Google Dork Generator (Proprietary) Proprietary
Generate structured OSINT search queries using a purpose-built investigation tool designed for reconnaissance, discovery, and pivoting.
Open Dork GeneratorA complete platform for digital investigators, analysts, and researchers.
Start investigating with OSINT tools
A curated intelligence platform featuring proprietary tools built within The OSINT Vault alongside carefully selected investigative resources.
Generate structured OSINT search queries using a purpose-built investigation tool designed for reconnaissance, discovery, and pivoting.
Open Dork GeneratorLaunch coordinated multi-platform investigations using a custom-built pivoting engine that executes queries across multiple endpoints instantly.
Launch InvestigationA curated and custom-built collection of browser-native investigative bookmarklets for metadata extraction, in-page analysis, and rapid reconnaissance.
Open BookmarkletsCreate structured intelligence reports using a workflow designed specifically for investigators and analysts.
Compose ReportOrganize raw investigative notes into structured intelligence outputs using a clean, purpose-built analysis workspace.
Open Note OrganizerTools for mapping networks, tracing domains, and identifying the systems behind online activity. Clear, reliable, and built for precise discovery.
Certificate Transparency log search. Find all subdomains by looking up TLS certificates. Great for mapping web infrastructure.
Programmatic access to CT logs. Use SSLMate's certspotter API or Google's CT API to automate subdomain discovery.
RIPE NCC's data service. Look up IP addresses, ASNs, prefixes, and abuse contacts. Essential for network attribution.
BGP routing data and ASN relationships. See who peers with who, upstream providers, and network topology.
Historical snapshots of websites. See what a site looked like years ago. Recover deleted content, find old contact info, track changes.
Multi-engine OSINT search tool for running queries across multiple platforms and discovering indexed data variations.
Search engine for Internet-connected devices. Find exposed services, open ports, vulnerable systems. Free tier has limited searches.
Note: Essential for finding what's actually exposed, not what should be exposed.
Add /robots.txt or /sitemap.xml to any domain. Reveals hidden directories, admin panels, API endpoints that site owners don't want crawled.
Historical DNS records and subdomain discovery. Track domain changes over time. Free tier provides limited lookups per month.
Historical and current WHOIS registration data for domains. Supports infrastructure attribution and domain pivoting with extensive historical records.
Best Used For: Domain ownership research and infrastructure pivot analysis.
DNS reconnaissance and domain infrastructure mapping. Identifies subdomains, DNS records, and related hosts tied to a domain. Generates visual network diagrams. No registration required.
Best Used For: Subdomain discovery and DNS infrastructure analysis.
Reverse DNS lookup, reverse WHOIS, and DNS history. Multiple DNS intelligence tools in one interface.
Internet-wide scanning data. Certificate searches, device fingerprinting, and exposure mapping. More structured than Shodan for research.
Crowdsourced IP reputation database used to identify malicious IP addresses. Aggregates abuse reports and assigns confidence scores. Community-driven threat intelligence with API access.
Best Used For: Validating suspicious IPs and identifying malicious infrastructure.
IP geolocation, ASN details, and company information. Clean API for programmatic lookups. Free tier available.
Identifies internet background noise vs targeted attacks. Determines if IP scanning is mass scanning or targeted activity.
Open threat intelligence platform. Community-contributed indicators of compromise, malicious IPs, and threat data.
Threat intelligence search engine. Query IPs, domains, and URLs for threat indicators. Clean interface with API access.
Analyzes files, hashes, domains, and IPs using multiple antivirus engines and threat intelligence feeds. Aggregates detection data and behavioral analysis from 70+ security vendors.
Best Used For: Malware analysis, IOC validation, and infrastructure reputation checks.
Website technology profiler. Identifies frameworks, analytics, hosting providers, and tech stack. Free basic lookups, paid for historical data.
Search engine for exposed databases, API keys, and configuration files. Scans the internet for data leaks and misconfigurations.
Internet scanner and data platform. Maps exposed services, vulnerabilities, and hosts. API access for automated queries.
Cyber defense search engine. Collects data on exposed assets, threat intelligence, and internet infrastructure. Free tier available.
Search engine for publicly exposed AWS S3 buckets. Find misconfigured cloud storage containing sensitive files and data.
Chinese internet asset search engine similar to Shodan/Censys. Scans global internet for exposed services, devices, and vulnerabilities. Strong coverage of Asian infrastructure with advanced query syntax.
Internet intelligence platform with attack surface discovery. Searches DNS, WHOIS, SSL certificates, and exposed services. Includes historical data and API access. Alternative to Shodan with different data sources.
