OSINT Cybersecurity Tools

Overview

OSINT Cybersecurity Tools

Welcome to the World of OSINT:

An ongoing collection of awesome tools and frameworks, best security software practices, libraries, learning tutorials, frameworks, academic and practical resources about Open-source intelligence (OSINT) in cybersecurity. Thanks to all contributors, you're awesome and wouldn't be possible without you! Our goal is to build a categorized community-driven collection of very well-known resources.

Table of Contents

^ back to top ^

Introduction

Open-source intelligence (OSNIT) is the insight gained from processing and analyzing public data sources such as broadcast TV and radio, social media, and websites. These sources provide data in text, video, image, and audio formats.

osint

According to U.S. public law, Open Source Intelligence:

  • Is produced from publicly available information
  • Is collected, analyzed, and disseminated in a timely manner to an appropriate audience
  • Addresses a specific intelligence requirement

^ back to top ^

General Search

The main search engines used by users.

^ back to top ^

Main National Search Engines

Localized search engines by country.

^ back to top ^

Meta Search

Lesser known and used search engines.

^ back to top ^

Specialty Search Engines

Search engines for specific information or topics.

^ back to top ^

Visual Search and Clustering Search Engines

Search engines that scrape multiple sites (Google, Yahoo, Bing, Goo, etc) at the same time and return results.

  • Carrot2 - Organizes your search results into topics.
  • Yippy - Search using multiple sources at once

Similar Sites Search

Find websites that are similar. Good for business competition research.

Document and Slides Search

Search for data located on PDFs, Word documents, presentation slides, and more.

File Search

Search for all kind of files.

Pastebins

Find information that has been uploaded to Pastebin & alternative pastebin-type sites

Code Search

Search by website source code

Major Social Networks

Real-Time Search, Social Media Search, and General Social Media Tools

Social Media Tools

Twitter

Facebook

^ back to top ^

Instagram

^ back to top ^

Pinterest

Reddit

Tools to help discover more about a reddit user or subreddit.

  • Imgur - The most popular image hosting website used by redditors.
  • Mostly Harmless - Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.
  • Reddit Archive - Historical archives of reddit posts.
  • Reddit Suite - Enhances your reddit experience.
  • Reddit Investigator - Investigate a reddit users history.
  • Reddit Metrics - Keeps track of the growth of a subreddit.
  • Reddit User Analyser - reddit user account analyzer.
  • SnoopSnoo - Provides reddit user and subreddits analytics.
  • Subreddits - Discover new subreddits.
  • Reddit Comment Search - Analyze a reddit users by comment history.
  • Universal Scammer List - This acts as the website-portion for the subreddit /r/universalscammerlist. That subreddit, in conjuction with this website and a reddit bot, manages a list of malicious reddit accounts and minimizes the damage they can deal. This list is referred to as the "USL" for short.

^ back to top ^

VKontakte

Perform various OSINT on Russian social media site VKontakte.

Tumblr

LinkedIn

  • FTL - Browser plugin that finds emails of people's profiles in LinkedIn.

Telegram

  • Telegago - A Google Advanced Search specifically for finding public and private Telegram Channels and Chatrooms.
  • Telegram Nearby Map - Webapp based on OpenStreetMap and the official Telegram library to find the position of nearby users.

Blog Search

Forums and Discussion Boards Search

Username Check

People Investigations

  • 411 (US) - Search by person, phone number, address, and business. Limited free info, premium data upsell.
  • 192 (UK) - Search by person, business, address. Limited free info, premium data upsell.
  • Ancestry - Premium data, free trial with credit card.
  • Black Book Online - Free. Nationwide directory of public record lookups.
  • Canada411 - Search by person, phone number, and business. Free.
  • Classmates - High-school focused people search. Free acounts allow creating a profile and viewing other members. Premium account required to contact other members.
  • CrunchBase - Business information database, with a focus on investment, acquisition, and executive data. Ancillary focus on market research and connecting founders and investors.
  • facesearch - Handy proxy to search Google face-only image search results.
  • Family Search - Popular genealogy site. Free, but registration requried. Funded by The Church Of Jesus Christ of Latter-day Saints.
  • Federal Bureau of Prisons - Inmate Locator (US) - Search federal inmates incarcerated from 1982 to the present.
  • Fold3 (US Military Records) - Search military records. Search filters limited with free access. Premium access requires subscription.
  • Genealogy Bank - Premium data, free trial with credit card.
  • Genealogy Links - Genealogy directory with over 50K links.
  • Homemetry - Reverse address search and allows searching for properties for sale/rent.
  • Judyrecords - Free. Nationwide search of 400 million+ United States court cases.
  • Kompass - Business directory and search.
  • My Life People Search - People search. Limited free info, premium data upsell.
  • OpenSanctions - Information on sanctions and public office holders.
  • The National Archives (UK) - Search UK national archives.
  • Reunion - People search. Limited free info, premium data upsell.
  • SearchBug - People search. Limited free info, premium data upsell.
  • Spokeo - People search. Limited free info, premium data upsell.
  • UniCourt - Limited free searches, premium data upsell. Nationwide search of 100 million+ United States court cases.
  • White Pages (US) - People search. Limited free info, premium data upsell.
  • ZabaSearch
  • JailBase
  • Black Book Online
  • Mugshots

