osint
NOTE: this section is just for my reference and majority of the links I use are saved as bookmarks in browser. If you'd like me to share it, send a DM.
OWASP/Amass
amass enum -d DOMAIN
subdomains osint
aboul3la/Sublist3r
./sublist3r.py -d DOMAINtomnomnom/assetfinder
assetfinder [--subs-only] DOMAINdarkoperator/dnsrecon
dnsrecon -t brt -d DOMAIN
Check for active sub-domains: tomnomnom/httprobe
Screenshot tool: sensepost/gowitness
email osint:
search engine osint
Search Operators: google-advanced-search-operators
# *: wildcard
site:*.DOMAIN.com
-<keywordToOmit>
intext:<> | inurl:<> | intitle:<>
filetype: <>
keyword1 AND|OR|* keyword2
"keyword1 keyword2"social networking osint
Twitter
from:USER
to:USER
@USER
since:YYYY-MM-DD
until:YYYY-MM-DD
geocode:GEO-CODE,<NUMBER>kmleaks osint
Radial01/PwnyCorral
python pwnycorral.py -hhmaverickadams/breach-parse
./breach-parse.sh @DOMAIN OUT.txt "PATH-to-BreachCompilationData"
username osint
sherlock-project/sherlock
python3 sherlock.py USERNAME
phone-number osint
sundowndev/phoneinfoga
phoneinfoga serve -p 9090
Last updated
Was this helpful?