==========================
== Gharib Personal Blog ==
==========================
A Techi Personal Blog

Offensive OSINT Tools

osint, offensive_osint

Offensive-OSINT-Tools

This repository contains tools and links that can be used during OSINT in Pentest or Red Team. Currently, there are numerous awesome lists with tons of tools, but Offensive Security specialists often don’t need such an extensive selection. This motivated the creation of this list. These tools cover almost all the needs of Offensive Security specialists and will help you get the job done efficiently.

If the tool performs multiple functions, for example collecting subdomains and URLs, it will be listed in two places.

📖 Table of Contents

↑ Contributing

Welcome! If you find that any of your favourite offensive tools is not on the list, you can suggest adding it.


↑ Search Engines

Search Engines for Investigation Domains/IP Addresses.

↑ Email addresses

Tools that help you collect email addresses. Usually the search requires the domain of the company.

↑ Source code

Tools for finding mentions in code. Useful to search for company/company mentions to find passwords/secrets/confidential information.

↑ SubDomain’s

Tools for automatic search of subdomains. Most of them require API keys to work correctly.

Tools

  • Bbot
  • sub.Monitor - Passive subdomain continous monitoring tool
  • Sudomy
  • Amass
  • theHarvester
  • Spiderfoot
  • subchase - Chase subdomains by parsing the results of Google and Yandex search results
  • GooFuzz - Enumerate directories, files, subdomains or parameters without leaving evidence on the target’s serve
  • SubGPT - SubGPT looks at subdomains you have already discovered for a domain and uses BingGPT to find more.
  • alterx - Fast and customizable subdomain wordlist generator using DSL.
  • Photon - Incredibly fast crawler designed for OSINT.
  • ronin-recon - Recursive recon engine and framework that can enumerate subdomains, DNS records, port scan, grab TLS certs, spider websites, and collect email addresses.
  • subdomain-enum - securitytrails api

Only sites/tools whose search is not automated by the tools above are listed here.

↑ URLs

Tools for passive collection and analysis URLs

  • Gau
  • Xurlfind3r
  • Unja
  • urlhunter - a recon tool that allows searching on URLs that are exposed via shortener services
  • Waymore
  • Spiderfoot
  • theHarvester
  • GooFuzz - Enumerate directories, files, subdomains or parameters without leaving evidence on the target’s serve
  • Rextracter.streamlit - Gathers links and analyses content
  • Uscrapper - Tool that allows users to extract various personal information from a website.
  • ronin-recon - Recursive recon engine and framework that can enumerate subdomains, DNS records, port scan, grab TLS certs, spider websites, and collect email addresses.
  • Ominis-Osint - The tool extracts relevant information such as titles, URLs, and potential mentions of the query in the results.

↑ Dark web

An undiscovered area, the author is too dumb for that. Will gradually expand.

↑ Intelligence

Threat Intelligence tools containing extensive company information, subdomains, DNS information, URLs and much more.

↑ Network Info

IP/Domain network analysis tools.

↑ DnsHistory

Tools for viewing the DNS history of a domain.

Certifications

↑ FTP servers

Tools allowing you to search for and download files located on public FTP servers.

↑ Passive Infrastructure scanner

Tools for automated passive IP address/subnet scanning.

↑ Microsoft Exchange

Tools that help in passive/semi-passive analysis of Microsoft Exchange.

↑ Telegram

Tools for investigating Telegram chats.

↑ Google Dorks

Tools for Google Dorks.

Nickname search tools.

↑ Phone number

Sometimes situations happen that require analysing an employee’s phone number to get more information.

↑ Wifi

  • 3Wifi - free base of access points

↑ Cloud

Tools for searching, gathering information from cloud.

↑ Information gathering tools

Links to guide, methodologies and any information that would be useful.