Showing results for tags 'osint'. - CryptoTalk.Org Jump to content

Search the Community

Showing results for tags 'osint'.

The search index is currently processing. Current results may not be complete.


More search options

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Crypto
    • About Forum
    • For Beginners
    • Chia Mining
    • Crypto World
    • Coins / Tokens Talk
    • NFTs & collections
    • Bounties
    • Exchanges
    • Defi
    • Trading
    • Marketplace
    • ICO/IEO's
    • Mobile Apps
    • Wallets
    • Tutorials
    • Mining
    • Services
    • Jobs
    • Artificial Intelligence (AI)
    • Referral Links
    • Gambling/HYIP's/FreeCoins
    • Off Topic
  • Russian
    • О Форуме
    • Новички
    • Chia Майнинг
    • Крипто Мир
    • Монеты / Токены
    • NFT & коллекции
    • Баунти кампании
    • Биржи криптовалют
    • Обменники
    • Defi
    • Трейдинг
    • ICO/IEO's
    • Мобильные Приложения
    • Кошельки
    • Инструкции
    • Майнинг
    • Услуги
    • Работа
    • Искусственный интеллект (ИИ)
    • Игры / Хайпы / Краны
    • Купить / Продать
    • Реферальный раздел
    • Оффтопик

Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


About Me


BTC


ETH

Found 4 results

  1. Основы информационной безопасности + контрольный список для проверки информационной безопасности организаций Обратите внимание, что речь пойдет не о технической стороне деятельности компаний, а о социальной инженерии, направленной на уязвимые места ваших сотрудников. Мы добавили бесплатный для общего пользования "ЧЕКЛИСТ ДЛЯ ПРОВЕРКИ ИНФОРМАЦИОННОЙ БЕЗОПАСНОСТИ ОРГАНИЗАЦИЙ". Мы надеемся, что этот контрольный список и информация, приведенная в данной статье, добавят спокойствия и информационной безопасности вашей организации. С чеклистом можно ознакомиться в конце статьи. Email. Чаще всего именно электронная почта является главной точкой входа в тайны вашей компании и ее личного состава. Каждый официальный сайт компании содержит контактную информацию, включающую адрес электронной почты с доменом компании. Например, info@nameoforganization.com или hr@nameoforganization.com. Это соответствует деловой этике, но в современном Интернете существует огромное количество инструментов (например, Google Dorks, phonebook.cz, hunter.io и др.), которые, используя домен, собирают другие адреса, которые организация, возможно, не хотела публиковать для широкой общественности. В результате можно обнаружить что-то вроде ciso@nameoforganization.com, andreypetrov@nameoforganization.com, SolyuVseSekretyKontory@nameoforganization.com. Само наличие рабочего e-mail не только дает возможность установить прямой контакт с сотрудником, минуя отдел по связям с общественностью, но и позволяет коллегам использовать его не по назначению: регистрировать аккаунты в социальных сетях, заказывать доставку и так далее, и так далее, и так далее. Все это впоследствии скрывается. По таким электронным адресам можно найти много интересной личной информации, которая пригодится хакерам и кибершантажистам. Фотографии сотрудников на сайте компании. Да, фотографии на сайте компании могут помочь найти аккаунты ваших сотрудников в социальных сетях. В большинстве случаев эта информация не имеет коммерческой ценности, но это отличная возможность собрать сведения о личной жизни сотрудника, что может вылиться в настолько хорошо построенную социально-инженерную кампанию, что злоумышленник даже не заметит подвоха. Кстати, существует достаточно много инструментов для поиска аккаунтов в социальных сетях по лицу. Например, FindClone, SearchForFace и даже просто google.pictures. Публичная активность. В действительности фотографии и публичная активность не являются столь критичными уязвимостями, как персональные данные, которые можно получить из адресов электронной почты. Исключить публичную активность компании - значит отсечь 80% маркетинга. Некоторые вещи стоит предавать огласке, а некоторые - нет. Примером социально-инженерной атаки может служить такой текст, как: "Добрый день, я видел Вас на конференции "Легенды SOC - 2023". Нам очень понравилась ваша презентация. Мы хотели бы предложить Вам сотрудничество. Условия и подробное предложение находятся во вложении". Согласитесь, заманчиво! Особенно если ваша компания немного недоплачивает сисадмину, и он находится в поисках более выгодного предложения. Велика вероятность, что даже опытный ИТ-специалист сначала откроет вложение и только потом задумается. Файлы на сайте компании. Вам может казаться, что вы спрятали все ненужные файлы, но поисковые роботы Google все тщательно проиндексировали. Проверить это очень просто. Например, ваш сайт находится по адресу: rogaikopyta.site. Набираем в строке поиска google: filetype: (здесь без пробела формат файла -- pdf, doc, docx, xls, txt) site:rogaikopyta.site. Далее проверяем, чтобы ничего лишнего вдруг не оказалось в открытом доступе. Есть ряд документов, которые юридическое лицо не может не публиковать, но то, что не входит в этот список, лучше почистить, ведь лишняя информация о ваших сотрудниках, контрагентах, финансовых активах - все это отличная пища для потенциальной атаки. Хочется также обратить внимание на то, какие сотрудники представляют наибольшую угрозу для информационной безопасности компаний. Большинство исследований в области информационной безопасности показывают, что самым слабым звеном в мерах безопасности являются сотрудники, поскольку именно они имеют полный доступ ко всем ресурсам и документам организаций. Новый сотрудник ИТ-службы. Новый сотрудник ИТ-службы может по неосторожности нанести огромный ущерб безопасности компании. Сегодня хакеры используют все более изощренные методы проникновения во внутренние ресурсы компаний, такие как социальная инженерия. Вновь принятый на работу ИТ-сотрудник не знаком с протоколами и процессами, обеспечивающими безопасную передачу файлов по сети, и поэтому является чрезвычайно привлекательной мишенью для злоумышленников, желающих получить полный доступ к корпоративной информации. Системный администратор. Во многих компаниях основными вопросами информационной безопасности занимаются системные администраторы. Сисадмин занимается не только техническими аспектами, но и несет огромную ответственность за материальные и нематериальные активы и репутацию организации. Кроме того, он знает о компании практически все, имеет доступ ко всем конфиденциальным данным, поэтому при определенных обстоятельствах может подвергнуться давлению со стороны киберпреступников. Высшее руководство. Как ни странно, генеральный директор компании на самом деле часто представляет собой огромную угрозу для ее информационной безопасности. По данным Ponemon Institute, более половины утечек, в которых участвуют сотрудники, происходят по вине высшего руководства. Такие потери являются наглядным доказательством того, что хакеры рассматривают в качестве своих целей не только менеджеров среднего звена, но и топ-менеджеров. Помощники руководителей также являются носителями очень ценной корпоративной информации. Они имеют доступ ко всем учетным данным, паролям, финансовым отчетам и внутренней документации. Именно это делает их особенно привлекательным объектом для взлома. Консультант по безопасности. Если вашей организации требуется сложная, многоступенчатая система безопасности, будьте готовы к сотрудничеству с различными поставщиками услуг из этой области. Однако помните, что внешний консультант по безопасности, привлеченный для определения текущего уровня безопасности и постановки задач в области ИБ, имеет полный доступ ко всем внутренним ресурсам компании и конфиденциальным данным, о чем хакеры прекрасно осведомлены. Внешний поставщик Крупные компании часто используют сразу несколько внешних