Source code search engine. Search for specific HTML, JavaScript, or CSS patterns across millions of websites. Find sites using same tracking codes, widgets, or templates. Useful for attribution and infrastructure mapping.
Website scanner and sandbox. Submit URLs to see live screenshots, DOM content, network requests, and technology fingerprints. Search historical scans by domain, IP, or content. API available.
Chinese internet search engine for exposed services and infrastructure. Query syntax similar to Shodan. Strong global coverage with different indexing approach. Good for cross-referencing Shodan/Censys results.
These three tools cover the most common investigation starting points:
When you have a username, email, or handle and need to understand its footprint. These tools help you connect details efficiently and with accuracy.
Searches across 2000+ platforms simultaneously. Includes social networks, forums, dating sites, and gaming communities. Designed for broad username reconnaissance.
Open-source username enumeration tool that checks hundreds of platforms for account presence tied to a single username. Web-based with no registration required. Enter a username, receive structured results showing platform presence.
Best Used For: Username reconnaissance and account discovery across platforms.
Check username availability across social networks and domain names. Includes less common platforms.
Lightning-fast username checking. Focuses on major platforms but updates frequently.
People search engine that locates publicly available information connected to an individual's online presence.
Note: Good for quick identity pivots when you need a fast starting point.
AI-powered facial recognition search engine. Upload a face photo and find where that face appears across the public internet. Identifies social media profiles, news articles, and websites containing matching faces.
People search engine aggregating data from public records, social profiles, and online activity. Returns comprehensive identity profiles including contact info, social media, and professional history. Enterprise/API-based pricing.
Straightforward checks to verify whether an email is valid, active, or linked to any concerning activity. Clean results without unnecessary steps.
Email OSINT tool. Links email addresses to Google accounts, profile pictures, Google Maps reviews, and YouTube channels.
Find professional email addresses by company name. Verify email deliverability. Free tier allows limited monthly searches.
Note: Fast for building target lists when you need valid corporate contacts at scale.
Reverse phone lookup. Identify spam callers, see caller ID info, and find who owns a phone number.
Advanced phone number information gathering. Identifies country, carrier, line type, and scans for online footprints.
Email reputation lookup. Checks if an email address is associated with data breaches, disposable services, or suspicious activity.
Email-based intelligence lookups to identify associated accounts and metadata. Assists in uncovering digital identity links and account correlations.
Best Used For: Email pivoting and digital identity correlation.
Check if an email or phone number appears in known data breaches. Maintained by Troy Hunt. API available for automated queries.
Email server diagnostics. SPF, DMARC, MX record lookups, blacklist checks, and DNS validation for email infrastructure.
Contact intelligence platform. Find email addresses, phone numbers, and social profiles for professionals. Ideal for investigative research and contact discovery.
Reverse phone, VOIP, address, name, and email lookup. Includes voicemail preview without calling the device. High accuracy for basic consumer-level OSINT.
Python-based CLI tool. Queries a phone number across multiple online services. Includes sources such as Instagram and Snapchat. Best used for quick command-line checks and automation.
Web-based OSINT lookup tools. Phone number section allows simultaneous searches across many services. Results displayed in separate tabs per service. Also available through OSINT virtual machines built using Michael Bazzell's OSINT Techniques books. Best used for broad, multi-source phone number investigations.
Online phone number verification service. Provides basic metadata and validation information. Best used for initial number validation and formatting checks.
Breach data search engine. Search by email, username, IP, name, or password hash to find leaked credentials from data breaches. Returns associated accounts and exposure details across billions of records.
Breach data search platform. Search billions of leaked records by email, username, IP, name, phone, VIN, or address. Returns plaintext passwords when available. Used by security researchers and investigators.
Enterprise breach detection platform. Monitors dark web for compromised credentials and PII. Provides actionable alerts for exposed employee/customer data. Used by security teams and investigators.
OSINT tool for investigating Google accounts. Extract name, profile photo, Google Maps reviews, YouTube channels, Google Calendar events, and more from a Gmail address. Powerful for mapping Google ecosystem activity.
pip install ghunt
ghunt login
ghunt email target@gmail.com
Threat intelligence and compromise checks focused on exposed credentials, malware indicators, and infrastructure risk signals.
A free threat intelligence toolset from Hudson Rock that can check whether a specific domain, username, or email address was compromised by Infostealer malware.
Summary: Infrastructure intelligence search to verify compromised identifiers and exposure signals linked to Infostealer activity.
What it checks: Domain, username, email, and malware compromise indicators.
Usage notes: Use the Hudson Rock interface to query identifiers and review exposure context, related infrastructure, and compromise indicators.
