Specialized OSINT Tools

Discover a selection of essential tools for your OSINT investigations. From advanced search to media analysis, master the best tools.

Search and Analysis

Google Dorks

Advanced search operators for Google

Use Cases

  • Search for sensitive files
  • Vulnerability discovery
  • Website investigation

Tip

Use operators in combination for more precise results

Shodan

Search engine for Internet-connected devices

Use Cases

  • Infrastructure mapping
  • Discovery of exposed services
  • Security analysis

Tip

Use filters to refine your search results

Censys

Internet infrastructure analysis platform

Use Cases

  • SSL/TLS certificate analysis
  • Device discovery
  • Domain investigation

Tip

Leverage APIs for automation

Domain Analysis

WHOIS

Domain information lookup

Use Cases

  • Owner identification
  • Registration history
  • Reputation analysis

Tip

Check the history of changes

DNS Lookup

DNS record search

Use Cases

  • Infrastructure mapping
  • Subdomain discovery
  • Configuration analysis

Tip

Use different record types

Reverse DNS

Reverse domain name lookup

Use Cases

  • IP investigation
  • Infrastructure discovery
  • Network analysis

Tip

Combine with other tools for a complete view

Media Analysis

ExifTool

File metadata extraction

Use Cases

  • Image analysis
  • Authenticity verification
  • Document investigation

Tip

Check GPS and technical information

Metagoofil

Document metadata extraction

Use Cases

  • Document analysis
  • Discovery of sensitive information
  • Leak investigation

Tip

Use in combination with other tools

FOCA

Metadata analysis tool

Use Cases

  • Website analysis
  • Metadata extraction
  • Information discovery

Tip

Configure search options according to your needs

Threat Intelligence & Monitoring

VirusTotal

File and URL analysis platform

Use Cases

  • Suspicious file analysis
  • URL investigation
  • Threat monitoring

Tip

Use the API for automation

AlienVault OTX

Threat intelligence platform

Use Cases

  • Threat monitoring
  • Indicator analysis
  • Campaign investigation

Tip

Share your findings with the community

Have I Been Pwned

Data breach verification service

Use Cases

  • Breach verification
  • Impact analysis
  • Compromise investigation

Tip

Use the API for automated verification

Best Practices for Tool Usage

Combine Tools

Use multiple tools to cross-reference information and get a complete view

Automate When Possible

Use APIs and scripts to automate repetitive tasks

Respect Limits

Comply with terms of service and tool limitations

Document Your Process

Keep track of tools used and results obtained