β€’ HTML Report<br/>β€’ Interactive Map]
    Report3 --> Save3[πŸ’Ύ Save to Results Folder:<br/>β€’ CSV Report<br/>β€’ PDF Report<br/>β€’ HTML Report]
    Report4 --> Save4[πŸ’Ύ Save to Results Folder:<br/>β€’ CSV Report<br/>β€’ PDF Report<br/>β€’ HTML Report<br/>β€’ Profile Images]
    Report5 --> Save5[πŸ’Ύ Save to Results Folder:<br/>β€’ CSV Report<br/>β€’ PDF Report<br/>β€’ HTML Report]
    
    Save1 --> Continue{πŸ”„ Continue?}
    Save2 --> Continue
    Save3 --> Continue
    Save4 --> Continue
    Save5 --> Continue
    Error1 --> Continue
    Error2 --> Continue
    
    Continue -->|Yes| Menu
    Continue -->|No| End([πŸ‘‹ Exit ScayNum])
    Option7 --> Update
    Option8 --> End
    
    style Start fill:#667eea,stroke:#764ba2,stroke-width:3px,color:#fff
    style Menu fill:#2196F3,stroke:#1976D2,stroke-width:3px,color:#fff
    style Process1 fill:#E91E63,stroke:#C2185B,stroke-width:2px,color:#fff
    style Process2 fill:#FF9800,stroke:#F57C00,stroke-width:2px,color:#fff
    style Process3 fill:#9C27B0,stroke:#7B1FA2,stroke-width:2px,color:#fff
    style Process4 fill:#00BCD4,stroke:#0097A7,stroke-width:2px,color:#fff
    style Process5 fill:#795548,stroke:#5D4037,stroke-width:2px,color:#fff
    style Analyze1 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
    style Analyze2 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
    style Analyze3 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
    style Analyze4 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
    style Analyze5 fill:#FFC107,stroke:#FFA000,stroke-width:2px,color:#000
    style Save1 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
    style Save2 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
    style Save3 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
    style Save4 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
    style Save5 fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
    style End fill:#f44336,stroke:#d32f2f,stroke-width:3px,color:#fff
Loading

Data Processing Pipeline

graph LR
    subgraph Input["πŸ“₯ INPUT LAYER"]
        A1[Phone Number<br/>+1234567890]
        A2[IP Address<br/>8.8.8.8]
        A3["Search Query<br/>John Doe"]
        A4[Instagram Username<br/>@username]
        A5[Username<br/>username123]
    end
    
    subgraph Validation["βœ… VALIDATION LAYER"]
        B1[Format Validation<br/>Phone Number Parser]
        B2[Format Validation<br/>IP Address Validator]
        B3[Query Processing<br/>Smart Variations]
        B4[Username Validation<br/>Format Check]
        B5[Username Validation<br/>Format Check]
    end
    
    subgraph Collection["πŸ“‘ DATA COLLECTION LAYER"]
        C1[API Calls<br/>Phone Lookup Services<br/>Social Media APIs<br/>Data Breach DBs]
        C2[API Calls<br/>IP Geolocation<br/>Threat Intelligence<br/>DNS Resolution]
        C3[Web Scraping<br/>DuckDuckGo Search<br/>Bing Search<br/>Google Fallback]
        C4[Instagram API<br/>Instaloader<br/>Profile Data<br/>Post Analytics]
        C5[Platform Checks<br/>20+ Social Platforms<br/>URL Verification<br/>Status Checking]
    end
    
    subgraph Processing["🧠 ANALYSIS LAYER"]
        D1[Risk Assessment<br/>Social Media Presence<br/>Breach Detection<br/>Geolocation Analysis]
        D2[Threat Analysis<br/>Risk Scoring<br/>Network Analysis<br/>DNS Records]
        D3[Result Ranking<br/>Categorization<br/>Relevance Scoring<br/>Content Extraction]
        D4[Engagement Analysis<br/>Fake Detection<br/>Hashtag Analysis<br/>Content Patterns]
        D5[Visibility Scoring<br/>Privacy Assessment<br/>Risk Evaluation<br/>Footprint Mapping]
    end
    
    subgraph Output["πŸ“€ OUTPUT LAYER"]
        E1[Terminal Display<br/>Colored Output<br/>Formatted Tables]
        E2[CSV Reports<br/>Spreadsheet Format<br/>Data Export]
        E3[PDF Reports<br/>Professional Docs<br/>Printable Format]
        E4[HTML Reports<br/>Interactive Web<br/>Visualizations]
        E5[Interactive Maps<br/>Geolocation Display<br/>Coordinate Mapping]
    end
    
