OSINT
Sock Puppets
Creating an Effective Sock Puppet for OSINT Investigations Introduction
The Art Of The Sock
Reddit My process for setting up anonymous sockpuppet accounts
Fake Name Generator
This Person Does not Exist
Privacy.com
Email OSINT
Hunter.io
Phonebook.cz
VoilaNorbert
Email-Hippo
Email-Checker
Clearbit-Connect
Password OSINT
PWDQuery
h8mail
Breachdirectory
Dehashed
WeLeakInfo
LeakCheck
SnusBase
Scylla.sh
Have I Been Pwned
Breached Credentials
# https://github.com/hmaverickadams/breach-parse
bash breach-parse.sh @company.com company.com "BreachCompilation/"
Image OSINT
Google Image Search
Yandex
TinEye
Jeffreys Image Metadata Viewer
GeoGuessr
GeoGuessr The Top Tips Tricks and Techniques
Username OSINT
NameChk
WhatsMyName
NameCheckup
People OSINT
WhitePages
TruePeopleSearch
FastPeopleSearch
FastBackgroundCheck
WebMii
PeekYou
411
Spokeo
ThatsThem
Voter-Records
TrueCaller
Caller-ID-Test
Infobel
Social Media OSINT
# Twitter
from:username since:2019/03/01 until:2019/04/01
to:username
@username
geocode:$geo_code,10km
Twitter-Advanced-Search
Social Bearing
Twitonomy
Sleeping Time
Mention Mapp
Tweetbeaver
SpoonBill
Tinfoleak
TweetDeck
Sowdust
Intelx-Facebook-Search
Wopita
Code-of-a-Ninja
InstaDP
ImgInn
Snap-Map
Website OSINT
BuiltWith
Domain-Dossier
DNSlytics-Reverse-IP
SpyOnWeb
VirusTotal
Visual-Ping
Back Link Watch
viewdns.info
Pentest Tools Subdomain Finder
Spyse
crt.sh
Shodan
Wayback Machine
Business OSINT
AI-HIT
Open Corporates
Wireless OSINT
WiGLE
Working with OSINT Tools
Linux Tools
theHarvester -d tesla.com -b all
recon-ng
h8mail
breach-parse
Twint
Subfinder
Assetfinder
httprobe
Amass
GoWitness
Hunchly
OSINT Automation Foundations
#!/bin/bash
domain=$1
RED="\033[1;31m"
RESET="\033[0m"
info_path=$domain/info
subdomain_path=$domain/subdomains
screenshot_path=$domain/screenshots
if [ ! -d "$domain" ];then
mkdir $domain
fi
if [ ! -d "$info_path" ];then
mkdir $info_path
fi
if [ ! -d "$subdomain_path" ];then
mkdir $subdomain_path
fi
if [ ! -d "$screenshot_path" ];then
mkdir $screenshot_path
fi
echo -e "${RED} [+] Checkin' who it is...${RESET}"
whois $1 > $info_path/whois.txt
echo -e "${RED} [+] Launching subfinder...${RESET}"
subfinder -d $domain > $subdomain_path/found.txt
echo -e "${RED} [+] Running assetfinder...${RESET}"
assetfinder $domain | grep $domain >> $subdomain_path/found.txt
#echo -e "${RED} [+] Running Amass. This could take a while...${RESET}"
#amass enum -d $domain >> $subdomain_path/found.txt
echo -e "${RED} [+] Checking what's alive...${RESET}"
cat $subdomain_path/found.txt | grep $domain | sort -u | httprobe -prefer-https | grep https | sed 's/https\?:\/\///' | tee -a $subdomain_path/alive.txt
echo -e "${RED} [+] Taking dem screenshotz...${RESET}"
gowitness file -f $subdomain_path/alive.txt -P $screenshot_path/ --no-http
OSINT Flowcharts






Search Engine OSINT
site:github.com
Term1 AND Term2
Term1 OR Term2
Term1 * Term3
site:tesla.com password filetype:pdf
site:tesla.com -www -shop
filetype:pdf inurl:file intext:password
Google Advanced Search
Google Search Guide
Yandex
DuckDuckGo
Last updated