E-mail Search / E-mail Check

Phone Number Research

  • National Cellular Directory - was created to help people research and reconnect with one another by performing cell phone lookups. The lookup products includes have billions of records that can be accessed at any time, as well as free searches one hour a day, every day.
  • Reverse Phone Lookup - Detailed information about phone carrier, region, service provider, and switch information.
  • Spy Dialer - Get the voicemail of a cell phone & owner name lookup.
  • Twilio - Look up a phone numbers carrier type, location, etc.
  • Phone Validator - Pretty accurate phone lookup service, particularly good against Google Voice numbers.
  • PhoneInfoga - Advanced information gathering & OSINT framework for phone numbers
  • FreeCarrierLookup
  • Sync.ME

Expert Search

Company Research

Job Search Resources

Q&A Sites

Domain and IP Research

Keywords Discovery and Research

Web History and Website Capture

Language Tools

Image Search

Image Analysis

Stock Images

Video Search and Other Video Tools

Radio and Podcasts Tools

Academic Resources and Grey Literature

Books and Reading

Geospatial Research and Mapping Tools

News

News Digest and Discovery Tools

Fact Checking

Data and Statistics

Web Monitoring

Bookmarking

Startpages

Browsers

Offline Browsing

VPN Services

Note-taking

Annotation Tools

Writing and Office Tools

Slide Show and Presentation Tools

Digital Publishing

Newsletter Tools

Digital Storytelling

Infographics and Data Visualization

Image and Photo Editing

Productivity Tools

E-mail Management

Document and Reference Management

PDF Management

OCR Tools

Cloud Storage and File Sharing

Web Automation

Dashboard Tools

Wikis

Collaboration and Project Management

Communication Tools

Calendars and Scheduling

Mind Mapping, Concept Mapping and Idea Generation Tools

Social Network Analysis

Privacy and Encryption Tools

^ back to top ^

DNS

  • Amass - The amass tool searches Internet data sources, performs brute force subdomain enumeration, searches web archives, and uses machine learning to generate additional subdomain name guesses. DNS name resolution is performed across many public servers so the authoritative server will see the traffic coming from different locations. Written in Go.
  • findsubdomains - Automatically scans different sources to collect as many subdomains as can. Validate all the data through various tools and services to provide correct results without waiting.

Other Tools

  • Barcode Reader - Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.
  • Belati - Belati - The Traditional Swiss Army Knife For OSINT. Belati is tool for Collecting Public Data & Public Document from Website and other service for OSINT purpose.
  • Datasploit - Tool to perform various OSINT techniques on usernames, emails addresses, and domains.
  • Greynoise - "Anti-Threat Intelligence" Greynoise characterizes the background noise of the internet, so the user can focus on what is actually important.
  • The Harvester - Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.
  • Intrigue Core - Framework for attack surface discovery.
  • Maltego - Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.
  • Hunchly - Hunchly is a web capture tool designed specifically for online investigations.
  • OpenRefine - Free & open source power tool for working with messy data and improving it.
  • Orbit - Draws relationships between crypto wallets with recursive crawling of transaction history.
  • OSINT Framework - Web based framework for OSINT.
  • OsintStalker - Python script for Facebook and geolocation OSINT.
  • Outwit - Find, grab and organize all kinds of data and media from online sources.
  • eScraper - Grab product descriptions, prices, image urls and other data effortlessly
  • Photon - Crawler designed for OSINT
  • Pown Recon - Target reconnaissance framework powered by graph theory.
  • QuickCode - Python and R data analysis environment.
  • SecApps Recon - Information gathering and target reconnaissance tool and UI.
  • sn0int - Semi-automatic OSINT framework and package manager.
  • SpiderFoot - OSINT automation platform with over 200 modules for threat intelligence, attack surface monitoring, security assessments and asset discovery.
  • Zen - Find email addresses of Github users
  • OSINT.SH - Information Gathering Toolset.
  • SpiderFoot - SpiderFoot is an open source intelligence (OSINT) automation tool.
  • FOCA - Tool to find metadata and hidden information in the documents.
  • ^ back to top ^

