osint-tools
MCP server exposing multiple OSINT tools for AI assistants like Claude
claude mcp add --transport stdio frishtik-osint-tools-mcp-server python /path/to/osint-tools-mcp-server/src/osint_tools_mcp_server.py \ --env PYTHONUNBUFFERED="1"
How to use
The OSINT Tools MCP Server exposes a suite of OSINT reconnaissance tools through a single MCP endpoint, enabling AI assistants to perform digital footprint analysis and information gathering. Tools include Sherlock for username searches, Holehe for email-to-platform checks, SpiderFoot for deep reconnaissance, GHunt for Google account intel, Maigret for broad username searches, TheHarvester for domain intelligence, and Blackbird for rapid username discovery across many sites. To use this server with Claude or similar assistants, configure the MCP client to route queries to the osint-tools MCP server and let the agent invoke the tools via natural language prompts. For example, you can ask the agent to check where a given email is registered, or to search for a username across multiple platforms, and then chain results from multiple tools for deeper insights.
A typical workflow might involve: first validating an email with Holehe, then expanding to username-based searches with Sherlock or Maigret, and optionally running a domain-wide scan with TheHarvester. SpiderFoot can be launched for a thorough, albeit longer, investigation to gather a comprehensive intelligence report, while GHunt can reveal Google account-related details. You can instruct the AI to orchestrate multiple tools in parallel or in sequence depending on the task’s urgency and depth.
How to install
Prerequisites:
- Python 3.8+ installed
- pip available
- Access to clone the MCP server repository
Installation steps:
- Clone the repository
git clone https://github.com/frishtik/osint-tools-mcp-server.git
cd osint-tools-mcp-server
- Install Python dependencies (this will install Sherlock, Holehe, Maigret, and TheHarvester as part of requirements)
pip install -r requirements.txt
- Configure Claude Desktop to point to the MCP server (example shown in the README):
{
"mcpServers": {
"osint-tools": {
"command": "python",
"args": ["/path/to/osint-tools-mcp-server/src/osint_tools_mcp_server.py"],
"env": {
"PYTHONUNBUFFERED": "1"
}
}
}
}
- Start or connect Claude Desktop to load the new MCP server configuration. If needed, adjust the path in the arguments to the actual location of osint_tools_mcp_server.py.
Optional: Prerequisites for additional tools (SpiderFoot, GHunt, Blackbird) as described in the README:
- SpiderFoot:
git clone https://github.com/smicallef/spiderfoot.git /opt/spiderfoot
cd /opt/spiderfoot
pip install -r requirements.txt
- GHunt:
git clone https://github.com/mxrch/GHunt.git /opt/ghunt
cd /opt/ghunt
pip install -r requirements.txt
- Blackbird:
git clone https://github.com/p1ngul1n0/blackbird.git /opt/blackbird
cd /opt/blackbird
pip install -r requirements.txt
Additional notes
Tips and considerations:
- The README notes that SpiderFoot can take 5–30 minutes for a full scan; plan investigations accordingly.
- Tools have different performance profiles. For time-sensitive tasks, prefer faster tools like Sherlock, Holehe, Maigret, or TheHarvester, and run SpiderFoot only when a deeper dive is required.
- Some tools require manual installation or setup beyond the MCP server (e.g., SpiderFoot, GHunt, Blackbird). Ensure these are installed and accessible in PATH or configured as needed.
- The MCP server uses Python asyncio to run tools concurrently; you can chain or parallelize tool usage in prompts to Claude, depending on the scenario.
- Ethical usage: strictly use publicly available information and adhere to applicable laws and platform terms. Obtain proper authorization for professional investigations.
Related MCP Servers
building-an-agentic-system
An in-depth book and reference on building agentic systems like Claude Code
AIDA
AI-Driven Security Assessment - Connect AI to 400+ pentesting tools via MCP
mcp-shodan
MCP server for querying the Shodan API
asterisk
Asterisk Model Context Protocol (MCP) server.
gtm
An MCP server for Google Tag Manager. Connect it to your LLM, authenticate once, and start managing GTM through natural language.
opencti_mcp_server
Natural language interface to OpenCTI threat intelligence. Built with Claude Code for $22. Part of Cooper Cyber Coffee.