OSINT (Open Source Intelligence)
Open Source Intelligence is the collection and analysis of data gathered from open sources to produce actionable intelligence.
Index
- AbuseIPDB
- Censys Search
- Cloudflare Radar
- Cisco Talos
- DeHashed
- DigitalSide
- Feodo Tracker
- FOFA
- Have I Been Pwned
- HudsonRock Free Tools
- Hunter
- ipinfo.io
- MAC Address Lookup
- MITRE ATT&CK
- MetaDefender Cloud
- NerdyData
- Nmmapper
- Qualys
- Security Headers
- Shodan
- SSLBL
- Threat Intelligence Platform
- threatfeeds.io
- ThreatFox
- URLhaus
- urlscan.io
- ViewDNS.info
- Wappalyzer
- Web Check
- Whoxy
- WhoisXML
- AbuseIPDB
- Censys Search
- Cloudflare Radar
- Cisco Talos
- DeHashed
- DigitalSide
- Feodo Tracker
- FOFA
- Have I Been Pwned
- HudsonRock Free Tools
- Hunter
- ipinfo.io
- MAC Address Lookup
- MITRE ATT&CK
- MetaDefender Cloud
- NerdyData
- Nmmapper
- Qualys
- Security Headers
- Shodan
- SSLBL
- Threat Intelligence Platform
- threatfeeds.io
- ThreatFox
- URLhaus
- urlscan.io
- ViewDNS.info
- Wappalyzer
- Web Check
- Whoxy
- WhoisXML
Google-Dorks-Cheat-Sheet
A list of useful Google Dorks queries and explanations. - GHDB
1. Caché
A cache is a metadata stored so that future requests for that data can be served faster. Cached versions of web pages can be used to view the contents of a page when the live version cannot be reached, has been altered or taken down.
The query cache:
will show the version of the web page that Google has in its cache.
Other tools related to the cache are this Cache checker and the Wayback Machine
2. Intext and Allintext
To find a specific text from a webpage, you can use the intext command. Intext will allow you to search for a single keyword in the results unlike allintext which can be used for multiple keywords. Shows only those pages containing that specific word (or words).
3. Filetype
Shows only pages that contains the document of that type. For example, you can apply a filter just to retrieve PDF files.
4. Intitle and Allintitle
This command filters out the documents based on HTML page titles as the main keywords exist within the title of the HTML page.
5. Inurl and Allinurl
the inurl command filters out the documents based on the URL text. Those keywords are available on the HTML page, with the URL representing the whole page.
Cache/Archive
Search the latest cached results.
Country & Language
If we want to get search results with specific country and language, set parameters gl
and hl
.
Directory Listing
Search websites which allow directory listings. We can retrieve all files if it's enabled in websites.
File Types
Specify the filetype e.g. pdf
`.
Sensitive Information
site:github.com "DB_USER"
site:github.com "DB_PASSWORD"
# Filter by datetime
"DB_USER" after:2022-01-01 before:2023-01-01
Subdomains
site:*.google.com
# -site: Exclude specific domain
site:*.example.com -site:www.example.com
# Specify file extension
site:*.google.com ext:php
Title
Searche keywords contained in page title.
URL
Search all URLs containing specific keyword e.g. TLD (com, eu, io, etc.).
Shodan Dorks
Shordan is a search engine which allows us to find various types of servers by filters. This page gives ways to search specific information.
- [systemweakness](https://systemweakness.com/how-to-find-open-elasticsearch-databases-using-shodan-fb9314af604a)
Search 'users' column
OSINT
-
It checks if the email address or the phone number has been exposed.