Public record repositories and FOIA resources for historical files, declassified investigations, and government documentation.
The FBI Vault is the FBI’s online FOIA reading room, providing public access to thousands of FBI records, investigations, and historical documents.
Command-line tool for username enumeration across 400+ social networks. Automated search with structured output. Commonly used for identity mapping.
Note: Best first step for username recon before manual verification.
Environment: Mac Terminal / Linux Terminal / Windows CMD
git clone https://github.com/sherlock-project/sherlock.git
cd sherlock
pip install -r requirements.txt
python sherlock username_here
Advanced phone number information gathering tool. Scans international phone numbers to identify carrier, location, and online presence.
Environment: Mac Terminal / Linux Terminal / Windows PowerShell
go install github.com/sundowndev/phoneinfoga/v2@latest
phoneinfoga scan -n "+15551234567"
phoneinfoga serve
Gather emails, subdomains, IPs, and URLs from public sources. Uses search engines, PGP servers, and Shodan.
Note: Run this early for domain recon before touching the target directly.
Environment: Kali Linux / Ubuntu Terminal / Mac Terminal
git clone https://github.com/laramies/theHarvester
cd theHarvester
pip install -r requirements.txt
python theHarvester.py -d example.com -b all
Collect dossier on a person by username. Checks 3000+ sites, extracts personal info from profiles.
Environment: Python environment (Mac / Linux / Windows)
pip install maigret
maigret john_doe
maigret john_doe --pdf
Check if an email is used on different sites like Twitter, Instagram, Imgur without notifying the user.
Environment: Python environment (Mac / Linux / Windows)
pip install holehe
holehe johndoe@gmail.com
holehe johndoe@gmail.com --only-used
Subdomain discovery tool. Passive reconnaissance using certificate transparency, DNS, and search engines. Fast and reliable.
Note: Fastest passive subdomain enum, use this before active scanning.
Environment: Mac Terminal / Linux Terminal (Go required)
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
subfinder -d example.com
subfinder -d example.com -o output.txt
In-depth DNS enumeration and network mapping. Active and passive subdomain discovery. Maintained by OWASP.
Note: More thorough than Subfinder but slower, use when you need deep enumeration.
Environment: Mac Terminal / Linux Terminal (Go required)
go install -v github.com/owasp-amass/amass/v4/...@master
amass enum -d example.com
amass enum -d example.com -o results.txt
Fast web crawler designed for OSINT. Extracts URLs, emails, social media accounts, and files from websites.
Note: Fast crawler for extracting all discoverable content from a target site.
Environment: Python environment (Mac / Linux / Windows)
git clone https://github.com/s0md3v/Photon.git
cd Photon
pip install -r requirements.txt
python photon.py -u https://example.com
Read, write, and edit metadata in images, videos, PDFs. Extract GPS coordinates, camera info, timestamps, author names.
Environment: Ubuntu / Kali Linux / Mac Terminal
sudo apt install exiftool
exiftool filename.jpg
exiftool -gps:all image.jpg
Open-source geospatial investigation tool that extracts metadata from images and maps GPS coordinates locally. Processes images in batch mode and reconstructs movement timelines without cloud dependency.
Best Used For: EXIF extraction, geolocation clustering, and timeline reconstruction from images.
Identify hash types. Determines what algorithm generated a hash string. Essential for password cracking and forensics.
Environment: Python environment (Mac / Linux / Windows)
pip install hashid
hashid examplehash
hashid -m examplehash
Command-line interface for Censys internet scanning data. Query certificates, hosts, and services from the terminal.
Environment: Python environment (Mac / Linux / Windows)
pip install censys
censys config
censys search "services.service_name: HTTP"
censys view 8.8.8.8
Full-featured web reconnaissance framework. Modular design with 80+ modules for passive recon: domains, contacts, credentials, hosts, ports. Database-backed with workspaces for organized investigations.
Environment: Kali Linux / Ubuntu / Mac Terminal
git clone https://github.com/lanmaster53/recon-ng.git
cd recon-ng && pip install -r REQUIREMENTS
./recon-ng
marketplace search
modules load recon/domains-hosts/hackertarget
OSINT tool for finding profiles by username across 350+ platforms. Fast multi-threaded scanning with export options. Designed for quick identity reconnaissance and persona mapping.
Environment: Python 3.8+ (Mac / Linux / Windows)
git clone https://github.com/thewhiteh4t/nexfil.git
cd nexfil && pip install -r requirements.txt
python nexfil.py -u username
python nexfil.py -f usernames.txt
The terminal (also called command line, command prompt, or shell) is a text-based interface where you type commands to control your computer. It looks intimidating but it's just another way to interact with your machine.