    A1 --> B1 --> C1 --> D1 --> E1
    A1 --> B1 --> C1 --> D1 --> E2
    A1 --> B1 --> C1 --> D1 --> E3
    A1 --> B1 --> C1 --> D1 --> E4
    A1 --> B1 --> C1 --> D1 --> E5
    
    A2 --> B2 --> C2 --> D2 --> E1
    A2 --> B2 --> C2 --> D2 --> E2
    A2 --> B2 --> C2 --> D2 --> E3
    A2 --> B2 --> C2 --> D2 --> E4
    A2 --> B2 --> C2 --> D2 --> E5
    
    A3 --> B3 --> C3 --> D3 --> E1
    A3 --> B3 --> C3 --> D3 --> E2
    A3 --> B3 --> C3 --> D3 --> E3
    A3 --> B3 --> C3 --> D3 --> E4
    
    A4 --> B4 --> C4 --> D4 --> E1
    A4 --> B4 --> C4 --> D4 --> E2
    A4 --> B4 --> C4 --> D4 --> E3
    A4 --> B4 --> C4 --> D4 --> E4
    
    A5 --> B5 --> C5 --> D5 --> E1
    A5 --> B5 --> C5 --> D5 --> E2
    A5 --> B5 --> C5 --> D5 --> E3
    A5 --> B5 --> C5 --> D5 --> E4
    
    style Input fill:#E3F2FD,stroke:#1976D2,stroke-width:2px
    style Validation fill:#FFF3E0,stroke:#F57C00,stroke-width:2px
    style Collection fill:#F3E5F5,stroke:#7B1FA2,stroke-width:2px
    style Processing fill:#E8F5E9,stroke:#388E3C,stroke-width:2px
    style Output fill:#FFEBEE,stroke:#C62828,stroke-width:2px
Loading

Detailed System Architecture

graph TB
    subgraph User["πŸ‘€ USER INTERFACE"]
        UI1[Command Line Interface<br/>Terminal/Console]
        UI2[Interactive Menu<br/>Option Selection]
        UI3[Real-time Feedback<br/>Progress Display]
    end
    
    subgraph Core["🧠 CORE SYSTEM"]
        C1[Main Entry Point<br/>main.py]
        C2[Core Module<br/>core.py<br/>Menu & Navigation]
        C3[Error Handling<br/>Exception Management]
        C4[Update System<br/>Git Integration]
    end
    
    subgraph Modules["πŸ”§ INTELLIGENCE MODULES"]
        M1[Phone Intelligence<br/>Phone Lookup<br/>Social Discovery<br/>Breach Check]
        M2[IP Intelligence<br/>Geolocation<br/>Threat Intel<br/>DNS Analysis]
        M3[Web Intelligence<br/>Multi-Engine Search<br/>Categorization<br/>Content Extraction]
        M4[Social Intelligence<br/>Instagram Analysis<br/>Profile Analytics<br/>Engagement Metrics]
        M5[Username Intelligence<br/>Platform Checking<br/>Visibility Scoring<br/>Privacy Assessment]
    end
    
    subgraph Data["πŸ“‘ DATA SOURCES"]
        D1[Phone APIs<br/>Carrier Info<br/>Geolocation]
        D2[Social Media APIs<br/>Profile Data<br/>Public Records]
        D3[Search Engines<br/>DuckDuckGo<br/>Bing<br/>Google]
        D4[Threat Intelligence<br/>AbuseIPDB<br/>VirusTotal<br/>OTX]
        D5[DNS Servers<br/>Record Resolution<br/>Reverse Lookup]
        D6[Instagram API<br/>Instaloader<br/>Profile & Posts]
    end
    
