Skip to content

One Liner OSINT is a collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering.

License

Notifications You must be signed in to change notification settings

yogsec/One-Liner-OSINT

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

45 Commits
 
 
 
 
 
 
 
 

Repository files navigation

One Liner OSINT

image

A collection of powerful one-liner commands for Open-Source Intelligence (OSINT) gathering. This repository provides quick and efficient command-line solutions to extract valuable information from public sources, including domain reconnaissance, social media analysis, metadata extraction, and more. Perfect for security researchers, bug bounty hunters, and ethical hackers looking to automate OSINT tasks with minimal effort.

WhatsApp Channel Telegram Channel LinkedIn WhatsApp Channel Lichess Email Telegram Channel

🔍 OSINT Dorks for Finding Personal Information

📧 Email & Contact Information

  • Find a person's email address:
    "John Doe" "@gmail.com" | "@yahoo.com" | "@outlook.com" -www
  • Find leaked email addresses in data breaches:
    "John Doe" site:pastebin.com | site:throwbin.io | site:breachforums.st
  • Look for email addresses from a specific domain:
    site:targetcompany.com "@targetcompany.com"
  • Search for phone numbers:
    "John Doe" "phone" | "contact" | "mobile" | "WhatsApp"
  • Find a person’s email in GitHub repositories:
    site:github.com "John Doe" "@gmail.com"
  • Find all social media accounts of a person:
    "John Doe" site:linkedin.com | site:facebook.com | site:twitter.com | site:instagram.com
  • Find someone’s Facebook profile even if hidden:
    "John Doe" site:facebook.com/public/
  • Search for Instagram profiles:
    site:instagram.com "John Doe"
  • Look for their posts on forums (Quora, Reddit, etc.):
    "John Doe" site:reddit.com | site:quora.com | site:stackoverflow.com
  • Search for personal blogs and old web profiles:
    "John Doe" site:medium.com | site:tumblr.com | site:blogspot.com
  • Find their Amazon wishlist:
    "John Doe" site:amazon.com "wishlist"
  • Look for mentions in news articles:
    "John Doe" site:nytimes.com | site:bbc.com | site:cnn.com
  • Find someone’s pictures across the web:
    "John Doe" site:flickr.com | site:500px.com | site:pinterest.com

📜 Resumes, CVs, & Work History

  • Find someone's resume or CV:
    "John Doe" filetype:pdf | filetype:doc "resume" | "curriculum vitae"
  • Look for employment history on LinkedIn:
    site:linkedin.com/in "John Doe"
  • Find past job applications:
    "John Doe" site:indeed.com | site:glassdoor.com

🔍 OSINT Dorks for Finding Organizational Information

🏢 Subdomains & Infrastructure

  • Find all subdomains of a company:
    site:*.targetcompany.com -www
  • Search for sensitive open directories:
    intitle:"index of" site:targetcompany.com
  • Check for publicly accessible FTP servers:
    inurl:ftp:// targetcompany.com
  • Find internal company documents:
    site:targetcompany.com ext:pdf | ext:doc | ext:ppt "confidential"
  • Look for job postings to understand their tech stack:
    site:targetcompany.com "hiring" | "we are looking for"
  • Check for network devices and login portals:
    site:targetcompany.com inurl:admin | inurl:dashboard | inurl:login

🔎 Leaks & Security Issues

  • Search for past security incidents:

    "targetcompany.com" "data breach" | "leaked database"
  • Look for exposed database files:

    site:targetcompany.com ext:sql | ext:db | ext:json
  • Find security vulnerabilities related to the organization:

    site:targetcompany.com inurl:CVE- | intext:"vulnerability"

🔍 Finding Emails & Credentials

  • Locate Publicly Available Emails
    site:pastebin.com OR site:throwbin.io "@gmail.com" OR "@yahoo.com"
  • Search for Leaked Passwords
    site:github.com OR site:pastebin.com "password" "username"
  • Find Corporate Email Addresses
    site:linkedin.com "@company.com"

📜 Finding Confidential Files

  • Look for Sensitive PDF Documents
    filetype:pdf OR filetype:docx "confidential" OR "internal"
  • Discover Public Google Drive Links
    site:drive.google.com "private" OR "restricted"
  • Identify Open FTP Servers
    intitle:"index of" "ftp" site:target.com