поставщиков. Ежедневные хакерские атаки подтверждают, что после получения поставщиками доступа к внутренним системам и сетям компании эти системы и сети становятся особенно уязвимыми для киберугроз. Чтобы обезопасить себя, компании должны предоставлять поставщикам ограниченный и контролируемый доступ. Уволенный сотрудник Роковой ошибкой многих компаний является закрытие доступа к внутренним ресурсам и сетям для бывших сотрудников. Совершая эту ошибку, организации становятся еще более уязвимыми для кибератак. Единственным верным решением является немедленное удаление всех учетных записей сотрудников, которые уже не работают в компании. Более того, бывшие сотрудники могут легко унести с собой базы данных потенциальных и текущих клиентов и другую конфиденциальную информацию и разместить ее в свободном доступе в Интернете. Временный работник Временная занятость - очень распространенное явление, особенно в сфере обслуживания и продаж. Не является исключением и сфера информационных технологий, где очень часто требуются сотрудники на временной основе для решения тех или иных задач. Таким сотрудникам предоставляется доступ к различным корпоративным порталам и системам, где хранится наиболее важная информация и данные компании. Кроме того, временным сотрудникам предоставляются в пользование корпоративные ноутбуки, планшеты и смартфоны. Именно поэтому таких сотрудников следует считать полноправными членами организации и защищать от угроз информационной безопасности. что речь пойдет не о технической стороне деятельности компаний, а о социальной инженерии, направленной на уязвимые места ваших сотрудников. Помните, что именно сотрудники и их халатное отношение к мерам безопасности представляют собой огромную угрозу для ИТ-безопасности компании. ДОПОЛНИТЕЛЬНАЯ ИНФОРМАЦИЯ, КОТОРАЯ МОЖЕТ ВАМ ПОМОЧЬ. ✅ ЧЕК-ЛИСТ ПРОВЕРКИ ОРГАНИЗАЦИЙ. ✅ 600 инструментов для osint и исследований. ✅ Инструменты для osint в blockchain. ✅ Маркетплейс для криптопроектов, все опции в одном месте. ✅ Инструменты для обеспечения безопасности смарт-контрактов. ✅ Новости osint, реальные расследования и полезная информация.
  2. Information security basics for company + checklist for checking information security of organizations. In this article, I would like to talk about information that needs to be protected from attackers planning to harm your business. Please note that we will not be talking about the technical part of companies' operations, but about social engineering aimed at the vulnerabilities of your employees. You can read the checklist at the end of the article. Email More often than not, email is the main entry point into the secrets of your company and its personal staff. Every official company website contains contact information that includes an email address with the company domain. For example, info@nameoforganization.com or hr@nameoforganization.com. This is consistent with business ethics, but in today's Internet there are a huge number of tools (e.g. Google Dorks, phonebook.cz, hunter.io etc) that, using the domain, collect other addresses that the organization may not have wanted to publish to the general public. This might reveal something like ciso@nameoforganization.com, andreypetrov@nameoforganization.com, SolyuVseSekretyKontory@nameoforganization.com. The mere presence of a work e-mail not only gives the opportunity to establish direct contact with the employee bypassing the public relations department, but also allows colleagues to misuse it, namely to register accounts in social networks, order deliveries and so on, so on, so on. All of this subsequently gets ducked. With such email addresses, we can find a lot of interesting personal information that is useful for hackers and cyber blackmailers. Employee photos on the company website Yes, photos on a company's website can help find your employees' social media accounts. In most cases, this information has no commercial value, but it is a great opportunity to gather information about an employee's private life, which can result in such a well-built social engineering campaign that the attacker will not even notice the catch. By the way, there are quite a few tools for searching social media accounts by face. For example, FindClone, SearchForFace, and even simple google.pictures. Public activity In reality, photos and public activity are not as critical vulnerabilities as personal data that can be gleaned from email addresses. To exclude a company's public activity is to cut off 80% of marketing. Some things are worth publicizing and some are not. An example of a social engineering attack would be a text like this: "Good afternoon, I saw you at the conference "Legends of SOC - 2023". We liked your presentation very much. We would like to propose cooperation. Terms and conditions and a detailed offer are in the attachment". Agree, tempting! Especially if your company slightly underpays a sysadmin, and he is in search of a more favorable offer. There is a high probability that even an experienced IT specialist will first open the attachment and only then think about it. Files on the company website You may think that you have hidden all the unnecessary files, but Google search robots have indexed everything carefully. It is very easy to check this. For example, your website is: rogaikopyta.site. Type in the search bar google: filetype: (here without a space file format -- pdf, doc, docx, xls, txt) site:rogaikopyta.site. Next, we check that nothing unnecessary is suddenly not in the public domain. There are a number of documents that a legal entity cannot not publish, but what is not included in this list, it is better to clean, because unnecessary information about your employees, counterparties, financial assets - all this is excellent food for a potential attack. We also want to pay attention to which employees pose the greatest threat to the information security of companies. Most information security studies indicate that the weakest link in security measures is the employees, as they are the ones who have full access to all the resources and documents of the organizations. New IT employee A new IT employee can inadvertently cause huge damage to a company's security. Today, hackers are using more and more sophisticated methods to infiltrate internal company resources, such as social engineering. A newly hired IT employee is unfamiliar with the protocols and processes responsible for the secure transfer of files over a network, and is therefore an extremely attractive target for cybercriminals looking to gain full access to corporate information. System administrator In many companies, system administrators handle the main information security issues. A sysadmin doesn't just handle the technical aspects, but has a huge responsibility for the tangible and intangible assets and reputation of the organization. Moreover, he knows almost everything about the company, has access to all confidential data, so under certain circumstances he can be subjected to pressure from cybercriminals. Top management Rather oddly, a company's CEO is actually often a huge threat to the company's information security. According to the Ponemon Institute, more than half of the leaks involving employees are caused by top management. Such losses are clear proof that hackers see not only middle managers but also top management as their targets. Executive assistants are also the carriers of very valuable corporate information. They have access to all credentials, passwords, financial reports and internal documentation. This is what makes them a particularly attractive target for hackers. Security Consultant If your organization needs a complex, multi-stage