{"id":26347226,"url":"https://github.com/yogsec/osint-tools","last_synced_at":"2026-01-03T12:03:33.129Z","repository":{"id":281568992,"uuid":"945675292","full_name":"yogsec/OSINT-Tools","owner":"yogsec","description":"The OSINT Framework is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers a wide range of categories to help security researchers, investigators, and analysts uncover crucial information effectively.","archived":false,"fork":false,"pushed_at":"2025-03-10T00:38:46.000Z","size":21,"stargazers_count":0,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-10T01:30:49.419Z","etag":null,"topics":["bugbounty","bugbountytips","bugbountytools","cybersecurity","cybersecurity-education","hackerone","hacking-tools","kali-linux","open-source-intelligence","osint","osint-framework","osint-kali","osint-resources","osint-tool","osint-tool-list","osint-toolkit","osint-tools","osint-tools-list","osinttools","yogsec"],"latest_commit_sha":null,"homepage":"https://linktr.ee/yogsec","language":null,"has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/yogsec.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2025-03-10T00:07:56.000Z","updated_at":"2025-03-10T00:41:54.000Z","dependencies_parsed_at":"2025-03-10T01:40:55.796Z","dependency_job_id":null,"html_url":"https://github.com/yogsec/OSINT-Tools","commit_stats":null,"previous_names":["yogsec/osint-tools"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FOSINT-Tools","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FOSINT-Tools/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FOSINT-Tools/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/yogsec%2FOSINT-Tools/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/yogsec","download_url":"https://codeload.github.com/yogsec/OSINT-Tools/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243835926,"owners_count":20355616,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bugbounty","bugbountytips","bugbountytools","cybersecurity","cybersecurity-education","hackerone","hacking-tools","kali-linux","open-source-intelligence","osint","osint-framework","osint-kali","osint-resources","osint-tool","osint-tool-list","osint-toolkit","osint-tools","osint-tools-list","osinttools","yogsec"],"created_at":"2025-03-16T07:16:15.881Z","updated_at":"2026-01-03T12:03:33.124Z","avatar_url":"https://github.com/yogsec.png","language":null,"readme":"# OSINT Tools 💡\n\n![OSINT Tools List](https://media1.giphy.com/media/v1.Y2lkPTc5MGI3NjExODM1cHFtYjNoM3gybmpwb2drZTBwaWZ6cXRqenIza3FycnJlOXh1diZlcD12MV9pbnRlcm5hbF9naWZfYnlfaWQmY3Q9Zw/3pzLJifxEvLpe/giphy.gif)\n\nThe **OSINT Framework** is a powerful collection of tools and methods designed for open-source intelligence gathering. This framework covers a wide range of categories to help security researchers, investigators, and analysts uncover crucial information effectively. \n\n\u003cdiv align=\"center\"\u003e\n      \u003ca href=\"https://www.whatsapp.com/channel/0029Vb68FeRFnSzGNOZC3h3x\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=WhatsApp+Channel\u0026amp;color=25D366\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"WhatsApp Channel\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://t.me/HackerSecure\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=Telegram+Channel\u0026amp;color=24A1DE\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"Telegram Channel\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://www.linkedin.com/in/cybersecurity-pentester/\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=LinkedIn\u0026amp;color=0A66C2\u0026amp;logo=LinkedIn\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"LinkedIn\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://linktr.ee/yogsec\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=LinkTree\u0026amp;color=25D366\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"WhatsApp