Environment: Mac Terminal / Linux Terminal / Windows CMD
pwd
ls
cd foldername
cd ..
clear
Most CLI OSINT tools need Python and Git installed first:
Environment: Mac Terminal / Linux Terminal / Windows CMD
python --version
git --version
Kali Linux comes with these OSINT tools already installed. If you're using Kali, you can skip the installation steps.
Pre-configured Linux distributions and virtual machines built specifically for OSINT investigations, security research, and digital forensics.
OSINT-focused virtual machine maintained by TraceLabs for missing persons investigations and CTF events.
Cyber Security Investigator Linux distribution designed for digital forensics, OSINT, and incident response.
DFIR and OSINT Linux distribution with comprehensive toolset for digital forensics and investigations.
Industry-standard penetration testing and security auditing distribution with extensive OSINT tools pre-installed.
Arch Linux-based distribution for penetration testers and security researchers with over 2800 tools.
Linux distribution specifically designed for OSINT investigations and open source intelligence gathering.
Ubuntu-based Linux distribution designed for penetration testing and security assessment.
Containerized OSINT environment with pre-configured tools for investigations.
Arch Linux-based distribution for security professionals with curated penetration testing tools.
OSINT-focused distribution with automated tool installation and configuration.
OSINT distribution designed for investigators with pre-configured investigative tools.
Debian-based distribution focused on privacy and anonymity with Tor integration.
Gentoo-based security-focused LiveCD distribution for penetration testing.
Arch Linux-based distribution optimized for security testing and OSINT.
Fedora spin providing a safe test environment for security auditing and forensics.
Next-generation investigation tools enhanced by artificial intelligence. Automate research, enrich data, and accelerate analysis with machine learning capabilities.
AI-powered research platform that enhances OSINT investigations. Track, annotate, and enrich research through intelligent automation, searchable archives, and private server deployment.
Features: AI-Driven Insights, Tag & Annotate Clippings, Preloaded Prompts, Secure Private Architecture, Auto-Capture Web Journeys, Searchable Archives
Free Plan: 1 user, 2 concurrent projects
Independent Plan: $9k/year for 5 users, 30 concurrent projects
Professional OSINT and data analysis platform. Automated data collection from 100+ sources including social media, company registries, breach databases. Link analysis visualization with graph-based entity mapping. Used by LE and corporate investigators.
Features: Graph-based link analysis, automated data enrichment, 100+ data sources, social network mapping, company research, phone/email lookup, IP intelligence
Free tier: Limited queries per month
Best for: Complex investigations requiring relationship mapping
Cloud-based automated OSINT reconnaissance platform. Correlates data from 200+ modules: domains, IPs, emails, names, phone numbers. Generates investigation graphs and exportable reports. Self-hosted open-source version also available.
Features: 200+ data modules, automated reconnaissance, investigation graphs, scheduled scans, API access, exportable reports
Open Source: github.com/smicallef/spiderfoot
Best for: Automated footprint mapping and continuous monitoring
AI-powered predictive intelligence platform designed for behavioral modeling and analytical forecasting. Leverages machine learning to identify patterns across datasets and generate probabilistic insights.
Best Used For: Behavioral forecasting, risk modeling, and predictive investigative analysis.
Enhances investigative search capabilities using AI-driven contextual understanding. Refines queries to uncover hidden relationships, semantic links, and pattern-based correlations beyond traditional keyword search.
Best Used For: Advanced semantic search and uncovering non-obvious data relationships.
AI-driven Reddit intelligence tool that analyzes user behavior, post history, sentiment, and subreddit network mapping. Processes billions of posts to identify behavioral patterns and community affiliations.
Best Used For: Reddit profile investigations, sentiment analysis, and subreddit ecosystem mapping.
Direct access to government databases, court records, and official registries. No middleman data brokers. These are primary sources.
Client-side investigation notebook for structuring raw notes into entities, timelines, sources, and conflict alerts. Deterministic processing with no external dependencies.
Built within The OSINT Vault
Direct access to U.S. federal court documents, case filings, and dockets. Official government system. $0.10 per page, free up to $30 per quarter.
Access to millions of U.S. court records, including civil, criminal, and federal filings. Aggregates court data from multiple jurisdictions into a searchable interface.
Best Used For: Searching U.S. court cases, litigation history, and legal records.
Access to federal and state court opinions, oral arguments, and PACER data. Widely used for legal research and judicial analysis. Maintained by Free Law Project.
Best Used For: Case law research, judicial opinion tracking, and federal court monitoring.
