OSINT Cybersecurity Tools

Overview

OSINT Cybersecurity Tools

Welcome to the World of OSINT:

An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about Open-source intelligence (OSINT) in cybersecurity. Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.

Table of Contents

^ back to top ^

Introduction

Open-source intelligence (OSNIT) is the insight gained from processing and analyzing public data sources such as broadcast TV and radio, social media, and websites. These sources provide data in text, video, image, and audio formats.

osint

According to U.S. public law, Open Source Intelligence:

  • Is produced from publicly available information
  • Is collected, analyzed, and disseminated in a timely manner to an appropriate audience
  • Addresses a specific intelligence requirement

^ back to top ^

General Search

The main search engines used by users.

^ back to top ^

Main National Search Engines

Localized search engines by country.

^ back to top ^

Meta Search

Lesser known and used search engines.

^ back to top ^

Specialty Search Engines

Search engines for specific information or topics.

^ back to top ^

Visual Search and Clustering Search Engines

Search engines that scrape multiple sites (Google, Yahoo, Bing, Goo, etc) at the same time and return results.

  • Carrot2 - Organizes your search results into topics.
  • Yippy - Search using multiple sources at once

Similar Sites Search

Find websites that are similar. Good for business competition research.

Document and Slides Search

Search for data located on PDFs, Word documents, presentation slides, and more.

File Search

Search for all kind of files.

Pastebins

Find information that has been uploaded to Pastebin & alternative pastebin-type sites

Code Search

Search by website source code

Major Social Networks

Real-Time Search, Social Media Search, and General Social Media Tools

Social Media Tools

Twitter

Facebook

^ back to top ^

Instagram

^ back to top ^

Pinterest

Reddit

Tools to help discover more about a reddit user or subreddit.

  • Imgur - The most popular image hosting website used by redditors.
  • Mostly Harmless - Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.
  • Reddit Archive - Historical archives of reddit posts.
  • Reddit Suite - Enhances your reddit experience.
  • Reddit Investigator - Investigate a reddit users history.
  • Reddit Metrics - Keeps track of the growth of a subreddit.
  • Reddit User Analyser - reddit user account analyzer.
  • SnoopSnoo - Provides reddit user and subreddits analytics.
  • Subreddits - Discover new subreddits.
  • Reddit Comment Search - Analyze a reddit users by comment history.
  • Universal Scammer List - This acts as the website-portion for the subreddit /r/universalscammerlist. That subreddit, in conjuction with this website and a reddit bot, manages a list of malicious reddit accounts and minimizes the damage they can deal. This list is referred to as the "USL" for short.

^ back to top ^

VKontakte

Perform various OSINT on Russian social media site VKontakte.

Tumblr

LinkedIn

  • FTL - Browser plugin that finds emails of people's profiles in LinkedIn.

Telegram

  • Telegago - A Google Advanced Search specifically for finding public and private Telegram Channels and Chatrooms.
  • Telegram Nearby Map - Webapp based on OpenStreetMap and the official Telegram library to find the position of nearby users.

