OSINT Tools
Helpful links and resources for Cyber Security Analysts and Researchers
Last updated
Helpful links and resources for Cyber Security Analysts and Researchers
Last updated
Here's a list of additional helpful tools that can be used for and Sand-boxing for Cyber Security Analysts and Researchers. These tools can be used to looking up information on Domains, IPs, URLs, File Hashes, etc.
Resources to find various OSINT platforms:
No one tool is the end all-be-all, please make sure to use multiple resources to gather and collect information.
- automates OSINT for threat intelligence and mapping your attack surface.
- , , , and more.
- Look up an .onion address and see basic information such as date last seen, open ports, running software and banners
- Search Tor, I2P, data leaks, domains, and emails
- Search for devices connected to the internet
- View leaked credentials and compromised assets
l by Heath Adams(TCM)
- View Windows Event codes, CVE's, and multiple other tools relating to WIndows Security.
- Extensive threat intelligence feed
- Assessing attack surface for internet connected devices
- Get a screenshot of a website rather than browsing to it.
- A wide variety of DNS, IP, and other tools.
- Whois, host, dig, nslookup, ping, traceroute, and geoiplookup tool on IPs and Domains
- Find all name servers for a domain name with this online DNS NS checker
- Search file hashes to see if they have been flagged as malicious.
- Check if your email or phone is in a data breach
- Faster Google dorking.
- Archive of various exploits
- View content from edited, deleted and older websites
- Search for indicators of compromise or something related
- Provides real time data of honeypot activity.
- Extensive and historical DNS data
- Gather information about targets
- Search for threat intelligence
- Search public S3 buckets
- Message Head Analyzer
- Scans files and URLs for threats
- Search publicly indexed information
- Search and discovery attack surfaces
- Collects cyber-threat intelligence data
- Git repository search
- Search vulnerabilities in a large database
- Search and monitor internet connected assets
- Search for certs that have been logged by CT
- Database of wireless networks, with statistics
- Marketing and affiliate marketing research
- Scans the internet for threat intelligence
- Search for email addresses belonging to a website
- Browse latest vulnerabilities and exploits
- Search 75 billion lines of code from 40 million projects