Cyber security

Cyber Detective’s OSINT Tools Collection

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more.

I collect all the links from my tweets in this collection (already 1000+ services for a wide variety of purposes).

Thank you for following me! @cyb_detective

Don’t forget that OSINT’s main strength is in automation. Read the Netlas Cookbook for details and examples.

Most Important Categories

SectionLink
Maps, Geolocation and TransportExplore
Social MediaExplore
Domain/IP/LinksExplore
Image Search and IdentificationExplore
CryptocurrenciesExplore
MessengersExplore
CodeExplore
Search enginesExplore
IOTExplore
ArchivesExplore
PasswordsExplore
EmailsExplore
NicknamesExplore

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Pystinger : Bypass Firewall For Traffic Forwarding Using Webshell

Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…

7 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

8 hours ago

CVE-Search : A Tool To Perform Local Searches For Known Vulnerabilities

Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…

1 day ago

How to Bash Append to File: A Simple Guide for Beginners

If you are working with Linux or writing bash scripts, one of the most common…

1 day ago

Mastering the Bash Case Statement with Simple Examples

What is a bash case statement? A bash case statement is a way to control…

1 day ago

How to Check if a File Exists in Bash – Simply Explained

Why Do We Check Files in Bash? When writing a Bash script, you often work…

3 days ago