Yet another OSINT list

Although OSINT is not about finding the magical tool, I find useful to keep my own list of tools & resources for reference and to get ideas when I’m stuck.

If you are a beginner with open-source intelligence, rushing to the tools is tempting, but I advise you to do some research on the technical side of things to make sure you understand what a tool does, what information it provides you, how accurate or actionable might this information be, etc.

E.g. : Before rushing to the “breached data” section, you should get familiar with what a databreach is, how they happen, where stuff usually leak, what MD5 & SHA1 hashes are, and so on.

You can explore the list on its Github repository, contributions & feedback welcome!

DataSploit tutorial

DataSploit Logo

DataSploit is a collection of python scripts which automate open source intelligence searches about domain names, email addresses, IP addresses and usernames.

To use DataSploit, you’ll need:

  • Python 2.7
  • a basic understanding of the command line.

In addition, knowing your way around python versions, dependencies and virtual environments will definitely help should the script throw out errors.

Why is DataSploit useful?

DataSploit searches several services at once. This speeds up the research process, as you don’t have to perform searches on each service separately. DataSploit also allows to search several targets in one go.

More …

theHarvester: find email addresses from a domain

theHarvester is a Python script that uses several search engines to find emails matching a certain domain name.

This has several use cases:

  • find emails of a company’s employees, if you know the company’s website.
  • find the email of someone if you know the website of its company or its personal website.
  • find the format of email addresses of a company. A lot of companies usually use a common format for its employees’ emails, such as surname.name@examplecompany.com. If this is the case, you can easily infer the email address of employees from their names.
More …