Contains a list of OSINT tools, OSINT tips, datasets, Maltego transform and others. There are free and paid tools you can use and owner is not responsible (take your own risks), only for knowledge or educational purposes. Apologies if some of the resources are no longer available or contain errors, as the owner does not regularly check the status of these resources, thank you.
- Use virtual machine, fake host or docker machine
- Use private network e.g vpn, tor, p2p
- Use second account (not you real account)
- Read ToS the resouces
- Enable your firewall, AV and IDS on your host or machine
- Strict your browser with the privacy extension disable js, ads and more
- Dont upload your private files make sure you have clean personal file in folder
- Scan the files will you download
- Encrypt your network traffic, message and disk
- IT Security
- CTF Player
- Journalist
- Investigator
- Cyber Crime
- Researcher & Annalist
- Law Enforcer
- General
You can build it with VM or Live USB make sure you have sandbox machine
Artist string
Author string
Caption string
Categories string
Collections string
DateTime date
DPP lang-alt
EditStatus string
FixtureIdentifier string
Keywords string
Notes string
ObjectCycle string
OriginatingProgram string
Rating real
Rawrppused boolean
ReleaseDate string
ReleaseTime string
RPP lang-alt
Snapshots string
Tagged boolean
More : man exiftool (Run on your terminal)
Site :
- exiftool -tagname="string" file
example : exiftool -Author="Bayu" test.txt
you can add multiple tag and multiple file
- exiftool -tagname="" file
example : exiftool -Author="" test.txt
- exiftool -all="" file
example : exiftool -all="" file
#Usage : man exiftool or read documentation exiftool.org
Not there are tag no writetable, make sure tagname can write
Automated tool by David Bombal
Use fresh file, if your file has been compressed or edit metadata you got a default metadata You can use xmp format for edit, write and delete metadata Check the documentation
- Instagram Be carefull using this tool
- Tinfoleak
- SOCMINT tool
- Graph Search
- Alfred
- Blackbird
- sociallinks
- spokeo
- maigret
- social searcher
- seon
- inteltechniques
- SNSSCRAPE
- dreddown - social media downloader
- knowlesys
- Kaggle
- RAPID API Collection
- Exploit Database
- AWS open data
- Open Network
- WHO Data
- Gpt OSINT
- Humdata
- datasetsearch
- OSINT Collection
- Academic Torrent
- Torrent API
- API OSINT TORRENT
- Microsoft Building Fingerprints
- MAXAR Satellite imagery
- Satellite Collection
- Open measure
- Fiugis
- Earth ESA
- Google Public Data
- paperswithcode
- ID BPS
- ID data Kementrian & Lembaha Dataset
- ShadowDragon
- datasetlist
- roboflow
- databoks katadata ID
- Google Engine Dataset
- All world geojson data
- statista
- World Bank Open Data
Site and forums OSINT community arround world
- Bellingcat Discord
- Independent OSINT
- OSINT.Team
- Seccodeid Forum
- Reddit OSINT
- TraceLabs Discord
- IntelTechniques
- Google Group
- 4Chan
- boardreader
- maltego
- offensiveosint
- sizeof
- onniforums
- intelligencewithsteve
- SANS
- cybdetective
- secjuice
- sector35
- ohshint
- osintcombine
- osintteam
- KASE OSINT Scenario
- Sophia Santos
- Chromium Code Search
- Code Finder
- codefinder org
- Android Code Search
- CodeSeek
- Debian Code Search
- Scala
- SearchCode
- SourceCodeOnline
- Woboq
- publicwww
- DevsecOps Secure Code
- awesomeopensource
- nerdydata
- Github code search
- sourcegraph
- cybdetective code search
- Archie
- 4shared
- FileSearching
- File chef
- Global File Search
