Skip to content

OSINT-TECHNOLOGIES/dpulse

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

1,240 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

🌐 DPULSE

Advanced Domain OSINT & Reconnaissance Tool



Stable Version Rolling Version Python Docker Documentation

Convenient, fast, and user-friendly collector of domain information from open sources.

Report Bug β€’ Request Feature β€’ Roadmap


⚠️ Disclaimer: DPULSE is a research tool tailored for OSINT professionals. It is not intended for criminal activities. The developer is not responsible for any misuse of this tool. Use strictly on allowed domains and for legal purposes.


πŸš€ Key Features

DPULSE automates the boring stuff in domain reconnaissance. It compiles data into clean HTML/XLSX reports.

Feature Description
πŸ” Basic Scan Automates WHOIS, subdomains, emails, IPs, social media, SSL info, open ports, and tech stack detection.
πŸ•΅οΈβ€β™‚οΈ PageSearch Deep dive into subdomains to find API keys, exposed passwords, cookies, hidden forms, and sensitive documents (PDF, config files).
🧩 Dorking Mode Automated Google Dorking for IoT, admin panels, sensitive files, and custom user-defined dorks.
πŸ”— API Integrations Native support for VirusTotal, SecurityTrails, and HudsonRock (compromised hosts check).
πŸ“Έ Snapshotting Captures target via Screenshots, HTML downloads, or Wayback Machine archiving.

⚑ Quick Start

Option 1: Docker Container (Recommended)

The fastest way to run DPULSE without worrying about dependencies and local installations. Everything is isolated in Docker container!

# 1. Pull the image
docker pull docker.io/osinttechnologies/dpulse:latest

# 2. Run DPULSE (Linux/macOS)
docker run --rm -it -v "$PWD":/data -w /data osinttechnologies/dpulse:latest

# 2. Run DPULSE (Windows PowerShell)
docker run --rm -it -v "${PWD}:/data" -w /data osinttechnologies/dpulse:latest

In case you are using Podman, which is Docker alternative in some OS:

# 1. Pull the image
podman pull docker.io/osinttechnologies/dpulse:latest

# 2. Run DPULSE (Linux/macOS)
podman run --rm -it -v "$PWD":/data:Z -w /data osinttechnologies/dpulse:latest

Option 2: Local installation using uv

Recommended local installation method for Windows, Linux, and macOS.

# 1. Clone the repository
git clone https://github.com/OSINT-TECHNOLOGIES/dpulse
cd dpulse

# 2.1. Run Linux/macOS installer
chmod +x install.sh
./install.sh

# 2.2. Run Windows installer
powershell -ExecutionPolicy Bypass -File .\install.ps1

These installers will automatically:

  • install uv if it is missing
  • install Python 3.11 which is strongly required for running DPULSE
  • create a virtual environment
  • install all required dependencies

After this procedure you can easily start DPULSE:

uv run dpulse

πŸ–₯️ Interface & Reports

Main Menu
Clean CLI interface for easy navigation.
dpulse_start

Scanning Process
Real-time feedback during the scan.
dpulse_bs

Output
Organized report folders with timestamps.
Report Folder


πŸ† Community & Mentions

We are proud to be mentioned by industry leaders and the cybersecurity community.

View all mentions (Social Media & Blogs)

X.com (Twitter)

LinkedIn

Telegram Channels

  • Cyber Detective
  • Hackers Factory
  • C.I.T Security
  • РСальний OSINT

Created by OSINT-TECHNOLOGIES

Documentation β€’ Contact Developer