Awesome Repos
- Proviesec / google-dorks Useful Google Dorks for WebSecurity and Bug Bounty
- vsec7 dork helper Dork Helper GUI
External Links
- Ayrix.com Dork Generator High utility dork tool, powerful web UI
- vti-dorks Awesome VirusTotal Intelligence Search Queries
User Research
- LeakCheck - https://leakcheck.io/
- SnusBase - https://snusbase.com/
- Scylla.sh - https://scylla.sh/
- HaveIBeenPwned - https://haveibeenpwned.com/
Usernames
- NameChk - https://namechk.com/
- WhatsMyName - https://whatsmyname.app/
- NameCheckup - https://namecheckup.com/
People
- WhitePages - https://www.whitepages.com/
- TruePeopleSearch - https://www.truepeoplesearch.com/
- FastPeopleSearch - https://www.fastpeoplesearch.com/
- FastBackgroundCheck - https://www.fastbackgroundcheck.com/
- WebMii - https://webmii.com/
- PeekYou - https://peekyou.com/
- 411 - https://www.411.com/
- Spokeo - https://www.spokeo.com/
- That'sThem - https://thatsthem.com/
- Voter Records - https://www.voterrecords.com
Phonenumbers
- TrueCaller - https://www.truecaller.com/
- CallerID Test - https://calleridtest.com/
- Infobel - https://infobel.com/
Birthdays
"Name of target" intext:"happy birthday"
Resumes
- Use CV or Resume
"Name of targert" resume filetype:pdf
Social Media
- Twitter Advanced Search - https://twitter.com/search-advanced
- Social Bearing - https://socialbearing.com/
- Twitonomy - https://www.twitonomy.com/
- Sleeping Time - http://sleepingtime.org/
- Mentionmapp - https://mentionmapp.com/
- Tweetbeaver - https://tweetbeaver.com/
- Spoonbill.io - http://spoonbill.io/
- Tinfoleak - https://tinfoleak.com/
- TweetDeck - https://tweetdeck.com/
- Sowdust Github - https://sowdust.github.io/fb-search/
- IntelligenceX Facebook Search - https://intelx.io/tools?tab=facebook
- Wopita - https://wopita.com/
- Code of a Ninja - https://codeofaninja.com/tools/find-instagram-user-id/
- InstaDP - https://www.instadp.com/
- ImgInn - https://imginn.com/
Snapchat Maps
Web Archives
Vulnerabilities (CVE)
Malware
Person Investigation
Accounts in Social Media & Other Platforms
The target person may use some social media. So first check if the account exists in each platform.
- GitHub
- Threads
- TikTok
- X (formerly Twitter)
- YoutTube
Google Dorking
Assume the target person named John Smith.
<social_media> john smith
<social_media> jsmith
<social_media> j.smith
# add the year of birth
<social_media> john1999
For example,
IOSINT (Image OSINT) for Account Pictures
If the person sets the picture as user profile or posts, we can investigate the information about the image using IOSINT.
Also, we might be able to get hints from information reflected a picture as below:
- Brand of clothes the person wears.
- Scenery reflected in the person's eye, cup, glass, etc.
- Numerical values such as dates reflected in a picture.
Older Account Pages
Using WayBackMachine, we can gather older information about the target person in each platform.
In WayBackMachine, search the following URLs.
IMINT (Image Intelligence) and GEOINT (Geospatial Intelligence)
IMINT and GEOINT are types of OSINT to reveal desired information from analyzing images.
Basic Investigation
Gather Information From Search Engine
Search the keyword which is found in the image.
- Name
- Location (country, city, etc.)
- When does it open
Reverse Image Search
Upload the image in each search engine.
-
Click the “Search by image” icon and upload the image.
Video (mp4) Geolocation
FFmpeg extracts every single frame from a video.
# -i: input file
# %06d: followed by six digits e.g. img_000001.png, img_000002.png, etc.
# -hide_banner: hide unnecessary text.
# -r: frame rate (e.g. 1 frame per second)
ffmpeg -i example.mp4 -r 1 img_%06d.png -hide_banner
Find Leaked API Keys
Finding API keys which are leaked is crucial work for penetration testing or bug bounty. If we found the API keys leaked, sensitive information is at risk of being stolen. So immediate actions must be taken.
Awesome Resources
-
This repository lists quick ways to find API keys of various providers.
Google Dorks
Google Dorks is useful to search leaked API keys/tokens.
*Here is the simple example so might be unuseful. Please see Awesome Resources section if you are seriously looking for that.
Common APIs
Try changing the site domain and the extensions e.g. js
, py
, go
.
GitHub repositories
site:github.com ext:php "api-key"
site:github.com ext:php "api_key"
site:github.com ext:php "api-token"
site:github.com ext:php "api_token"
site:github.com ext:php "access-token"
site:github.com ext:php "access_token"
site:github.com ext:php "x-api-key"
site:github.com ext:php "x_api_key"
site:github.com ext:php "x-api-token"
site:github.com ext:php "x_api_token"
site:github.com ext:php "x-access-token"
site:github.com ext:php "x_access_token"
GitLab repositories
GitHub Dorks
- [github-dorks](https://github.com/techgaun/github-dorks)
AWS
Google APIs
Hugging Face
OpenAI
Common Credentials
path:.env
path:.env passwd
path:.env password
path:.env secret
path:*.env api
path:*.env passwd
path:*.env password
path:*.env secret
path:config.* auth
path:config.* password
path:config.* passwd
path:config.* token
path:config.json password
"example.com" password
"example.com" passwd
"example.com" credential
"example.com" creds
Web Conf
WordPress
Databases
Git
Bash
path:.bash_history
path:.bash_profile
path:.bashrc
path:.profile
path:.bashrc password
path:.bash_history root
path:etc/passwd
path:etc/shadow
path:password.*
SSH
Docker
Backup Files
For searching subdirectories and backlinks
Archive.org
For JSON file:
For TXT format:If you need to limit the time frame of the crawl then you can add the following parameters to the end to narrow the range.
Example:You can also decrease or increase the limit to match your needs. Example: