Information Gatheringosintreconnaissanceautomationintelligence

SpiderFoot

SpiderFoot is an open source intelligence (OSINT) automation tool that gathers intelligence about targets such as IP addresses, domain names, hostnames, network subnets, ASNs, email addresses, or person's names. It can be used offensively for penetration testing or defensively to identify exposed information.

Description

SpiderFoot automates the process of gathering intelligence about a given target. This package contains an OSINT tool designed to collect data on various target types including IP addresses, domain names, hostnames, network subnets, ASNs, email addresses, or person's names.

The tool can be used offensively as part of a black-box penetration test to gather information about the target. Defensively, it helps identify what information you or your organization are freely providing for attackers to use against you.

SpiderFoot includes both a main interface (sf.py) and a CLI client (sfcli.py) for interacting with the server.

How It Works

SpiderFoot operates by automating OSINT collection through enabled modules that query various data sources. It supports scan targets via parameters like -s TARGET and module selection with -m mod1,mod2. The tool runs scans, applies correlation rules with -C scanID, and outputs results in formats like tab, csv, or json. The CLI connects to a SpiderFoot server for remote operations.

Installation

bash
sudo apt install spiderfoot

Flags

-h, --helpshow this help message and exit
-d, --debugEnable debug output.
-l IP:portIP and port to listen on.
-m mod1,mod2,...Modules to enable.
-M, --modulesList available modules.
-C, --correlate scanIDRun correlation rules against a scan ID.
-s TARGETTarget for the scan.
-t type1,type2,...Target types to include in the scan.
-u {all,footprint,investigate,passive}Scan mode: all, footprint, investigate, or passive.
-o {tab,csv,json}Output format: tab, csv, or json.

Examples

Show the help message and usage for SpiderFoot main interface.
spiderfoot -h
List available modules.
spiderfoot -M
Run a scan against the specified target.
spiderfoot -s TARGET
Run correlation rules against a specific scan ID.
spiderfoot -C scanID
Show the help message for SpiderFoot CLI.
spiderfoot-cli -h
Connect to SpiderFoot server on the specified URL.
spiderfoot-cli -s URL
Authenticate to SpiderFoot server with username and password.
spiderfoot-cli -u USER -p PASS
Updated 2026-04-16kali.org ↗