Python-based tool that automates extraction of structured data from court websites. Supports analysts performing large-scale judicial record collection.
Best Used For: Bulk scraping and structured extraction of court records.
Most U.S. states maintain free searchable databases for criminal and civil cases. Search by name, case number, or party. Each state operates its own system.
Official U.S. government registry. Search registered sex offenders across all states. Includes photos, addresses, and conviction details.
Most counties provide free online access to property ownership records, tax assessments, and sale history. Direct access to assessor databases.
World's largest open database of companies. Search 200+ million companies across jurisdictions. Track officers, filings, ownership.
The Center for Public Accountability provides investigative research into corporate and institutional influence. Offers transparency data useful in financial and influence investigations.
Best Used For: Corporate transparency research and institutional investigation.
Each U.S. state maintains official business entity databases. Search LLC registrations, corporation filings, and registered agent information.
Public data aggregation platform. Search phone numbers, emails, usernames across multiple open-source intelligence databases.
Global sanctions database. Search politically exposed persons (PEPs), criminal watchlists, and anti-money laundering data from official sources worldwide.
Professional-grade OSINT and risk-analysis platform used by investigators to aggregate public data across multiple sources. Subscription-based investigative tool.
Tools for uncovering the information stored inside documents, images, and other files. Organized, dependable extraction for investigative clarity.
Read, write, and edit metadata in images, videos, PDFs. Extract GPS coordinates, camera info, timestamps, author names.
Crawl websites and extract metadata from Office documents, PDFs. Finds usernames, software versions, network paths.
Online metadata viewer. Upload images, documents, or videos to extract hidden data. No installation required. Works in browser.
Tools for discovering infrastructure details, technology stacks, and digital footprints not visible on the surface.
B2B contact database. Company hierarchies, decision makers, direct dials. Enterprise pricing, expensive but comprehensive.
Email finder and verification API. Domain search returns all public email addresses. Email pattern detection and deliverability checks.
curl "https://api.hunter.io/v2/domain-search?domain=example.com&api_key=YOUR_KEY"
A powerful asset discovery and intelligence engine designed for scanning and cataloging internet assets across a wide range of sources.
Note: Strong for asset discovery and mapping external exposure at scale.
An AI-powered OSINT search engine delivering rapid intelligence across open sources, supporting investigations, threat analysis, and corporate security.
Note: Best when you want broad OSINT coverage quickly before deeper pivots.
Identify any vehicle using AI. Upload an image and the system will instantly recognize the make, model, year, and additional vehicle attributes. Offers both free and paid tiers.
Note: Useful when you have only an image and need make/model context fast.
Search globally across all of GitHub or restrict queries to specific repositories or organizations to discover code, indicators, configurations, or exposed elements.
Note: Great for finding exposed strings, configs, and reuse across repos.
Search US government research funding. Find grants, principal investigators, institutions, publications, patents from NIH-funded research.
European Commission research database. Find EU-funded projects, participants, publications, results from Framework Programmes.
Largest collection of dissertations and theses. Free previews, full access through libraries. Find academic research by author or topic.
Search local government databases for property records, court filings, business licenses, permits. Every county has different online systems.
Search code, commits, issues, repos with advanced filters. Find API keys, credentials, personal info accidentally committed. Filter by date, language, user.
filename:.env OPENAI_API_KEYuser:username passwordextension:py import requestsTools for accessing historical versions of web content, tracking changes, and recovering deleted information.
Create permanent snapshots of web pages. Search for archived versions of deleted content. Captures complete pages including dynamic elements.
Search across multiple web archives simultaneously. Aggregates results from Internet Archive, Archive.today, and other archival services.
Programmatic access to the Internet Archive's Wayback Machine index. Query all archived snapshots for any URL. Returns timestamps, status codes, MIME types. Essential for automated archive research and tracking historical changes at scale.
Example Query:
curl "https://web.archive.org/cdx/search/cdx?url=example.com/*&output=json&limit=100"
Parameters: url, from, to, limit, output (json/text), filter, collapse
Tools for analyzing browser characteristics, device information, and digital fingerprints left during online activity.
Advanced browser fingerprinting detector. Analyzes canvas, WebGL, audio, fonts, and other fingerprint vectors. Open-source testing tool.
Check how unique your browser fingerprint is. Analyzes plugins, screen resolution, timezone, fonts, and other identifying characteristics.
Displays detailed device and browser information. Shows what data websites can collect about your system and network.
Direct access to official corporate registries, SEC filings, and business entity databases.
U.S. Securities and Exchange Commission database. Access all public company filings, financial statements, and regulatory documents.
