Site search

Search results: «JeyZeta»

Found matches: 3

👨🏽 💻 𝗟𝗲𝗮𝗸𝗣𝗲𝗲𝗸

OSINT tool that allows to perform searches by email, username, password, password, domain, IP address, full name, hash or phone, in order to verify if associated information has been exposed in public leaks, showing partial and anonymous results. 🕵🏽 ♂️

👁️ These types of platforms are used for cybersecurity awareness, risk analysis and personal auditing, not to exploit information.

💻 https://leakpeek.com/

nic In my OSINT Manual you can find many more tools, techniques and practical cases, always from an ethical, legal and responsible approach, making clear the limits of information use.

👉 Manual OSINT: https://hackunderway.com/producto/manual-osint/

#JeyZeta #OSINT...
CLI tool for passive collection of URLs from multiple OSINT sources, without directly interacting with the target.

📌 Supported sources:

- AlienVault OTX
- Bevigil (requires API)
- Common Crawl
- URLScan (requires API)
- GitHub (require token)
- Intelligence X (requires API)
- Wayback Machine
- Total Virus (requires API)
- Hudson Rock (requires API)

🔍 Extra:
In Wayback Machine also analyzes:

- URLs within historical snapshots
- Old records of robots.txt

🔗 Official restock:
https://github.com/hueristiq/xurlfind3r

⚠️ For educational purposes and authorized auditions only.

For more:
👁 https://www.patreon.com/HackUnderway

#JeyZeta #web #recon #xurlfind3r #osint #golang #docker #webpentesting #cybersecurity #ethicalhacking
𝗪𝗮𝘆𝗺𝗼𝗿𝗲 🕵🏽‍♂️
Herramienta OSINT que permite descubrir versiones antiguas de sitios web, endpoints ocultos y archivos históricos desde múltiples fuentes:
🌐 Wayback Machine
📦 Common Crawl
🛰 AlienVault OTX
🔍 URLScan
🛡 VirusTotal
📁 Intelligence X
Ideal para:
• Recon pasivo
• Bug Bounty
• Pentesting
• Investigación OSINT
GitHub:
https://github.com/xnl-h4ck3r/waymore
👁 Manual OSINT:
https://hackunderway.com/producto/manual-osint/
#JeyZeta #OSINT #Waymore #Pentesting #EthicalHacking #CyberSecurity #CyberDefense