Site search

Search results: «osint»

Found matches: 17

👨🏽 💻 𝗟𝗲𝗮𝗸𝗣𝗲𝗲𝗸

OSINT tool that allows to perform searches by email, username, password, password, domain, IP address, full name, hash or phone, in order to verify if associated information has been exposed in public leaks, showing partial and anonymous results. 🕵🏽 ♂️

👁️ These types of platforms are used for cybersecurity awareness, risk analysis and personal auditing, not to exploit information.

💻 https://leakpeek.com/

nic In my OSINT Manual you can find many more tools, techniques and practical cases, always from an ethical, legal and responsible approach, making clear the limits of information use.

👉 Manual OSINT: https://hackunderway.com/producto/manual-osint/

#JeyZeta #OSINT...
𝗪𝗮𝘆𝗺𝗼𝗿𝗲 🕵🏽‍♂️
Herramienta OSINT que permite descubrir versiones antiguas de sitios web, endpoints ocultos y archivos históricos desde múltiples fuentes:
🌐 Wayback Machine
📦 Common Crawl
🛰 AlienVault OTX
🔍 URLScan
🛡 VirusTotal
📁 Intelligence X
Ideal para:
• Recon pasivo
• Bug Bounty
• Pentesting
• Investigación OSINT
GitHub:
https://github.com/xnl-h4ck3r/waymore
👁 Manual OSINT:
https://hackunderway.com/producto/manual-osint/
#JeyZeta #OSINT #Waymore #Pentesting #EthicalHacking #CyberSecurity #CyberDefense
🔎 What is 𝐘𝐚𝐧𝐝𝐞𝐱 𝐝𝐨𝐫𝐤𝐢𝐧𝐠? (Advanced OSINT Technique)

Most bug hunters know about Google Dorks…

But very few explore the power of Yandex Dorking using Yandex 🔥

Yandex is a Russian search engine that sometimes indexes files and directories that Google ignores — making it extremely powerful for reconnaissance and OSINT.

💡 Why Yandex is Special?

✔️ Different indexing algorithm
✔️ Better exposure of open directories
✔️ Sometimes reveals sensitive files not visible on Google
✔️ Useful for bug bounty & recon

---

🎯 Common Yandex Dork Examples

⚠️ For educational & authorized testing only.

1️⃣ Find Exposed Login Pages...
🔍 𝗗𝗮𝗿𝗸 𝗪𝗲𝗯 𝗥𝗲𝗽𝗼𝗿𝘁 – SOCRadar

Tool that allows you to check if an email or domain has been exposed on the dark web. 💻
Analyze leaks, forums, marketplaces, and sources of intelligence to detect potential risks.
- Ideal for OSINT, cybersecurity and threat analysis.
🥷🏼 https://socradar.io/labs/app/dark-web-report/
📘 OSINT Manual:
https://hackunderway.com/producto/manual-osint/
⚠️ Responsible use: For ethical and legal purposes only.
#OSINT #CyberSecurity #DarkWeb #ThreatIntelligence
🚨 Think your location is safe when you post a selfie? Think again.

Hackers don’t always need GPS access — sometimes your social media photo alone gives away more than you realize. Here’s how they can track location from a single pic 👇

📸 1. Hidden EXIF Metadata
Many photos contain embedded data like GPS coordinates, device info, and timestamp.
If the platform doesn’t strip it, someone can extract it in seconds.

🪟 2. Background Clues
Street signs, shop names, vehicle plates, landmarks, even reflections in mirrors — all can reveal where you are.
OSINT tools make this shockingly fast....
CLI tool for passive collection of URLs from multiple OSINT sources, without directly interacting with the target.

📌 Supported sources:

- AlienVault OTX
- Bevigil (requires API)
- Common Crawl
- URLScan (requires API)
- GitHub (require token)
- Intelligence X (requires API)
- Wayback Machine
- Total Virus (requires API)
- Hudson Rock (requires API)

🔍 Extra:
In Wayback Machine also analyzes:

- URLs within historical snapshots
- Old records of robots.txt

🔗 Official restock:
https://github.com/hueristiq/xurlfind3r

⚠️ For educational purposes and authorized auditions only.

For more:
👁 https://www.patreon.com/HackUnderway

#JeyZeta #web #recon #xurlfind3r #osint #golang #docker #webpentesting #cybersecurity #ethicalhacking
Argus – The Ultimate Information Gathering Toolkit
Argus is an all-in-one Python toolkit for reconnaissance and information gathering across networks & web applications. It provides a clean CLI menu, multiple modules, and a smooth workflow for OSINT, network reconnaissance, and security checks—backed with a clear legal disclaimer for ethical use only.

Key Highlights
• Network & Infrastructure: WHOIS, DNS/DoH, DNSSEC, TXT records, zone transfer, IP/Server info & geolocation, TLS/SSL chain & cipher analysis, SSL expiry, HTTP/2–HTTP/3 detection, traceroute, open ports.
• Web Applications: crawler, content/dir discovery, robots.txt & sitemap parsing, CMS & tech stack detection, broken links, cookie analyzer, performance...
OSINT-MASTER ULTIMATE PRO is a powerful open-source intelligence tool developed by Team Hackethics138. As shown in the screenshot above, it features a clean terminal interface with color-coded menus for efficient OSINT operations. The tool is designed for ethical security research, digital forensics, and cybersecurity education.

🔧 MAIN FEATURES

Instagram Intelligence: Profile analysis, follower analytics, metadata extraction
Phone Forensics: Carrier identification, number validation, geolocation tracing
User-Friendly Interface: Pink-bordered menus, color-coded feedback

All content shared is strictly for educational and awareness purposes. I do not promote, engage in, or encourage any illegal activities. Use the information responsibly and in compliance with applicable...
Maps radio signals into situational intelligence
WireTapper is a wireless OSINT tool that passively detects and maps Wi-Fi, Bluetooth, CCTV cameras, vehicles, headphones, TVs, IoT devices, and cell towers, turning nearby radio signals into clear situational intelligence
https://github.com/h9zdev/WireTapper
TinEye 🔎 Reverse image search tool that allows you to find where an image has been posted on the Internet using the image itself as a reference.

Allows you to identify the original source, detect modified or cropped versions, locate copies on different websites, and find higher-resolution images, all from a single search.

Ideal for digital verification, OSINT, fact-checking, copyright protection and visual content analysis.
Upload the image or paste the URL... and you get matches in seconds.

🔗 Web: https://tineye.com/

⚠️ Ethical and responsible use.
Tool for research, verification and content protection.
Harassment, the invasion of privacy or misuse...