    subgraph Processing["βš™οΈ DATA PROCESSING"]
        P1[Data Collection<br/>API Requests<br/>Web Scraping]
        P2[Data Validation<br/>Format Checking<br/>Error Handling]
        P3[Data Analysis<br/>Pattern Recognition<br/>Risk Assessment]
        P4[Data Enrichment<br/>Cross-referencing<br/>Correlation]
    end
    
    subgraph Reports["πŸ“„ REPORT GENERATION"]
        R1[CSV Generator<br/>Spreadsheet Format]
        R2[PDF Generator<br/>FPDF Library]
        R3[HTML Generator<br/>Jinja2 Templates]
        R4[Map Generator<br/>Folium Maps]
    end
    
    subgraph Output["πŸ’Ύ OUTPUT"]
        O1[Results Folder<br/>Organized Storage]
        O2[CSV Files<br/>Data Export]
        O3[PDF Reports<br/>Documentation]
        O4[HTML Reports<br/>Interactive View]
        O5[Map Files<br/>Geolocation Display]
    end
    
    UI1 --> C1
    UI2 --> C1
    UI3 --> C1
    
    C1 --> C2
    C2 --> C3
    C2 --> C4
    C2 --> M1
    C2 --> M2
    C2 --> M3
    C2 --> M4
    C2 --> M5
    
    M1 --> D1
    M1 --> D2
    M2 --> D2
    M2 --> D4
    M2 --> D5
    M3 --> D3
    M4 --> D6
    M5 --> D2
    
    M1 --> P1
    M2 --> P1
    M3 --> P1
    M4 --> P1
    M5 --> P1
    
    P1 --> P2
    P2 --> P3
    P3 --> P4
    
    P4 --> R1
    P4 --> R2
    P4 --> R3
    P4 --> R4
    
    R1 --> O1
    R2 --> O1
    R3 --> O1
    R4 --> O1
    
    O1 --> O2
    O1 --> O3
    O1 --> O4
    O1 --> O5
    
    style User fill:#667eea,stroke:#764ba2,stroke-width:2px,color:#fff
    style Core fill:#4CAF50,stroke:#45a049,stroke-width:2px,color:#fff
    style Modules fill:#FF9800,stroke:#F57C00,stroke-width:2px,color:#fff
    style Data fill:#9C27B0,stroke:#7B1FA2,stroke-width:2px,color:#fff
    style Processing fill:#00BCD4,stroke:#0097A7,stroke-width:2px,color:#fff
    style Reports fill:#E91E63,stroke:#C2185B,stroke-width:2px,color:#fff
    style Output fill:#795548,stroke:#5D4037,stroke-width:2px,color:#fff
Loading

Complete Data Flow Sequence

sequenceDiagram
    autonumber
    participant User
    participant Main as Main Entry Point
    participant Core as Core Module
    participant Module as Intelligence Module
    participant API as External APIs
    participant Analyzer as Data Analyzer
    participant Reporter as Report Generator
    participant FileSystem as File System
    
    User->>Main: Launch ScayNum
    Main->>Core: Initialize Application
    Core->>User: Display Menu Options
    
    User->>Core: Select Option (1-8)
    Core->>Core: Validate Selection
    
    alt Option 1-5: Intelligence Module
        Core->>Module: Initialize Module
        Module->>User: Request Input Data
        User->>Module: Provide Input (Phone/IP/Query/Username)
        Module->>Module: Validate Input Format
        
        alt Invalid Input
            Module->>User: Show Error Message
            Module->>Core: Return to Menu
        else Valid Input
            Module->>API: Send API Request(s)
            API-->>Module: Return Raw Data
            
            loop Multiple Data Sources
                Module->>API: Additional Requests
                API-->>Module: Additional Data
            end
            