Channel\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://x.com/home\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=X\u0026amp;color=000000\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"Lichess\"\u003e\u003c/a\u003e\n  \u003ca href=\"mailto:abhinavsingwal@gmail.com?subject=Hi%20YogSec%20,%20nice%20to%20meet%20you!\"\u003e\u003cimg alt=\"Email\" src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=Gmail\u0026amp;color=EA4335\u0026amp;logo=Gmail\u0026amp;logoColor=FFFFFF\u0026amp;label=\"\u003e\u003c/a\u003e\n  \u003ca href=\"https://yogsec.github.io/yogsec/\"\u003e\u003cimg src=\"https://img.shields.io/static/v1?style=for-the-badge\u0026amp;message=Website\u0026amp;color=FFFFC5\u0026amp;logo=\u0026amp;logoColor=FFFFFF\u0026amp;label=\" alt=\"Telegram Channel\"\u003e\u003c/a\u003e  \n  \n\u003c/div\u003e\n\n---\n\n## Categories \n\n### 👤 Username Investigation\n\n### 📧 Email Address\n\n### 🌐 Domain Name\n\n### 📍 IP \u0026 MAC Address\n\n### 🖼️ Images / Videos / Docs\n\n### 👥 Social Networks\n\n### 💬 Instant Messaging\n\n### 🔎 People Search Engines\n\n### 💛 Dating\n\n### 📞 Telephone Numbers\n\n### 📂 Public Records\n\n### 🏢 Business Records\n\n### 🚍 Transportation\n\n### 🌍 Geolocation Tools / Maps\n\n### 📋 Metadata\n\n### 📱 Mobile Emulation\n\n### 💣 Terrorism\n\n### 🕶️ Dark Web\n\n### 💰 Digital Currency\n\n### 🔐 Encoding / Decoding\n\n### 🤖 AI Tools\n\n### 📡 Malicious File Analysis\n\n### ⚡ Exploits \u0026 Advisories\n\n### 🔍 Threat Intelligence\n\n### 🔒 OpSec (Operational Security)\n\n### ✍️ Documentation / Evidence Capture\n\n### 🎓 Training \n\n---\n\n# Username Investigation Tools 🔎\n\n\n### 🛠️ Tools List\n- **WhatsMyName** - [GitHub](https://github.com/WebBreacher/WhatsMyName)\n- **Namechk** - [Website](https://namechk.com/)\n- **Sherlock** - [GitHub](https://github.com/sherlock-project/sherlock)\n- **KnowEm** - [Website](https://knowem.com/)\n- **UserRecon** - [GitHub](https://github.com/thelinuxchoice/userrecon)\n- **CheckUsernames** - [Website](https://checkusernames.com/)\n- **Social Analyzer** - [GitHub](https://github.com/qeeqbox/social-analyzer)\n- **Maigret** - [GitHub](https://github.com/soxoj/maigret)\n\n---\n\n# Email Investigation Tools 📧\n\n\n### 🛠️ Tools List\n- **Hunter.io** - [Website](https://hunter.io/)\n- **EmailRep** - [Website](https://emailrep.io/)\n- **HaveIBeenPwned** - [Website](https://haveibeenpwned.com/)\n- **Epieos** - [Website](https://epieos.com/)\n- **Phonebook.cz** - [Website](https://phonebook.cz/)\n- **That’sThem** - [Website](https://thatsthem.com/)\n- **OSINT Combine Email Search** - [Website](https://osintcombine.com/tools/email-search)\n- **Holehe** - [GitHub](https://github.com/megadose/holehe)\n\n---\n\n# Domain Name Investigation Tools 🌐\n\n\n### 🛠️ Tools List\n- **WhoisXML API** - [Website](https://whoisxmlapi.com/)\n- **VirusTotal** - [Website](https://www.virustotal.com/)\n- **SecurityTrails** - [Website](https://securitytrails.com/)\n- **ViewDNS** - [Website](https://viewdns.info/)\n- **Spyse** - [Website](https://spyse.com/)\n- **DNSDumpster** - [Website](https://dnsdumpster.com/)\n- **URLScan.io** - [Website](https://urlscan.io/)\n- **CRT.sh** - [Website](https://crt.sh/)\n\n---\n\n# IP \u0026 MAC Address Investigation Tools 📍\n\n\n### 🛠️ Tools List\n- **Shodan** - [Website](https://www.shodan.io/)\n- **Censys** - [Website](https://censys.io/)\n- **IPinfo** - [Website](https://ipinfo.io/)\n- **MaxMind