OS Int Tools
A list of useful Open-Source Intelligence Tools
Useful tools for performing Open-Source Intelligence investigations.
- Bellingcat's Online Investigation Toolkit - https://bellingcat.gitbook.io/toolkit/more/all-tools
- Finding devices - network-side
- Shodan - https://www.shodan.io/
- Censys - https://censys.io/
- FOFA - https://en.fofa.info/
- Visualise results
- Maltego - https://www.maltego.com/
- Finding touch-points from other resources (DNS, social media, etc)
- The Harvester - https://github.com/laramies/theHarvester
- Recon-NG - https://bitbucket.org/LaNMaSteR53/recon-ng
- SpiderFoot - https://github.com/smicallef/spiderfoot
- DNS Dumpster - https://dnsdumpster.com/
- Subdomain Finder - https://subdomainfinder.c99.nl/
- Certificate Search - https://crt.sh/
- Collections harvesters
- OSINT Framework - https://osintframework.com/
- OSINT Combine - https://osintcombine.com/
- Social Media
- Namechk - https://github.com/GONZOsint/Namechk
- Sherlock - https://github.com/sherlock-project/sherlock
- Threat Intel
- FBI Watchdog - seized domains - https://github.com/DarkWebInformer/FBI_Watchdog
- Data Breaches
- Have I Been Pwned – https://haveibeenpwned.com/
- Abuse IP DB – https://www.abuseipdb.com/
- urlscan.io – https://urlscan.io/
- CentralOps Network Tools – https://centralops.net/co/
- VirusTotal – https://www.virustotal.com/
- Hybrid Analysis – https://www.hybrid-analysis.com/
- MXToolbox – https://mxtoolbox.com/
- SSL Labs’ SSL Test – https://www.ssllabs.com/ssltest/
- CIRCL’s Lookyloo – https://lookyloo.circl.lu/
- ARIN Whois – https://www.arin.net/
- CVE List – https://cve.mitre.org/cve/
- AlienVault Open Threat Exchange (OTX) – https://otx.alienvault.com/
- ThreatYeti - https://www.threatyeti.com/
- IP API - https://ipapi.is/
- Typo-Squatted domains - https://haveibeensquatted.com/
- IP and Domain info - https://ipinfo.io/ and https://host.io/
- WiFi mapping - https://wigle.net/