📂 Exposed Databases

  • Unprotected MongoDB Instances
    inurl:27017 "_id"
  • Open Elasticsearch Instances
    inurl:9200 "_search"
  • Public Firebase Databases
    site:firebasestorage.googleapis.com

🕵️‍♂️ OSINT on People

🔍 Social Media Investigation

  • Find Profiles Across Social Platforms
    site:facebook.com OR site:twitter.com OR site:instagram.com "John Doe"
  • Search for Usernames on Websites
    site:github.com OR site:reddit.com "username123"
  • Find a Person’s Facebook Profile by Location
    site:facebook.com "John Doe" "New York"

📍 Geolocation Tracking

  • Search Tweets from a Specific Area
    site:twitter.com "New York" geocode:40.7128,-74.0060,5km
  • Extract GPS Data from Images
    exiftool image.jpg
  • Perform Reverse Image Search
    🔗 Google Reverse Image Search

📡 Dark Web & Leaked Data OSINT

🔑 Searching for Leaked Credentials

  • Check if an Email is Breached
    🔗 Have I Been Pwned
  • Look for Exposed Passwords on Dark Web
    site:darksearch.io "email@example.com"
  • Find Leaked Data on Pastebin
    site:pastebin.com "password" OR "login"

📁 Discovering Exposed Files

  • Search Government & Military Docs
    site:gov OR site:mil filetype:pdf "confidential"
  • Find Public AWS Buckets
    site:s3.amazonaws.com "target"
  • Look for API Keys in GitHub Repositories
    site:github.com "api_key" "secret"

🔍 OSINT on Organizations

🌎 Subdomain & Infrastructure Discovery

  • Find Hidden Subdomains
    subfinder -d target.com
  • Locate Public API Endpoints
    site:target.com "api/v1/"

🔗 Employee & Corporate Intelligence

  • Look for Employee LinkedIn Profiles
    site:linkedin.com "company.com"
  • Find Open Zoom Meetings
    site:zoom.us "join" "meeting"
  • Discover Public Slack Channels
    site:slack.com "company"

⚡ OSINT Automation Tools

🛠 Recon & Intelligence Gathering

  • SpiderFoot – Automated OSINT tool
    spiderfoot -s target.com
  • theHarvester – Gather emails & subdomains
    theHarvester -d target.com -b all
  • Amass – Network mapping & reconnaissance
    amass enum -d target.com
  • Metagoofil – Extract metadata from files
    metagoofil -d target.com -t pdf -o results/

📢 Social Media OSINT

  • Sherlock – Locate Social Media Accounts
    sherlock username
  • Instagram Scraper – Extract Data from Instagram
    instaloader --login username target_account

🌍 Geolocation & Image OSINT

  • ExifTool – Extract Metadata from Images
    exiftool image.jpg
  • Reverse Image Search on Google
    🔗 Google Images

🔎 Advanced Google Dorks for People & Organizations

  • Find Personal Information on a Website
    site:target.com intext:"phone number" OR "email" OR "address"
  • Find Login Pages
    site:target.com inurl:login
  • Find PDFs & Documents Containing Emails
    filetype:pdf OR filetype:docx OR filetype:xls intext:"@gmail.com"
  • Find Public FTP Servers
    intitle:"index of" "ftp" site:target.com

📍 Find Hidden Data & Cached Info

  • Search in Google Cache
    cache:target.com
  • Find Deleted Pages via Wayback Machine
    site:web.archive.org target.com
  • Search for Sensitive PDF Reports
    site:gov OR site:mil OR site:edu filetype:pdf "confidential"

🕵️‍♂️ OSINT on People (Personal Reconnaissance)

🔎 Find Someone's Digital Footprint

👀 Social Media Intelligence (SOCMINT)

  • Find All Social Media Accounts for a Username
    site:twitter.com OR site:instagram.com OR site:facebook.com "username"
  • Find Facebook Posts About Someone
    site:facebook.com "John Doe" "lives in New York"
  • Find Instagram & TikTok Accounts via Google
    site:instagram.com "john_doe" OR site:tiktok.com "john_doe"
  • Use Sherlock for Automated Social Media OSINT
    sherlock username

📍 Geolocation OSINT

🔎 Track Location from Photos

  • Extract GPS from Image Metadata
    exiftool image.jpg
  • Search Google for Images from a Location
    site:instagram.com "New York City" "Times Square"
  • Find Someone's Location via Twitter
    site:twitter.com "New York" geocode:40.7128,-74.0060,5km