GeoIP** - [Website](https://www.maxmind.com/)\n- **AbuseIPDB** - [Website](https://www.abuseipdb.com/)\n- **IPVoid** - [Website](https://www.ipvoid.com/)\n- **MAC Vendors** - [Website](https://macvendors.com/)\n- **WhatIsMyIPAddress** - [Website](https://whatismyipaddress.com/)\n\n---\n\n# Images / Videos / Docs Investigation Tools 🖼️🎥📄\n\n\n### 🛠️ Tools List\n- **Google Reverse Image Search** - [Website](https://images.google.com/)\n- **TinEye** - [Website](https://tineye.com/)\n- **Exiftool** - [GitHub](https://github.com/exiftool/exiftool)\n- **Forensically** - [Website](https://29a.ch/photo-forensics/)\n- **Photo Sherlock** - [Website](https://play.google.com/store/apps/details?id=app.phosherlock)\n- **Video Vault** - [Website](https://videovault.io/)\n- **File Analyzer** - [Website](https://www.file-analyzer.com/)\n- **WeVerify** - [Website](https://weverify.eu/)\n\n---\n\n# Social Networks Investigation Tools 📱🌐\n\n\n### 🛠️ Tools List\n- **Sherlock** - [GitHub](https://github.com/sherlock-project/sherlock)\n- **Namechk** - [Website](https://namechk.com/)\n- **SocialSearcher** - [Website](https://www.social-searcher.com/)\n- **Spoonbill** - [Website](https://spoonbill.io/)\n- **Pipl** - [Website](https://pipl.com/)\n- **Twitonomy** - [Website](https://www.twitonomy.com/)\n- **Mentionmapp** - [Website](https://mentionmapp.com/)\n- **PeopleLooker** - [Website](https://www.peoplelooker.com/)\n\n---\n\n# Instant Messaging Investigation Tools 💬📲\n\n\n### 🛠️ Tools List\n- **WhatsMyName** - [GitHub](https://github.com/WebBreacher/WhatsMyName)\n- **Telegram Open Source** - [Website](https://core.telegram.org/)\n- **Signal CLI** - [GitHub](https://github.com/AsamK/signal-cli)\n- **Discord Bot List** - [Website](https://discord.bots.gg/)\n- **ChatWatch** - [Website](https://chatwatch.net/)\n- **Skype Resolver** - [Website](https://skypegrab.net/)\n- **IMSpy** - [GitHub](https://github.com/imspy)\n- **Beeper** - [Website](https://www.beeper.com/)\n\n---\n\n# People Search Engines Investigation Tools 🔍👤\n\n\n### 🛠️ Tools List\n- **Pipl** - [Website](https://pipl.com/)\n- **Spokeo** - [Website](https://www.spokeo.com/)\n- **TruthFinder** - [Website](https://www.truthfinder.com/)\n- **PeekYou** - [Website](https://www.peekyou.com/)\n- **BeenVerified** - [Website](https://www.beenverified.com/)\n- **FamilyTreeNow** - [Website](https://www.familytreenow.com/)\n- **That’sThem** - [Website](https://thatsthem.com/)\n- **FastPeopleSearch** - [Website](https://www.fastpeoplesearch.com/)\n\n---\n\n# Dating Investigation Tools ❤️🔍\n\n\n### 🛠️ Tools List\n- **Tinderlyzer** - [GitHub](https://github.com/travistynes/tinderlyzer)\n- **SocialCatfish** - [Website](https://socialcatfish.com/)\n- **Reverse Image Search** (for profile picture checks) - [Google](https://images.google.com/)\n- **CupidRadar** - [Website](https://www.cupidradar.com/)\n- **DateID** - [Website](https://www.dateid.com/)\n- **Profile Searcher** - [Website](https://www.profilesearcher.com/)\n\n---\n\n# Telephone Numbers Investigation Tools ☎️🔎\n\n\n### 🛠️ Tools List\n- **Truecaller** - [Website](https://www.truecaller.com/)\n- **NumLookup** - [Website](https://www.numlookup.com/)\n- **EmobileTracker** - [Website](https://www.emobiletracker.com/)\n- **Sync.me** - [Website](https://sync.me/)\n- **CallerID Test** - [Website](https://calleridtest.com/)\n- **FreeCarrierLookup** - [Website](https://freecarrierlookup.com/)\n- **PhoneInfoga** - [GitHub](https://github.com/sundowndev/phoneinfoga)\n\n---\n\n# Public Records Investigation Tools 🗂️🔍\n\n\n### 🛠️ Tools List\n- **SearchSystems** - [Website](https://publicrecords.searchsystems.net/)\n- **BRB