Skip to content

myshkin42/worker-osint-toolkit

Repository files navigation

Worker OSINT MCP Server

Open Source Intelligence toolkit for worker advocacy, labor organizing, and corporate accountability.

Overview

This is an OSINT (Open Source Intelligence) toolkit designed specifically for workers' rights investigations. It provides 12 powerful tools to investigate companies, document workplace violations, and support labor organizing - turning surveillance techniques typically used against workers into tools that empower worker advocacy.

Built For

  • Labor unions and organizers
  • Worker rights advocates
  • Legal aid clinics
  • Workplace safety investigators
  • Journalists covering labor issues
  • Workers researching their employers

Features

12 Integrated OSINT Tools

  1. ABN Lookup (Australia) - Business registry verification
  2. CRO Lookup (Ireland) - Companies registration office search
  3. WHOIS Lookup - Domain ownership and registration
  4. DNS Reconnaissance - Infrastructure and email server mapping
  5. Certificate Transparency - Subdomain discovery via SSL certificates
  6. Subdomain Scanning - Complete infrastructure enumeration
  7. Wayback Machine - Historical website data (1996-present)
  8. Social Media Search - Platform discovery and account finding
  9. Google Dorking - Advanced search with worker-focused queries
  10. Breach Check - Data breach and security incident assessment
  11. Email Harvesting - Contact discovery strategies
  12. Comprehensive Investigation - Master tool with OPSEC guidance

Key Capabilities

  • Dual Jurisdiction: Australia and Ireland focus
  • Privacy Levels: Conservative, moderate, or aggressive approaches
  • OPSEC Built-in: Operational security warnings and guidance
  • Legal Boundaries: Clear guidance on permitted vs prohibited activities
  • Worker-Focused: All tools optimized for labor advocacy use cases
  • Evidence Preservation: Guidance on saving and documenting findings

Installation

Prerequisites

  • Docker Desktop with MCP toolkit
  • Claude Desktop
  • Python 3.9+

Setup

  1. Clone or download this repository
cd C:\Projects
git clone [your-repo-url] osint-mcp-server
  1. Build the Docker image
cd osint-mcp-server
docker build -t worker-osint-mcp:latest .
  1. Configure Claude Desktop Edit %APPDATA%\Claude\claude_desktop_config.json:
{
  "mcpServers": {
    "worker-osint": {
      "command": "docker",
      "args": [
        "run",
        "-i",
        "--rm",
        "worker-osint-mcp:latest"
      ]
    }
  }
}
  1. Restart Claude Desktop

Usage

Quick Start

Ask Claude to investigate a company:

Investigate Qantas using the comprehensive investigation tool

Individual Tools

Use specific tools for targeted investigations:

Look up ABN 16009661901
Find subdomains for qantas.com.au
Search certificates for company.com
Check historical snapshots of company-website.com

Investigation Workflows

Quick Verification (15 min)

1. Use ABN/CRO lookup to verify company
2. Run WHOIS for domain ownership
3. Search social media presence

Standard Investigation (1-2 hours)

1. Business registry lookup
2. Infrastructure mapping (DNS, certificates)
3. Subdomain enumeration
4. Google dorking for documents
5. Historical analysis via Wayback

Deep Investigation (Multiple sessions)

All tools + manual research + evidence compilation
See docs/USAGE_GUIDE.md for detailed workflows

Documentation

Use Cases

Wage Theft Investigation

  • Find enterprise agreements and award rates
  • Search Fair Work Commission determinations
  • Document pay discrepancies
  • Build legal case evidence

OH&S Violations

  • Locate safety reports and incident documentation
  • Track historical safety records
  • Find deleted safety content
  • Document workplace hazards

Union Organizing

  • Research company anti-union history
  • Map corporate structure
  • Find employee contact information
  • Identify internal systems and portals

Enterprise Bargaining

  • Verify company structure and ownership
  • Research financial position
  • Find existing agreements
  • Identify parent company relationships

OPSEC - Operational Security

Critical Warnings

Every investigation leaves digital traces:

  • IP addresses logged
  • Search queries tracked
  • DNS requests visible
  • Certificate lookups recorded

Protection Essentials

  1. VPN Always - ProtonVPN, Mullvad, IVPN
  2. Dedicated Browser - Separate from personal use
  3. Clear Data - After each session
  4. Document Everything - For legal protection

Advanced Protection

For sensitive investigations:

  • Tor Browser for anonymity
  • Tails OS for maximum privacy
  • Burner accounts and devices
  • Time zone awareness

See docs/USAGE_GUIDE.md for complete OPSEC guidance.