security system, be prepared to partner with a variety of service providers from this field. Remember, however, that an external security consultant brought in to determine the current level of security and set goals for the organization's IS direction has full access to all internal company resources and sensitive data, which hackers are well aware of. External vendor Large companies often utilize multiple external vendors at once. Daily hacker attacks confirm that once vendors gain access to a company's internal systems and networks, those systems and networks are particularly vulnerable to cyber threats. To protect themselves, companies must give vendors limited, controlled access. Fired employee A fatal mistake many companies make is neglecting to close access to internal resources and networks to former employees. By making this mistake, organizations become even more susceptible to cyberattacks. The only true solution is to immediately delete all accounts of employees who are no longer with the company. Moreover, former employees can easily take databases of potential and current customers and other confidential information with them and put it freely available online. Temporary employee Temporary employment is a very common phenomenon, especially in the service and sales industry. The IT sector is no exception, as very often employees are needed here on a temporary basis to help close some tasks. These employees are given access to various corporate portals and systems where the company's most important information and data is stored. Moreover, temporary employees are given the use of corporate laptops, tablets and smartphones. This is why these employees should be considered full-fledged in the organization and protected from information security threats. I would like to finish this article with a quote from Bruce Schneier: "In terms of security, the mathematical apparatus is flawless, computers are vulnerable, networks are lousy, and people are disgusting." Remember that it is employees and their negligence towards security measures that pose a huge threat to a company's IT security. ADDITIONAL INFORMATION THAT MAY HELP YOU. ✅ CHECKLIST FOR INSPECTION ORGANIZATIONS. ✅ 600 INSTRUMENTS FOR OSINT AND RESEARCH. ✅ TOOLS FOR OSINT IN BLOCKCHAIN. ✅ ALL OPTIONS IN ONE PLACE. ✅ TOOLS FOR SECURING SMART CONTRACTS.
  3. 600 BEST OSINT TOOLS 2022. The first OSINT service with artificial intelligence using more than 1100 sources of information "OSINT AI BM". There are 7 months to go until the service is launched. We decided to make available to you some of the information sources that you can use for OSINT. Link to original resource list>>>> Keyword research tools. Google AdWords Keyword Tool KWFinder Keyword discover Keyword Shitter One Look: Enter a word, phrase, sentence, or pattern to search for related words. Ubersuggest: suggest keywords not available in the Google Keyword Planner. Browser extensions for OSINT. Double Shot Search is an extension for Chrome that doubles the search. It searches in two search engines simultaneously - Bing and Google. Hunter.io is a service that will find e-mail addresses associated with a certain domain. You can also use this tool to find an e-mail address by name in a couple of seconds. RevEye is an open-source Chrome extension that runs a photo through Google, Bing, Yandex and TinEye. Search Engines. General Search Google Bing Yahoo AOL Infospace Lycos Exalead ASK Ecosia entireweb teoma yippy I Search From: simulate using Google Search from a different location or device, or perform a search with custom search settings. millionshort: Allows you to remove the top of the search engine results (e.g Remove top 100,1000,10000) National Search Engines. Yandex: Russia Search: Switzerland Alleba: Philippines Baidu | so | bhanvad China Eniro: Sweden Daum: South Korea Goo: Japan Onet: Poland Parseek: Iran SAPO: Portugal AONDE: Brazil Lableb: Arabic based search engine arabo: Arabic Search engine Privacy-oriented search engines DuckDuckGo: Online investigators usually use it to search the surface web while using the Tor Browser. Startpage: Fetch results from Google without tracking its users. Peekier: Privacy oriented search engines that fetch its results using its own search algorithm. Qwant: Based in France. Oscobo: Based in UK. Swisscows: Privacy safe WEB-search based in Switzerland. Gigablast: Open source search engine. Gibiru: Uncensored and anonymous search engine. Privado Meta search engines Excite Search MetaGer Zapmeta etools: Compile its results from major international search engines, keep user privacy by not collecting or sharing personal information of its users. This search engine is very fast and show a summary for each search query -on the right side- detailing the source of its results. All the interne: query major search engines including shopping site like Amazon and eBay. izito: Aggregate data from multiple sources (Yahoo, Bing, Wikipedia, YouTube and other) to generate optimal results which includes images, videos, news and articles. Metacrawler: Aggregate results from Google and Yahoo!. My all search: Aggregates results through Bing, DuckDuckGo, AOL Search, Ask, Oscobo, Mojeek, ZapMeta, MetaCrawler. Carrot2: Open Source Search Results Clustering Engine aggregate results from GoogleAPI, Bing API, eTools Meta Search, Lucene, SOLR, and more. elocalfinder: Fetch results from Google, Yahoo!, Ask and Bing . All-in-One Searx FTP search engines Global file search Archie File watcher Mamont NAPALM FTP Indexer Files Search Engines Faganfinder DOCUMENT SEARCH ENGINE grayhatwarfare: Search for Open Amazon s3 Buckets and their contents. There are specialized sites that hold images appeared in the press and news media, to search for this type of images go to: Gettyimages: Contains images from news, entertainment, fashion, sports and archival imagery. Reuters pictures News press Associated Press images portal PA images European pressphoto agency Canadian Press images archive Images shared across social media sites can be found in the following locations: Flickr Flicker map idGettr: Find Flicker ID number (also works for groups). Flickr Hive Mind: Data mining tool for the Flickr database of photography. Instagram Stalkture: Instagram Online Web Viewer. Pinterest There are specialized sites that hold images appeared in the press and news media, to search for this type of images go to: Google reverse search Karmadecay TinEye Yandex reverse image search Bing visual search REVERSE IMAGE SEARCH Cam finds App: this is an App available for both Android and Apple devices. It uses visual search technology to recognize uploaded picture and give instant results about it like related images, local shopping results and a vast selection of web results. Image Identification Project Picsearch Yahoo search engine Graphics search: artage graphicriver freepik graphicsfactory clipart-library kissclipart Stock photo search: ImageFinder istockphoto stocksnap gettyimages shutterstock pikwizard mostphotos photopin Video Search Engines YouTube Google video Yahoo video search Bing videos AOL videos StartPage video search Veoh Vimeo 360daily Official Facebook video search Crowd tangle (Facebook video search) Internet archive open source movies Live Leak Facebook live video map Meta Tube Geo Search Tool: Search for all movies according to a specific query entered by the user – the result set will be further filtered according to the distance from a specific location (city, village, intersection) and according to a specific time frame (past hour, past two or three hours ..etc.). Earth Cam Insecam Blog Search. Blogspot Blog Search blogsearchengine bloggingfusion