MOOSINT
OSINT Framework:
Data Breach Checks:
Netcraft toolbar.netcraft.com/site_report?url=YOURTARGET Shodan: shodan.io/ Censys: www.censys.io/ipv4?q=YOURTARGET Security Headers: securityheaders.com/?q=YOURTARGET Threat Crowd: threatcrowd.org/domain.php?domain=YOURTARGET Zoomeye: zoomeye.org Wigle: wigle.net
Extensions: Netcraft, VirusTotal, Wappalyzer
SSL: Crt.sh: https://crt.sh/?q=%25.YOURTARGET SSL Labs: ssllabs.com/ssltest/analyze.html?d=YOURTARGET testssl.sh: https://testssl.sh/
DNS: DNS Dumpster: https://dnsdumpster.com Security Trails: https://securitytrails.com/domain/ Wayback Machine: https://web.archive.org/web/*/YOURTARGET
Buckets: Grayhatwarfare: buckets.grayhatwarfare.com Social Media: Sherlock: github.com/sherlock-project/sherlock Sagemode: https://github.com/senran101604/sagemode NameChk: namechk.com/
Socks: Fake Name Generator: fakenamegenerator.com/ This Person Does not Exist: thispersondoesnotexist.com/
Reverse Image Search: Google: images.google.com TinEye: tineye.com Exiftool | Strings | Binwalk Email: Hunter: hunter.io Phonebook: phonebook.cz/ Hippo: tools.verifyemailaddress.io
Breach Checks: Have I Been Pwned: haveibeenpwned.com/ Have I Been Breached: haveibeenbreached.com/ Dehashed - dehashed.com/ Phones: TrueCaller: truecaller.com/ Phone Scoop: phonescoop.com GSM Arena: gsmarena.com Caller ID Test: calleridtest.com
VM's: tracelabs.org/initiatives/osint-vm#downloads
Dorks: site, inurl, intitle, intext, link, filetype, * + -
Last updated