🔎 Reverse Image Search


💾 Leaked Database & Dark Web OSINT

🔑 Find Leaked Emails & Passwords

  • Check if an Email is Breached 🔗 https://haveibeenpwned.com
  • Find Leaked Databases on Pastebin
    site:pastebin.com "password" "target.com"
  • Search for Leaked Credentials on the Dark Web
    site:darksearch.io "email@example.com"

📂 Find Exposed Databases

  • Search for Open MongoDB
    inurl:27017 "_id"
  • Search for Open Elasticsearch Instances
    inurl:9200 "_search"
  • Find Firebase Databases
    site:firebasestorage.googleapis.com

📡 OSINT on Organizations

🔎 Subdomain & Infrastructure Recon

  • Find Hidden Subdomains
    subfinder -d target.com
  • Find Exposed API Endpoints
    site:target.com "api/v1/"

🔗 Find Employee Emails

  • Find Company Email Patterns with Hunter.io
    🔗 https://hunter.io
  • Search for Leaked Employee Emails
    site:linkedin.com "@target.com"

🔎 Detect Exposed Cloud Storage

  • Find Public Google Drive Links
    site:drive.google.com "confidential"
  • Find Public AWS S3 Buckets
    site:s3.amazonaws.com "target"

🚀 OSINT Automation Tools

🔎 Comprehensive OSINT Frameworks

  • SpiderFoot – Automated OSINT tool
    spiderfoot -s target.com
  • theHarvester – Gather emails & subdomains
    theHarvester -d target.com -b all

⚡ Fast Recon Tools

  • Amass – Network mapping & reconnaissance
    amass enum -d target.com
  • Metagoofil – Extract metadata from public files
    metagoofil -d target.com -t pdf -o results/
  • Maltego – Visualize OSINT data connections
    🔗 https://www.maltego.com

📍 Find Deleted & Cached Information

  • Wayback Machine (Internet Archive) – View old versions of websites
    🔗 https://web.archive.org
    curl "http://web.archive.org/cdx/search/cdx?url=target.com&output=json"
  • Google Cache – View cached pages of deleted content
    cache:target.com
  • Bing Cache – Alternative for Google Cache
    inurl:cache:target.com

🔍 Extract Content from Websites

  • HTTrack – Clone websites for offline analysis
    httrack https://target.com
  • wget – Download full websites
    wget -r -np -k https://target.com
  • Scrapy – Python framework for web scraping
    scrapy startproject target_spider

🕵️‍♂️ OSINT on People (Personal Intelligence)

🔎 Find Hidden Personal Information

👤 Find Personal Email Addresses

  • Hunter.io – Find email patterns from company domains
    🔗 https://hunter.io
  • Holehe – Check if an email is linked to online accounts
    holehe email@example.com
  • Email Permutator – Generate possible email variations
    permute.py first last company.com

📌 Find Geolocation & Address Details

📍 Extract GPS from Images

  • ExifTool – Extract geolocation from images
    exiftool image.jpg
  • Google Earth Historical Imagery – View past satellite images
    🔗 https://earth.google.com

🗺️ Find Someone’s Address


💾 Leaked Database & Credential Hunting

🔑 Find Leaked Passwords

📂 Search for Exposed Databases

  • Find Public MongoDB Databases
    inurl:27017 "MongoDB"
  • Search for Open Elasticsearch DBs
    inurl:9200 "_search"
  • Check for Firebase Data Leaks
    site:firebasestorage.googleapis.com

🔎 Deep Web & Dark Web OSINT

🛑 Search Hidden Onion Sites

  • Ahmia – Search the dark web
    🔗 https://ahmia.fi
  • TorBot – Automate OSINT on onion sites
    git clone https://github.com/DedSecInside/TorBot.git
  • OnionSearch – Find stolen credentials
    python3 onionsearch.py target

📡 Scan Deep Web Data Leaks


🛠️ Subdomain & Website OSINT

🔎 Find Hidden Subdomains

  • Subfinder – Collect subdomains
    subfinder -d target.com
  • Amass – Map an organization's infrastructure
    amass enum -d target.com

🔗 Discover Public API Endpoints

  • Find API Keys in GitHub
    site:github.com "api_key" "target.com"
  • Search for Publicly Accessible APIs
    site:target.com "api/v1/"

