Pentest-Book
  • Pentest-Book
  • Recon
    • Public info gathering
    • Root domains
    • Subdomain Enum
      • Subdomain Takeover
    • Webs recon
    • Network Scanning
    • Host Scanning
    • Packet Scanning
  • Enumeration
    • Pentesting Web checklist
      • Cheat sheet
    • Pentesting Web Checklist V2
    • Web Attacks
      • General Info
      • Quick tricks
      • Bruteforcing / Cracking
      • Crawl / Fuzz
      • Header injections
      • LFI / RFI
      • Open redirects
      • SSRF
      • SQLi
      • File upload
      • XSS
        • CSP
      • XXE
      • CORS
      • CSRF
      • Command Injection
      • HTTP Request Smuggling
      • Web Cache Poisoning
      • Clickjacking
      • Web Sockets
      • CRLF
      • IDOR
      • Session fixation
      • Email attacks
      • HTTP Parameter pollution
      • SSTI
      • Deserialization
      • Prototype Pollution
      • JWT attacks
      • Webshells
      • Broken Links
      • Cookie Padding
      • Information Disclosure
    • Web Technologies
      • Wordpress
      • Joomla
      • Drupal
      • Tomcat
      • APIs
      • GraphQL API
      • JS
      • ASP.NET
      • GitHub / GitLab
      • WAFs
      • Firebird
      • WebDav
      • Jenkins
      • IIS
      • VHosts
      • Firebase
      • OWA
      • OAuth
      • Flask
      • Symfony && Twig
      • NoSQL (MongoDB, CouchDB)
      • PHP
      • RoR (Ruby on Rails)
      • JBoss - Java Deserialization
      • OneLogin - SAML Login
      • Flash SWF
      • Nginx
      • Python
      • Adobe AEM
      • Magento
      • SAP
      • MFA
      • GWT
      • Jira
      • OIDC (Open ID Connect)
      • ELK
      • Sharepoint
      • Others
    • Cloud
      • General
      • Cloud Info Gathering
      • AWS
      • Azure
      • GCP
      • Docker && Kubernetes
      • CDN - Comain Fronting
    • Files
    • SSL/TLS
    • Ports
  • Exploitation
    • Payloads
    • Reverse Shells
    • File transfer
  • Post Exploitation
    • Linux
    • Pivoting
    • Windows
      • AD
        • Kerberos
      • PS tips & tricks
  • Mobile
    • General
    • Android
    • iOS
  • Others
    • Burp Suite
    • Password cracking
    • VirtualBox
    • Code review
    • Internal Pentest
    • Web fuzzers review
    • Recon suites review
    • Subdomain tools review
    • Random
    • Master assessment mindmaps
    • Bug Bounty
    • Exploiting
    • Tools everywhere
  • Courses
    • OSINT
      • Sock Puppets
      • Email OSINT
      • Password OSINT
      • Image OSINT
      • Username OSINT
      • People OSINT
      • Social Media OSINT
      • Website OSINT
      • Business OSINT
      • Wireless OSINT
      • Working with OSINT Tools
      • OSINT Automation Foundations
      • OSINT Flowcharts
      • Search Engine OSINT
    • CBBH
    • CPTS / OSCP
      • Useful commands
      • Information Gathering
      • Network Enumeration
      • Protocols & Services
        • MSSQL
      • File Transfers
      • Shells, Payloads & Exploit
      • Metasploit Framework
      • Password Attacks
      • Pivoting, Tunneling & Port Forwarding
      • Privilege Escalation
      • Active Directory
      • Phishing & Client-Side Attacks
      • Antivirus Evasion
  • EXTERNAL PENTEST
  • Internal Pentest
    • Internal Pentest CheatSheet
Powered by GitBook
On this page
  1. Courses

OSINT

Sock PuppetsEmail OSINTPassword OSINTImage OSINTUsername OSINTPeople OSINTSocial Media OSINTWebsite OSINTBusiness OSINTWireless OSINTWorking with OSINT ToolsOSINT Automation FoundationsOSINT FlowchartsSearch Engine OSINT
PreviousTools everywhereNextSock Puppets

Last updated 11 months ago