- Search Shared
- MMNT
- Pdf analyzer
- Tools pdf24
- Awario
- Brand24
- Samdesk
- Maltego social links
- Maltego Social Links Pro
- Social Searcher
- Social Analyzer
- SNSCRAPE - Scraper
- OSINT compass
- Phantom Buster
- Open measure
- huntintel
- Sherlock Eye
- clauneck
- ShadowDragon
- sociallinks
- Crimewall
- socialscan
- META crowdtangle
- drone emprit
- brandmentions
- Buffer
- Coosto
- Revive Social
- Social Analyzer
- Gpt OSINT
- SNSCRAPE - Scraper
- Phantom Buster
- huntintel
- Sherlock Eye
- clauneck
- ShadowDragon
- sociallinks
- Crimewall
- socialscan
- Better Whois
- whoishistory
- DNS History
- DNS Spy
- DNS Checker
- HackerTarget
- RedHunt Labs Attack Surface Recon API
- Shodan
- Wappalyzer
- Sudomy
- Testssl
- Nmap
- builtwith
- VirusTotal
- Nessus
- Nikto
- Webshag
- wayback machine
- Whoxy
- Farsight DNSDB Transforms for Maltego
- Web Screnshhot Maltego Transforms
- Nuclei
- Netcraft
- DNSX
- cachedview
- Zoomeye
- securitytrails
- hakrawler
- Dork Lab
- Websecreenshoot
- Leakos
- Pastos
- SNYK
- Similar Sites
- Similar Web
- spyonweb
- analyzeid
- Zeus-Scanner
- CloudFail
- Real IP Discover
- Mend Io
- whois request
- completedns
- dnsdumper
- A href Backlink Checker
- Neil Patel Backlink
- Semrush Backlink
- Small SEO Tool Backlink
- SEO Backlink Check
- Moz Backlink
- SPAM Check Score
- MOZ Spam Check
- WEB Check
- brightcloud ip lookup
- Url Filltering
- Katana
- chiasmod0n
- redirectdetective
- wheregoes
- spyoffers
- Web Leaked Credentials
- host tracker
- crt.sh
- merklemap.com
- view DNS
- visualping
- jam dev browser extension
- Whoxy Whois History
- whoisfreaks Whois History
- domaintools Whois History
- whoisxmlapi Whois History
- fofa
- nerdydata
- urlquery
- transparencyreport Google
- stat ripe
- favicon-hash
- FavFreak
- LeakIX
- vstat
- Unfurl
- VirusTotal
- Archive Org
- Iplocation
- Smallseotools
- Abuse IP
- Check Phish
- Radar By Cloudflare
- Is it Phishing
- Kaspersky
- PolySwarm
- Threat Miner
- Netcraft
- Malwareworld
- DNS TWIST
- URL CRAZY - Phishing detector
- CRT - Find cert ssl and etc
- Phishing catcher
- Open Phish
- Phishtalk
- URL Haus
- Expand Url
- Tiny Scan
- redirectdetective
- wheregoes
- spyoffers
- vx-underground
- ShadowDragon
- metadefender
- fofa
- safeweb norton
- haveibeensquatted
- Apility.io
- Alien Vault
- AutoShun
- Blacklist Check Tool
- Censys
- CVE Details
- IBM X-Force Exchange
- JoeSandbox Cloud
- Is It Hacked?
- Is It Phishing
- Kaspersky Threat
- Malware Domain List
- Malware URL Website
- Quttera
- Virus total
- Virus Share
- Web Cookies Scanner
- Yara
- Yara Hub
- Spiderfoot
- NVD
- Seclist
- CVE Mitre
- Malicious Check
- Email Header Analysis
- Email-Analytics
- Email Header Analisis Toolbox
- Url Scan
- AnyRun
- Hybrid Analysis
- VMRay Sandbox
- Browser Sandbox
- Fillter Bypass
- Abuse IP DB
- Talos CTI
- Phishing Analysis Tool
- Phish Verification System
- PolySwarm
- ThreatCrowd
- HYAS Insight
- Phishstats
- GitGuardian
- Rescure
- PolySwarm
- Darkfeed
- Header Email
- Badan Pemeriksa APK
- SPAMHAUS
- Spiderfoot HX You must have account
- Flare
- Malwareworld
- DNS TWIST
- URL CRAZY - Phishing detector
- CRT - Find cert ssl and etc
- Phishing catcher
- Blackite
- Open Phish
- Phish Talk
- Threat Feeds
- Threat Miner
- Intel OWL
- RiskIQ
- LOKI
- Mandiant
- Mend Io
- TRIAGE
- EML Analyzer
- Cyber Chef
- Expand Url
- Wanna Browser Sandbox
- pestudio
- procmon
- C2-Tracker
- malpedia
- vx-underground
- shellpub
- qianxin
- CAPA MANDIANT
- ShadowDragon
- decompiler
- deepdarkCTI
- metadefender
- CTX
