Skip to content

kikikoteyka-dev/Kiki-Osint

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

28 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

KikiHub

A local web hub combining OSINT research, WiFi handshake cracking, and Flipper Zero file management β€” all in one interface.

Python Flask Platform GPU


What's inside

Tab Description
πŸ” OSINT Username / email β†’ full digital portrait via VK, Maigret (500+ sites), HaveIBeenPwned, AI analysis
πŸ“‘ WiFi Cracker Drop a .pcap β†’ convert β†’ crack with hashcat. Multi-SSID, real-time terminal output
🐬 Flipper Zero Browse SD card over USB, download .pcap files directly to PC

Requirements

Python packages

pip install Flask flask-cors pyserial

External tools

Tool Purpose
hashcat 7.x GPU WPA cracking (-m 22000)
WSL + hcxpcapngtool Convert .pcap β†’ .hc22000
Wireshark EAPOL frame analysis (tshark)
CUDA Toolkit NVIDIA GPU acceleration (optional, ~3Γ— speedup)

Wordlists β€” place .txt files in C:\HashCat\hashcat-7.1.2\, KikiHub picks them all up automatically. Recommended: weakpass.com β†’ weakpass_4.txt


Setup

git clone https://github.com/kikikoteyka-dev/Kiki-Osint.git -b kiki-hub
cd Kiki-Osint
pip install Flask flask-cors pyserial

# Edit paths at the top of app.py to match your installation
python app.py

Open http://localhost:7777


API Keys

Create keys.json next to app.py (never committed):

{
  "VK_TOKEN": "vk1.a.xxx",
  "GEMINI_API_KEY": "AIza...",
  "ANTHROPIC_API_KEY": "sk-ant-...",
  "OPENAI_API_KEY": "sk-..."
}

Or set them via the Settings tab in the UI.

Key Where to get
VK Token vkhost.github.io β†’ Kate Mobile
Claude console.anthropic.com
ChatGPT platform.openai.com
Gemini aistudio.google.com

File structure

app.py                  Flask backend β€” hub routes + hashcat API + Flipper serial
index.html              Dock UI (OSINT / WiFi / Flipper / Settings panels)
keys_store.py           Read/write keys.json
wifi_cracker/
  wifi_cracker.py       Standalone WiFi Cracker app (also served via hub)

WiFi cracking workflow

1. Capture with Flipper Zero + Marauder β†’ sniffpmkid.pcap
2. Open WiFi Cracker tab β†’ drag & drop pcap
3. Analyze β†’ converts via WSL hcxpcapngtool
4. Run Hashcat β†’ iterates wordlists automatically
5. Password appears in terminal when found

Flipper Zero

Connect Flipper by USB, select COM port in the Flipper tab β€” browse and download files directly without qFlipper.

Close qFlipper before connecting, it holds the COM port.


Disclaimer

For educational and authorized testing purposes only.

About

πŸ” OSINT tool for digital footprint discovery β€” search by username or emai across VK, Telegram, 500+ sites, HaveIBeenPwned and more. AI portrait via Claude|Gemini|ChatGPT

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors