🔭TeleSpot OSINT lookup from Telephone number using DDGR + BING + GOOGLE + DEHASHED and uses pattern recognition correlations. NOW with TelespotX!
☆103Feb 26, 2026Updated last month
Alternatives and similar repositories for Telespot
Users that are interested in Telespot are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 📵 A windows desktop program designed for one thing; to help you remove your data from 50+ people-search sites at the source. No cloud, n…☆36Feb 18, 2026Updated last month
- A robust Python-based OSINT tool designed for validating and investigating email addresses across social media platforms and known data b…☆62Aug 6, 2025Updated 7 months ago
- MetaHarvest - is designed to extract rich, structured metadata from any given list of websites. It taps into web page contents to retriev…☆29Sep 16, 2025Updated 6 months ago
- NAIJA OSINT INTEL is a comprehensive open-source intelligence gathering tool specifically designed for Nigerian cybersecurity professiona…☆19Aug 21, 2025Updated 7 months ago
- Scripts created by AI Agents to use as tools for data collection. These are examples of Inforensics JITT (Just-In-Time Tool) Agent.☆14Jul 7, 2024Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Professional Phishing Awareness & Cybersecurity Education Platform☆24Oct 17, 2025Updated 5 months ago
- ☎️ xTELENUMSINT - A powerful new Chrome extension for Telephone OSINT (NUMSINT) that automates searches in Google using 10 different form…☆60Feb 26, 2026Updated last month
- Mine valuable information using advanced Google search queries known as Google Dorks.☆27Aug 11, 2025Updated 7 months ago
- ☆32Oct 11, 2025Updated 5 months ago
- A shellcode crypto-packing tool for PoC (used with msfvenom payloads)☆17Feb 10, 2023Updated 3 years ago
- Repository created to share information about tactics, techniques and procedures used by threat actors. Initially with ransomware groups …☆45Updated this week
- Rogue wifi AP with fake captive portal login page for pentesting with ESP32.☆12Jan 8, 2024Updated 2 years ago
- A list of OSINT resources and tools that may be useful to you when conducting investigations related to the United States of America. Thi…☆24Sep 9, 2025Updated 6 months ago
- Real-time and historical 3D visualization of ADS-B aircraft data with 7 visual themes, mini radar, and interactive controls☆28Mar 15, 2026Updated last week
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- 🌴 An internet traffic noise generater using a ton of random parameters including: using 30+ personas, 10 parallel generators, chaos theo…☆139Feb 26, 2026Updated last month
- PathShield is an anti-tracking tool for M5StickC Plus v1/2 that uses BLE & WiFI scanning to detect and alert you to devices following you…☆44Jan 19, 2026Updated 2 months ago
- A lightweight redirector for Google Cloud Run, enabling domain fronting via Google-owned infrastructure.☆135Nov 12, 2025Updated 4 months ago
- DeepSearch is a powerful Python-based OSINT utility that leverages Google's advanced search operators to perform comprehensive digital fo…☆59Dec 24, 2025Updated 3 months ago
- A user-friendly Python toolkit for open source intelligence, providing key features such as image geolocation, social media profiling, em…☆319Sep 1, 2025Updated 6 months ago
- A dynamic, Flask-based web application providing a centralized interface for executing various open-source intelligence (OSINT) and cyber…☆43Sep 19, 2025Updated 6 months ago
- This program helps you convert any image into a cartoon for free. Cartoonize your images using this python code.☆23Jan 25, 2023Updated 3 years ago
- Allows control and monitoring of four cameras at the same time☆17Apr 10, 2024Updated last year
- ☆16Apr 9, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Mailer is python3 script use for sending spear-phishing to target email...It was created by Spider Anongreyhat☆30Apr 18, 2022Updated 3 years ago
- IoT Camera Reconnaissance and Live Viewer☆182Jul 30, 2024Updated last year
- BlackHat Asia 2025 code and presentations☆18Apr 13, 2025Updated 11 months ago
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Sep 24, 2024Updated last year
- Darkweb_Crawler - is an advanced, stealthy Python-based dark web intelligence platform designed for authorized security professionals and…☆122Feb 18, 2026Updated last month
- python and bash workaround for cell_search and srsue for SIB parsing☆20Feb 15, 2025Updated last year
- A very dangerous tool for termux.☆28Jun 11, 2024Updated last year
- Scan every stock listed on the Nasdaq to find those with daily inside bars for trading,☆13Dec 10, 2024Updated last year
- Real-time tracking of Steam players activities☆39Feb 7, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Examples of simple code patterns causing BOF☆14Apr 10, 2020Updated 5 years ago
- Exploit Android MSM8974 Chipset☆14Aug 20, 2015Updated 10 years ago
- A wifi scanning tamagotchi. Feed your pet by taking it to new places!☆29Feb 10, 2024Updated 2 years ago
- Bookmarklets created for OSINT applications☆23Oct 24, 2023Updated 2 years ago
- This CSS try to improve the Obsidian editor typogaphy.☆15Oct 16, 2021Updated 4 years ago
- Place to store my various exposed IoT cam-scanning work and info☆24Sep 25, 2023Updated 2 years ago
- A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and self‑deletion.☆65Aug 6, 2025Updated 7 months ago