Skip to content

Latest commit

 

History

History
206 lines (148 loc) · 6.15 KB

File metadata and controls

206 lines (148 loc) · 6.15 KB

OSINT

Table of Contents

Resources

Name Description URL
cloud_enum Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud. https://github.com/initstring/cloud_enum
DeHashed Breach Monitoring https://dehashed.com
DorkSearch Faster Google Dorking https://dorksearch.com
Exploit-DB - Google Hacking Database Exploit Database Google Dorks https://www.exploit-db.com/google-hacking-database
GHunt GHunt is a modulable OSINT tool designed to evolve over the years, and incorporates many techniques to investigate Google accounts, or objects. https://github.com/mxrch/GHunt
GitFive Track down GitHub users. https://github.com/mxrch/GitFive
hunter Hunter lets you find professional email addresses in seconds and connect with the people that matter for your business. https://hunter.io
Intelligence X OSINT Search Engine https://intelx.io
linkedin2username Generate username lists from companies on LinkedIn. https://github.com/initstring/linkedin2username
NerdyData Get a list of websites that use certain technologies, plus their company and spend data. https://www.nerdydata.com
Osintgram Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname. https://github.com/Datalux/Osintgram
OSINT Recon Tool OSINT Mindmap Tool https://recontool.org/#mindmap
osintui Open Source Intelligence Terminal User Interface https://github.com/wssheldon/osintui
Recon-ng Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources. https://github.com/lanmaster53/recon-ng
Sherlock Hunt down social media accounts by username across social networks. https://github.com/sherlock-project/sherlock
tweets_analyzer Tweets metadata scraper & activity analyzer https://github.com/x0rz/tweets_analyzer

Fast Google Dorks Scan

https://github.com/IvanGlinkin/Fast-Google-Dorks-Scan

$ ./FGDS.sh <DOMAIN>
$ proxychains bash ./FGDS.sh <DOMAIN>

Google

Google Dorks

https://cheatsheet.haax.fr/open-source-intelligence-osint/dorks/google_dorks/

https://www.searchenginejournal.com/google-search-operators-commands/215331/

intitle:index.of <TEXT>    // open directory listings
ext:php
inurl:%3F
site:*.*.*.<DOMAIN>
filetype:txt
Example
ext:php inurl:? site:<DOMAIN>

Finding .git Directories

"(intext:"index of /.git") ("parent directory")

Juicy Extensions

ext:log | ext:txt | ext:conf | ext:cnf | ext:ini | ext:env | ext:sh | ext:bak | ext:backup | ext:swp | ext:old | ext:~ | ext:git | ext:svn | ext:htpasswd | ext:htaccess site:<DOMAIN>

Cloud Environments

site:http://s3.amazonaws.com "<DOMAIN>"
site:http://blob.core.windows.net "<DOMAIN>"
site:http://googleapis.com "<DOMAIN>"
site:http://drive.google.com "<DOMAIN>"

Leaks

site:http://jsfiddle.net "<DOMAIN>"
site:http://codebeautify.org "<DOMAIN>"
site:http://codepen.io "<DOMAIN>"
site:http://pastebin.com "<DOMAIN>"
Example
site:http://jsfiddle.net | site:http://codebeautify.org | site:http://codepen.io | site:http://pastebin.com "<DOMAIN>"
site:http://jsfiddle.net | site:http://codebeautify.org | site:http://codepen.io | site:http://pastebin.com "<DOMAIN>" "demo" "test" "api"

Open Redirects

inurl:page= | inurl:url= | inurl:return= | inurl:next= | inurl:redir= | inurl:redirect= | inurl:target= | inurl:page= inurl:& inurl:http site:http://<DOMAIN>

Server-Side Request Forgery (SSRF)

inurl:http | inurl:proxy= | inurl:html= | inurl:data= | inurl:resource= inurl:& site:<DOMAIN>

Google ID

https://medium.com/week-in-osint/getting-a-grasp-on-googleids-77a8ab707e43

Setup

  1. Add a new contact to you google account (email address required)
  2. Open developer tools and select the network tab
  3. Reload the page
  4. Set the right pane to request
  5. Check all batchexecute packets
Example

https://contacts.google.com/_/ContactsUi/data/batchexecute?rpcids=OSOtuf&f.sid=-916332265175998083&bl=boq_contactsuiserver_20200707.13_p0&hl=en&soc-app=527&soc-platform=1&soc-device=1&_reqid=765234&rt=c

  1. Watch out for a string like the following one
Example
[[["OSOtuf","[\"55fa738b0a752dc5\",\"117395327982835488254\"]",null,"generic"]]]

The Google ID's are always 21 characters long and starting with 10 or 11.

https://get.google.com/albumarchive/

https://www.google.com/maps/contrib/

h8mail

https://github.com/khast3x/h8mail

$ h8mail -t <EMAIL>

Photon

https://github.com/s0md3v/Photon

$ python3 photon.py -u https://<DOMAIN> -l 3 -t 100 --wayback

Recon-ng

Common Commands

$ recon-ng
$ recon-ng -w <WORKSPACE>
[recon-ng][default] > workspaces create <WORKSPACE>
[recon-ng][default] > db schema
[recon-ng][default] > db insert domains
[recon-ng][default] > marketplace search
[recon-ng][default] > marketplace search <NAME>
[recon-ng][default] > marketplace info <NAME>
[recon-ng][default] > marketplace install <NAME>
[recon-ng][default] > marketplace remove <NAME>
[recon-ng][default] > modules search
[recon-ng][default] > modules load <MODULE>
[recon-ng][default][<MODULE>] > info
[recon-ng][default][<MODULE>] > options list
[recon-ng][default][<MODULE>] > options set <VALUE>
[recon-ng][default][<MODULE>] > run
[recon-ng][default] > keys list
[recon-ng][default] > keys add <KEY> <VALUE>
[recon-ng][default] > keys remove <KEY>

Ctrl+c unloads a module.

Social Analyzer

https://github.com/qeeqbox/social-analyzer

$ python3 app.py --cli --mode "fast" --username "<GIVENNAME> <SURNAME>" --websites "youtube facebook instagram" --output "pretty" --options "found,title,link,rate"

theHarvester

https://github.com/laramies/theHarvester

$ theHarvester -d <DOMAIN> -l 500 -b google -f myresults.html