- SNYK
- Github advisoreis
- Openwall
- Falcon Feeds
- filescan
- urlquery
- transparencyreport google
- trustpositif Kominfo ID
- Malware Bazaar
- tria
- safeweb norton
- threatbook
- pulsedive
- cuckoo
- LeakIX
- Binary Edge
- Shodan
- Shodan Filters
- Shodan Scripts
- Kamerka
- airportwebcams
- Earthcam
- tvway
- Cameraftp
- Insecam
- Webcams
- Molecool CCTV and Nearby
- Calculator IPVM
- webcamtaxi
- weatherbug
- CCTV location tracking
- Rusia pub CCTV
- lIVE CAM beach Australia
- webcamcse cipher387
- Whats my ip This tools can show your ip address isp provider
- Ip 2 location This tools can show your ip address isp provider and geo location
- unwiredlabs Dataset about IP around world
- Wigle Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers
- Fing Net Scan
- Wifianalyzer
- Signalmonitoring
- Angry Ip
- Advanced ip scanner
- Wifimap
- Fon
- SolarWInds
- wifispc
- wificafespots
- openwifimap
- unwiredlabs
- cellphonetrackers wifi tracker
- mylnikov BSSID Public API
- wifidb
- combain
- freifunk
- GONZOsint- geowifi
- bgp
Tips
You can find the file hash or other threat indicator
- Alien Vault
- Exploit db
- AT&T
- Yara
- Yara Hub
- Virustotal
- Joesandbox
- Spiderfoot
- Open CTI
- Solarwinds
- VMware Carbon Black Endpoint
- Insightidr
- MISP
- NVD
- Seclist
- CVE Mitre
- Whois Record
- Abuse IP DB
- Talos CTI
- Darkfeed
- Flare
- Mihari
- Processhacker
- Koodous
- Blackite
- Open Phish
- Phish Talk
- Sophos
- Signature Base
- SIEM Rules
- Threat Feed
- Threat Connect
- Threat Miner
- Virus Share
- Intel OWL
- RiskIQ
- TypeDB
- Goosint
- Google APT search
- LOKI
- Mandiant
- IoC Editor
- CREST Threat Intel
- Intel471
- flashpoint
- pestudio
- procmon
- zerofox
- malpedia
- vx-underground
- shellpub
- qianxin
- CAPA MANDIANT
- ShadowDragon
- sociallinks
- decompiler
- deepdarkCTI
- metadefender
- CTX
- Falcon Feeds
- NetAlertX
- filescan
- Malware Bazaar
- greynoise
- darktrace
- threatbook
- pulsedive
- cuckoo
- polyswarm
- recordedfuture
- Dorklab
- Ominis-Osint
- Go Dork
- Dorkish
- Dork Collection
- Fast Dork Scan
- Shodan Quries
- List Dork
- CENSYS Queries
- Google Dork Simplified
- Gdorks
- cybdetective pastebin
- NAMINT
- BullsEye0 dorks
Dorking is a wonderful thing, you can use this technique to search for anything such as index of a website, looking for live online camera server and other specifics, as for dorking commands that you can do for example
- intitle: Search for specific titles
- inurl: Search for specific urls or paths
- intext: Search for specific words or contects
- filetype: Search for files
- site: Search from a specified target
- Wildcard or symbol * (star) Find all web pages, for example: seccodeid*
- Define:term Search for all things with specified terms, example define:seccodeid
- cache page Take a snapshot of an indexed page. Google uses this to find the right page for the query you're looking for. Website or target specifically
- allintext: Searches for specific text contained on a web page
- allinurl: Find various keywords in a URL
- allintitle: Restricts results to those containing all terms specified in a title
- link: List of web pages that have links to the specified URL
- (|) Pipe. This is a logical operator, | "tips" will show all the sites which contain either, or both words
- (+) Used to concatenate words, useful to detect pages that use more than one specific key
- (-) Minus operator avoids showing results that contain certain words, e.g. security -trails will show pages that use "security" in their text, but not those that have the word "trails"