            Module->>Analyzer: Process Raw Data
            Analyzer->>Analyzer: Data Cleaning
            Analyzer->>Analyzer: Pattern Recognition
            Analyzer->>Analyzer: Risk Assessment
            Analyzer->>Analyzer: Correlation Analysis
            Analyzer-->>Module: Analyzed Results
            
            Module->>User: Display Results in Terminal
            Module->>Reporter: Generate Reports
            
            Reporter->>Reporter: Create CSV Report
            Reporter->>Reporter: Create PDF Report
            Reporter->>Reporter: Create HTML Report
            Reporter->>Reporter: Create Interactive Map (if applicable)
            
            Reporter->>FileSystem: Save All Reports
            FileSystem-->>Reporter: Confirmation
            Reporter-->>Module: Reports Generated
            
            Module->>User: Show Save Location
        end
        
    else Option 6: Batch Processing
        Core->>Module: Initialize Batch Module
        Module->>User: Request CSV File Path
        User->>Module: Provide File Path
        Module->>FileSystem: Read CSV File
        FileSystem-->>Module: File Data
        
        loop Each Row in CSV
            Module->>Module: Process Single Entry
            Note over Module: Same flow as single entry
        end
        
        Module->>Reporter: Generate Batch Summary
        Reporter->>FileSystem: Save Batch Reports
        
    else Option 7: Update System
        Core->>Core: Check Git Status
        Core->>Core: Fetch Updates
        Core->>User: Show Available Updates
        User->>Core: Confirm Update
        Core->>Core: Pull Latest Code
        Core->>Core: Update Dependencies
        Core->>User: Show Update Status
        
    else Option 8: Exit
        Core->>User: Display Thank You Message
        Core->>Main: Exit Application
    end
    
    alt Continue Processing
        Module->>Core: Return to Menu
    else Exit
        Module->>Main: Exit Application
    end
Loading

✨ Features

πŸ“± Phone Intelligence Module

Comprehensive Phone Number Analysis:

  • βœ… Social Media Discovery - Find profiles across 50+ platforms
  • βœ… Data Breach Verification - Check against 100+ known breaches
  • βœ… Messaging Platform Detection - Identify WhatsApp, Telegram, Signal usage
  • βœ… Geolocation Intelligence - Precise location mapping with coordinates
  • βœ… Owner Information Estimation - Name and demographic analysis
  • βœ… Interactive Geographic Visualization - Real-time map integration
  • βœ… Risk Assessment Engine - Threat level evaluation
  • βœ… Batch Processing Capability - Process thousands of numbers via CSV

Perfect for: Digital forensics, background checks, threat intelligence


🌐 IP Intelligence Module

Advanced IP Address Intelligence:

  • βœ… Comprehensive IP Profiling - Country, city, ISP, organization details
  • βœ… Reverse DNS Resolution - Complete domain name analysis
  • βœ… DNS Records Intelligence - A, AAAA, MX, TXT, NS records
  • βœ… Threat Intelligence Integration - Check against 50+ threat databases
  • βœ… Network Infrastructure Analysis - ASN, hosting, proxy detection
  • βœ… Geographic Visualization - Interactive mapping with coordinates
  • βœ… Security Risk Assessment - Automated threat evaluation
  • βœ… Bulk IP Analysis - Process multiple IPs simultaneously

Perfect for: Network security, incident response, threat hunting


πŸ” Web Intelligence Module

Advanced Web Search Intelligence:

  • βœ… Multi-Engine Search - DuckDuckGo, Bing, Google with fallback
  • βœ… Smart Result Categorization - Automatic content classification
  • βœ… Social Media Profile Detection - Identify social accounts
  • βœ… Contact Information Extraction - Emails, phones, addresses
  • βœ… Threat Intelligence Analysis - Security indicator detection
  • βœ… Comprehensive Reporting - CSV, PDF, HTML with visualizations
  • βœ… Advanced Filtering - Relevance and source-based filtering
  • βœ… Real-time Data Processing - Live result analysis

Perfect for: Digital investigations, competitive intelligence, research


πŸ“Έ Social Intelligence Module

Instagram Profile Intelligence:

  • βœ… Comprehensive Profile Analysis - Bio, followers, posts, engagement
  • βœ… Fake Account Detection - AI-powered suspicious profile identification
  • βœ… Engagement Rate Calculation - Automated metrics analysis
  • βœ… Hashtag Intelligence - Popular hashtags and trend analysis
  • βœ… Real-time Monitoring - Live profile tracking capabilities
  • βœ… Visual Report Generation - Beautiful PDF/HTML reports
  • βœ… Content Analysis - Post patterns and content categorization
  • βœ… Network Mapping - Connection and interaction analysis

Perfect for: Social media investigations, influencer analysis, brand protection


πŸ‘€ Username Intelligence Module

Cross-Platform Username Intelligence:

  • βœ… Multi-Platform Verification - Check 20+ major platforms
  • βœ… Visibility Score Calculation - Online presence quantification
  • βœ… Risk Level Assessment - Automated security evaluation
  • βœ… Privacy Recommendations - Personalized protection advice
  • βœ… Comprehensive Reporting - Detailed CSV, PDF, HTML reports
  • βœ… Real-time Platform Checking - Live availability verification
  • βœ… Brand Protection Analysis - Username squatting detection
  • βœ… Digital Footprint Mapping - Complete online presence overview

Perfect for: Brand protection, identity verification, digital footprint analysis


πŸš€ Installation

Prerequisites

  • Python 3.7 or higher
  • pip (Python package manager)
  • Git (for updates)

Quick Installation

Windows

Method 1: One-Click Installation (Recommended)

# Download and extract ScayNum
# Double-click on run_ScayNum.bat

Method 2: PowerShell Installation

# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum

# Install dependencies
.\run_ScayNum.ps1 -Install

# Launch ScayNum
.\run_ScayNum.ps1

Method 3: Command Prompt Installation

# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum

# Install dependencies
pip install -r requirements.txt

# Launch ScayNum
python main.py

macOS

Method 1: Terminal Installation (Recommended)

# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum

# Make script executable
chmod +x run_ScayNum.sh

# Install dependencies
./run_ScayNum.sh install

# Launch ScayNum
./run_ScayNum.sh

Method 2: Makefile Installation

# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum

# Install and launch
make install && make run

Linux

Method 1: Quick Installation

# Clone the repository
git clone https://github.com/Scayar/ScayNum.git
cd ScayNum

# Install dependencies
sudo apt update
sudo apt install python3-pip
pip3 install -r requirements.txt

# Launch ScayNum
python3 main.py

πŸ’» Usage

Basic Usage

  1. Launch ScayNum:

    python main.py
  2. Select a module from the menu:

    • 1 - Phone Number OSINT
    • 2 - IP Address Lookup
    • 3 - Web Search
    • 4 - Instagram OSINT
    • 5 - Username Search
    • 6 - Batch Processing
    • 7 - Update ScayNum
    • 8 - Exit
  3. Follow the prompts to enter your query

  4. View results in the terminal and check the generated reports in the results folder

Examples

Phone Intelligence Example

python main.py
# Select option 1: Phone Number OSINT
# Enter phone number: +1234567890

IP Intelligence Example

python main.py
# Select option 2: IP Address Lookup
# Enter IP address: 8.8.8.8

Web Search Example

python main.py
# Select option 3: Web Search
# Enter query: "John Doe cybersecurity"

Batch Processing Example

# Create CSV file with targets
echo "phone_number" > phones.csv
echo "+1234567890" >> phones.csv
echo "+9876543210" >> phones.csv

# Run batch processing
python main.py
# Select option 6: Batch Processing
# Select option 1: Phone Numbers (CSV)
# Enter file path: phones.csv