Meta's social media analytics platform. Track public content performance across Facebook, Instagram, Reddit. Requires application and approval.
International Consortium of Investigative Journalists database. Search Panama Papers, Paradise Papers, and other offshore leak investigations. Track shell companies and hidden wealth.
Free VIN lookup from NICB. Check if vehicle was reported stolen or has salvage title.
Official U.S. government VIN decoder. Identifies vehicle specifications, manufacturer details, and recall information. Direct access to NHTSA database.
Aggregates public property records from county assessors. Shows ownership history, sale prices, and tax assessments. Free access to most data.
Find where images appear online. Track down original sources, find higher resolution versions, identify people and places.
Reverse image search with oldest and newest sorting. Find image modifications, track usage, locate sources.
Russian search engine with excellent face recognition. Often finds results Google misses, especially for Eastern European content.
Browser extension for video verification. Fragment videos, reverse image search frames, analyze metadata. Essential for journalists.
Extract upload time, thumbnail images from YouTube videos for verification and reverse image searching.
Sun position calculator for photo/video geolocation. Analyze shadows in images to estimate time of day, verify claimed locations, or narrow down photo dates. Essential for chronolocation and verifying when images were taken.
Digital image forensics tool. Error Level Analysis (ELA) to detect photo manipulation. Identifies edited regions, cloning, splicing. Also extracts hidden EXIF metadata. Essential for verifying image authenticity.
Visual link analysis for OSINT investigations. Map relationships between people, companies, domains, IPs. Free version has limited transforms.
Startup and company information. Funding rounds, investors, key people, competitors. Free basic search, paid for exports.
Advanced LinkedIn search and filtering. Boolean searches, company insights, org charts. Business subscription required.
Create permanent snapshots of web pages. Search for archived versions of deleted content. Unlike Wayback Machine, captures complete pages.
Search multiple cache sources at once. Checks Google Cache, Wayback Machine, Archive.is from one interface.
View Google's cached version of any page. Add "cache:" before URL or click dropdown next to search result.
Google Dorking is the practice of using advanced search operators to extract precise, publicly available information from the internet. Investigators, journalists, researchers, and security analysts use it to find what others miss. It's powerful — and surprisingly open.
Google Dorking uses advanced operators in Google Search to narrow results based on file type, page content, title, URL structure, and more. Used correctly, it can surface hidden data, public records, login portals, forgotten documents, and exposed endpoints.
Limits results to specific file types like PDF, DOC, XLS, TXT, SQL, and more.
filetype:pdf cybersecurity
Finds pages with specific keywords in the URL structure.
inurl:login site:example.com
Searches for keywords within page content/body text.
intext:"password reset"
Matches specific keywords in page titles.
intitle:"index of" backup
Shows pages that link to a specific URL.
link:example.com
Limits search to a specific domain or extension (.edu, .gov, etc.).
site:.edu "login"
Shows Google's cached version of a page.
cache:example.com
Finds websites similar to the specified URL.
related:example.com
Displays information about a specific URL.
info:example.com
Returns definitions from various sources.
define:cybersecurity
All specified words must appear in the page title.
allintitle:cybersecurity tips
All specified words must appear in the URL.
allinurl:admin login
Target educational institutions for publicly exposed contact info and directories.
site:.edu "phone number"
site:.edu student "phone number"
Find login pages and admin portals on specific domains.
inurl:edu "login"
intitle:"login" site:example.com
Locate vBulletin-powered forums on educational, government, and military domains.
"powered by vbulletin" site:.edu
"powered by vbulletin" site:.gov
"powered by vbulletin" site:.mil
Find forum registration pages on institutional domains.
inurl:.edu "register forum"
inurl:.gov "register forum"
Google can help surface public Facebook profiles using key identifiers like usernames, emails, or name + location.
site:facebook.com "[username]"
site:facebook.com "[email]"
site:facebook.com "[John Doe]" "New York"
Facebook's old Graph Search is gone, but some URL patterns still work for public search.
facebook.com/search/str/[query]/keywords
facebook.com/search/str/John%20Doe/keywords
Pair phone numbers with context phrases to surface exposed contact data on Facebook.
site:facebook.com "[123-456-7890]"
site:facebook.com "contact me"
Key use cases for Google Dorking in professional contexts:
Essential browser extensions that enhance your investigation workflow. Quick access to OSINT tools, data extraction, and automated reconnaissance directly from your browser.
Identifies technologies used on websites - CMS, frameworks, analytics tools, server software, CDN, payment processors. Essential for profiling target infrastructure.