🚀 Automated OSINT Tools

🔎 OSINT Frameworks

  • SpiderFoot – Full OSINT automation
    spiderfoot -s target.com
  • Metagoofil – Extract metadata from public files
    metagoofil -d target.com -t pdf -o results/

⚡ Fast Data Gathering

  • theHarvester – Find emails, subdomains, and metadata
    theHarvester -d target.com -b all
  • Maltego – Visualize OSINT data connections
    🔗 https://www.maltego.com

📍 Find Hidden Data & Leaks

📂 Data Breach & Credential Lookups


🕵️ Social Media Intelligence (SOCMINT)

🔍 Find Hidden Social Media Accounts

  • WhatsMyName – Search username across multiple platforms
    🔗 https://whatsmyname.app
  • Sherlock – Find accounts linked to a username
    python3 sherlock.py username
  • Maigret – More powerful than Sherlock for finding social accounts
    python3 maigret.py username

📸 Reverse Image Search on Social Media

📍 Track Geolocation Data

  • GeoCreepy – Extracts geolocation from social media posts
    git clone https://github.com/ilektrojohn/creepy.git
  • ExifTool – Extracts GPS coordinates from photos
    exiftool image.jpg
  • Google Earth Historical Imagery – View past satellite images
    🔗 https://earth.google.com

🔑 Extract Metadata & Documents

📂 Hidden Metadata in Files

  • FOCA – Extracts metadata from documents, PDFs
    🔗 https://elevenpaths.com/foca
  • ExifTool – Extract hidden details from images and documents
    exiftool document.docx
  • Strings – Find hidden text in binary files
    strings target.pdf
  • Metadata2Go – Online metadata extraction
    🔗 https://www.metadata2go.com

📡 Subdomain & Website Enumeration

🔍 Find Hidden Subdomains

  • Subfinder – Finds subdomains via multiple sources
    subfinder -d target.com
  • Findomain – Fast subdomain enumeration
    findomain -t target.com
  • CRT.sh – Find SSL certificates linked to subdomains
    🔗 https://crt.sh

🛠️ Find Exposed Directories

  • GoBuster – Find hidden directories and files
    gobuster dir -u target.com -w wordlist.txt
  • Dirsearch – More advanced directory brute-forcing
    python3 dirsearch.py -u target.com -e php,html,js

🔎 Google Dorks (More Advanced)

🗂️ Find Exposed Databases

  • Search for SQL dumps
    inurl:.sql filetype:sql
  • Find public Firebase databases
    site:firebasestorage.googleapis.com
  • Locate public MongoDB instances
    inurl:27017 filetype:log

📄 Find Sensitive Documents

  • Find internal reports
    site:target.com filetype:pdf "confidential"
  • Search for exposed .env files (credentials)
    inurl:.env "DB_PASSWORD"
  • Look for exposed config files
    intitle:"index of" "wp-config.php"

💾 Data Breach & Credential Automation

📂 Check If an Email Is in a Breach

  • Holehe – Check if an email is linked to social accounts
    holehe email@example.com
  • H8mail – Find leaked passwords
    h8mail -t email@example.com
  • GHunt – Extract data from Google accounts
    python3 ghunt.py email@example.com

🚀 Dark Web Data Mining

  • TorBot – Automates OSINT on dark web sites
    git clone https://github.com/DedSecInside/TorBot.git
  • OnionSearch – Searches dark web for stolen data
    python3 onionsearch.py target

🔎 People & Organization Searches

📝 Leaked Data & Breach Searches

🧕️ Dark Web & Underground Searches


📎 Advanced Metadata & Document Analysis

🔑 Extract Metadata from Images & Documents

  • ExifTool – Extract metadata from photos, PDFs, docs
    exiftool target.jpg
  • strings – Find hidden text in binary files
    strings target.docx
  • pdf-parser – Search for hidden data in PDFs
    pdf-parser target.pdf
  • OpenMetadata – Online metadata extractor
    🔗 https://metapicz.com

🔍 Reverse Image & Facial Recognition


🚀 Automated OSINT Tools

🐾 Subdomain & Website Enumeration

  • Sublist3r – Find subdomains of a target
    python sublist3r.py -d target.com
  • Amass – Powerful OSINT reconnaissance tool
    amass enum -d target.com
  • CRT.sh – Find SSL certificates revealing hidden subdomains
    🔗 https://crt.sh

📞 Phone Number Intelligence


🔍 Google Dorks (More Advanced)