Blog Directory Bloghub: Online blog directory. blog-search blogsearchengine Fake News Detection. Snopes: Discovers false news, stories, urban legends and research/validate rumors to see whether it is true. Hoaxy: Check the spread of false claims (like a hoax, rumor, satire, news report) across social media sites. The site derives its results from reputable fact checking organizations to return the most accurate results. FactCheck: This site is partnered with Facebook to help identify and label fake news reported by its users. It also monitors different media for the false info covering a wide range of topics like health, science, hoaxes spread through Spam emails. ReviewMeta: Analysis Amazon user reviews. Reporter Lab: Gives a map of global fact-checking sites. Truth Or Fiction: Discover fake news in different topics like politics, nature, health, space, crime, police and terrorism…etc. Hoax-Slayer: Focuses on email scam and social media hoaxes. Verification Handbook: A definitive guide to verifying digital content for emergency coverage available in different languages. Verification junkie: This is a directory of tools for verifying, fact checking and assessing the validity of eyewitness reports and user self-published content online. citizen evidence: tools and lessons to teach people how to authenticate user-generated online contents. Managed by Amnesty International. News/Newspaper Search Engines. 1stHeadlines: Breaking news headline. Google News Archive Google Newspaper Archive News Now Newspaper Archives: Contains Newspaper Archives 1607-2017 and Obituaries & Family History Records. All you can read Newspapers Search Findmypast: US and world historical( China, Denmark, France, Germany, Jamaica, and South Africa are also searchable within the collection) Newspaper archive. Daily Earth Search U.S. Newspaper Directory, 1690-Present Newspaper Map World News The paperboy Newsography: International relations and armed conflicts global news aggregator and historical database. Online Newspapers: Online Newspaper Directory for the World. YouGotTheNews: Search Engine for US News – Search thousands of national, business, and local news sources. Library of Congress Newspapers directory & 100 Years Ago Today: Search U.S. Newspaper Directory, 1690-Present using these two links from the Library of Congress. Patent Search Engines Google Advanced Patent Search Engine European Patent Office Israel Patent Office Database Norwegian Industrial Property Office Swedish Patent and Registration Office Switzerland Taiwan Intellectual Property Office Japan Patent Office World Intellectual Property Organization (WIPO) State Intellectual Property Office (SIPO) of the People’s Republic of China Australia Patent Search Canadian Intellectual Property Office Danish Patent and Trademark Office Finnish Patent and Registration Office France Patent Search Germany Patent Office UK Patent Search Engine India Patent Office stopfakes: The International Trade Administration (ITA), U.S. Department of Commerce, manages STOPfakes.gov to assist U.S. businesses protect and enforce their intellectual property rights against counterfeits and pirated goods in the global marketplace. FreePatentsOnline: Patent metadata search engine. Patent Lens Directory of Intellectual Property Offices Worldwide Business Search Business Profiles Open corporates: The largest open database of companies in the world. crunchbase Zoom info: List companies in the U.S categorized by industry and offer information corporationwiki: Allows you to search for any company and visualize the connection between people working within it Kompass: This is a global B2B portal with information about companies in more than 60 countries. Infobel Orbis directory Manta: Business directory for U.S businesses Canadian Company Capabilities Canadian Importers Database LittleSisThis is a powerful profiling website that lists a wealth of information about 185,000 people and 67,000 organizations in varying stages of completion. Companies House EUROPAGES Vault Owler The United Kingdom Limited Liability Company list International White and Yellow Pages Google finance VAT number validation (EURO) EORI number validation Court Case Files of Arbitration Courts (RUS) European e-Justice Portal Business Annual Records Annual Reports: Lists thousands of annual records from 5,333 companies worldwide. Reporter Link: Contains more than 60 Million searchable tables, figures and datasets. Gov.Uk U.S. Securities and exchange commission Sedar Company registration around the world: Give a list of government, commercial registers websites around the globe. Data Leak Websites Leak.sx breachchecker Intelligence X 4iq leak-lookup leakcheck nuclearleaks weleakinfo leakpeek haveibeenpwned snusbase Have I Been Sold? leakedsource WikiLeaks Joe Black Security Black Kite scatteredsecrets dehashed Cryptome inoitsu GlobaLeaks: is an open-source, free software intended to enable secure and anonymous whistleblowing initiatives Al Jazeera’s Investigative Unit ghostproject Have I Been Facebooked? : Check if your data was part of the Facebook April 2021 breach. spycloud raidforums Have I Been Zucked? : Check if your details are included in the 2019 Facebook data breach. leakhispano Fasterbroadband F-Secure Identity Theft Checker Firefox Monitor Amibreached Password Checkup by Google Pastebin sites Social Media Intelligence Brand tracker Facebook Facebook scanner: As of June 6th, you can scan only your own profile with this tool. Socmint: Facilitate fetching information using Facebook Graph search. Lookup ID: Find Facebook personal numeric ID / Group ID / Page ID. FindMyFbid: Locate Facebook personal numeric ID. Facebook JSON Search LikeAlyzer: Analyze and monitor Facebook Pages. Face Live: Facebook live video search. Who posted what?: Facebook keyword search generator. It searches Facebook posts and limit the results to specific date. ExtractFace: Automate extracting data from Facebook profiles (Not working currently). Twitter Twitter search home Twitter advanced search page Twitter Deck All My Tweets: View all public tweets posted by any Twitter account on one page. Trendsmap: Shows you most popular trends, hashtags and keywords on Twitter from anywhere around the world. Foller: Analysis Twitter account (profile public information, number of tweets and followers, topics, hashtags, mention). First Tweet: Find the first tweet of any search keyword or link. Social bearing: Analysis twitter accounts. Twicsy Follower wonk Sleeping Time: Predict the sleeping schedule of anyone on Twitter. Simple Twitter Profile Analyzer (Python script). Tag board:Search for hashtags on Twitter, Facebook & Google+. TINFOLEAK Spoonbill: Monitor profile changes from the people you follow on Twitter. Export Tweet: Advanced Twitter analytical service, you can download the generated report for off-line usage. To unlock full features, you need to pay. LinkedIn Recruitment Geek LinkedIn Xray Search LinkedIn Scraper: Scrapes Any LinkedIn Data Tomgandhi Consulting LinkedIn Xray Search Recruit’em X-Ray Search Lisearcher: Easily find public LinkedIn profiles for candidates or B2B prospects in Google by searching using job title and keywords with boolean search. Locksmith for LinkedIn LinkedIn Contact Extractor LinkedIn Résumés LinkedIn People Finder (International) Instagram iconosquare picodash: A powerful search engine to explore Instagram & Twitter photos, videos, users and locations. ToFo Reddit reddit-user-analyser.netlify.app: Analyse a Reddit user resavr: Reveal Deleted Reddit Comments redditsearch: Advanced Reddit search karmadecay: Reverse image search of Reddit.com (beta) Redective: The Reddit Search Detective