OSINT Sources
Complete catalog of public information sources
Explore the best OSINT sources for collecting strategic information. From search engines to specialized databases, discover the tools and techniques for conducting effective investigations.
Quick OSINT Tips
Google Dorks : site: filetype: intitle: inurl: intext:Shodan : port:22 country:US org:"company"WHOIS history to detect ownership changesCertificate Transparency logs to discover subdomainsWayback Machine to find removed contentEXIF data from images for geolocation and metadataInternet Sources
Web platforms and social networks for collecting public information
Search Engines
Google, Bing, DuckDuckGo, Yandex and specialized engines for targeted information searches
Recommended Tools
Tip
Use advanced operators: site:, filetype:, intitle:, inurl: to refine your searches
Usage Examples:
- ✓site:example.com filetype:pdf
- ✓intitle:"index of" "config.php"
- ✓inurl:admin
Social Networks
Social platforms and professional networks for profile and activity analysis
Recommended Tools
Tip
Analyze metadata, connections, posts and geolocated information
Usage Examples:
- ✓Twitter search by geolocation
- ✓LinkedIn connection analysis
- ✓Photo EXIF extraction
Forums and Communities
Technical exchange platforms, underground forums and specialized communities
Recommended Tools
Tip
Search for technical discussions, data leaks and known security issues
Usage Examples:
- ✓Credential search on Pastebin
- ✓GitHub repository analysis
- ✓Subreddit monitoring
Web Archives
Historical captures of websites and removed content
Recommended Tools
Tip
Find old versions of sites, removed content and modifications
Usage Examples:
- ✓Site modification history
- ✓Removed content recovery
- ✓Evolution analysis
Technical Sources
Technical information about infrastructure, domains and network configurations
DNS and WHOIS
Information about domains, owners and DNS configurations
Recommended Tools
Tip
Analyze ownership changes, subdomains, MX configurations and DNS history
Usage Examples:
- ✓Subdomain enumeration
- ✓WHOIS history
- ✓MX/TXT record analysis
SSL/TLS Certificates
Certificate analysis, trust chains and security history
Recommended Tools
Tip
Discover hidden domains, validate authenticity and analyze expired certificates
Usage Examples:
- ✓Organization search
- ✓Subdomain discovery via CT logs
- ✓Certificate chain analysis
File Metadata
Extraction of hidden information in documents, images and media
Recommended Tools
Tip
Extract GPS coordinates, authors, software used, creation dates
Usage Examples:
- ✓Photo EXIF extraction
- ✓PDF metadata analysis
- ✓Author information recovery
IoT Engines
Scanning of connected devices, exposed services and vulnerabilities
Recommended Tools
Tip
Identify webcams, servers, industrial equipment and vulnerable services
Usage Examples:
- ✓Unsecured webcam search
- ✓Open port scanning
- ✓Banner detection
Institutional Sources
Official registers, government databases and legal publications
Public Registers
Business registers, property records, courts and legal databases
Recommended Tools
Tip
Verify legal existence, executives, addresses and legal status
Usage Examples:
- ✓Company search
- ✓Executive analysis
- ✓Modification history
Official Publications
Government reports, security bulletins and official alerts
Recommended Tools
Tip
Consult CVEs, security bulletins and official recommendations
Usage Examples:
- ✓CVE search
- ✓Security alerts
- ✓Incident reports
CTI Databases
Threat intelligence, IOCs, TTPs and threat analysis
Recommended Tools
Tip
Analyze indicators of compromise, malicious campaigns and adversary tactics
Usage Examples:
- ✓IOC search
- ✓Malware analysis
- ✓Threat correlation
Academic Databases
Scientific publications, research and specialized studies
Recommended Tools
Tip
Access the latest research in security, cryptography and exploitation
Usage Examples:
- ✓Research papers
- ✓Proof of concepts
- ✓Case studies
Essential Best Practices
Verify Your Sources
Always cross-check information with multiple independent sources. Be wary of misinformation and manipulated content.
Document Systematically
Capture timestamped screenshots, note complete URLs, save web pages before they disappear.
Respect Legality
Access only public information. No hacking, no identity theft, no privacy violations.
Protect Your Identity
Use VPN, Tor, isolated virtual machines and compartmentalize your investigations to preserve your OPSEC.
Ready for Practice!
Now that you know the sources, discover how to exploit them with our investigation methodologies and practical guides.