  • Find plaintext passwords
    intext:"password" filetype:log
  • Search for exposed email lists
    site:pastebin.com "email" | "password"
  • Locate hidden admin panels
    site:target.com inurl:admin

📧 Email & Contact Information

Find all email formats used by a company:

site:targetcompany.com "@targetcompany.com"

Search for leaked emails:

"john.doe@email.com" site:pastebin.com | site:breachforums.st

📱 Phone Numbers & Messaging Apps

Look for leaked phone numbers:

"+123456789" site:pastebin.com | site:throwbin.io

Find if a number is linked to Telegram:

site:t.me "+123456789"

🔗 Social Media & Online Presence

Find hidden social media profiles:

"John Doe" site:linkedin.com | site:facebook.com | site:instagram.com

Locate images of a person:

site:instagram.com "John Doe" | site:flickr.com "John Doe"

🏢 Company Subdomains & Infrastructure

Find all subdomains of a company:

site:*.targetcompany.com -www

Check for open directories:

intitle:"index of" site:targetcompany.com

🔑 API Keys & Credentials

Find API keys leaked in GitHub repositories:

site:github.com "api_key" | "AWS_SECRET" | "password" targetcompany.com

Search for environment files:

site:targetcompany.com ext:env "DB_PASSWORD" | "SECRET_KEY"

🕵️ Leaks & Security Issues

Find leaked internal documents:

site:targetcompany.com ext:pdf | ext:doc "confidential"

Look for mentions of a company in hacking forums:

"targetcompany.com" site:breachforums.st | site:raidforums.com

🔍 Google Dorks for Personal OSINT

  • Find social media profiles:
    "John Doe" site:facebook.com | site:twitter.com | site:linkedin.com | site:instagram.com
  • Find email addresses linked to a person:
    "John Doe" "@gmail.com" | "@yahoo.com" | "@outlook.com"
  • Search for phone numbers:
    "John Doe" "contact" | "phone" | "mobile" | "WhatsApp" site:pastebin.com | site:github.com
  • Find resume or CV:
    "John Doe" filetype:pdf | filetype:doc "resume" | "curriculum vitae"
  • Look for mentions in data leaks:
    "John Doe" site:pastebin.com | site:github.com | site:throwbin.io
  • Check for forum posts:
    "John Doe" site:reddit.com | site:quora.com | site:stackoverflow.com
  • Search for person’s photos:
    "John Doe" site:instagram.com | site:pinterest.com | site:flickr.com
  • Find Amazon wishlists:
    "John Doe" site:amazon.com "wishlist"

🔍 Google Dorks for Organizations

  • Find subdomains of a company:
    site:*.targetcompany.com -www
  • Look for internal documents:
    site:targetcompany.com ext:pdf | ext:doc | ext:ppt "confidential"
  • Search for employee emails:
    "@targetcompany.com" -www
  • Find job postings to understand technology stack:
    "hiring" | "we are looking for" site:targetcompany.com
  • Check for API keys and credentials on GitHub:
    site:github.com "targetcompany.com" "api_key" | "password"
  • Find exposed databases:
    site:targetcompany.com ext:sql | ext:db | ext:json
  • Search for network devices and login portals:
    site:targetcompany.com inurl:login | inurl:admin
  • Look for configuration files:
    site:targetcompany.com ext:conf | ext:ini | ext:log
  • Check for past security incidents:
    "targetcompany.com" "data breach" | "leaked database"

🔍 Bing & Yandex Dorks for Personal & Organization OSINT

  • Find person’s profiles on lesser-known sites:
    "John Doe" site:myspace.com | site:medium.com | site:tumblr.com
  • Check for old cached pages:
    site:targetcompany.com cache:
  • Find hidden directories:
    intitle:"index of" site:targetcompany.com


OSINT for Social Media

🛠 Automating OSINT with APIs & Scrapers

🚀 Twitter (X) Advanced OSINT

# Extract tweets, likes, and followers via API
twint -u username --followers --following --tweets
# Search for leaked credentials in tweets  
twint -s "password OR API_KEY OR AWS_SECRET_ACCESS_KEY"
# Extract Twitter followers without rate limits
twint -u username --followers --csv -o followers.csv
# Find accounts linked to a phone number  
twint -s "+1234567890"
# Monitor target’s tweets in real-time
twint -u username --rt
# Find tweets with geotagged locations  
twint -s "keyword" --near "New York"