Reveals website technology stack including widgets, analytics, hosting, CMS, advertising networks. More comprehensive than Wappalyzer for some categories.
View image metadata directly in your browser. Right-click any image to see EXIF data including camera model, GPS coordinates, timestamps, and software used.
Right-click any image to instantly search it on Google, Yandex, TinEye, Bing, and Baidu. Save time by accessing multiple reverse image search engines from one menu.
Reverse image search across 30+ search engines with one click. Supports Google, Bing, Yandex, TinEye, plus region-specific engines. More comprehensive than RevEye.
Spoof your browser's user agent to appear as different browsers, devices, or bots. Useful for accessing mobile-only content or bypassing basic detection.
Quickly access archived versions of any webpage. See historical snapshots, track changes over time, and recover deleted content from Internet Archive.
Highlight and analyze text on any webpage. Extract emails, IP addresses, phone numbers, cryptocurrency addresses. Includes instant lookups and pivot tools.
Context menu with 150+ OSINT tools. Highlight text (usernames, emails, IPs, domains) and right-click to instantly search across multiple platforms.
Created by Michael Bazzell. Collection of custom search engines for Facebook, Twitter, Instagram, LinkedIn, and more. Includes advanced query builders.
Displays detailed information about websites - IP address, location, hosting provider, domain registrar, DNS records. One-click access to WHOIS data.
Search IOCs (indicators of compromise) directly from selected text. Supports IP addresses, domains, URLs, hashes, CVEs, Bitcoin addresses across 70+ engines.
Extract all links from a webpage into organized lists. Filter by domain, file type, or pattern. Export to CSV or clipboard for further analysis.
Automatically detect and extract data from web pages into structured tables. Scrape listings, profiles, search results without coding. Export to CSV or Excel.
Block trackers, force HTTPS connections, see website privacy ratings. Useful for understanding what data websites collect during investigations.
Mass download manager. Download all images, videos, or files from a page with filters. Essential for archiving evidence or collecting media from targets.
Download videos from websites including YouTube, Facebook, Twitter, Vimeo. Capture video evidence that might be deleted later. Supports 1000+ sites.
Save complete web pages as single HTML files including CSS, images, fonts. Perfect for preserving evidence - everything is embedded, no external dependencies.
Capture full-page screenshots even on long scrolling pages. Save as PDF, PNG, or JPEG. Annotate screenshots before saving. Essential for documenting investigations.
Official Shodan browser extension. Shows IoT devices, open ports, vulnerabilities, and historical data for any IP you visit. Requires paid Shodan account for full features.
Extract all email addresses from any webpage instantly. Export to CSV or copy to clipboard. Useful for contact discovery and lead generation.
Open multiple URLs at once from a list. Paste dozens of links and open them in separate tabs. Speeds up investigation workflows significantly.
Copy URLs of all open tabs to clipboard with one click. Export tab lists for documentation or sharing with team members. Various format options.
Automatically remove tracking elements from URLs. Clean links before sharing or archiving. Prevents tracking parameters from revealing your investigation.
View, edit, create, and delete cookies. Essential for session analysis, understanding tracking mechanisms, and testing authentication flows.
GeoSpy is an advanced AI-powered geolocation platform designed for enterprise and law enforcement use. It delivers meter-level accuracy using state-of-the-art computer vision, even with low-context images.
Current DNS records only show where a domain points NOW. Passive DNS databases record historical changes. Use SecurityTrails or DNSDumpster to see:
Why it works: People often move domains but leave traces. Historical DNS can reveal connections they thought were hidden.
Telegram doesn't require phone numbers to search users. Key techniques:
Tools: Use @username_to_id_bot to get numeric user IDs. Check recent message timestamps to see when someone's active.
Advanced Boolean search operators most people don't know:
title:(VP OR Director) AND company:Microsoft NOT title:Assistant
school:"Stanford University" AND company:(Google OR Meta) AND title:Engineer
profile_language:en AND location:"San Francisco Bay Area" AND past_company:Apple
Pro tip: Use parentheses for complex queries. Combine current_company and past_company to map career paths.
TikTok usernames can be changed but the profile URL numeric ID stays permanent. Finding someone who changed their username:
site:tiktok.com "@oldusername"WiGLE database maps WiFi networks and their physical locations worldwide. If you have:
You can find approximate physical location. Useful when investigating where photos were taken based on visible WiFi networks.
URL: wigle.net
Don't just look at cached pages. COMPARE them:
Tool: CachedView pulls from multiple cache sources simultaneously.
Don't just reverse search once. Chain your searches:
Why it works: Original images propagate across the internet. Each search engine indexes different corners of the web.