Threat Intelligence

  • GitGuardian - Public GitHub Monitoring - Monitor public GitHub repositories in real time. Detect secrets and sensitive information to prevent hackers from using GitHub as a backdoor to your business.
  • REScure Threat Intel Feed - REScure is an independent threat intelligence project which we undertook to enhance our understanding of distributed systems, their integration, the nature of threat intelligence and how to efficiently collect, store, consume, distribute it.
  • OTX AlienVault - Open Threat Exchange is the neighborhood watch of the global intelligence community. It enables private companies, independent security researchers, and government agencies to openly collaborate and share the latest information about emerging threats, attack methods, and malicious actors, promoting greater security across the entire community.
  • OnionScan - Free and open source tool for investigating the Dark Web. Its main goal is to help researchers and investigators monitor and track Dark Web sites.
  • Digital Stakeout - DigitalStakeout Scout™ is the leading security intelligence tool to collect data from the surface web, social media, dark web and technical sources to illuminate and investigate external threats.
  • ^ back to top ^

OSINT Videos

OSINT Blogs

Other Resources

Project Management Tools

Project management tools, Scrum tools, and Project Boards.

  • ClickUp - Heavy-weight Task Management
  • Scrumfast - Light-weight, Free Project Management Tool
  • Trello - Free Team Project Board

Contributing

Please read CONTRIBUTING if you wish to add tools or resources.

Credits

This list was taken partially taken from i-inteligence's OSINT Tools and Resources Handbook.

License

MIT License & cc license

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

To the extent possible under law, Paul Veillard has waived all copyright and related or neighboring rights to this work.

^ back to top ^

Owner
Paul Veillard, P. Eng
Welcome to the most extensive collection of encyclopedic knowledge in the World of CyberSecurity®
Paul Veillard, P. Eng
Malware Configuration And Payload Extraction

CAPEv2 (Python3) has now been released CAPEv2 With the imminent end-of-life for Python 2 (January 1 2020), CAPEv1 will be phased out. Please upgrade t

Context Information Security 701 Dec 27, 2022
About Hive Burp Suite Extension

Hive Burp Suite Extension Description Hive extension for Burp Suite. This extension allows you to send data from Burp to Hive in one click. Create iss

7 Dec 07, 2022
Patching - Interactive Binary Patching for IDA Pro

Patching - Interactive Binary Patching for IDA Pro Overview Patching assembly code to change the behavior of an existing program is not uncommon in ma

589 Dec 30, 2022
Dahua IPC/VTH/VTO devices auth bypass exploit

CVE-2021-33044 Dahua IPC/VTH/VTO devices auth bypass exploit About: The identity authentication bypass vulnerability found in some Dahua products duri

Ashish Kunwar 23 Dec 02, 2022
𝙾𝚙𝚎𝚗 𝚂𝚘𝚞𝚛𝚌𝚎 𝚂𝚌𝚛𝚒𝚙𝚝 - 𝙽𝚘 𝙲𝚘𝚙𝚢𝚛𝚒𝚐𝚑𝚝 - 𝚃𝚎𝚊𝚖 𝚆𝚘𝚛𝚔 - 𝚂𝚒𝚖𝚙𝚕𝚎 𝙿𝚢𝚝𝚑𝚘𝚗 𝙿𝚛𝚘𝚓𝚎𝚌𝚝 - 𝙲𝚛𝚎𝚊𝚝𝚎𝚍 𝙱𝚢 : 𝙰𝚕𝚕 𝚃𝚎𝚊𝚖 - 𝙲𝚘𝚙𝚢𝙿𝚊𝚜𝚝 𝙲𝚊𝚗 𝙽𝚘𝚝 𝙼𝚊𝚔𝚎 𝚈𝚘𝚞 𝚁𝚎𝚊𝚕 𝙿𝚛𝚘𝚐𝚛𝚊𝚖𝚖𝚎𝚛