Example
".mlab.com password"
"access_key"
"access_token"
"amazonaws"
"api.googlemaps AIza"
"api_key"
"api_secret"
"apidocs"
"apikey"
"apiSecret"
"app_key"
"app_secret"
"appkey"
"appkeysecret"
"application_key"
"appsecret"
"appspot"
"auth"
"auth_token"
"authorizationToken"
"aws_access"
"aws_access_key_id"
"aws_key"
"aws_secret"
"aws_token"
"AWSSecretKey"
"bashrc password"
"bucket_password"
"client_secret"
"cloudfront"
"codecov_token"
"config"
"conn.login"
"connectionstring"
"consumer_key"
"credentials"
"database_password"
"db_password"
"db_username"
"dbpasswd"
"dbpassword"
"dbuser"
"dot-files"
"dotfiles"
"encryption_key"
"fabricApiSecret"
"fb_secret"
"firebase"
"ftp"
"gh_token"
"github_key"
"github_token"
"gitlab"
"gmail_password"
"gmail_username"
"herokuapp"
"internal"
"irc_pass"
"JEKYLL_GITHUB_TOKEN"
"key"
"keyPassword"
"ldap_password"
"ldap_username"
"login"
"mailchimp"
"mailgun"
"master_key"
"mydotfiles"
"mysql"
"node_env"
"npmrc _auth"
"oauth_token"
"pass"
"passwd"
"password"
"passwords"
"pem private"
"preprod"
"private_key"
"prod"
"pwd"
"pwds"
"rds.amazonaws.com password"
"redis_password"
"root_password"
"secret"
"secret.password"
"secret_access_key"
"secret_key"
"secret_token"
"secrets"
"secure"
"security_credentials"
"send.keys"
"send_keys"
"sendkeys"
"SF_USERNAME salesforce"
"sf_username"
"site.com" FIREBASE_API_JSON=
"site.com" vim_settings.xml
"slack_api"
"slack_token"
"sql_password"
"ssh"
"ssh2_auth_password"
"sshpass"
"staging"
"stg"
"storePassword"
"stripe"
"swagger"
"testuser"
"token"
"x-api-key"
"xoxb "
"xoxp"
[WFClient] Password= extension:ica
access_key
bucket_password
dbpassword
dbuser
extension:avastlic "support.avast.com"
extension:bat
extension:cfg
extension:env
extension:exs
extension:ini
extension:json api.forecast.io
extension:json googleusercontent client_secret
extension:json mongolab.com
extension:pem
extension:pem private
extension:ppk
extension:ppk private
extension:properties
extension:sh
extension:sls
extension:sql
extension:sql mysql dump
extension:sql mysql dump password
extension:yaml mongolab.com
extension:zsh
filename:.bash_history
filename:.bash_history DOMAIN-NAME
filename:.bash_profile aws
filename:.bashrc mailchimp
filename:.bashrc password
filename:.cshrc
filename:.dockercfg auth
filename:.env DB_USERNAME NOT homestead
filename:.env MAIL_HOST=smtp.gmail.com
filename:.esmtprc password
filename:.ftpconfig
filename:.git-credentials
filename:.history
filename:.htpasswd
filename:.netrc password
filename:.npmrc _auth
filename:.pgpass
filename:.remote-sync.json
filename:.s3cfg
filename:.sh_history
filename:.tugboat NOT _tugboat
filename:_netrc password
filename:apikey
filename:bash
filename:bash_history
filename:bash_profile
filename:bashrc
filename:beanstalkd.yml
filename:CCCam.cfg
filename:composer.json
filename:config
filename:config irc_pass
filename:config.json auths
filename:config.php dbpasswd
filename:configuration.php JConfig password
filename:connections
filename:connections.xml
filename:constants
filename:credentials
filename:credentials aws_access_key_id
filename:cshrc
filename:database
filename:dbeaver-data-sources.xml
filename:deployment-config.json
filename:dhcpd.conf
filename:dockercfg
filename:environment
filename:express.conf
filename:express.conf path:.openshift
filename:filezilla.xml
filename:filezilla.xml Pass
filename:git-credentials
filename:gitconfig
filename:global
filename:history
filename:htpasswd
filename:hub oauth_token
filename:id_dsa
filename:id_rsa
filename:id_rsa or filename:id_dsa
