• Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
AnonyViet - English Version
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office
No Result
View All Result
AnonyViet - English Version
No Result
View All Result

SEEKR: OSINT . Data Collection Toolkit

AnonyViet by AnonyViet
April 15, 2023
in Security
0

Seekr is a versatile toolkit with an intuitive web interface for collecting and managing OSINT data. Seekr’s Backend is written in Go and provides many features/tools for data collection, organization and analysis. This is a very suitable tool for you to do OSINT as it will make it easier for you to find and manage the data you need. In this article, I will show you how to install and use this tool.
SEEKR: OSINT . Data Collection Toolkit

Join the channel Telegram belong to AnonyViet ???? Link ????

Features of Seekr

Seekr combines note taking and OSINT into a single application. Seekr can be used in conjunction with your existing tools. Seekr is designed for OSINT and optimized for real-world use cases.
Main features:

  • Has a computer interface
  • OSINT targets are stored in the database
  • Integrate many popular OSINT tools (e.g. phoneinfoga)
  • GitHub for emailing
  • There is a target tag used to manage each target in the database
  • Detect other targets integrated in the target tag

How to install Seekr

Step 1: Before installing Seekr, you must make sure your system, here I use Ubuntu, has git and go installed.

You can install go with the command:

sudo apt install golang-go

And install git with command:

sudo apt install git

Step 2: Download Seekr’s repo with the command:

git clone https://github.com/seekr-osint/seekr

Step 3: Go to the repo you just downloaded and start Seekr with the command:

cd seekr
go run main.go

SEEKR: 16 . OSINT Data Collection Toolkit

So you have successfully installed and started Seekr. Next we will learn how to use Seekr.

How to use Seekr

When you launch Seekr, the program will automatically open the browser and access the web interface. I will choose SEEKR Desktop.

SEEKR: OSINT 17 . Data Collection Toolkit

In the lower left corner is Seekr’s tools menu. You choose the first tool to open the target card.

SEEKR: OSINT 18 . Data Collection Toolkit

You press new.

SEEKR: 19 . OSINT Data Collection Toolkit

Here, you can enter a lot of information of the target such as full name, gender, address, …. After entering the information, press Save.

SEEKR: 20 . OSINT Data Collection Toolkit

Click the avatar icon of the newly created target.

SEEKR: Data Collection Toolkit using OSINT 21

Here, you can enter the target’s username to find other accounts that use this information. If that’s the account you need then press Accept to add to the target tag.

SEEKR: Data Collection Toolkit using OSINT 22

In the target tab, you can further investigate the newly added accounts of your target by pressing Deep Investigation.

SEEKR: OSINT 23 . Data Collection Toolkit

The second tool in the menu is a page that aggregates all the OSINT tools you need for your target’s crawling.

SEEKR: 24 . OSINT Data Collection Toolkit

The 3rd tool in the menu is Whois. You can exploit a lot of related information of the domain and ip you want. However, at the time of testing, this feature is faulty.

SEEKR: OSINT 25 . Data Collection Toolkit

The 4th tool in the menu is CRTSH. You can use this tool to search for certificates related to the domain you want.

SEEKR: OSINT 26 . Data Collection Toolkit

SEEKR: OSINT 27 . Data Collection Toolkit

To get the most out of Seekr, you can use the following procedure.

SEEKR: OSINT 28 . Data Collection Toolkit

Rate this post

Tags: collectiondataOSINTSEEKRToolkit
Previous Post

WHEN YOU CANNOT RUN A FACEBOOK Friend Invitation

Next Post

Use Midjourney for free, why not?

AnonyViet

AnonyViet

Related Posts

How to use hackers use Splitfus to execute PowerShell malicious code
Security

How to use hackers use Splitfus to execute PowerShell malicious code

July 20, 2025
How to implement Shellcode Injection attack technique with Autoit
Security

How to implement Shellcode Injection attack technique with Autoit

March 14, 2025
How to exploit the holy hole of Hijacking on Windows
Security

How to exploit the holy hole of Hijacking on Windows

March 8, 2025
Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery
Security

Hamamal: Shellcode execution technique from afar to overcome Antivirus's discovery

February 10, 2025
Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile
Security

Snov.io Email Finder: Search emails with only company name/domain name/LinkedIn profile

December 14, 2024
Capsolver: Automatic solution solution for business
Security

Capsolver: Automatic solution solution for business

December 12, 2024
Next Post
Use Midjourney for free, why not?

Use Midjourney for free, why not?

0 0 votes
Article Rating
Subscribe
Login
Notify of
guest

guest

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments

Recent News

How to set up a private voice on iPhone that few people know

How to set up a private voice on iPhone that few people know

February 11, 2026
Instructions to Hide Secret Documents in Any Song

Instructions to Hide Secret Documents in Any Song

February 10, 2026
How to blur photos on iPhone after taking them is extremely simple

How to blur photos on iPhone after taking them is extremely simple

February 10, 2026
Dell SE2426: A “lifesaver” solution for office workers’ eyes.

Dell SE2426: A “lifesaver” solution for office workers’ eyes.

February 9, 2026
How to set up a private voice on iPhone that few people know

How to set up a private voice on iPhone that few people know

February 11, 2026
Instructions to Hide Secret Documents in Any Song

Instructions to Hide Secret Documents in Any Song

February 10, 2026
How to blur photos on iPhone after taking them is extremely simple

How to blur photos on iPhone after taking them is extremely simple

February 10, 2026
AnonyViet - English Version

AnonyViet

AnonyViet is a website share knowledge that you have never learned in school!

We are ready to welcome your comments, as well as your articles sent to AnonyViet.

Follow Us

Contact:

Email: anonyviet.com[@]gmail.com

Main Website: https://anonyviet.com

Recent News

How to set up a private voice on iPhone that few people know

How to set up a private voice on iPhone that few people know

February 11, 2026
Instructions to Hide Secret Documents in Any Song

Instructions to Hide Secret Documents in Any Song

February 10, 2026
  • Home
  • Home 2
  • Home 3
  • Home 4
  • Home 5
  • Home 6
  • Next Dest Page
  • Sample Page

https://sun52.network

No Result
View All Result
  • Home
  • News
  • Software
  • Knowledge
  • MMO
  • Tips
  • Security
  • Network
  • Office

https://sun52.network

wpDiscuz
0
0
Would love your thoughts, please comment.x
()
x
| Reply