𝙾𝚙𝚎𝚗 𝚂𝚘𝚞𝚛𝚌𝚎 𝚂𝚌𝚛𝚒𝚙𝚝 - 𝙽𝚘 𝙲𝚘𝚙𝚢𝚛𝚒𝚐𝚑𝚝 - 𝚃𝚎𝚊𝚖 𝚆𝚘𝚛𝚔 - 𝚂𝚒𝚖𝚙𝚕𝚎 𝙿𝚢𝚝𝚑𝚘𝚗 𝙿𝚛𝚘𝚓𝚎𝚌𝚝 - 𝙲𝚛𝚎𝚊𝚝𝚎𝚍 𝙱𝚢 : 𝙰𝚕𝚕 𝚃𝚎𝚊𝚖 - 𝙲𝚘𝚙𝚢𝙿𝚊𝚜𝚝 𝙲𝚊𝚗 𝙽𝚘𝚝 𝙼𝚊𝚔𝚎 𝚈𝚘𝚞 𝚁𝚎𝚊𝚕 𝙿𝚛𝚘𝚐𝚛𝚊𝚖𝚖𝚎𝚛

CodeX-ID 2 Oct 27, 2022
"KeyLogger-WebService" Is a Keylogger Write In python.

KeyLogger-WebService "KeyLogger-WebService" Is a Keylogger Write In python. When you Inject the file on a computer once the file is opened on the comp

Freddox 21 Dec 16, 2022
PyExtractor is a decompiler that can fully decompile exe's compiled with pyinstaller or py2exe

PyExtractor is a decompiler that can fully decompile exe's compiled with pyinstaller or py2exe with additional features such as malware checker/detector! Also checks file(s) for suspicious words, dis

Rdimo 56 Jul 31, 2022
Tools for converting Nintendo DS binaries to an ELF file for Ghidra/IDA

nds2elf Requirements nds2elf.py uses LIEF and template.elf to form a new binary. LIEF is available via pip: pip3 install lief Usage DSi and DSi-enhan

Max Thomas 17 Aug 14, 2022
Scan all java processes on your host to check weather it's affected by log4j2 remote code execution

Log4j2 Vulnerability Local Scanner (CVE-2021-45046) Log4j 漏洞本地检测脚本,扫描主机上所有java进程,检测是否引入了有漏洞的log4j-core jar包,是否可能遭到远程代码执行攻击(CVE-2021-45046)。上传扫描报告到指定的服

86 Dec 09, 2022
This is the fuzzer I made to fuzz Preview on macOS and iOS like 8years back when I just started fuzzing things.

Fuzzing PDFs like its 1990s This is the fuzzer I made to fuzz Preview on macOS and iOS like 8years back when I just started fuzzing things. Some discl

Chaithu 14 Sep 30, 2022
A collection of over 5.1 million sub-domains and assets belonging to public bug bounty programs, compiled into a repo, for performing bulk operations.

📂 Public Bug Bounty Targets Data By BugBountyResources A collection of over 5.1M sub-domains and assets belonging to bug bounty targets, all put in a

Bug Bounty Resources 87 Dec 13, 2022
Tor Relay availability checker, for using it as a bridge in countries with censorship

Tor Relay Availability Checker This small script downloads all Tor Relay IP addresses from onionoo.torproject.org and checks whether random Relays are

ValdikSS 161 Dec 30, 2022
A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

A way to analyse how malware and/or goodware samples vary from each other using Shannon Entropy, Hausdorff Distance and Jaro-Winkler Distance

11 Nov 15, 2022
A Feature Rich Modular Malware Configuration Extraction Utility for MalDuck

Malware Configuration Extractor A Malware Configuration Extraction Tool and Modules for MalDuck This project is FREE as in FREE 🍺 , use it commercial

c3rb3ru5 103 Dec 18, 2022
A Python tool to automate some dorking stuff to find information disclosures.

WebDork v1.0.3 A open-source tool to find publicly available sensitive information about Companies/Organisations! WebDork A Python tool to automate so

Rahul rc 123 Jan 08, 2023
对naabu的端口扫描结果,调用nmap进行指纹识别

naabu2nmap 对naabu的端口扫描结果,调用nmap进行指纹识别

Se7en 12 Nov 22, 2022
Password List Creator Simple !

Password List Creator Simple !

MR.D3F417 4 Jan 27, 2022
Python program that generates secure passwords.

Python program that generates secure passwords. The user has the option to select the length of the password, amount of passwords,

4 Dec 07, 2021
Log4Shell Proof of Concept (CVE-2021-44228)

CVE-2021-44228 Log4Shell Proof of Concept (CVE-2021-44228) Make sure to use Java 8 JDK. Java 8 Download Images Credits Casey Dunham - Java Reverse She

Kr0ff 3 Jul 23, 2022
the metasploit script(POC) about CVE-2021-36260

CVE-2021-36260-metasploit the metasploit script(POC) about CVE-2021-36260. A command injection vulnerability in the web server of some Hikvision produ

Taroballz 14 Nov 09, 2022