📘 Facebook Advanced OSINT

# Find all Facebook groups a user is in  
google "site:facebook.com/groups username"
# Extract hidden friends list from a Facebook profile  
curl -s "https://graph.facebook.com/v14.0/username/friends?access_token=YOUR_ACCESS_TOKEN"
# Scrape Facebook public posts by a user  
facebook-scraper username --posts
# Search for leaked Facebook IDs in breaches  
google "site:pastebin.com facebook.com/profile.php?id="
# Find Facebook posts from a specific location  
google "site:facebook.com intext:'📍 New York'"

📸 Instagram Advanced OSINT

# Download all Instagram stories from a target  
instaloader --stories username
# Extract Instagram metadata (location, device info, etc.)  
instaloader --metadata-json username
# Find all Instagram profiles linked to an email  
google "site:instagram.com intext:email@example.com"
# Extract geotagged Instagram posts  
google "site:instagram.com intext:'📍 London'"
# Find Instagram users with similar interests  
google "site:instagram.com intext:'#hacking #cybersecurity'"

💼 LinkedIn Advanced OSINT

# Scrape all employees from a company  
linkedin-scraper -c "Google"
# Extract job postings and hidden email contacts  
google "site:linkedin.com/jobs 'Cybersecurity Analyst' 'Remote'"
# Find LinkedIn profiles with leaked credentials  
google "site:linkedin.com/in 'password' OR 'email@example.com'"
# Identify LinkedIn users who worked for a company in the past  
google "site:linkedin.com/in 'Worked at Google'"
# Find LinkedIn profiles linked to an IP address  
shodan search "org:'LinkedIn Corp'"

📺 YouTube Advanced OSINT

# Download metadata from a YouTube channel  
yt-dlp -J "https://www.youtube.com/c/username"
# Extract subtitles and hidden keywords from videos  
yt-dlp --write-auto-sub --skip-download "https://www.youtube.com/watch?v=VIDEO_ID"
# Find YouTube videos from a specific geolocation  
google "site:youtube.com intext:'📍 New York'"
# Extract YouTube video analytics & insights  
google "site:socialblade.com youtube username"
# Find deleted YouTube videos  
google "site:archive.org youtube.com/watch?v="

🎵 TikTok Advanced OSINT

# Scrape TikTok videos from a user  
tiktok-scraper user username -n 50 -d
# Extract TikTok comments and engagement analytics  
tiktok-scraper user username -t comments
# Find TikTok accounts linked to an email  
google "site:tiktok.com intext:email@example.com"
# Download TikTok videos and metadata  
tiktok-scraper video VIDEO_ID
# Extract hashtags and trends from TikTok  
google "site:tiktok.com intext:'#OSINT #Cybersecurity'"

🎯 Extra OSINT Techniques

# Reverse search social media profile pictures  
google "site:tineye.com inurl:result image.jpg"
# Find deep-web social media leaks  
google "site:pastebin.com OR site:ghostbin.com 'email@example.com'"
# Extract hidden metadata from social media images  
exiftool image.jpg
# Search for hidden social media accounts using an IP  
shodan search "ip:xxx.xxx.xxx.xxx"

🕵️ General Social Media OSINT

# Find accounts linked to an email or phone
whatsmyname -u email@example.com
# Check username presence across 500+ platforms
python3 sherlock username
# Scrape all social media links from a website
python3 photon.py -u example.com
# Identify hidden social media accounts of a target
theHarvester -d target.com -b all
# Check for social media accounts linked to an IP
shodan search "org:'Target ISP' http.title:'Login'"

🐧 Twitter (X) OSINT

# Get all tweets from a specific time range
twint -u username --since 2024-01-01 --until 2024-03-01
# Extract user email from tweets (if leaked)
twint -u username --email
# Find accounts created in a specific year
twint --year 2010
# Get tweets containing geolocation data
twint -u username --geocode
# Identify all hashtags used by a user
twint -u username --hashtags
# Extract all retweets of a specific user
twint -u username --retweets

💘 Facebook OSINT

# Find a user’s Facebook ID
curl -s "https://graph.facebook.com/username?access_token=YOUR_ACCESS_TOKEN"
# Find Facebook pages associated with an email
google "site:facebook.com intext:'email@example.com'"
# Extract all friends of a target (if public)
google "site:facebook.com intext:'Friends' username"
# Get public posts mentioning a keyword
google "site:facebook.com/public keyword"
# Search for Facebook profiles linked to a phone number
google "site:facebook.com intext:'+1234567890'"

