Site search

Search results: «OSINT»

Found matches: 14

👨🏽 💻 𝗟𝗲𝗮𝗸𝗣𝗲𝗲𝗸

OSINT tool that allows to perform searches by email, username, password, password, domain, IP address, full name, hash or phone, in order to verify if associated information has been exposed in public leaks, showing partial and anonymous results. 🕵🏽 ♂️

👁️ These types of platforms are used for cybersecurity awareness, risk analysis and personal auditing, not to exploit information.

💻 https://leakpeek.com/

nic In my OSINT Manual you can find many more tools, techniques and practical cases, always from an ethical, legal and responsible approach, making clear the limits of information use.

👉 Manual OSINT: https://hackunderway.com/producto/manual-osint/

#JeyZeta #OSINT...
𝗪𝗮𝘆𝗺𝗼𝗿𝗲 🕵🏽‍♂️
Herramienta OSINT que permite descubrir versiones antiguas de sitios web, endpoints ocultos y archivos históricos desde múltiples fuentes:
🌐 Wayback Machine
📦 Common Crawl
🛰 AlienVault OTX
🔍 URLScan
🛡 VirusTotal
📁 Intelligence X
Ideal para:
• Recon pasivo
• Bug Bounty
• Pentesting
• Investigación OSINT
GitHub:
https://github.com/xnl-h4ck3r/waymore
👁 Manual OSINT:
https://hackunderway.com/producto/manual-osint/
#JeyZeta #OSINT #Waymore #Pentesting #EthicalHacking #CyberSecurity #CyberDefense
🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...
🚨 Think your location is safe when you post a selfie? Think again.

Hackers don’t always need GPS access — sometimes your social media photo alone gives away more than you realize. Here’s how they can track location from a single pic 👇

📸 1. Hidden EXIF Metadata
Many photos contain embedded data like GPS coordinates, device info, and timestamp.
If the platform doesn’t strip it, someone can extract it in seconds.

🪟 2. Background Clues
Street signs, shop names, vehicle plates, landmarks, even reflections in mirrors — all can reveal where you are.
OSINT tools make this shockingly fast....
CLI tool for passive collection of URLs from multiple OSINT sources, without directly interacting with the target.

📌 Supported sources:

- AlienVault OTX
- Bevigil (requires API)
- Common Crawl
- URLScan (requires API)
- GitHub (require token)
- Intelligence X (requires API)
- Wayback Machine
- Total Virus (requires API)
- Hudson Rock (requires API)

🔍 Extra:
In Wayback Machine also analyzes:

- URLs within historical snapshots
- Old records of robots.txt

🔗 Official restock:
https://github.com/hueristiq/xurlfind3r

⚠️ For educational purposes and authorized auditions only.

For more:
👁 https://www.patreon.com/HackUnderway

#JeyZeta #web #recon #xurlfind3r #osint #golang #docker #webpentesting #cybersecurity #ethicalhacking
Argus – The Ultimate Information Gathering Toolkit
Argus is an all-in-one Python toolkit for reconnaissance and information gathering across networks & web applications. It provides a clean CLI menu, multiple modules, and a smooth workflow for OSINT, network reconnaissance, and security checks—backed with a clear legal disclaimer for ethical use only.

Key Highlights
• Network & Infrastructure: WHOIS, DNS/DoH, DNSSEC, TXT records, zone transfer, IP/Server info & geolocation, TLS/SSL chain & cipher analysis, SSL expiry, HTTP/2–HTTP/3 detection, traceroute, open ports.
• Web Applications: crawler, content/dir discovery, robots.txt & sitemap parsing, CMS & tech stack detection, broken links, cookie analyzer, performance...
Maps radio signals into situational intelligence
WireTapper is a wireless OSINT tool that passively detects and maps Wi-Fi, Bluetooth, CCTV cameras, vehicles, headphones, TVs, IoT devices, and cell towers, turning nearby radio signals into clear situational intelligence
https://github.com/h9zdev/WireTapper
TinEye 🔎 Reverse image search tool that allows you to find where an image has been posted on the Internet using the image itself as a reference.

Allows you to identify the original source, detect modified or cropped versions, locate copies on different websites, and find higher-resolution images, all from a single search.

Ideal for digital verification, OSINT, fact-checking, copyright protection and visual content analysis.
Upload the image or paste the URL... and you get matches in seconds.

🔗 Web: https://tineye.com/

⚠️ Ethical and responsible use.
Tool for research, verification and content protection.
Harassment, the invasion of privacy or misuse...
𝗮𝗽𝗸𝟮𝘂𝗿𝗹

It is an OSINT tool designed to quickly extract IP addresses and URLs from APK files through disassembly and decompilation processes. 🤖

Allows you to identify endpoints such as:

• URLs (http / https)
• IP addresses
• Dominions
• APIs
• Internal route
• Other patterns of interest

It is especially useful in:

🔎 Security analysis
🔬 Reverse engineering
🛡 Pentesting of mobile applications
🦠 Malware Analysis

Ideal for security investigators and mobile security professionals.

🔗 GitHub: https://github.com/n0mi1k/apk2url
𝗮𝗽𝗸𝟮𝘂𝗿𝗹

It is an OSINT tool designed to quickly extract IP addresses and URLs from APK files through disassembly and decompilation processes. 🤖

Allows you to identify endpoints such as:

• URLs (http / https)
• IP addresses
• Dominions
• APIs
• Internal route
• Other patterns of interest

It is especially useful in:

🔎 Security analysis
🔬 Reverse engineering
🛡 Pentesting of mobile applications
🦠 Malware Analysis

Ideal for security investigators and mobile security professionals.

🔗 GitHub: https://github.com/n0mi1k/apk2url