
The Black Tiger – Installation Guide
Are you ready to take your cybersecurity skills to the next level? Do you want to uncover hidden information with just a few clicks? The Black Tiger, a powerful OSINT tool, is here to make your cyber-investigations more efficient and accurate than ever before. In this blog post, we’re going to dive deep into the world of The Black Tiger,
revealing its extraordinary features, benefits, and how you can harness its potential. Let’s embark on this exhilarating journey!
The Black Tiger: Unleashing the Beast
The Black Tiger is not your ordinary OSINT tool. It’s a fierce and intelligent linux tool that combines various
data sources, analytical tools, and algorithms to provide you with comprehensive information about your targets. Whether you’re a cybersecurity professional, a journalist, or simply someone curious about online investigations, this tool is designed to cater to your needs.
The Black Tiger tool is focused on OSINT almost all areas (People, Nicknames, Social Networks, Emails, Phone Numbers, Web Pages, Public IPs and Images). My idea was to collect and automate all the most
Advanced OSINT techniques possible in a single Tool and thus work in the most comfortable and fast way possible,
since we only have to give a couple of clicks and it will only start collecting and displaying in an orderly and
classified manner all the information. All Sections are separated into parts in case you only want to extract a specific type of information, but it also has the penultimate option that combines all the Options so that it can extract everything it is capable of from the data that we have entered.
The Name: Unveiling “The Black Tiger”

In the world of cybersecurity and OSINT, a tool’s name can carry significant meaning. “The Black Tiger” is no exception. The name draws inspiration from a real-life hero of espionage, Ravindra Kaushik, also known as “The Black Tiger.”
Ravindra Kaushik, an Indian Research and Analysis Wing (RAW) agent, dedicated his life to serving his country as a spy from 1975 to 1983. His remarkable contributions and unwavering dedication to the cause have earned him a place in the annals of Indian history as one of the greatest spies the nation has ever known.
As a tribute to the courage, dedication, and relentless pursuit of knowledge exemplified by Ravindra Kaushik, “The Black Tiger” OSINT tool stands as a symbol of tenacity in the world of digital investigation. It embodies the spirit of its namesake, helping users unveil hidden truths and navigate the intricate web of online information.
Much like the real Black Tiger left an indelible mark on India’s intelligence landscape, my tool aspires to leave a lasting impact on the field of OSINT. With its powerful features and capabilities, it’s a fitting homage to the legacy of a true espionage legend.
Installation Guide:
0) Install and use the Tool with Root. Make sure you are a root user while installing this tool, to avoid errors.
1) It is a goo practice to update your linux system before installing any new tool in it.
sudo apt update && apt -y full-upgrade
2) Install git if you dont have it installed.
sudo apt-get install git
3) Copy and paste this command to clone The Black Tiger into your linux system.
git clone https://github.com/VirusZzHkP/The-Black-Tiger

4) Now to get into the tool’s directory, check where you have cloned it, with ls command. Then type the command below.
cd the_black_tiger
5) We will now use the change mode (chmod) command to change the file permissions of the file named “the_black_tiger.sh”. With that if you notice I’ve given a number i.e. “777”, which is the permission level for a different category of users:
- The first digit (7) represents the permissions for the owner of the file.
- The second digit (7) represents the permissions for users in the same group as the file.
- The third digit (7) represents the permissions for all other users.
chmod 777 the_black_tiger.sh

6) Then to run this tool we use the following command,
./the_black_tiger.sh

7) To use the tool for the first time we have to Install all the required items, this is a one time action. For that press “0” then the following window will appear.

8) Within Option “0”, press “1” to install all the things required to run the tool, it may take few minutes. Also make sure you are a root user to avoid errors while installation process.
After installation we find sections 2, 3 and 4 in the same window, where we can configure the APIs to get the most out of the_black_tiger.
9) Installation and configuration is done now we can enjoy the tool.
Features of The Black Tiger:
The tool “The Black Tiger” offers a wide range of features, each tailored to enhance your online investigations.
Web Pages:
When it comes to web pages, it provides extensive capabilities, including identifying web technologies using WhatWeb, retrieving domain information with Whois, conducting advanced port scanning, extracting server details, and attempting to reveal the real IP of a server, even if protected by CloudFlare. You can also assess SSL encryption, list all the URLs associated with a domain, gather information about WordPress websites, extract worker details, email addresses, and phone numbers, list domains, utilize Google Dorks, and even ping a website from multiple countries for a comprehensive analysis.

Individuals:
For investigations related to individuals, the tool covers a variety of areas, including Google Dorks for detailed searches, social networks for exploring profiles, images, posts, and more. It’s an invaluable resource for uncovering information about people.

