Information Gathering

Infoooze – Your Comprehensive Guide To OSINT Tools

Infoooze is a powerful and user-friendly OSINT (Open-Source Intelligence) tool that allows you to quickly and easily gather information about a specific target.

With Infoooze, you can easily search for information about websites, IP addresses, usernames, and more, all from the convenience of a simple command-line interface.

One of the key features of Infoooze is its ability to work as a global package, allowing you to use it from any directory on your computer.

It also has ability to automatically save the results of your searches to a text file. This means that you can easily access and refer to the information you have gathered at a later time.

Infoooze is easy to install and use, making it an ideal tool for anyone looking to gather information quickly and efficiently.

Features

  1. InstaGram Recon
  2. Subdomain Scanner
  3. Ports Scan
  4. User Recon
  5. Mail finder
  6. URL Scanner
  7. Exif metadata
  8. Whois Lookup
  9. IP Lookup
  10. Header Info
  11. Website Age
  12. DNS Lookup
  13. UserAgent Lookup
  14. Git Recon
  15. URL Expander
  16. Youtube Lookup
  17. Instagram DP Viwer
  18. Save Results to file

Getting Started

Prerequisites

You need NodeJs 12 or later to run this tool.
To install Node.js, follow the instructions for your operating system:

  • Linux
sudo apt-get install nodejs
  • On many distros NodeJs is installed by default.
  • Termux
pkg install nodejs-lts 
  • Windows
    • Download the latest LTS version from NodeJs.
    • Run the installer.
    • Follow the prompts in the installer (Accept the license agreement, click the NEXT button a bunch of times and accept the default installation settings).
    • Restart your computer. You won’t be able to run Node.js until you restart your computer.

For more information click here.

Tamil S

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

5 hours ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

1 day ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

4 weeks ago