📸 Instagram OSINT

# Find Instagram accounts linked to an email
google "site:instagram.com intext:email@example.com"
# Search for Instagram users by location
google "site:instagram.com intext:'📍 Location'"
# Extract all captions from an Instagram profile
instaloader --comments --metadata-json profile_username
# Get all Instagram stories from a public account
instaloader --stories username
# Extract all tagged photos of a user
google "site:instagram.com inurl:tags username"

💼 LinkedIn OSINT

# Find all employees of a company
theHarvester -d company.com -b linkedin
# Extract LinkedIn profile email from commits
git log --pretty=format:"%ae" | sort -u
# Search for LinkedIn users by job title
google "site:linkedin.com/in 'Cybersecurity Researcher' 'India'"
# Extract all skills listed on a LinkedIn profile
google "site:linkedin.com/in username 'Skills'"
# Search for LinkedIn profiles linked to a phone number
google "site:linkedin.com/in intext:'+1234567890'"

📺 YouTube OSINT

# Find all videos uploaded by a user
google "site:youtube.com/c/username"
# Extract metadata from a YouTube video
yt-dlp -J "https://www.youtube.com/watch?v=VIDEO_ID"
# Search for YouTube comments mentioning a keyword
google "site:youtube.com 'keyword' 'comments'"
# Download all subtitles from a YouTube channel
yt-dlp --write-auto-sub --sub-lang en --skip-download "https://www.youtube.com/c/username"

🎵 TikTok OSINT

# Scrape TikTok videos from a user
tiktok-scraper user username -n 50 -d
# Find TikTok videos based on geolocation
google "site:tiktok.com intext:'📍 New York'"
# Extract TikTok user bio information
tiktok-scraper user username -d --store

🐮 Reddit OSINT

# Search for deleted Reddit posts
google "site:removeddit.com user username"
# Find Reddit users discussing a keyword
google "site:reddit.com 'keyword' 'thread'"
# Extract all posts made by a Reddit user
reddit-scraper -s "username"
# Find Reddit users who commented on a specific post
google "site:reddit.com inurl:comments 'keyword'"

🦉 GitHub OSINT

# Search for exposed API keys in GitHub
google "site:github.com intext:'AWS_SECRET_ACCESS_KEY'"
# Find GitHub repositories linked to an email
google "site:github.com intext:'email@example.com'"
# Extract GitHub commits mentioning a keyword
github-search "keyword"
# Search for leaked credentials in GitHub
google "site:github.com intext:'password='"

📞 Telegram OSINT

# Search for Telegram groups related to a topic
google "site:t.me keyword"
# Extract messages from a public Telegram group
telegram-history-dump -c "https://t.me/group_name"

📲 WhatsApp OSINT

# Find public WhatsApp groups
google "site:chat.whatsapp.com keyword"
# Check if a phone number is linked to WhatsApp
curl -s "https://api.whatsapp.com/send?phone=+1234567890"

🕵️ Advanced OSINT Tricks

# Reverse search social media profile pictures
google "site:tineye.com inurl:result image.jpg"
# Find data leaks related to an email
dehashed -q email@example.com
# Extract EXIF metadata from social media images
exiftool image.jpg

General Social Media Search:

# Search for a username across multiple social media platforms
curl -s "https://usersearch.org/?q=username" | grep -Eo 'https://[a-zA-Z0-9./?=_-]+'
# Check if a username exists on multiple sites using Sherlock
python3 sherlock username

Twitter (X) OSINT:

# Search for tweets from a specific user containing a keyword
curl -s "https://nitter.net/username/search?q=keyword"
# Find all images posted by a Twitter user
twint -u username --media
# Search for email addresses in tweets
twint -s "@gmail.com OR @yahoo.com OR @protonmail.com" --output emails.txt --csv

Facebook OSINT:

# Search for a Facebook profile by name
google "site:facebook.com inurl:profile Name"
# Find Facebook posts mentioning a keyword
google "site:facebook.com/posts keyword"

Instagram OSINT:

# Extract Instagram user information
instaloader --login your_username profile_username
# Find all tagged photos of a user
google "site:instagram.com/tagged/ username"

LinkedIn OSINT:

