Specialized OSINT Tools
Discover a selection of essential tools for your OSINT investigations. From advanced search to media analysis, master the best tools.
Search and Analysis
Google Dorks
Advanced search operators for Google
Use Cases
- Search for sensitive files
- Vulnerability discovery
- Website investigation
Tip
Use operators in combination for more precise results
Shodan
Search engine for Internet-connected devices
Use Cases
- Infrastructure mapping
- Discovery of exposed services
- Security analysis
Tip
Use filters to refine your search results
Censys
Internet infrastructure analysis platform
Use Cases
- SSL/TLS certificate analysis
- Device discovery
- Domain investigation
Tip
Leverage APIs for automation
Domain Analysis
WHOIS
Domain information lookup
Use Cases
- Owner identification
- Registration history
- Reputation analysis
Tip
Check the history of changes
DNS Lookup
DNS record search
Use Cases
- Infrastructure mapping
- Subdomain discovery
- Configuration analysis
Tip
Use different record types
Reverse DNS
Reverse domain name lookup
Use Cases
- IP investigation
- Infrastructure discovery
- Network analysis
Tip
Combine with other tools for a complete view
Media Analysis
ExifTool
File metadata extraction
Use Cases
- Image analysis
- Authenticity verification
- Document investigation
Tip
Check GPS and technical information
Metagoofil
Document metadata extraction
Use Cases
- Document analysis
- Discovery of sensitive information
- Leak investigation
Tip
Use in combination with other tools
FOCA
Metadata analysis tool
Use Cases
- Website analysis
- Metadata extraction
- Information discovery
Tip
Configure search options according to your needs
Threat Intelligence & Monitoring
VirusTotal
File and URL analysis platform
Use Cases
- Suspicious file analysis
- URL investigation
- Threat monitoring
Tip
Use the API for automation
AlienVault OTX
Threat intelligence platform
Use Cases
- Threat monitoring
- Indicator analysis
- Campaign investigation
Tip
Share your findings with the community
Have I Been Pwned
Data breach verification service
Use Cases
- Breach verification
- Impact analysis
- Compromise investigation
Tip
Use the API for automated verification
Best Practices for Tool Usage
Combine Tools
Use multiple tools to cross-reference information and get a complete view
Automate When Possible
Use APIs and scripts to automate repetitive tasks
Respect Limits
Comply with terms of service and tool limitations
Document Your Process
Keep track of tools used and results obtained