fawadqureshi007

BlackTrace is a Python OSINT toolkit for reconnaissance, offering image geolocation, email breach checks, domain/IP lookup, metadata analysis, and reverse image search.

19
5
69% credibility
Found Apr 28, 2026 at 19 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

BlackTrace is a menu-driven toolkit that collects and displays publicly available information from images, social profiles, emails, domains, IP addresses, and networks for ethical research and investigations.

How It Works

1
๐Ÿ•ต๏ธ Discover BlackTrace

You find this handy toolkit online while curious about checking public info for safety or research.

2
๐Ÿ“ฅ Bring it home

Download the files to your computer and follow the simple setup steps to get everything ready.

3
๐Ÿš€ Launch the tool

Open the program and enjoy the colorful menu showing all the investigation options.

4
๐Ÿ” Choose your search

Pick what to explore, like an image, email, username, or website, feeling like a detective.

5
๐Ÿ“ Add your details

Type in the info you want to check, like a photo path or screen name, and watch it gather public clues.

โœ… Get smart insights

See a clear list of findings, such as locations or profiles, helping you learn without any hassle.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 19 to 19 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is Black?

BlackTrace is a Python CLI toolkit for OSINT reconnaissance, bundling tasks like image EXIF geolocation, email breach checks via HaveIBeenPwned, domain WHOIS/DNS lookups, metadata extraction, and reverse image searches across engines. It tackles scattered recon tools by offering a menu-driven interface with 18 modules, from social username sweeps to IP blacklist analysis and Reddit/GitHub profiling. Run it via a one-click script after venv setup, with optional API keys for deeper intel like AbuseIPDB reports.

Why is it gaining traction?

It stands out as a no-frills all-in-one alternative to juggling tools like theHole or Recon-ng, with a flashy neon CLI that lists platforms for username checks and auto-opens Google Dorks or maps. The quick install script handles deps like spaCy for entity extraction, and modules like port scanning or Wayback snapshots deliver immediate results without config hassles. Devs dig the broad coverage, from phone carrier lookups to threat feed links, echoing black ops 3-style analysis in a single black github python repo.

Who should use this?

Cybersecurity researchers and pentesters needing fast recon on targets like emails, IPs, or GitHub users during bug bounties. Red teamers profiling attackers via social media sweeps or subreddit scrapes, and OSINT hobbyists verifying domains/subdomains before deeper dives. Skip if you're after polished enterprise toolsโ€”ideal for Kali users scripting quick blacklists or black panther-level intel grabs.

Verdict

With 19 stars and a 0.7% credibility score, it's an immature script collection lacking tests or robust error handling, but solid docs and ethical disclaimers make it a fun starter for OSINT analysis. Try for casual recon, but audit modules yourself before production use.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.