filename:idea14.key
filename:known_hosts
filename:logins.json
filename:makefile
filename:master.key path:config
filename:netrc
filename:npmrc
filename:pass
filename:passwd path:etc
filename:pgpass
filename:prod.exs
filename:prod.exs NOT prod.secret.exs
filename:prod.secret.exs
filename:proftpdpasswd
filename:recentservers.xml
filename:recentservers.xml Pass
filename:robomongo.json
filename:s3cfg
filename:secrets.yml password
filename:server.cfg
filename:server.cfg rcon password
filename:settings
filename:settings.py SECRET_KEY
filename:sftp-config.json
filename:sftp-config.json password
filename:sftp.json path:.vscode
filename:shadow
filename:shadow path:etc
filename:spec
filename:sshd_config
filename:token
filename:tugboat
filename:ventrilo_srv.ini
filename:WebServers.xml
filename:wp-config
filename:wp-config.php
filename:zhrc
HEROKU_API_KEY language:json
HEROKU_API_KEY language:shell
HOMEBREW_GITHUB_API_TOKEN language:shell
jsforce extension:js conn.login
language:yaml -filename:travis
msg nickserv identify filename:config
org:Target "AWS_ACCESS_KEY_ID"
org:Target "list_aws_accounts"
org:Target "aws_access_key"
org:Target "aws_secret_key"
org:Target "bucket_name"
org:Target "S3_ACCESS_KEY_ID"
org:Target "S3_BUCKET"
org:Target "S3_ENDPOINT"
org:Target "S3_SECRET_ACCESS_KEY"
password
path:sites databases password
private -language:java
PT_TOKEN language:bash
redis_password
root_password
secret_access_key
SECRET_KEY_BASE=
shodan_api_key language:python
WORDPRESS_DB_PASSWORD=
xoxp OR xoxb OR xoxa
s3.yml
.exs
beanstalkd.yml
deploy.rake
.sls
AWS_SECRET_ACCESS_KEY
API KEY
API SECRET
API TOKEN
ROOT PASSWORD
ADMIN PASSWORD
GCP SECRET
AWS SECRET
"private" extension:pgp
intext:"hacking" site:seccodeid.com
inurl:login site:seccodeid.com
intext:username filetype:log
site:www.github.com ext:doc | ext:docx | ext:odt | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv
PRO TIPS!
You can add other headers, regex and search engine endpoints for refinement and to encode queries
- BING SEARCH
WEB
for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0" "https://www.bing.com/search?pglt=2081&q=.php?id=" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep ".php?id" | sort -u ;done
Hunt Username
for ((i=1;1<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0;Accept: */*;Accept-Language: id,en-US;q-0.7,en;q-0.3;Accept-Encoding: gzip, deflate, br;Referer: https: //www.bing.com/;DNT: 1;Connection: keep-alive;Cookie: 1P_JAR=2023-11-05-19;Sec-Fetch-Dest:empty;Sec-Fetch-Mode:cors;Sec-Fetch-Site: same-origin;TE: trailers" "https://www.bing.com/search?pglt=2081&q=Jieyab89" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep -E "Jieyab89|github" | sort -u ;done
Hunt Username
for ((i=1;1<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0;Accept: */*;Accept-Language: id,en-US;q-0.7,en;q-0.3;Accept-Encoding: gzip, deflate, br;Referer: https: //www.bing.com/;DNT: 1;Connection: keep-alive;Cookie: 1P_JAR=2023-11-05-19;Sec-Fetch-Dest:empty;Sec-Fetch-Mode:cors;Sec-Fetch-Site: same-origin;TE: trailers" "Your Bing Request URL Header" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep -E "Jieyab89|github" | sort -u ;done
- GOOGLE SEARCH
Hunt Username
for ((i=1;1<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/119.0;Accept: */*;Accept-Language: id,en-US;q-0.7,en;q-0.3;Accept-Encoding: gzip, deflate, br;Referer: https: //www.google.com/;DNT: 1;Connection: keep-alive;Cookie: 1P_JAR=2023-11-05-19;Sec-Fetch-Dest:empty;Sec-Fetch-Mode:cors;Sec-Fetch-Site: same-origin;TE: trailers" "https://www.google.com/search?sourceid=chrome-psyapi2&ion=1&espv=2&ie=UTF-8&start=${i}0&q=Jieyab89" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep -E "Jieyab89|github" | sort -u ;done