Nicknames/Alias:
When dealing with nicknames or aliases, The Black Tiger allows you to employ Google Dorks, search 574 social networks to locate accounts associated with a specific nickname, and access related images and posts.

Social Networks:
The tool excels in social network investigations, providing access to information about Instagram, TikTok, Twitter, Twitch, and GitHub (including email) accounts, all without requiring an account of your own.

Emails:
In the realm of email investigations, The Black Tiger offers extensive capabilities, enabling you to gather email information, verify email existence, search 121 social networks for accounts linked to a particular email, find GitHub accounts associated with the email, and utilize Google Dorks for in-depth searches.

Phone Numbers:
Phone number investigations are made easy with the tool, allowing you to identify the company (ISP) associated with a phone number, check if the number is registered on platforms like Instagram, Amazon, or Snapchat, employ Google Dorks, and even attempt to extract the owner’s name for a more comprehensive profile.

Public IPs:
For public IPs, The Black Tiger offers geolocation down to the exact city, identifies open ports with their associated services and versions, and performs web pings from various countries to assess the availability and responsiveness of the IP address.

YouTube Videos/Channels:
When it comes to YouTube videos and channels, the tool provides a wealth of data. You can access details such as the publication date and time, title, description, thumbnail image URLs in various sizes, video statistics (views, likes, comments, and favorites), geolocation (if enabled), video specifics (duration, dimensions, definition, projection), video category, and thumbnails. For channels, it offers data on the date and time of creation, title, description, thumbnail image URLs in various sizes, location (if enabled), channel statistics (total video views, subscribers, total videos), keywords, playlists, status, and categories.

Images:
Finally, for images, The Black Tiger allows you to extract metadata, conduct searches using Google’s image search engine, utilize a specific image search engine, and magnify an image up to four times without significant loss of image quality. These capabilities make it a versatile tool for various investigative tasks, both for professionals and enthusiasts in the field.

Key Points to keep in mind:
When using The Black Tiger, it’s crucial to pay attention to specific details and considerations to ensure a smooth experience. Here are some key points to keep in mind:
User Permissions Matter:
During the installation and configuration of requirements, when prompted to add a user, make sure to select a user who does not have root permissions. Using a root user or entering the information incorrectly can impact the functionality of certain options that open a browser from the terminal. Be cautious and precise in this step to avoid potential issues.
API Configuration:
To maximize the utility of The Black Tiger, consider configuring APIs from veriphone.io, shodan.io, and zoomeye.org. These APIs are free and can enhance the tool’s capabilities. Properly configuring these APIs will help you extract valuable information during your investigations.
VPN and Server Accuracy:
When using The Black Tiger to gather public IP information, keep in mind that VPNs can sometimes lead to inaccurate server responses regarding open ports. To overcome this, the tool comes equipped with several scanners, and two of them can provide more accurate port information even when a VPN is in use.
Close Firefox:
The Black Tiger is designed to open multiple tabs in your web browser. To ensure a seamless experience, it’s recommended to have Firefox closed before running the tool. This precaution will help prevent potential errors and ensure that the tool can function as intended.
Optimal Terminal Usage:
For a visually pleasing experience, it’s advisable to use The Black Tiger with the terminal in full-screen mode. This configuration not only looks better but also provides a more comfortable environment for conducting your investigations.
Regular Updates:
If you’ve downloaded an older version of the tool, consider uninstalling it and then reinstalling the latest version,
along with its requirements. Doing so can help resolve errors and provide access to improvements that significantly enhance the tool’s functionality. Staying up to date ensures you can take full advantage of the latest features and enhancements.
By following these recommendations and being mindful of the details mentioned, you’ll be better equipped to utilize The Black Tiger effectively in your online investigations and maximize the tool’s potential.
Conclusion:
In the dynamic world of cybersecurity and online investigations, having the right tool is paramount. “The Black Tiger,” our robust OSINT solution, is here to elevate your digital sleuthing. With its diverse features
and user-friendly interface, it’s not just a tool—it’s your trusty companion in the quest for truth.
From web pages to people, social networks, emails, phone numbers, and public IPs, “The Black Tiger” caters
to a wide range of investigative needs. It’s versatile, efficient, and designed for everyone, from cybersecurity professionals to curious enthusiasts.
Ready to take your investigations to the next level? Install The Black Tiger now and embrace the power of OSINT like never before.
Note for Users
While our blog post provided an extensive introduction to “The Black Tiger” and its installation guide,
it’s made the post quite lengthy. Stay tuned for our upcoming guide, where we’ll explore
how to use the tool in detail, with step-by-step instructions and real-world examples. Your journey with “The Black Tiger” is just beginning, and we’re excited to help you maximize its potential.
– VirusZzwarning