theHarvester
theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
😸 Github
⬇️ Installation
#Python #Osint #Recon
➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗ ➗
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
theHarvester is a simple to use, yet powerful tool designed to be used during the reconnaissance stage of a red
team assessment or penetration test. It performs open source intelligence (OSINT) gathering to help determine
a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using
#Python #Osint #Recon
Please open Telegram to view this post
VIEW IN TELEGRAM
Find people on the Internet
🤖 Download
#Osint #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
🤖 Download
#Osint #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Snoop Project
Snoop Project One of the most promising OSINT tools to search for nicknames
This is the most powerful software taking into account the CIS location.
Is your life slideshow? Ask Snoop.
Snoop project is developed without taking into account the opinions of the NSA and their friends,
that is, it is available to the average user
GNU/Linux ✅
Windows 7/10 (32/64) ✅
Android (Termux) ✅
macOS ❗️
IOS 🚫
WSL 🚫
GitHub
Download
#RedTeam #Scanner #Osint #Username_Search
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Snoop Project One of the most promising OSINT tools to search for nicknames
This is the most powerful software taking into account the CIS location.
Is your life slideshow? Ask Snoop.
Snoop project is developed without taking into account the opinions of the NSA and their friends,
that is, it is available to the average user
GNU/Linux ✅
Windows 7/10 (32/64) ✅
Android (Termux) ✅
macOS ❗️
IOS 🚫
WSL 🚫
GitHub
Download
#RedTeam #Scanner #Osint #Username_Search
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
❤1👍1🔥1😢1
Subfinder
We have made it to comply with all the used passive source licenses and usage restrictions. The passive model guarantees speed and stealthiness that can be leveraged by both penetration testers and bug bounty hunters alike.
⚪️ Fast and powerful resolution and wildcard elimination modules
⚪️ Curated passive sources to maximize results
⚪️ Multiple output formats supported (JSON, file, stdout)
⚪️ Optimized for speed and lightweight on resources
⚪️ STDIN/OUT support enables easy integration into workflows
GitHub
#Osint #BugBounty #SubDomains
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
subfinder is a subdomain discovery tool that returns valid subdomains for websites, using passive online sources. It has a simple, modular architecture and is optimized for speed. subfinder is built for doing one thing only - passive subdomain enumeration, and it does that very well.We have made it to comply with all the used passive source licenses and usage restrictions. The passive model guarantees speed and stealthiness that can be leveraged by both penetration testers and bug bounty hunters alike.
⚪️ Fast and powerful resolution and wildcard elimination modules
⚪️ Curated passive sources to maximize results
⚪️ Multiple output formats supported (JSON, file, stdout)
⚪️ Optimized for speed and lightweight on resources
⚪️ STDIN/OUT support enables easy integration into workflows
GitHub
#Osint #BugBounty #SubDomains
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
httpxis a fast and multi-purpose HTTP toolkit that allows running multiple probes using the retryablehttp library. It is designed to maintain result reliability with an increased number of threads.
⚪️ Simple and modular code base making it easy to contribute.
⚪️ Fast And fully configurable flags to probe multiple elements.
⚪️ Supports multiple HTTP based probings.
⚪️ Smart auto fallback from https to http as default.
⚪️ Supports hosts, URLs and CIDR as input.
⚪️ Handles edge cases doing retries, backoffs etc for handling WAFs.
GitHUb
#osint #ssl_certificate #bugbounty #cybersecurity
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/MRvirusIRBOT
📢 t.iss.one/BugCod3
Incredibly fast crawler designed for OSINT
Photon can extract the following data while crawling:
example.com/gallery.php?id=2)#Python #Crawler #Osint #Spider
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2😱2❤1
5 important Tools that can use for Bug Hunting Journey or pen-testing process.
Information Gathering or Reconnisence is the most important part of penetration testing.
#recon #osint
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
Information Gathering or Reconnisence is the most important part of penetration testing.