Legal & Ethical Use

Permitted ✅

  • Public records and business registries
  • Public websites and social media
  • Search engines
  • Passive DNS/certificate lookups
  • Court records and Fair Work decisions

Prohibited ❌

  • Unauthorized system access
  • Using stolen credentials
  • Harassment or stalking
  • Impersonating others
  • DDoS or system disruption

Grey Areas ⚠️

  • Web scraping (check robots.txt and ToS)
  • Leaked databases (context matters)
  • Social engineering (honesty required)

Always operate within legal boundaries. This toolkit is for legitimate worker advocacy only.

Architecture

Components

  • MCP Server: Python-based Model Context Protocol server
  • Docker Container: Isolated execution environment
  • Claude Integration: AI-assisted investigation workflow
  • Tool Chain: 12 interconnected OSINT capabilities

Technologies

  • Python 3.9+
  • aiohttp for async HTTP requests
  • BeautifulSoup4 for web scraping
  • dnspython for DNS queries
  • Docker for containerization
  • MCP protocol for Claude integration

Development

Project Structure

osint-mcp-server/
├── osint_server.py          # Main MCP server
├── requirements.txt         # Python dependencies
├── Dockerfile              # Container definition
├── worker-osint-catalog.yaml  # MCP tool catalog
├── docs/
│   ├── USAGE_GUIDE.md     # Complete documentation
│   └── QUICK_REFERENCE.md # Quick lookup
└── README.md              # This file

Adding New Tools

  1. Add tool definition to TOOLS list in osint_server.py
  2. Implement async function for the tool
  3. Add to call_tool() handler
  4. Update worker-osint-catalog.yaml
  5. Rebuild Docker image
  6. Test with Claude

Troubleshooting

Tool Not Showing in Claude

  • Verify Docker container is running: docker ps
  • Check Claude Desktop config: %APPDATA%\Claude\claude_desktop_config.json
  • Restart Claude Desktop
  • Check logs: docker logs [container-id]

Permission Errors

  • Ensure Docker Desktop is running
  • Check file permissions in project directory
  • Verify config file is valid JSON

Tools Not Working

  • Check internet connection
  • Verify target websites are accessible
  • Review tool-specific error messages
  • Some sites block automated access (expected)

Support & Resources

Fair Work Commission (Australia)

Workplace Relations Commission (Ireland)

Legal Support

Contributing

This toolkit is designed for worker advocacy. Contributions that enhance worker safety, improve OPSEC, or add useful investigation capabilities are welcome.

Please ensure:

  • Code maintains ethical focus on worker rights
  • OPSEC considerations are addressed
  • Legal boundaries are respected
  • Documentation is updated

License

[Your chosen license - consider GPL or similar copyleft license to keep it free for workers]

Disclaimer

This toolkit is provided for legitimate worker advocacy, labor organizing, and legal purposes only. Users are responsible for:

  • Operating within legal boundaries
  • Respecting privacy laws
  • Following OPSEC guidelines
  • Using tools ethically

The authors assume no liability for misuse.

Acknowledgments

Built with inspiration from:

  • Bellingcat's OSINT investigations
  • Worker advocacy movements globally
  • Open source intelligence community
  • Labor organizers fighting for workers' rights

Solidarity.


"The tools of surveillance and investigation have been used against workers for too long. This toolkit helps level the playing field."

headless (default)

python tools/worksafe_vic.py

visible

HEADLESS=0 python tools/worksafe_vic.py

filter by company and limit

COMPANY="Qantas" MAX_RECORDS=5 python tools/worksafe_vic.py

About

Worker OSINT toolkit - development version

Resources

License

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors