Open Source Intelligence toolkit for worker advocacy, labor organizing, and corporate accountability.
This is an OSINT (Open Source Intelligence) toolkit designed specifically for workers' rights investigations. It provides 12 powerful tools to investigate companies, document workplace violations, and support labor organizing - turning surveillance techniques typically used against workers into tools that empower worker advocacy.
- Labor unions and organizers
- Worker rights advocates
- Legal aid clinics
- Workplace safety investigators
- Journalists covering labor issues
- Workers researching their employers
- ABN Lookup (Australia) - Business registry verification
- CRO Lookup (Ireland) - Companies registration office search
- WHOIS Lookup - Domain ownership and registration
- DNS Reconnaissance - Infrastructure and email server mapping
- Certificate Transparency - Subdomain discovery via SSL certificates
- Subdomain Scanning - Complete infrastructure enumeration
- Wayback Machine - Historical website data (1996-present)
- Social Media Search - Platform discovery and account finding
- Google Dorking - Advanced search with worker-focused queries
- Breach Check - Data breach and security incident assessment
- Email Harvesting - Contact discovery strategies
- Comprehensive Investigation - Master tool with OPSEC guidance
- Dual Jurisdiction: Australia and Ireland focus
- Privacy Levels: Conservative, moderate, or aggressive approaches
- OPSEC Built-in: Operational security warnings and guidance
- Legal Boundaries: Clear guidance on permitted vs prohibited activities
- Worker-Focused: All tools optimized for labor advocacy use cases
- Evidence Preservation: Guidance on saving and documenting findings
- Docker Desktop with MCP toolkit
- Claude Desktop
- Python 3.9+
- Clone or download this repository
cd C:\Projects
git clone [your-repo-url] osint-mcp-server- Build the Docker image
cd osint-mcp-server
docker build -t worker-osint-mcp:latest .- Configure Claude Desktop
Edit
%APPDATA%\Claude\claude_desktop_config.json:
{
"mcpServers": {
"worker-osint": {
"command": "docker",
"args": [
"run",
"-i",
"--rm",
"worker-osint-mcp:latest"
]
}
}
}- Restart Claude Desktop
Ask Claude to investigate a company:
Investigate Qantas using the comprehensive investigation tool
Use specific tools for targeted investigations:
Look up ABN 16009661901
Find subdomains for qantas.com.au
Search certificates for company.com
Check historical snapshots of company-website.com
Quick Verification (15 min)
1. Use ABN/CRO lookup to verify company
2. Run WHOIS for domain ownership
3. Search social media presence
Standard Investigation (1-2 hours)
1. Business registry lookup
2. Infrastructure mapping (DNS, certificates)
3. Subdomain enumeration
4. Google dorking for documents
5. Historical analysis via Wayback
Deep Investigation (Multiple sessions)
All tools + manual research + evidence compilation
See docs/USAGE_GUIDE.md for detailed workflows
- Complete Usage Guide - Comprehensive documentation
- Quick Reference - Fast lookup and common workflows
- QUICK_REFERENCE.md - Command reference (if in root)
- Find enterprise agreements and award rates
- Search Fair Work Commission determinations
- Document pay discrepancies
- Build legal case evidence
- Locate safety reports and incident documentation
- Track historical safety records
- Find deleted safety content
- Document workplace hazards
- Research company anti-union history
- Map corporate structure
- Find employee contact information
- Identify internal systems and portals
- Verify company structure and ownership
- Research financial position
- Find existing agreements
- Identify parent company relationships
Every investigation leaves digital traces:
- IP addresses logged
- Search queries tracked
- DNS requests visible
- Certificate lookups recorded
- VPN Always - ProtonVPN, Mullvad, IVPN
- Dedicated Browser - Separate from personal use
- Clear Data - After each session
- Document Everything - For legal protection
For sensitive investigations:
- Tor Browser for anonymity
- Tails OS for maximum privacy
- Burner accounts and devices
- Time zone awareness
See docs/USAGE_GUIDE.md for complete OPSEC guidance.
- Public records and business registries
- Public websites and social media
- Search engines
- Passive DNS/certificate lookups
- Court records and Fair Work decisions
- Unauthorized system access
- Using stolen credentials
- Harassment or stalking
- Impersonating others
- DDoS or system disruption
- Web scraping (check robots.txt and ToS)
- Leaked databases (context matters)
- Social engineering (honesty required)
Always operate within legal boundaries. This toolkit is for legitimate worker advocacy only.
- MCP Server: Python-based Model Context Protocol server
- Docker Container: Isolated execution environment
- Claude Integration: AI-assisted investigation workflow
- Tool Chain: 12 interconnected OSINT capabilities
- Python 3.9+
- aiohttp for async HTTP requests
- BeautifulSoup4 for web scraping
- dnspython for DNS queries
- Docker for containerization
- MCP protocol for Claude integration
osint-mcp-server/
├── osint_server.py # Main MCP server
├── requirements.txt # Python dependencies
├── Dockerfile # Container definition
├── worker-osint-catalog.yaml # MCP tool catalog
├── docs/
│ ├── USAGE_GUIDE.md # Complete documentation
│ └── QUICK_REFERENCE.md # Quick lookup
└── README.md # This file
- Add tool definition to
TOOLSlist inosint_server.py - Implement async function for the tool
- Add to
call_tool()handler - Update worker-osint-catalog.yaml
- Rebuild Docker image
- Test with Claude
- Verify Docker container is running:
docker ps - Check Claude Desktop config:
%APPDATA%\Claude\claude_desktop_config.json - Restart Claude Desktop
- Check logs:
docker logs [container-id]
- Ensure Docker Desktop is running
- Check file permissions in project directory
- Verify config file is valid JSON
- Check internet connection
- Verify target websites are accessible
- Review tool-specific error messages
- Some sites block automated access (expected)
- Website: https://www.fairwork.gov.au
- Phone: 13 13 94
- Website: https://www.workplacerelations.ie
- Phone: 1890 80 80 90
- Maurice Blackburn (AU): https://www.mauriceblackburn.com.au
- Shine Lawyers (AU): https://www.shine.com.au
- FLAC - Free Legal Advice (IE): https://www.flac.ie
This toolkit is designed for worker advocacy. Contributions that enhance worker safety, improve OPSEC, or add useful investigation capabilities are welcome.
Please ensure:
- Code maintains ethical focus on worker rights
- OPSEC considerations are addressed
- Legal boundaries are respected
- Documentation is updated
[Your chosen license - consider GPL or similar copyleft license to keep it free for workers]
This toolkit is provided for legitimate worker advocacy, labor organizing, and legal purposes only. Users are responsible for:
- Operating within legal boundaries
- Respecting privacy laws
- Following OPSEC guidelines
- Using tools ethically
The authors assume no liability for misuse.
Built with inspiration from:
- Bellingcat's OSINT investigations
- Worker advocacy movements globally
- Open source intelligence community
- Labor organizers fighting for workers' rights
Solidarity.
"The tools of surveillance and investigation have been used against workers for too long. This toolkit helps level the playing field."
python tools/worksafe_vic.py
HEADLESS=0 python tools/worksafe_vic.py
COMPANY="Qantas" MAX_RECORDS=5 python tools/worksafe_vic.py