Blog Search

Forums and Discussion Boards Search

Username Check

People Investigations

  • 411 (US) - Search by person, phone number, address, and business. Limited free info, premium data upsell.
  • 192 (UK) - Search by person, business, address. Limited free info, premium data upsell.
  • Ancestry - Premium data, free trial with credit card.
  • Black Book Online - Free. Nationwide directory of public record lookups.
  • Canada411 - Search by person, phone number, and business. Free.
  • Classmates - High-school focused people search. Free acounts allow creating a profile and viewing other members. Premium account required to contact other members.
  • CrunchBase - Business information database, with a focus on investment, acquisition, and executive data. Ancillary focus on market research and connecting founders and investors.
  • facesearch - Handy proxy to search Google face-only image search results.
  • Family Search - Popular genealogy site. Free, but registration requried. Funded by The Church Of Jesus Christ of Latter-day Saints.
  • Federal Bureau of Prisons - Inmate Locator (US) - Search federal inmates incarcerated from 1982 to the present.
  • Fold3 (US Military Records) - Search military records. Search filters limited with free access. Premium access requires subscription.
  • Genealogy Bank - Premium data, free trial with credit card.
  • Genealogy Links - Genealogy directory with over 50K links.
  • Homemetry - Reverse address search and allows searching for properties for sale/rent.
  • Judyrecords - Free. Nationwide search of 400 million+ United States court cases.
  • Kompass - Business directory and search.
  • My Life People Search - People search. Limited free info, premium data upsell.
  • OpenSanctions - Information on sanctions and public office holders.
  • The National Archives (UK) - Search UK national archives.
  • Reunion - People search. Limited free info, premium data upsell.
  • SearchBug - People search. Limited free info, premium data upsell.
  • Spokeo - People search. Limited free info, premium data upsell.
  • UniCourt - Limited free searches, premium data upsell. Nationwide search of 100 million+ United States court cases.
  • White Pages (US) - People search. Limited free info, premium data upsell.
  • ZabaSearch
  • JailBase
  • Black Book Online
  • Mugshots

E-mail Search / E-mail Check

Phone Number Research

  • National Cellular Directory - was created to help people research and reconnect with one another by performing cell phone lookups. The lookup products includes have billions of records that can be accessed at any time, as well as free searches one hour a day, every day.
  • Reverse Phone Lookup - Detailed information about phone carrier, region, service provider, and switch information.
  • Spy Dialer - Get the voicemail of a cell phone & owner name lookup.
  • Twilio - Look up a phone numbers carrier type, location, etc.
  • Phone Validator - Pretty accurate phone lookup service, particularly good against Google Voice numbers.
  • PhoneInfoga - Advanced information gathering & OSINT framework for phone numbers
  • FreeCarrierLookup
  • Sync.ME

Expert Search

Company Research

Job Search Resources

Q&A Sites

Domain and IP Research

Keywords Discovery and Research

Web History and Website Capture

Language Tools

Image Search

Image Analysis

Stock Images

Video Search and Other Video Tools

Radio and Podcasts Tools

Academic Resources and Grey Literature

Books and Reading

Geospatial Research and Mapping Tools

News

News Digest and Discovery Tools

Fact Checking

Data and Statistics

Web Monitoring

Bookmarking

Startpages

Browsers

Offline Browsing

VPN Services

Note-taking

Annotation Tools

Writing and Office Tools

Slide Show and Presentation Tools

Digital Publishing

Newsletter Tools

Digital Storytelling

Infographics and Data Visualization

Image and Photo Editing

Productivity Tools

E-mail Management

Document and Reference Management

PDF Management

OCR Tools

Cloud Storage and File Sharing

Web Automation

Dashboard Tools

Wikis

Collaboration and Project Management

Communication Tools

Calendars and Scheduling

Mind Mapping, Concept Mapping and Idea Generation Tools

Social Network Analysis

Privacy and Encryption Tools

^ back to top ^

DNS

  • Amass - The amass tool searches Internet data sources, performs brute force subdomain enumeration, searches web archives, and uses machine learning to generate additional subdomain name guesses. DNS name resolution is performed across many public servers so the authoritative server will see the traffic coming from different locations. Written in Go.
  • findsubdomains - Automatically scans different sources to collect as many subdomains as can. Validate all the data through various tools and services to provide correct results without waiting.