1:Nmap:Nmap is a free and open-source network mapping tool that can use for network discovery and security auditing
2: Amass:The OWASP Amass tool suite obtains subdomain names by scraping data sources, recursive brute forcing, crawling web archives, permuting/altering names, and reverse DNS sweeping.
3:Dirb:Dirb is a powerful web content scanner tool that can use to find hidden and existing files on the web application
4: Sublist3r:Sublist3r is a python tool designed to enumerate subdomains of websites using OSINT.
5:DNS Recon:DNS Recon is a tool that can use for Domain Name System (DNS) enumeration.
#recon #osint
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📢 t.iss.one/BugCod3
❤🔥4🎉2
hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.
go install github.com/hakluke/hakip2host@latest
hakip2host --help
BugCod3#Osint #Recon #CIDR #HTTPS
Please open Telegram to view this post
VIEW IN TELEGRAM
Search inside every file, folder and subfolder for OSINT
(based on the book The Hobbit, Smaug the dragon)
It is not an online tool. This program scans your local database to search a variable you specified inside each file with bruteforce.
This tool has been created for utility to search inside every file which contains your input,
and also not all files/folders are supported (outside UTF-8 unicode) atm.
Could be useful for osint individuals.
make inside smaug-mainmake inside smaug-main.Makefile under smaug-main.BugCod3#C #Smaug #OSINT
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3❤2🔥2
This media is not supported in your browser
VIEW IN TELEGRAM
Chiasmodon is an OSINT (Open Source Intelligence) tool designed to assist in the process of gathering information about target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials (usernames and passwords), CIDRs (Classless Inter-Domain Routing), ASNs (Autonomous System Numbers), and subdomains. the tool allows users to search by domain, CIDR, ASN, email, username, password, or Google Play application ID.
📋 Output Customization: Choose the desired output format (text, JSON, or CSV) and specify the filename to save the search results.
pip install chiasmodon
chiasmodon_cli.py -h
BugCod3#OSINT #BugBounty #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥3👍2❤1
Version 1.0.0 is available now
#OSINT #CyberSecurity #password
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
pip3 install -U chiasmodon #OSINT #CyberSecurity #password
Please open Telegram to view this post
VIEW IN TELEGRAM
❤5🔥3⚡2
This media is not supported in your browser
VIEW IN TELEGRAM
🕵️♂️ Human-like Behavior Mimicking: To mimic human-like behavior and avoid detection by anti-bot mechanisms, the tool randomizes user agents for each request. This helps in making the requests appear more natural and reduces the likelihood of being flagged as automated activity.
cd Ominis-Osint
pip install -r requirements.txt
python3 Ominis.py
BugCod3#Python #Osint #Search #Engin #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡3🔥3❤2👍1
🕵️ Eyes is an OSINT tool to get existing accounts from an email
About:
Eyes is osint tool based on account search from an email address
Eyes is able to find not only if an account is existing on different sites but also to find the account in question (with certain modules)
even if the profile has nothing to do with the email 😲!
All this without warning the target 🕵️♂️
📊 Features of script:
⚪️ fully async
⚪️ asynchrone scraping
⚪️ menu in cli format (commands)
📂 Requirements / Launch:
⚪️ Python 3
⚪️ Git
⚪️ New terminal (to display emojis) # only for windows
💻 Usage:
😸 Github
⬇️ Download
🔒
#Osint #Email
➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖ ➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
About:
Eyes is osint tool based on account search from an email address
Eyes is able to find not only if an account is existing on different sites but also to find the account in question (with certain modules)
even if the profile has nothing to do with the email 😲!
All this without warning the target 🕵️♂️
usage: eyes.py [-h] [-m] [email]
positional arguments:
email search information on the target email with modules, services...
options:
-h, --help show this help message and exit
-m, --modules gives you all the email modules used by Eyes
BugCod3#Osint #Email
Please open Telegram to view this post
VIEW IN TELEGRAM
⚡4🔥2❤1👍1
Blackbird is a robust OSINT tool that facilitates rapid searches for user accounts by username or email across a wide array of platforms, enhancing digital investigations. It features WhatsMyName integration, export options in PDF, CSV, and HTTP response formats, and customizable search filters.
cd blackbird
pip install -r requirements.txt
Search by username
python blackbird.py --username username1 username2 username3Search by email
python blackbird.py --email [email protected] [email protected] [email protected]Export results to PDF
python blackbird.py --email [email protected] --pdfBlackbird uses AI-powered NER models to improve metadata extraction, identifying key entities for faster and more accurate insights.
python blackbird.py --username username1 --aiBugCod3#Python #Osint #Tools
Please open Telegram to view this post
VIEW IN TELEGRAM
❤8👍4🔥3⚡2
Extracts URLs from OSINT Archives for Security Insights.
💬
Urx is a command-line tool designed for collecting URLs from OSINT archives, such as the Wayback Machine and Common Crawl.
📊 Features:
⚪️ Fetch URLs from multiple sources (Wayback Machine, Common Crawl, OTX)
⚪️ Process multiple domains concurrently
⚪️ Filter results by file extensions or patterns
⚪️ Use presets (predefined filter sets) for convenience (like "no-image" to exclude all image-related extensions)
⚪️ Multiple output formats (plain, JSON, CSV)
⚪️ Output to console or file
⚪️ Support for reading domains from stdin (pipeline integration)
⚪️ URL testing capabilities (status checking, link extraction)
🔼 Installation:
💻 Usage:
Github
⬇️ Download
🔒
#Osint #URL #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
💬
Urx is a command-line tool designed for collecting URLs from OSINT archives, such as the Wayback Machine and Common Crawl.
📊 Features:
⚪️ Fetch URLs from multiple sources (Wayback Machine, Common Crawl, OTX)
⚪️ Process multiple domains concurrently
⚪️ Filter results by file extensions or patterns
⚪️ Use presets (predefined filter sets) for convenience (like "no-image" to exclude all image-related extensions)
⚪️ Multiple output formats (plain, JSON, CSV)
⚪️ Output to console or file
⚪️ Support for reading domains from stdin (pipeline integration)
⚪️ URL testing capabilities (status checking, link extraction)
🔼 Installation:
cd urx
cargo build --release
💻 Usage:
# Scan a single domain
urx example.com
# Scan multiple domains
urx example.com example.org
# Scan domains from a file
cat domains.txt | urx
Github
⬇️ Download
🔒
BugCod3#Osint #URL #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
❤10👍5🔥2⚡1
Trape (stable) v2.0
💬
Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowledge, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.
📊 Some benefits:
⚪️ LOCATOR OPTIMIZATION
⚪️ APPROACH
⚪️ REST API
⚪️ PROCESS HOOKS
⚪️ PUBLIC NETWORK TUNNEL
⚪️ CLICK ATTACK TO GET CREDENTIALS
⚪️ NETWORK
⚪️ PROFILE
💻 Usage:
Github
⬇️ Download
🔒
#Python #Osint #Security #Tracking #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
💬
Trape is an OSINT analysis and research tool, which allows people to track and execute intelligent social engineering attacks in real time. It was created with the aim of teaching the world how large Internet companies could obtain confidential information such as the status of sessions of their websites or services and control their users through their browser, without their knowledge, but It evolves with the aim of helping government organizations, companies and researchers to track the cybercriminals.
📊 Some benefits:
⚪️ LOCATOR OPTIMIZATION
⚪️ APPROACH
⚪️ REST API
⚪️ PROCESS HOOKS
⚪️ PUBLIC NETWORK TUNNEL
⚪️ CLICK ATTACK TO GET CREDENTIALS
⚪️ NETWORK
⚪️ PROFILE
💻 Usage:
cd trape
pip3 install -r requirements.txt
python3 trape.py -h
#Example: python3 trape.py --url https://example.com --port 8080
Github
⬇️ Download
🔒
BugCo3#Python #Osint #Security #Tracking #Tools
➖➖➖➖➖➖➖➖➖➖
👤 t.iss.one/BugCod3BOT
📣 t.iss.one/BugCod3
🔥3❤2⚡1