Cyber security

Awesome OSINT – A Comprehensive Resource For Cybersecurity Experts

A curated list of amazingly awesome open source intelligence tools and resources. Open-source intelligence (OSINT) is intelligence collected from publicly available sources.

In the intelligence community (IC), the term “open” refers to overt, publicly available sources (as opposed to covert or clandestine sources).

This list is to help all of those who are into Cyber Threat Intellience (CTI), threat hunting, or OSINT. From beginners to advanced.

Table Of Contents

  • General Search
  • Main National Search Engines
  • Meta Search
  • Specialty Search Engines
  • Visual Search and Clustering Search Engines
  • Similar Sites Search
  • Document and Slides Search
  • File Search
  • Pastebins
  • Code Search
  • Major Social Networks
  • Real-Time Search, Social Media Search, and General Social Media Tools
  • Social Media Tools
    • Twitter
    • Facebook
    • Instagram
    • Pinterest
    • Reddit
    • VKontakte
    • Tumblr
    • LinkedIn
    • Telegram
  • Blog Search
  • Forums and Discussion Boards Search
  • Username Check
  • People Investigations
  • Email Search / Email Check
  • Phone Number Research
  • Vehicle / Automobile Research

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Transport Layer Protocols :

At the transport layer, the primary protocols in use are TCP and UDP. Modern operating…

38 minutes ago

Top OSINT Tools to Find Emails, Usernames and Passwords

Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets…

11 hours ago

Google Dorking in Cybersecurity: A Complete Guide

Introduction In the vast ocean of the internet, the most powerful tool you already have…

23 hours ago

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 week ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

2 weeks ago