All tags

HOME
Company News OSINT OSINT Case Study OSINT Events OSINT News OSINT Tools Product Updates SL Crimewall SL Professional for i2 SL Professional for Maltego Use Сases

Center of Excellence Column: Unlocking GitHub for OSINT

This week in the Social Links Center of Excellence Column, we’re looking at using GitHub as a source for OSINT. Investigating suspects involves plenty of creative problem-solving, as an ongoing case usually requires more than simply checking the most popular online platforms. To expand your toolbox, we’re sharing our insights to show you a non-obvious source of information for investigators.

Let’s jump in!

What is GitHub?

First things first, many people’s impression of GitHub is that it’s “just a website for developers” or “a platform for source code hosting.” While these points are correct, it’s not the full story. GitHub is actually a social media platform. Here are the core elements of the website:

  • Profiles. Accounts have profile pictures, bios, links to other social media pages, organizations, and personal details.
  • Collaboration. The platform enables discussions, project forking (copying the code for personal development), and pull requests (suggesting changes to the code).
  • Networking. Users can subscribe to other profiles and repositories (source code) and track the activities of codebases.

So, going onto the GitHub Homepage, a logged-in user will see a news feed, updates from people they follow, and subscriptions. Additionally, notifications about the latest activities in the repositories, pull requests, and even project suggestions would be visible. Looks very much like a social media platform, right?

GitHub’s homepage features all the elements of a social media platform

GitHub as an OSINT Source

Since the website is so similar to social platforms, SOCMINT (Social Media Intelligence) techniques can provide plenty of insight for experts. An investigator can simply understand a developer’s social network, which organizations they work in, special interests, and skills by studying the user’s profile. However, this is not all that hides under the Git mechanism.

On the platform, developers sign every code change (called a “commit” on the platform) with their name and email. However, it’s pretty common for developers to use different emails and aliases for commits due to misconfigurations. 

So, let’s say we have an anonymous GitHub account as our target. We can study their projects to find the different usernames and email addresses that the person uses. Moreover, given that the platform launched in 2008 and the current user base is around 100M, it’s possible to collect a person’s entire career history easily.

Using GitHub for OSINT Investigations

Let’s look at a practical example to better illustrate the potential of GitHub as a source of information. Imagine we are dealing with a hacker who’s causing problems with malware. We only have a link to the target’s GitHub repository. First, we have tools that can greatly help our investigation—octosuite, GitFive, and Gitcolombo.

Let’s imagine a scenario where we’re looking for the suspect’s personal email, social media accounts, and real name. With the help of GitFive, we put in the repository of the target, and the tool identifies other mail addresses belonging to the suspect. Additionally, the software also provides the usernames tied to the address.

With a few clicks, we find all the email addresses that belong to our suspect

After we have the different email addresses, we look at the suspect’s aliases. One handy feature of GitFive is that the tool can search for name variations to see if there are any matches. So, in a few clicks, we get the possible aliases of the target in addition to their real name. Using this information, we can continue our investigation on other social media platforms to see if any handles match existing accounts.

GitFive can provide username variations that an investigator can match on other social media platforms

And that’s the end of our piece about GitHub as an OSINT source. Investigators must consider all possible avenues during a case. Experts can stay one step ahead of malicious actors by using all the resources at their disposal.

Share this post

You might also like

You’ve successfully subscribed to OSINT Blog by Social Links | OSINT Investigations
Welcome back! You’ve successfully signed in.
Great! You’ve successfully signed up.
Success! Your email is updated.
Your link has expired
Success! Check your email for magic link to sign-in.