The list of write-ups, articles, and PoC of various interesting in context of OSINT
☆23Mar 13, 2025Updated 11 months ago
Alternatives and similar repositories for information-disclosure-writeups-and-pocs
Users that are interested in information-disclosure-writeups-and-pocs are comparing it to the libraries listed below
Sorting:
- Search emails with Netlas.io☆20Aug 4, 2023Updated 2 years ago
- ☆34May 18, 2023Updated 2 years ago
- A template for standard Maltego transformation☆13Dec 8, 2021Updated 4 years ago
- Repository to track community hardware, data and funding.☆12Apr 8, 2022Updated 3 years ago
- Collections of services for search data from passengers lists and emigrants records☆12Jun 3, 2022Updated 3 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- Corporative registry worldwide catalog. 63 countries☆16Jun 24, 2022Updated 3 years ago
- Maltego transforms for Hunchly☆17Jun 9, 2025Updated 9 months ago
- Инструкции по бытовому каждодневному поиску☆15Oct 5, 2024Updated last year
- Processing PST/EML/MBOX mail archives for Investigative Research☆24May 11, 2024Updated last year
- Phishable is a project that logs misconfigured DNS that can be exploited to conduct phishing attacks & spoof domains. Phishable helps org…☆21May 1, 2023Updated 2 years ago
- ☆18Feb 25, 2025Updated last year
- A very simple tool that generates multiple spellings of a phone number (to effectively search for it using the OR operator and quotes)☆21Dec 30, 2021Updated 4 years ago
- Template for new OSINT command-line tools☆76Nov 25, 2024Updated last year
- ☆39Nov 24, 2022Updated 3 years ago
- URL / IP / Email defanging with Golang. Make IoC harmless.☆20Sep 9, 2025Updated 6 months ago
- Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve ca…☆17Aug 4, 2023Updated 2 years ago
- 📚 A Curated List of Awesome Telegram OSINT Tools, Sites & Resources☆23Dec 8, 2021Updated 4 years ago
- Curated list of well-developed C# Offensive Tools☆20Jan 30, 2020Updated 6 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- Phishing Abusing Microsoft 365 OAuth Authorization Flow☆24Dec 17, 2021Updated 4 years ago
- List of websites to search for court documents in different countries☆24Jun 1, 2022Updated 3 years ago
- OSINT tool to find info about your old pages.☆19Mar 19, 2022Updated 3 years ago
- ☁️ Curated Cloud OSINT resources — dorks, tools, and techniques for AWS, Azure, GCP, Oracle Cloud, and other major providers reconnaissan…☆115Feb 16, 2026Updated 3 weeks ago
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆30Nov 10, 2024Updated last year
- Wistalk : Analyze Wikipedia User's Activity☆25Jun 23, 2025Updated 8 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- Este repositório tem como objetivo centralizar as informações que foram compartilhadas nos vídeos do Youtube referente aos primeiros pass…☆40Jul 15, 2024Updated last year
- A command line tool that queries the Open Corporates Database and returns data on corporations under the copyleft Open Database License.☆33Jan 22, 2023Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Jul 7, 2022Updated 3 years ago
- 📊 Adana - 1-click analytical dashboard for OSINT researchers☆41Apr 23, 2024Updated last year
- List with File Extensions used by Ransomware☆37Updated this week
- A Ruby script that takes in IPs and returns Country, State, and City☆42May 1, 2022Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆38Feb 14, 2026Updated 3 weeks ago
- Maltego transformation for searching of accounts by username☆80Feb 15, 2022Updated 4 years ago
- Quick Cache and Archive search buttons☆39May 11, 2024Updated last year
- A simple simulator for modeling earth-to-space RFI attacks. Demonstrated at DEFCON 30.☆42Jul 19, 2023Updated 2 years ago
- 🔪 Dumper & ripper for Telegram bots by token☆225Dec 23, 2023Updated 2 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆41Nov 23, 2023Updated 2 years ago