Mostly Harmless: looks up the page you are currently viewing to see if it has been submitted to reddit. redditarchive Reddit Enhancement Suite: A Google Chrome Add-on. reddit investigator: Investigate Reddit users. reddit metrics: a tool for tracking statistics of reddits users and discovering the fastest growing communities on reddit. atomiks: Analyse a Reddit user. SnoopSnoo: Get insights on any reddit user activity. Reddit Comment Search: Search through comments of a particular reddit user. Social Media Psychological Analysis Tone Analyzer: This is an online service that offers free linguistic analysis to detect human feelings -like joy, fear, sadness, anger, analytical, confident and tentative tones- found in text – like Tweets, emails and Facebook messages. Watson Tone Analyzer: This is a cloud based server created by IBM, it analyzes emotions and tones in online contents (e.g. Facebook posts, reviews and Tweets) to predict the emotional status of the writer. This service can be used in different scenarios -other than intelligence- like detecting customers tones to understand their needs or to better serve them. Fake Sport: This site analyzes Amazon, Yelp, TripAdvisor and Apple App store users reviews to check The credibility of these reviews. Review Meta: Investigate user reviews on Amazon to check which one is likely to be fake or misleading. People Search General People Search Engines Truth finder: TruthFinder has a huge database of social media profiles, address history, contact information, public records (federal, country and state data sources) and other commercial sources, you can search using target first and/or last name in addition to city/state where he lives or lived before. 411: Search for people within the United States, search parameter includes Full name, location, reverse phone lookup, email and business. Pipl People Smart: Search for people using thier name, phone, address or email. Skip Ease Spokeo TruePeopleSearch US Search Peek You Zaba Search: Find people in the USA using name or phone number. White Pages: Search for people within the USA using their name, phone number, business or address. Been Verified: Search for people within USA using their name, phone, email or mailing address. Address Search: Search for someone email or mailing address using his name and location, the service is limited to the United States only. Lullar: Search social media websites using target email address or first & last name or username. Yasni My Life Anywho: Finding people , places and businesses. You can search by name, address or phone number. intelius: People search and phone number lookup. Snoop Station: Search for people using full name and location. Commercial service. Family Tree Now Radaris Info Space Cubib: Search millions of online data records for free. Aggregated data is derived from people search, marketing data, property records, vehicle records, court records, patents, business registration, domain name registration, and white house visitation records. That’s Them Webmii How many of me Genealogy Sorted By Name: A list of links to genealogy details -based on the first letter of the person’s surname- mentioned on other websites. Online Registries The Knot: Find a couple’s wedding registry and website. Registry Finder: Search for registries. Amazon registry My Registry: Global online gift registry service. Checked Twice User Name Check Check user name: Check the use of a specific username on 160 Social Networks, very useful to discover target social media accounts if he/she was using the same username on multiple platforms. Namechk: Check to see if a specified username is used for major domain names and social media sites. Namecheckr: Check domain & social username availability across multiple networks. User Search: Scan 45 popular social media websites. knowem Namevine Email Search Email validation services. This service checks whether an email address exists or not and gives other detailed technical information about it. Email Permutator+: useful to guess the possible combination of the email account of the target. Email Dossier: Give detailed technical validation report about emails. Emailhippo Verifalia Hunter Email Checker: Verify whether an email address is real. Mail Tester Byte Plant Email Validator Email Format Email Permutator+ Emails4Corporations.com Scam Dex Email Header AnalysisGet detailed technical information extracted from email headers, this includes sender IP address, email, sender ISP in addition to Geographical information. Phone Number Search Z lookup: International reverse phone lookup including cell phones. Reverse Phone Lookup Inter800 Twilio Spy Dialer Who calld Info Bel Fone Finder True Caller Free Carrier Lookup Phone Lookup Employee Profile LinkedIn Recruit in: A third party website that use Google to search the profiles on LinkedIn. This return deeper results compared to LinkedIn. Byte: Popular Middle east job website. Market Visual Xing: Business networking site Indeed Eluta CareerBuilder Euro Jobs Glassdoor Monster Head Hunter Jobs Job site Seek Simply Hired Zip Recruiter Terrorist Organizations Jihad Intel: Jihad Identifiers Database. Government Records Vital Records These are government records usually created by local authorities, it includes birth and death records, marriage licenses and divorce decrees genealogybank: Genealogy Records found in Newspapers such as: Birth Announcements, Engagements, Marriage, Anniversary & Divorce Records, Obituaries, Legal Notices, Family Reunions, Military Records Passenger Lists, Photographs & Images, Shipping & Shipping Records, Community News Articles and more! Sorted By Birth Date: This site uses the Death Master File as of 1 March 2014. Online Searchable Death Indexes and Records Family Search Find a Grave Deaths of U.S. Citizens in Foreign Countries Obits Archive U.S., Department of Veterans Affairs BIRLS Death File, 1850-2010 Melissa Deceased online National Records of Scotland: Links to Births, Deaths and Marriage government records in Scotland and selected countries like USA and Canada. Find My Past Forebears Criminal & Court Records National Sex Offender Public Website (NSOPW) SpotCrime: Show a map of crime hot spots for hundreds of different cities around the United States. Black Book Online The Inmate Locator: List inmate locator services in the United Sates. Federal Bureau of Prisons FBI Crime statistics National Criminal Justice Reference Service: This is federally funded resource offering justice and drug-related information to support research, policy, and program development worldwide. Property Record US Realty Record Melissa Property record Zillow: Offers buying, selling, renting, financing, remodeling properties in the United States. US Title Records GOV.UK Neighbor Report Tax & Financial Records VAT Search Real Property Tax Database Search The National Archives (UK) United States Public Records Online Directory: Contain links to official States Websites Public Databases including US citizens’ public tax records. Social Security Number Search SSN Check: Reverse Social Security Number Lookup (For USA only). SSN-Verify: Social Security Number search and lookup tools. Other Public Records There are other types of online public records that can prove useful in some cases. Search Systems: Public records search engine; it includes links to premium databases (require payment). Unites States patent records Google Advanced Patent Search Federal Election Commission: List Individual contribution made by individuals, Native American tribes, partnerships, sole proprietorships, limited liability companies (LLCs) and contributions by the candidate to all political