Other Tools

  • Barcode Reader - Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.
  • Belati - Belati - The Traditional Swiss Army Knife For OSINT. Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose.
  • Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
  • Greynoise - "Anti-Threat Intelligence" Greynoise characterizes the background noise of the internet, so the user can focus on what is actually important.
  • The Harvester - Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
  • Intrigue Core - Framework for attack surface discovery.
  • Maltego - Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.
  • Hunchly - Hunchly is a web capture tool designed specifically for online investigations.
  • OpenRefine - Free & open source power tool for working with messy data and improving it.
  • Orbit - Draws relationships between crypto wallets with recursive crawling of transaction history.
  • OSINT Framework - Web based framework for OSINT.
  • OsintStalker - Python script for Facebook and geolocation OSINT.
  • Outwit - Find, grab and organize all kinds of data and media from online sources.
  • eScraper - Grab product descriptions, prices, image urls and other data effortlessly
  • Photon - Crawler designed for OSINT
  • Pown Recon - Target reconnaissance framework powered by graph theory.
  • QuickCode - Python and R data analysis environment.
  • SecApps Recon - Information gathering and target reconnaissance tool and UI.
  • sn0int - Semi-automatic OSINT framework and package manager.
  • SpiderFoot - OSINT automation platform with over 200 modules for threat intelligence, attack surface monitoring, security assessments and asset discovery.
  • Zen - Find email addresses of Github users
  • OSINT.SH - Information Gathering Toolset.
  • SpiderFoot - SpiderFoot is an open source intelligence (OSINT) automation tool.
  • FOCA - Tool to find metadata and hidden information in the documents.
  • ^ back to top ^

Threat Intelligence

  • GitGuardian - Public GitHub Monitoring - Monitor public GitHub repositories in real time. Detect secrets and sensitive information to prevent hackers from using GitHub as a backdoor to your business.
  • REScure Threat Intel Feed - REScure is an independent threat intelligence project which we undertook to enhance our understanding of distributed systems, their integration, the nature of threat intelligence and how to efficiently collect, store, consume, distribute it.
  • OTX AlienVault - Open Threat Exchange is the neighborhood watch of the global intelligence community. It enables private companies, independent security researchers, and government agencies to openly collaborate and share the latest information about emerging threats, attack methods, and malicious actors, promoting greater security across the entire community.
  • OnionScan - Free and open source tool for investigating the Dark Web. Its main goal is to help researchers and investigators monitor and track Dark Web sites.
  • Digital Stakeout - DigitalStakeout Scout™ is the leading security intelligence tool to collect data from the surface web, social media, dark web and technical sources to illuminate and investigate external threats.
  • ^ back to top ^

OSINT Videos

OSINT Blogs

Other Resources

Project Management Tools

Project management tools, Scrum tools, and Project Boards.

  • ClickUp - Heavy-weight Task Management
  • Scrumfast - Light-weight, Free Project Management Tool
  • Trello - Free Team Project Board

Contributing

Please read CONTRIBUTING if you wish to add tools or resources.

Credits

This list was taken partially taken from i-inteligence's OSINT Tools and Resources Handbook.

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work.

^ back to top ^

Owner
Paul Veillard, P. Eng
Welcome to the most extensive collection of encyclopedic knowledge in the World of CyberSecurity®
Paul Veillard, P. Eng
Scanning for CVE-2021-44228

Filesystem log4j_scanner for windows and Unix. Scanning for CVE-2021-44228, CVE-2021-45046, CVE-2019-17571 Requires a minimum of Python 2.7. Can be ex

Brett England 4 Jan 09, 2022
Fuzz introspector is a tool to help fuzzer developers to get an understanding of their fuzzer’s performance and identify any potential blockers.

Fuzz introspector Fuzz introspector is a tool to help fuzzer developers to get an understanding of their fuzzer’s performance and identify any potenti

Open Source Security Foundation (OpenSSF) 221 Jan 01, 2023
This program will brute force any Instagram account you send it its way given a list of proxies.

Instagram Bruter This program will brute force any Instagram account you send it its way given a list of proxies. NOTICE I'm no longer maintaining thi

1 Nov 15, 2021
BloodyAD is an Active Directory Privilege Escalation Framework

BloodyAD Framework BloodyAD is an Active Directory Privilege Escalation Framework, it can be used manually using bloodyAD.py or automatically by combi

757 Jan 07, 2023
Exploit for GitLab CVE-2021-22205 Unauthenticated Remote Code Execution

Vuln Impact An issue has been discovered in GitLab CE/EE affecting all versions starting from 11.9. GitLab was not properly validating image files tha

Hendrik Agung 2 Dec 30, 2021
IDA plugin for quickly copying disassembly as encoded hex bytes