Publications** - [Website](https://www.brbpub.com/)\n- **FamilySearch** - [Website](https://www.familysearch.org/)\n- **Archives.gov** - [Website](https://www.archives.gov/)\n- **VitalChek** - [Website](https://www.vitalchek.com/)\n- **OpenCorporates** - [Website](https://opencorporates.com/)\n- **PACER** - [Website](https://pacer.uscourts.gov/)\n\n---\n\n# Business Records Investigation Tools 🏢🔍\n\n\n### 🛠️ Tools List\n- **OpenCorporates** - [Website](https://opencorporates.com/)\n- **D\u0026B Hoovers** - [Website](https://www.dnb.com/)\n- **CompanyCheck** - [Website](https://companycheck.co.uk/)\n- **Kompass** - [Website](https://www.kompass.com/)\n- **SEC EDGAR** - [Website](https://www.sec.gov/edgar.shtml)\n- **GlobalOpenData** - [Website](https://globalopendataindex.org/)\n- **Bizapedia** - [Website](https://www.bizapedia.com/)\n\n---\n\n# Transportation Investigation Tools 🚗🚌✈️\n\n\n### 🛠️ Tools List\n- **FlightAware** - [Website](https://www.flightaware.com/)\n- **MarineTraffic** - [Website](https://www.marinetraffic.com/)\n- **Flightradar24** - [Website](https://www.flightradar24.com/)\n- **OpenRailwayMap** - [Website](https://www.openrailwaymap.org/)\n- **VesselFinder** - [Website](https://www.vesselfinder.com/)\n- **PlaneFinder** - [Website](https://planefinder.net/)\n\n---\n\n# Geolocation Tools / Maps Investigation Tools 🌍🗺️📍\n\n\n### 🛠️ Tools List\n- **Google Maps** - [Website](https://maps.google.com/)\n- **OpenStreetMap** - [Website](https://www.openstreetmap.org/)\n- **Mapillary** - [Website](https://www.mapillary.com/)\n- **Wikimapia** - [Website](https://wikimapia.org/)\n- **GeoGuessr** - [Website](https://www.geoguessr.com/)\n- **What3Words** - [Website](https://what3words.com/)\n\n---\n\n# Metadata Investigation Tools 🗂️🔎📄\n\n\n### 🛠️ Tools List\n- **ExifTool** - [Website](https://exiftool.org/)\n- **FOCA** - [Website](https://elevenpaths.com/foca)\n- **Metagoofil** - [Website](https://www.kitploit.com/2019/02/metagoofil-information-gathering-tool.html)\n- **exif.regex.info** - [Website](https://exif.regex.info/)\n- **Jeffrey's Image Metadata Viewer** - [Website](http://exif.regex.info/exif.cgi)\n\n---\n\n# Mobile Emulation Tools 📱🖥️🔍\n\n\n### 🛠️ Tools List\n- **Genymotion** - [Website](https://www.genymotion.com/)\n- **Android Studio Emulator** - [Website](https://developer.android.com/studio/run/emulator)\n- **NoxPlayer** - [Website](https://www.bignox.com/)\n- **BlueStacks** - [Website](https://www.bluestacks.com/)\n- **MEmu Play** - [Website](https://www.memuplay.com/)\n\n---\n\n# Terrorism Investigation Tools ⚠️🕵️‍♂️🌍\n\n\n### 🛠️ Tools List\n- **TRAC (Terrorism Research \u0026 Analysis Consortium)** - [Website](https://www.trackingterrorism.org/)\n- **START (National Consortium for the Study of Terrorism and Responses to Terrorism)** - [Website](https://start.umd.edu/)\n- **Global Terrorism Database (GTD)** - [Website](https://www.start.umd.edu/gtd/)\n- **Jane's Terrorism and Insurgency Centre** - [Website](https://www.janes.com/)\n- **IntelCenter Database** - [Website](https://intelcenter.com/)\n\n---\n\n# Dark Web Investigation Tools 🕶️🌑💻\n\n\n### 🛠️ Tools List\n- **Ahmia** - [Website](https://ahmia.fi/)\n- **Dark.fail** - [Website](https://dark.fail/)\n- **OnionLand Search** - [Website](https://onionlandsearchengine.com/)\n- **Tor Project** - [Website](https://www.torproject.org/)\n- **Hunchly** - [Website](https://www.hunch.ly/)\n\n---\n\n# Digital Currency Investigation Tools 💰🕵️‍♂️📊\n\n\n### 🛠️ Tools List\n- **Blockchain.com