Open source intelligence gathering for targets including organizational profiling, infrastructure mapping, and attack surface discovery
From greyhatccnpx claudepluginhub overtimepog/greyhatcc --plugin greyhatccThis skill uses the workspace's default tool permissions.
Designs and optimizes AI agent action spaces, tool definitions, observation formats, error recovery, and context for higher task completion rates.
Enables AI agents to execute x402 payments with per-task budgets, spending controls, and non-custodial wallets via MCP tools. Use when agents pay for APIs, services, or other agents.
Compares coding agents like Claude Code and Aider on custom YAML-defined codebase tasks using git worktrees, measuring pass rate, cost, time, and consistency.
/greyhatcc:osint <target domain or organization>
{{ARGUMENTS}} is parsed automatically — just provide a target in any format:
No format specification needed from user — detect and proceed.
Before executing this skill:
.greyhatcc/scope.json — verify target is in scope, note exclusions.greyhatcc/hunt-state.json — check active phase, resume contextfindings_log.md, tested.json, gadgets.json — avoid duplicating workWebSearch queries:
- "<org_name>" company overview technology
- "<org_name>" engineering team blog
- "<org_name>" careers technology stack
- "<org_name>" about page team
- site:linkedin.com "<org_name>" employees
Extract:
Sources:
- LinkedIn: Search "<org_name>" employees → map team structure
- theHarvester (if installed): theHarvester -d <domain> -b all
- Hunter.io: Email patterns and employee list
- GitHub: Org members and contributors → org:<org_name>
Extract:
WebSearch queries:
- "<org_name>" careers engineer developer
- site:linkedin.com/jobs "<org_name>"
- site:greenhouse.io "<org_name>"
- site:lever.co "<org_name>"
Job postings reveal exact tech stack, VPN products, internal tool names, and security gaps:
| Job Posting Mentions | Intelligence Value |
|---|---|
| "Experience with AWS, Kubernetes" | Cloud infra = test S3, metadata SSRF, RBAC |
| "GraphQL, Apollo Server" | GraphQL endpoints = introspection, batching, authz |
| "Cognito, Auth0, Firebase" | Auth provider = provider-specific attack vectors |
| "Jenkins, GitLab CI" | CI/CD = pipeline exploitation, artifact exposure |
| "Elasticsearch, Redis" | Data stores = check for public access |
| "Microservices architecture" | Many services = more API endpoints, SSRF targets |
| "We're hiring a security engineer" | Security team is understaffed = more likely to have gaps |
Search queries:
- org:<org_name> — All public repos
- "<domain>" password OR secret OR api_key OR token — Leaked secrets
- "<domain>" extension:env — Environment files
- "<domain>" extension:json firebase OR aws — Config files
- "<org_name>" filename:.env — Environment files
- "<org_name>" filename:docker-compose.yml — Infrastructure configs
- "<org_name>" filename:config.yml — Configuration files
Use TruffleHog or Gitleaks patterns to search commit history for rotated secrets. 23.8M secrets leaked on public GitHub in 2024 (25% YoY increase).
Sources:
- HaveIBeenPwned: Check domain email pattern for breaches
- WebSearch: "<domain>" data breach leaked
- WebSearch: "<domain>" credentials dump pastebin
Extract:
Sources:
1. Web Search: "<domain>" infrastructure architecture blog
2. Shodan: org:"<org_name>" — all indexed infrastructure
3. Shodan: ssl.cert.subject.CN:<domain> — SSL cert matching
4. DNS History: WebSearch for SecurityTrails, ViewDNS results
5. BGP/ASN: WebSearch for "<org_name>" ASN bgp.he.net
Sources:
1. GrayHatWarfare: Search for org-related bucket names
2. S3 bucket guessing: <domain>, <domain>-assets, <domain>-backup
3. Azure blob: <org>.blob.core.windows.net
4. GCS: storage.googleapis.com/<domain>
5. Firebase: <project>.firebaseio.com/.json
osint-researcher-high (opus) for deep multi-source OSINT with analysisosint-researcher (sonnet) for comprehensive multi-source OSINTosint-researcher-low (haiku) for quick single-source lookupsSave to recon/osint/ directory:
osint_summary.md — Executive summary with key findingsemployees.md — Employee enumeration resultstech_intel.md — Technology stack from job postings and blogsgithub_intel.md — GitHub intelligence and potential leaksbreach_intel.md — Breach exposure assessmentinfrastructure.md — Infrastructure mapping from passive sourcesAfter completing this skill:
tested.json — record what was tested (asset + vuln class)gadgets.json — add any informational findings with provides/requires tags for chainingfindings_log.md — log any confirmed findings with severity