πŸ› οΈ Project Structure

ScayNum/
β”œβ”€β”€ main.py                    # πŸš€ Main entry point
β”œβ”€β”€ scripts/
β”‚   β”œβ”€β”€ core.py               # 🧠 Core application logic
β”‚   β”œβ”€β”€ phone_intelligence.py # πŸ“± Phone OSINT module
β”‚   β”œβ”€β”€ ip_intelligence.py    # 🌐 IP intelligence module
β”‚   β”œβ”€β”€ web_intelligence.py   # πŸ” Web search module
β”‚   β”œβ”€β”€ social_intelligence.py # πŸ“Έ Social media module
β”‚   └── username_intelligence.py # πŸ‘€ Username search module
β”œβ”€β”€ requirements.txt          # πŸ“¦ Dependencies
β”œβ”€β”€ setup.py                 # βš™οΈ Package configuration
β”œβ”€β”€ README.md               # πŸ“– Documentation
β”œβ”€β”€ LICENSE                 # πŸ“„ License information
β”œβ”€β”€ Makefile               # πŸ”§ Build automation
β”œβ”€β”€ .gitignore            # 🚫 Git ignore rules
β”œβ”€β”€ run_ScayNum.bat        # πŸͺŸ Windows launcher
β”œβ”€β”€ run_ScayNum.ps1        # πŸ’» PowerShell launcher
└── run_ScayNum.sh         # 🐧 Shell launcher

πŸ“¦ Dependencies

Core Dependencies

  • pyfiglet - ASCII art and banners
  • colorama - Terminal color support
  • tabulate - Beautiful table formatting
  • requests - HTTP client library
  • beautifulsoup4 - HTML parsing
  • phonenumbers - Phone number validation
  • folium - Interactive maps
  • instaloader - Instagram API
  • fpdf - PDF generation
  • jinja2 - HTML templating
  • dnspython - DNS resolution
  • googlesearch-python - Google search integration

Install all dependencies:

pip install -r requirements.txt

πŸ›‘οΈ Security & Privacy

Privacy Features

  • βœ… No Data Storage - All data processed locally
  • βœ… Encrypted Communications - Secure API connections
  • βœ… Rate Limiting - Respectful API usage
  • βœ… User Agent Rotation - Anti-detection measures
  • βœ… Proxy Support - Anonymous browsing capabilities

Legal Compliance

⚠️ Important Notice:

  • This tool is for educational and research purposes only
  • Users are responsible for complying with local laws and regulations
  • Respect privacy and terms of service of target platforms
  • Use responsibly and ethically

🀝 Contributing

We welcome contributions from the community! Here's how you can help:

πŸ› Bug Reports

  • Use the Issues page
  • Provide detailed error descriptions
  • Include system information and logs

πŸ’‘ Feature Requests

  • Submit feature ideas via Issues
  • Describe use cases and benefits
  • Consider implementation complexity

πŸ”§ Code Contributions

  1. Fork the repository
  2. Create a feature branch
  3. Make your changes
  4. Add tests if applicable
  5. Submit a pull request

πŸ“š Documentation

  • Improve README sections
  • Add code comments
  • Create tutorials and guides

πŸ“„ License

This project is licensed under the MIT License - see the LICENSE file for details.


πŸ“ž Credits

Author

Scayar

Special Thanks

  • Open Source Community - For amazing libraries and tools
  • OSINT Community - For knowledge sharing and collaboration
  • Contributors - For code improvements and bug fixes
  • Users - For feedback and feature suggestions

Inspiration

  • OSINT Framework - For comprehensive intelligence gathering
  • Maltego - For graph-based intelligence visualization
  • Shodan - For internet-wide intelligence gathering
  • TheHarvester - For email and domain intelligence

πŸ™ Acknowledgments

This project would not be possible without the amazing open-source community and the tools they've created. Thank you to all the developers and contributors who make projects like this possible.


🌟 Star History

If you find this project helpful, please consider giving it a star ⭐

GitHub Stars GitHub Forks GitHub Issues


Made with ❀️ by Scayar

Website Telegram Email Buy Me a Coffee


πŸ“Š Statistics

GitHub repo size GitHub language count GitHub top language GitHub last commit

About

Advanced OSINT Intelligence Platform for Digital Investigations | Phone Intelligence | IP Analysis | Web Search | Social OSINT | Username Search

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published