Explorer** - [Website](https://www.blockchain.com/explorer)\n- **Chainalysis** - [Website](https://www.chainalysis.com/)\n- **Elliptic** - [Website](https://www.elliptic.co/)\n- **CipherTrace** - [Website](https://ciphertrace.com/)\n- **BTCScan** - [Website](https://btcscan.org/)\n\n---\n\n# Encoding / Decoding Tools 🔡🔍📟\n\n\n### 🛠️ Tools List\n- **CyberChef** - [Website](https://gchq.github.io/CyberChef/)\n- **Base64 Decode** - [Website](https://www.base64decode.org/)\n- **URL Decoder** - [Website](https://www.urldecoder.org/)\n- **Encode/Decode** - [Website](https://emn178.github.io/online-tools/)\n- **Ascii Converter** - [Website](https://www.asciitohex.com/)\n\n---\n\n# AI Tools 🤖🧠🔍\n\n\n### 🛠️ Tools List\n- **Maltego** - [Website](https://www.maltego.com/)\n- **Hunchly** - [Website](https://www.hunch.ly/)\n- **Cortical.io** - [Website](https://www.cortical.io/)\n- **Social Links** - [Website](https://sociallinks.io/)\n- **Skopenow** - [Website](https://www.skopenow.com/)\n\n---\n\n# Malicious File Analysis Tools 🕵️‍♂️💻🐾\n\n\n### 🛠️ Tools List\n- **VirusTotal** - [Website](https://www.virustotal.com/)\n- **Hybrid Analysis** - [Website](https://www.hybrid-analysis.com/)\n- **Cuckoo Sandbox** - [Website](https://cuckoosandbox.org/)\n- **Joe Sandbox** - [Website](https://www.joesecurity.org/)\n- **Intezer Analyze** - [Website](https://analyze.intezer.com/)\n\n---\n\n# Exploits \u0026 Advisories Tools 🚨🛡️📋\n\n\n### 🛠️ Tools List\n- **Exploit Database** - [Website](https://www.exploit-db.com/)\n- **CVE Details** - [Website](https://www.cvedetails.com/)\n- **Rapid7** - [Website](https://www.rapid7.com/db/)\n- **Packet Storm Security** - [Website](https://packetstormsecurity.com/)\n- **0day.today** - [Website](https://0day.today/)\n\n---\n\n# Threat Intelligence Tools 🔍🛡️🌍\n\n\n### 🛠️ Tools List\n- **MISP** - [Website](https://www.misp-project.org/)\n- **AlienVault OTX** - [Website](https://otx.alienvault.com/)\n- **ThreatConnect** - [Website](https://www.threatconnect.com/)\n- **Recorded Future** - [Website](https://www.recordedfuture.com/)\n- **IBM X-Force Exchange** - [Website](https://exchange.xforce.ibmcloud.com/)\n- **Hudson Rock Cybercrime Intelligence Toolset** - [Website](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools)\n\n---\n\n# OpSec (Operational Security) Tools 🕶️🔐🛡️\n\n\n### 🛠️ Tools List\n- **Tails OS** - [Website](https://tails.boum.org/)\n- **Whonix** - [Website](https://www.whonix.org/)\n- **Qubes OS** - [Website](https://www.qubes-os.org/)\n- **Veracrypt** - [Website](https://www.veracrypt.fr/)\n- **GPG (GNU Privacy Guard)** - [Website](https://gnupg.org/)\n\n---\n\n# Documentation / Evidence Capture Tools 📝📸🔎\n\n\n### 🛠️ Tools List\n- **Hunchly** - [Website](https://www.hunch.ly/)\n- **Snagit** - [Website](https://www.techsmith.com/screen-capture.html)\n- **Monosnap** - [Website](https://monosnap.com/)\n- **ShareX** - [Website](https://getsharex.com/)\n- **Screenpresso** - [Website](https://www.screenpresso.com/)\n\n# Training Tools 🎓📚💻\n\n\n### 🛠️ Tools List\n- **TryHackMe** - [Website](https://tryhackme.com/)\n- **Hack The Box** - [Website](https://www.hackthebox.com/)\n- **PentesterLab** - [Website](https://pentesterlab.com/)\n- **OverTheWire** - [Website](https://overthewire.org/)\n- **Root Me** - [Website](https://www.root-me.org/)\n\n---\n\n📢 **Stay Updated!** Join my Telegram channel for the latest cybersecurity insights, tools, and bug bounty discussions!  \n\n🔗 [https://t.me/HackerSecure](https://t.me/HackerSecure) 🚀👨‍💻  \n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyogsec%2Fosint-tools","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fyogsec%2Fosint-tools","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fyogsec%2Fosint-tools/lists"}