committees. Follow That Money: How money spent in Federal elections. Political Money Line: Track money spent in politics. EHDP Data.GOV.UK Stats Local libraries in USA offer access to proprietary databases like ReferenceUSA (huge directory service) and America’s Newspapers (full-text obituaries) for a small fee. In many instances, such services can be offered remotely in exchange for a valid library subscription card. Technical Footprinting Website history Internet Archive (Wayback Machine) Cached pages:Show previous websites capture on three different archive websites (Google cache, Coral, Archive.org). CachedView: The Google Cache Browser for any page on the Internet. Way backpac (Tool): This is a tool that allows you to download the entire Wayback Machine archive for a given web page. Archive.today WebCite: Only archive history is avaiable. Library of Congress UK web archive Stanford Web Archive Portal oldweb.today: Retrieve archived web pages from the different public internet archives. You can also display archived websites using different web browsers. UK Government web archive Website monitoring services Alert services Google alert Talk walker Visual ping Follow that page Watch that page Update Scanner:A Firefox extension that Monitors web pages for updates. RSS Tools And Services RSSOwl Websites mirroring tools HTTrack: Copy website for offline view. GNU Wget: Retrieve files using HTTP, HTTPS, FTP and FTPS internet protocols. BlackWidow: Download complete site or part of it and can download any kind of files- including YouTube videos embedded within it. Link extractor Link Extractor Free URL Extractor Link Gopher: This is a Firefox add-on that extracts all links from web pages, including the embedded one and display them in a new web page. Check target website backlinks To see all linked websites to a specific domain name, type the following in Google: site:* darknessgate.com (There should be a space between the asterisk and the domain name). Identify technologies used Built with: Give detailed technical information about the technology used to build target website. Wappalyzer dnslytics: To Find domains sharing the same Google Analytics ID. IT devices Default Credentials CIRT Default password Default Password Lookup Router Passwords Open Sez Me! Hashes Vulnerabilities Database Exploit Database Packet Storm Security Focus National Vulnerability Database CVE Details CVE Secunia Research Web Scraping Tools Common Crawl: maintain an open repository of web crawl data that can be accessed and analyzed by anyone. theHarvester: This is a tool for gathering subdomain names, e-mail addresses, virtual hosts, open ports/ banners, and employee names from different public sources like: Google, Bing, LinkedIn, Twitter, Yahoo, pgp and more. Web data extractor (Commercial Application): Collect various data types including URLs, phone and fax numbers, email addresses, as well as meta tag information and body text. 80legs: (Commercial) Web Scraping Tools and Cloud-Based Web Crawling. agenty: Cloud-based agents for data scraping, text extraction, ocr, categorization, change detection, sentiment analysis and more… Anthracite: is a collection of Web mining power tools combined in an easy-to-use graphical environment that lets users quickly and seamlessly extract data from Internet sources, modify it to suit their needs, and export it to templates or databases, e.g. for RSS feeds. apify: is a web scraping and automation platform for developers. artoo.js: is a piece of JavaScript code meant to be run in your browser’s console to provide you with some scraping utilities. scrapy:An open source and collaborative framework for extracting the data you need from websites. datatoolbar DEiXTo datasift Email extractor Website certification search Censys Certificate Search Statistics & analytics Tools Alexa Moon Search Spy On Web W3bin Visual Site Mapper Site Liner Clear web stats Website outlook Informer Security headers Website Reputation Checker Threat Miner URLVoid Threat Crowd Reputation authority Sucuri SiteCheck Joe Sandbox Safe Browsing Malware domain blacklist MalwareURL Scumware WHOIS Lookup ICANN AFRINIC APNIC LACNIC Domain Big Data Whoisology Robtext Who Revrse Operative Framework URL Scan Subdomain Discovery Using Google search operator:Type site:target.com -inurl:www and Google will show all related subdomain names of the target. Example:site:yahoo.com -inurl:www ( Detailed instructions ) Virus Total DNSdumpster Gobuster Bluto PentTest Tools Sublist3r Amass: In-depth subdomain enumeration written in Go. SecurityTrails: Sub-domain discovery and different online footprinting tests (associated domains, IPs, and SSL) IP address tracking IP Geolocation information IPverse IP2Location Ipfingerprints DB-IP IP Location UTrace Information about IP (Internet Protocol) Onyphe CIDR REPORT for IPv4 IP to ASN Reverse DNS Lookup Reverse IP lookup Same IP CIDR REPORT for IPv6 IP Address Tools ExoneraTor BGP (Border Gateway Protocol) BGP4 Hurricane Electric BGP Toolkit BGP Ranking BGP Stream: Show Global map of alerts about hijacks, leaks, and outages in the Border Gateway Protocol. Blacklist IP addresses Block List FireHOL Directory of Malicious IPs Online Maps General Geospatial Research Tools Digital Globe: Easy to use global map imagery tool with advanced search filters. Bing Maps: Alternative to Google Map. Yandex Maps: A Russian alternative to Google. Baidu Maps: A Chinas alternative to Google. Daum: Koran Map. N2yo: Live streaming from different satellites. It also gives information about the tracked satellites and their coverage area. Wigle: Wi-Fi networks mapping around the globe. It shows the Wi-Fi network name along with the access point MAC (Hardware) address, in addition to the possible location where free Wi-Fi is might be available. BB Bike: Compare between two maps, for example, compare the same location map for Bing and Google map to see the difference in target location. Newspaper map: List all newspapers around the globe on a map, you can filter according to location and newspaper language. USGS: Search world map using different search criteria like address, place name or location coordinates. Map version is newer than Google maps. Google Street View: View a specific location -must be existed within Google street view database- as if you are there. Google maps Street View player: Show street view -where available- between two points on the map. RouteView: Another Google map street viewer. Open Street Cam: View open street cameras in a specific location -where available. Zoom Earth: View international cloud imagery -updated each day- from NASA satellites. Terrapattern: This is a visual search tool for satellite imagery, it allows you to search wide geographical area for specific visual effect. Currently, the search works in the following cities: New York, San Francisco, Pittsburgh, Berlin, Miami and Austin. dominoc925: Show Military Grid Reference System (MGRS) Coordinates. Mapillary: View street level imagery uploaded by people around the world. It gives a 3D view of many places (its database currently have 259,200,042), very useful to discover/investigate a specific location while you are not there. Address Lookup: Find the address of any place on Google Maps. Inspire Geoportal: Give access to European spatial data. Hiking and Biking map: A map for hiking and biking. Viamichelin: Show tourist, restaurants, hotels, traffic and weather on world map. CORONA Project: List more than 800,000 images collected by the CORONA spy satellite launched by the United Sates and was in operation between 1960-1972. Ani Maps: Create maps with interactive animations. Trip Geo: Create a