HexCopy IDA plugin for quickly copying disassembly as encoded hex bytes. This whole plugin just saves you two extra clicks... but if you are frequentl

OALabs 46 Oct 30, 2022
Remote control your Greenbone Vulnerability Manager (GVM)

Greenbone Vulnerability Management Tools The Greenbone Vulnerability Management Tools gvm-tools are a collection of tools that help with remote contro

Greenbone 130 Dec 17, 2022
This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device

f5-waf-enforce-sigs-CVE-2021-44228 This enforces signatures for CVE-2021-44228 across all policies on a BIG-IP ASM device Overview This script enforce

Ismael Gonçalves 5 Mar 31, 2022
EyeJo是一款自动化资产风险评估平台,可以协助甲方安全人员或乙方安全人员对授权的资产中进行排查,快速发现存在的薄弱点和攻击面。

EyeJo EyeJo是一款自动化资产风险评估平台,可以协助甲方安全人员或乙方安全人员对授权的资产中进行排查,快速发现存在的薄弱点和攻击面。 免责声明 本平台集成了大量的互联网公开工具,主要是方便安全人员整理、排查资产、安全测试等,切勿用于非法用途。使用者存在危害网络安全等任何非法行为,后果自负,作

429 Dec 31, 2022
exchange-ssrf-rce

Usage python3 .\exchange-exp.py -------------------------------------------------------------------------------- |

Jen 76 Nov 09, 2022
A python tool capable of creating HUGE wordlists. Has the ability to add custom words for concatenation in any way you see fit.

A python tool capable of creating HUGE wordlists. Has the ability to add custom words for concatenation in any way you see fit.

Codex 9 Oct 05, 2022
Use FOFA automatic vulnerability scanning tool

AutoSRC Use FOFA automatic vulnerability scanning tool Usage python3 autosrc.py -e FOFA EMAIL -k TOKEN Screenshots License MIT Dev 6613GitHub6613

PwnWiki 48 Oct 25, 2022
Log4Shell RCE Exploit - fully independent exploit does not require any 3rd party binaries.

Log4Shell RCE Exploit fully independent exploit does not require any 3rd party binaries. The exploit spraying the payload to all possible logged HTTP

258 Jan 02, 2023
Mass Shortlink Bypass Merupakan Tools Yang Akan Bypass Shortlink Ke Tujuan Asli, Dibuat Dengan Python 3

Shortlink-Bypass Mass Shortlink Bypass Merupakan Tools Yang Akan Bypass Shortlink Ke Tujuan Asli, Dibuat Dengan Python 3 Support Shortlink tii.ai/tei.

Wan Naz ID 6 Oct 24, 2022
test application for the licence key web app.

licence_software_test_app Make sure you set your database values in a .env file to the folder. Install MYSQL connector: pip install mysql-connector-py

Carl Beattie 1 Oct 28, 2021
Python lib to automate basic QFT calculations like Wick-contractions.

QFTools Python lib to automate basic QFT calculations like Wick-contractions. Features Wick contractions for real scalar fields Wick contractions for

2 Aug 21, 2022
compact and speedy hash cracker for md5, sha1, and sha256 hashes

hash-cracker hash cracker is a multi-functional and compact...hash cracking tool...that supports dictionary attacks against three kinds of hashes: md5

Abdullah Ansari 3 Feb 22, 2022
MD5-CRACKER - A gmail brute force app created with python3

MD5-CRACKER So this is my first app i created with python3 . if you guys downloa

2 Nov 10, 2022
PoC encrypted diary in Python 3

Encrypted diary Sample program to store confidential data. Provides encryption in the form of AES-256 with bcrypt KDF. Does not provide authentication

1 Dec 25, 2021
Create a secure tunnel from a custom domain to localhost using Fly and WireGuard.

Fly Dev Tunnel Developers commonly use apps like ngrok, localtunnel, or cloudflared to expose a local web service at a publicly-accessible URL. This i

170 Dec 11, 2022