Creating believable fake accounts for investigation requires discipline:
Warning: Check your jurisdiction's laws on digital impersonation.
Even with VPN/Tor, your browser has a unique fingerprint. Test and reduce it:
Cloudflare hides origin servers. Techniques to find the real IP:
Advanced Google search operators to find leaked information:
site:pastebin.com "password" "@company.com"
filetype:pdf "confidential" site:target.com
intitle:"index of" "parent directory" "config.php"
inurl:"/admin/login.php" site:*.edu
site:linkedin.com "email" "@target.com" AND "mobile"
Explanation: Combine operators to narrow down exposed files, login pages, directory listings, and contact info.
Companies use predictable email formats. Once you know one email, you can guess others:
Bonus: Email permutation tools like EmailHippo generate all possible formats.
Even with GPS data stripped, photos reveal location through visual clues:
Tools: GeoGuessr skills transfer here. Cross-reference with Google Street View.
Audio files contain hidden metadata and forensic traces:
Free tool: Audacity (spectrogram view) and Sonic Visualiser
Phone numbers reveal more than you'd think:
CLI tool: PhoneInfoga automates most of this.
Current WHOIS data is often privacy-protected. Historical WHOIS reveals original owners:
Sensitive data gets dumped to paste sites regularly:
Google dork: site:pastebin.com "@targetdomain.com"
Shortened URLs hide the destination. Expand them safely:
curl -sI shortened-url | grep -i locationSecurity tip: Never click shortened URLs directly. Always check destination first.
Crypto transactions are public. Track wallet activity:
Tools: OXT.me (Bitcoin), Chainalysis Reactor (pro), GraphSense
Find someone's research, publications, collaborations:
This is a curated hub of OSINT tools organized for accuracy and ease of use. Everything is structured cleanly so investigators can find what they need without noise or clutter. Clear layout. Reliable resources. A straightforward space designed for real investigative workflows.
Start with three foundational OSINT tools ideal for new investigators:
Code exposure & repository pivots.
Self-assessment quiz with 10 real OSINT investigation scenarios. Test your knowledge of tools and techniques. Automated scoring with completion certificate for perfect scores. Immediate feedback on your performance.
Command-line challenge quiz with 10 CLI questions. Test your knowledge of Sherlock, Nmap, grep, curl, ExifTool, and other OSINT command-line tools. Automated scoring with certificate for perfect scores.
Visual mind-map of OSINT resources organized by category. Navigate through hundreds of tools by use case: username, email, domain, social networks, people search, and more. Interactive tree structure lets you explore categories and discover tools you didn't know existed.
Curates investigative tools across multiple intelligence disciplines. Acts as a discovery resource for analysts expanding their toolkit. Maintained by professional OSINT vendor.
Best Used For: Finding and exploring additional OSINT tools.
Founded and operated by Nicole Hurey, creator of ParadoxIndex.com. Nicole builds proprietary OSINT tools, investigative workflows, and intelligence systems used by analysts, researchers, and digital investigators worldwide.
Contact: nicole@paradoxindex.com · theosintvault@gmail.com
Follow on LinkedIn
A browser-based OSINT platform offering proprietary tools, workflows, and curated intelligence resources for investigators and analysts.
Yes — all core tools on The OSINT Vault are free and accessible directly in your browser.
The platform was founded and operated by Nicole Hurey, an OSINT tool developer and investigative workflow designer.
They support reconnaissance, digital footprinting, people search, metadata analysis, reporting, and structured intelligence gathering.
Social Footprint Mapping
If a person exists online, these tools help surface the activity and patterns they leave behind. Structured, consistent, and easy to interpret.
Social Searcher
FreemiumReal-time social media search. Monitor mentions across Twitter, Facebook, Instagram, YouTube, Reddit, and more.
IntelX (Intelligence X)
FreemiumSearch engine for data leaks, breaches, and the darknet. Paid subscription for unlimited searches and exports.
Followerwonk
FreemiumTwitter analytics and search. Find people by bio keywords, compare followers, analyze activity patterns.
Twint
FreeAdvanced Twitter scraping tool. Bypass API limits, scrape tweets, followers, following, likes without authentication.
SocialNet by ShadowDragon
ProfessionalAPI-driven OSINT platform. Accessible via the Horizon web portal. Integrates with tools such as Maltego and i2. Best suited for structured social network analysis and API-based correlation.
Social Blade
FreeTrack statistics and analytics for YouTube, Twitch, Instagram, Twitter creators. View subscriber counts, follower growth history, estimated earnings, channel rankings. Useful for verifying influencer claims and tracking account growth patterns.