WEB
for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Windows NT 10.0; rv:68.0) Gecko/20100101 Firefox/68.0" "https://www.google.com/search?sourceid=chrome-psyapi2&ion=1&espv=2&ie=UTF-8&start=${i}0&q=.php?id=" | grep -Eo 'href="[^\"]+"' | grep -Po "(http|https)://[a-zA-Z0-9./?=_%:-]*" | grep ".php?id" | sort -u ;done
- us.searchboth.net
- Archive.org
- Yandex
- Pastebin
- Topix.com
- search.carrot2.org/stable/search
- Shodan
- Piratebays
- Onesearch
- Searchencrypt
- Duckgo
- Waymore
- StartPage
- Searx
- CommonCrawl
- Similar Sites
- Zap Meta
- Carrot Search
- Goo Search
- swisscows
- odp
- Yiipy Search
- webarchiveviewer
- duckduckgo Bangs
- mediasova
- mojeek
- boardreader
- Geoint CSE search
- lolarchiver
- DMCA Lumen DB
- Wayback Machine
- Intelligence X
- Openlibrary
- Archive Fo
- UKWA
- Archive today
- Waymore
- Cached Pages
- cachedview
- ArchivEye
- Twitter Archive
- Archive Today
- Wayback Downloader
- How to archive tele content
- webarchiveviewer
- ShadowDragon
- lolarchiver
- Time Travel
- Dehashed
- Haveibeenpwned
- Intelligence X
- Wiki Leaks
- DDO Secrets
- Breached Availabe on Darkweb
- Stealthmole
- Doxbin
- Search0t
- Search0t MAP
- What Breach
- Breach Directory
- Snusbase
- Flare
- Leaklookup
- Pastos
- Blackkite
- Facebook Data Breach Cheker
- pwnedOrNot
- Intel471
- Maltego Transform ShadowDragon
- offshoreleaks
- proxynova password breach
- WhiteIntel
- Leaked Domain
- cybdetective pastebin
- emploleaks
- databreaches
- lolarchiver
- Leakcheck
- exposed
- oathnet
- sn0int pwndb-domains
- sn0int pwndb-emails
- SCI HUB This domain will always change, check the mirror Mirror
- Z-Library
- DOAJ (Directory of Open Access Journals)
- LibGen (Library Genesis)
- ScienceOpen
- CORE
- Unpaywall
- Wiley Online Library
- Open Access Button
- Libgen
- Ieee
- Sciencedirect
- Sinta
- Scopus
- Onesearch ID
- Z-Library
- DOAJ (Directory of Open Access Journals)
- LibGen (Library Genesis) 2
- ScienceOpen
- CORE
- Springer Support
- Springer link 2
- Academia.edu
- CyberLeninka
- Unpaywall
- ResearchGate
- Wiley Online Library
- Open Access Button
- Arjuna Kemdikbud ID
- Bima Kemdikbud ID
- Rama Kemdikbud ID
- Google scholar
- Publish or Perish
- mendeley
- Sciepub
- Anjani Kemdikbud ID Report person academic cheat
- Zotero
- ebsco
- gale
- hathitrust
- connectedpapers
- whois
- whois by hostinger
- Netcraft
- Hunter
- SignalHire
- Spiderfoot
- Spiderfoot HX You must have account
- Rocket Reach
- Glasdoor
- Indeed
- ZoomInfo
- Crunchbase
- Apolo
- Lusha
- Jobstreet
- BOTW
- opencorporates
- Data OCCRP
- OSINT Maps
- Tripadvisor
- Trustindex
- G Map Review
- Provenexpert
- SIMPU RI
- collegerecruiter
- corporationwiki
- Maltego social links
- indokontraktor ID
- opentender ID
- lpse lkpp ID
- ahu ID
- Minerba ESDM ID
- MODI ID
- Minerba ESDM ID Map
- HAKI ID
- Email Format
- opensanctions
- ALEPT OCCRP
- offshoreleaks
- gajiterbaru
- sociallinks
- Job Planet
- Deals Job
- Pay Scale
- salary
- Paylab Salary Info
- emploleaks
- UK Company Search
- Venture Radar
- tracxn
- clearbit
- Kemenperin ID
- IDX ID
- OJK ID
- lpse lkpp ID
- companieshouse ID
- Fintech ID
- Website informer
- contactout
- opensecrets
- spyfu
- google finance
- spokeo
- 123people
- peepdb
- reversegeni
- PDDIKTI
- IDEBKU OJK ID
- SINTA
- Social Searcher
- Pimeyes
- Rocketreach
- SignalHire
- Website informer