direction map using Google Street View data. GeoGig: Open source tool which import raw geospatial data (currently from Shapefiles, PostGIS or SpatiaLite) into a repository to track any change to the data. GRASS GIS: This is an open source Geographic Information System (GIS) software used for managing and analyzing geospatial data, spatial modeling, and visualization. Timescape: This is a map based storytelling platform. Polymaps: A JavaScript library for making dynamic, interactive maps in modern web browsers and supports different visual presentations to place on. Mapquest: Helps you to find places on a map (Like Hotels, restaurants, coffee, Grocery stores, pharmacy, airport and many more), you can also use this service to find the best route -shortest one and estimated time to arrive- when going from one place to another. NGA GEOINT: National Geospatial-Intelligence Agency official repository of map related tools on GitHub. Free Map Tools: Find the radius around a point on the map. Maphub: Create interactive map by adding points, lines, polygons or labels in addition to customized background. Crowdmap: This is an annotation tool that allows you to visualize information on a map and timeline. Maperitive: This is a Windows software for drawing maps based on OpenStreetMap and GPS data. Perry-Castañeda Library Map Collection: List online maps of current interest around the world in addition to different map -including historical maps- of different locations around the world. United Nations Geospatial Information Section Roundshot: View live cameras from selected regions around the world. Live Earthquake Map Universal Postal Union: Find zipcodes of all countries. Commercial Satellites European Space Imaging Maxar Global Date/Time Wolframe Alpha: Enter a specific city/town or any location and the site will retrieve important information about it, like: Population, current local time, current weather, nearby cities, nearby airports, geographic properties and many more. SunCalc: Shows sun movement during the course of the day for any given location on the map. SunCalc Mooncalc Location Based Social Media Youtube Geo Search Tool: This is a Geolocation search tool for YouTube geotagged videos. You can search for videos at a given address and in a given time-frame. Facebook Facebook Live: Go to Facebook live to see where there are live videos currently broadcasting. Live videos appear on a global map; a user can click over any live video -represented as a blue dot- to view/save it. Twitter Geo-Location Tweet Mapper: This is a free service to list all Geo-tagged tweets (All tweets posted while the “Location” feature is ON). All you need to do is to enter target Twitter handle then press ENTER. A map will appear showing red markers. One Million Tweet Map: View world latest one million tweets on a map. Qtr Tweets: Allows you to find all tweets within a specific distance from the target location on map, you can also search for keywords and filter the results according to a predefined criterion like: tweets with images and tweets with non-location data. Tweet Map: Visualize all tweets on a global map, click over the points -which represent tweets- to read tweet content. You can also see top hash tags and tweets and search for them. Other Geo-Location Social Media Tools Strava Heat Map: This is a performance measurement sporting App for athletics; it works by monitoring athletic activities through the GPS sensor existed within their smartphone (supports Apple and Android) or any other supported devices. Strava heat map shows ‘heat’ made by aggregated, public activities over the last two years, this map is updated monthly. Transport Tracking. Air Movements Flight Aware: This company is considered the largest flight tracking data company in the world, it offers its flight tracking service free of charges for both private and commercial air traffic. Flight Radar 24: Offer international real-time civilian flight tracking service, it tracks over 150000 flights per day and has the ability to track specific types of military jets (Like Russian and NATO jets) in some regions. Air Cargo Tracker: Track air cargo for 190 airlines, you need to supply the Air cargo number to track the plane. The site also lists Airline code, Airline prefixes and Airport codes. Radar Box 24: International airplane tracker. PlaneFinder World Aircrafts Database Maritime Movements Marine Traffic Container Tracking: Track containers for 125 companies, you need to supply the container number only. Vessel Finder Cruise Mapper Ship Finder Container prefix list The international identification codes of container owners (BIC Codes) International port code Vehicles and Railway ASM: Real time train tracking across the USA. Train Time:Live map of London underground trains. Aprs Package Tracking After Ship: Track 447 couriers worldwide. Just enter the package number and it will automatically detect the courier company. Tracking EX: Track 235 courier. 17 Track: Package tracking service. Package trackr: Track global couriers and visualize the delivery path with Google Maps. Boxoh: Package tracking service for USPS, UPS, FedEx, DHL/AirBorne. Canada Post Royal Mail Webcams World web cam search: Display -available- webcams from around the world on a Google map. Earth Cam: Live streaming webcam from different places around the globe. Fisgonia World Cam Opentopia Mila IP, MAC address data and service compilation for OSINT computer intelligence. 1. IP Data Retrieval HostHunter - Detects and retrieves host names from a set of target IP addresses; cyberhubarchive - Archive of data leaks, it contains IP addresses of Skype accounts; spiderfoot.net - automatic search using a huge number of methods, but can be used in the cloud if you register; iknowwhatyoudownload (http://iknowwhatyoudownload.com/) - shows what is being downloaded on the Internet; recon.secapps.com - automatic search and link matching; check.torproject.org - finds a list of all Tor output nodes in the last 16 hours that may have reached IP; dnslytics.com - will find domains; metrics.torproject.org (https://metrics.torproject.org/exonerator.html) - checks if IP address was used as a host for Tor traffic, date required; 2. Data search by MAC-address. xinit.ru - shows Wi-Fi location; alexell.ru - will also show the location. wigle.net - finds Wi-Fi access point, its physical address and name; 3. Compilation of services for OSINT computer intelligence List of services and utilities designed to analyze such data as IP, SSID, file metadata, DNS records and everything where the object of analysis is an element of IT structure, be it a site or IP address. Urlscan.io - checks to whom a TLS certificate was issued and which IP addresses are associated with the site. PDFCandy - service allows to extract and modify PDF metadata. wigle - can show SSID and BSSID of Wi-Fi access points on the map. PublicWWW - the service searches for information on the source code of pages. Finds nicknames, links in the code, compares site icons, which allows you to search for twins; finds any similar links to identifiers or phrases, wallets, tokens, also allows you to find providers of advertising widgets, etc. Metadata2Go - helps to find out all the metadata of a file. HostHunter - searches for domain names using a set of IP addresses. Knock Subdomain Scan - searches subdomains on the target domain and can generate an output file with the results. Namechk - a site that will find all of a person's accounts in all social networks and Before the OSINT AI BM service goes live, the first 1,000 users will get free access to the service for one year. The service is scheduled to launch in September 2022.