- Find and Update company
- Thatsthem
- Freepeoplesearch
- Predicta Search
- Epios
- anymailfinder
- getprospect
- ZoomInfo
- Apolo
- Family Tree
- Radaris
- beenverified
- bandcamp
- Sherlock Eye
- NIK PARSE
- Maltego Social Links Pro
- hertz
- fastpeoplesearch
- fastpeoplesearch.info
- intelius
- recruitin
- recruitmentgeek
- Arjuna Kemdikbud ID
- peekyou
- castrickclues
- lolarchiver
- clearbit
- idcrawl
- contactout
- argali
- ciddb
- cellrevealer
- spydialer
- Twilio
- Reverse lookup
- PhoneInfoga
- Sync
- National cell
- Getcontact
- Moriarty-Project
- Get Contact
- True Caller
- Cell Id Lookup
- Device Info
- Cell Finder
- Unkownphone
- Whocallsme
- elenchitelefonici
- nationalcellulardirectory
- phonebooks
- International Phone Directories
- PhoneInfoga
- Spy Dialer
- Phone Validator
- Fone finder
- 411 reverse phone
- Number guru
- Zaba reverse phone
- FullContact
- HLR Lookup
- Ceebydith HLR Lookup
- Free HLR
- HLR Lookup API
- Maltego Phone Search
- SignalHire
- Emobiletracker
- OpenCNAM
- Fullcontact
- seon
- Thatsthem
- Freepeoplesearch
- Epios
- anymailfinder
- getprospect
- ZoomInfo
- Spam Calls
- inteltechniques
- pipl
- phonebook
- CALL APP
- Number Finder IOS
- Dalily Android Apps
- ViewCaller
- inspektur
- lolarchiver
- countrycode
- HLR Tsel Code Area
- HLR Tsel Area Code
- Indosat HLR
- idcrawl
- SMS PING
- SMS PING APK
- Ghunt online tools
- numpi
Pro Tips
If you has found the person phone number you can check at data breach, e wallet, social media, email address (via reset password), getcontact, truecaller, ipqs, fraud checker and last trying to dork or search any info into social media too
- Namechk
- Knowem
- Nexfil
- Sherlock
- Instantusername
- Snitch
- Checkusernames
- Maigret
- Picuki
- ZoomInfo
- Alfred
- Blackbird
- Bellingcat Username
- whatsmyname
- holehe
- hertz
- peekyou
- lolarchiver
- User Searcher
- idcrawl
- Ghunt online tools
- Facebook lookup id
- Sherlock
- Socialsearcher Users
- Nexfil
- Googlesocialsearch
- Google Social Network Transforms
- FullContact
- maigret
- Blackbird
Group Search: site:facebook.com inurl:group
Group Wall Posts Search: site:facebook.com inurl:wall
Pages Search: site:facebook.com inurl:pages
Public Profiles: allinurl: people ‘‘name’’ site:facebook.com
Photos By - https://www.facebook.com/search/taget_id/photos-by
Photos Liked - https://www.facebook.com/search/taget_id/photos-liked
Photos Of - https://www.facebook.com/search/taget_id/photos-of
Comments - https://www.facebook.com/search/taget_id/photos-commented
Friends - https://www.facebook.com/search/taget_id/friends
Videos Tagged - https://www.facebook.com/search/taget_id/videos
Videos By - https://www.facebook.com/search/taget_id/videos-by
Videos Liked - https://www.facebook.com/search/taget_id/videos-liked
Videos Commented - https://www.facebook.com/search/taget_id/videos-commented
Events Attended - https://www.facebook.com/search/taget_id/events-joined
Relatives - https://www.facebook.com/search/taget_id/relatives
or you can use dork for spesific example
id site:facebook.com
page site: facebook.com
id site:facebook.com *
page site: facebook.com *
- Intel Technique
- DumpItBlue
- Facebook Search
- Fb-sleep-stats
- Lookup-ID.com
- SearchIsBack
- Wolfram Alpha Facebook Report
- Facebook Recover Lookup
- Who posted facebook
- sowsearch
- Hastag Analzer
- Export comment
- Facebook endpoint
- Facebook Graph
- Facebook live
- Facebook vid downloader
- Fb Sleep Stats
- Skopenow FB Hunter
- Facebook Data Breach Cheker
- F**ck Facebook Github
- exportcomments