  4. OSINT TOOLS 2022 (Part 2) The first part of the list, which contains more than 600 tools for OSINT, can be found here>>> Browser extensions for OSINT Search two different search engines for email domains and search photo search engine for other services.• Double Shot Search ( https://chrome.google.com/webstore/detail/double-shot-search-query/kddlkbpbepnaepdleclhdnfdpdogdhop ) is a Chrome extension that doubles your search. You can search on both Bing and Google at the same time.Find email addresses in seconds• Hunter (Email Hunter) ( http://hunter.io ) a service that will find e-mail addresses associated with a particular domain. Also, you can use this tool to find an email address by last name in a couple of seconds.• RevEye ( https://chrome.google.com/webstore/detail/reveye-reverse-image-sear/keaaclcjhehbbapnphnmpiklalfhelgf ) is an open-source Chrome extension that punches in a photo using Google, Bing, Yandex and TinEye.• Namechk ( https://namechk.com ) Username and Domain Name Checker - Search All Domain Names and User Names to see if they're available ) is a site that will find all the accounts of a person in all social networks and messengers. It is enough to enter his nickname in one social network and the same nickname will be found in the other one. Finding a Target by IP and MAC Address - OSINT Folks, today I have prepared for you a very useful collection of resources, thanks to which you can find information about your target with IP or MAC address.•HostHunter ( https://github.com/SpiderLabs/HostHunter ) - Discovers and extracts host names from a set of target IP addresses;•Cyberhubarchive ( https://github.com/cyberhubarchive/archive ) - archive of leaked data, it has IP addresses of Skype accounts;Iknowwhatyoudownload (Torrent downloads and distributions for IP 54.91.109.76 http://iknowwhatyoudownload.com/ ) - shows what is being downloaded online;•Recon ( https://recon.secapps.com/ ) - automatic search and link mapping;•Sorry. You are not using Tor. - will find a list of all Tor outbound nodes in the last 16 hours that could reach an IP;•Reverse IP, NS, MX, WHOIS and Search Tools (https://dnslytics.com/reverse-ip ) - will find domains;•@iptools_robot - bot to quickly find ip address information, will find whois, real IP behind Cloudflare, ports and more;•Welcome to Tor Metrics ( http://metrics.torproject.org ) - checks if the IP address was used as a host for Tor traffic, requires a date;Compilation of services for OSINT computer intelligenceList of services and utilities created for analysis of such data as IP, SSID, file metadata, DNS records, and everything where the object of analysis is an element of IT structure, be it a site or IP address.•Whatsmydns ( https://www.whatsmydns.net/ ) - Check DNS records of the site (including hidden ones).•dns recon and research, find and lookup dns records ( http://dnsdumpster.com/ ) - Site data including hosting location and owner location, as well as other data.•xinit.ru ( https://xinit.ru/bs ) - check domain or IP address by whois; get snapshots from Google cache and data from web archive; services and protocols on server; HTTP response headers; links from site pages on host; email addresses of domain; check site on VirusTotal; show real IP address behind Cloudflare; DNS infrastructure of site.•URL and website scanner ( http://urlscan.io/ ) - checks who is issued a TLS certificate and which IP addresses are associated with the site.•PDFCandy ( https://pdfcandy.com/edit-pdf-meta.html ) - service gives you the ability to extract and modify PDF metadata.•Wigle ( https://wigle.net/ ) - can show you the SSID and BSSID of the Wi-Fi hotspots on the map.•PublicWWW ( http://publicwww.com/ ) - service searches the source code of pages. Finds nicknames, references in code, matching website icons, that allows looking for twins; find any similar IDs or phrases, wallets, tokens, also allows finding advertising widgets providers, etc.•Metadata2Go ( https://www.get-metadata.com ) - helps to find out all the metadata of a file.•HostHunter ( https://github.com/SpiderLabs/HostHunter ) - searches domain names for a set of IP addresses.•Knock Subdomain Scan ( https://github.com/guelfoweb/knock )- Crawls subdomains on the target domain and can generate an output file with results. Looking for a person's details from a bank card number - OSINT. There are situations where we get scammed by fraudsters with only the card number in hand.Search through mobile bankingWe try to make a transfer through our bank's mobile application. In this case, it is desirable that both you and the object of the search used the same major bank such as Sber.But here it is a matter of luck.If the stars are aligned, the banking interface will give us the name of the cardholder.Search through special servicesThere are dozens of services on the net that allow you to find specific information by card number.It can be a name of a bank, a type of card or a region the owner lives in.•bincheck.io ( https://bincheck.io )•bincheck.org ( https://bincheck.org/ )•freebinchecker.com (https://www.freebinchecker.com )This service allows you to check your credit debit card type and other details.•binlist.net ( https://binlist.net )•psm7.com ( https://psm7.com/bin-card ) Bitcoin Bitcoin wallet checker - OSINT It is no longer a secret that bitcoin is not as anonymous as many people think. The balance of a wallet and all of its transfers can easily be tracked. That's why there is a list of some services that can help with this.•Bitref ( https://bitref.com ) - Bitcoin wallet verification.•Block Explorer ( https://blockexplorer.com ) - Block Explorer, allows you to track where and when your bitcoin wallet's money goes.•Blockchain ( https://www.blockchain.com/ru/explorer ) - Block Explorer, also allows you to track transactions in your wallet.•Cryptocurrency Alerting ( https://cryptocurrencyalerting.com/wallet-watch.html ) - Service allowing you to set notifications about activity of your address.•Blockseer ( https://www.blockseer.com ) - Visualisation of links between addresses involved in transactions. Picking up the victim by photo-OSINT. •Photo Sherlock ( https://t.me/BrainHaking2_0ENG/72 ) - The application provides a photo search from the camera or gallery. You can use it to find information about a picture on the Internet, for example to check who really owns a photo from a social network (check for fake images).The modification got Premium, removed ads and rubbish. An indispensable thing for any OSINT'er.•Search4faces.com ( https://search4faces.com )- free service for searching faces in social networks. Currently there are 4 image bases:1 billion 109 million 563 thousand VK.com avatars;280 million 781 thousand avatars from Vk.com + Odnoklassniki.com;125 million 443 thousand avatars from TikTok;4 million 594 thousand avatars from ClubHouse;You can search not only by photo but also by any other image of a human face. For example, from a picture or a sketch.Get one-touch information about a picture on the Internet! OSINT 2022 TOOLS (Part 1) more than 6000 tools>>>>
×
×
  • Create New...