# Search for employees of a company
google "site:linkedin.com/in company name"
# Extract LinkedIn profile data
python3 linkedin2username.py -u "Company Name"

Reddit OSINT:

# Search for a Reddit user’s posts
google "site:reddit.com/user/username"
# Find comments from a user
curl -s "https://www.reddit.com/user/username/comments.json"

YouTube OSINT:

# Find all videos uploaded by a user
google "site:youtube.com/user OR site:youtube.com/channel username"
# Extract YouTube video metadata
yt-dlp --get-title --get-id --get-description --get-duration --get-upload-date "https://www.youtube.com/watch?v=VIDEO_ID"

TikTok OSINT:

# Search for a TikTok user's profile
google "site:tiktok.com/@username"
# Extract TikTok videos and metadata
tiktok-scraper user username -n 50 -d

Snapchat OSINT:

# Find public Snapchat stories
google "site:map.snapchat.com username"
# Search for Snapchat users by name
google "site:snapchat.com add username"

Pinterest OSINT:

# Find all Pinterest boards of a user
google "site:pinterest.com/username"
# Search for pins related to a keyword
google "site:pinterest.com/pin/ keyword"

GitHub OSINT:

# Search for sensitive data in a user's GitHub repo
google "site:github.com username password OR api_key OR token"
# Find email addresses in GitHub commits
git log --pretty=format:"%ae" | sort -u

Telegram OSINT:

# Find Telegram groups related to a keyword
google "site:t.me keyword"
# Check if a Telegram username exists
curl -s "https://t.me/username"

Discord OSINT:

# Find Discord servers related to a keyword
google "site:discord.gg keyword"
# Search for Discord user profiles
google "site:discord.com users username"

WhatsApp OSINT:

# Search for public WhatsApp groups
google "site:chat.whatsapp.com keyword"
# Check if a phone number has a WhatsApp account
curl -s "https://api.whatsapp.com/send?phone=+1234567890"

General OSINT Tools for Social Media:

# Find all social media profiles of a user
holehe username@example.com
# Check username availability on multiple sites
python3 maigret username
# Extract metadata from an image (EXIF data)
exiftool image.jpg

OSINT One-Liners for People Search & Email Investigation

🔍 People Search

  • Find social media profiles using name & location:
    site:facebook.com "John Doe" "New York"
  • Search for a username across multiple sites:
    curl -s https://usersearch.org/?q=username | grep -oP 'https?://\S+'
  • Check if a username exists on social networks (Sherlock):
    python3 sherlock username
  • Google dork for public records:
    "John Doe" site:whitepages.com OR site:spokeo.com OR site:intelius.com
  • Find someone’s name linked to a phone number:
    site:truepeoplesearch.com "123-456-7890"

📧 Email Investigation

  • Check if an email is in a data breach (Have I Been Pwned API):

    curl -s "https://haveibeenpwned.com/api/v3/breachedaccount/test@example.com" -H "hibp-api-key: YOUR_API_KEY"
  • Find email format for a company:

    hunter.io "example.com"
  • Reverse lookup email to find associated accounts:

    site:linkedin.com intext:"test@example.com"
  • Search for email leaks using Google dorks:

    "test@example.com" filetype:txt OR filetype:csv OR filetype:log
  • Check email reputation (MXToolbox):

    curl -s "https://mxtoolbox.com/SuperTool.aspx?action=blacklist:test@example.com"
  • Find someone's old accounts via Wayback Machine:

    curl -s "http://web.archive.org/cdx/search/cdx?url=facebook.com/johndoe*&output=text&fl=original"
  • Get full details of a phone number (Numverify API):

    curl -s "http://apilayer.net/api/validate?access_key=YOUR_API_KEY&number=+11234567890"
  • Find all images of a person using face recognition (PimEyes):

    site:pimeyes.com "John Doe"
  • Locate someone's forum activity using email hash (Gravatar):

    curl -s "https://en.gravatar.com/avatar/$(echo -n 'test@example.com' | md5sum | awk '{print $1}')"
  • Find a person's connections & mentions on the web:

    site:about.me OR site:angel.co OR site:medium.com "John Doe"
  • Reverse image search a profile picture (Google Images):

    curl -F "encoded_image=@profile.jpg" https://www.google.com/searchbyimage/upload

💎 Email Investigation

  • Find email aliases used by a person:
    site:pastebin.com OR site:throwawaymail.com "JohnDoe@example.com"
  • Find an email in GitHub repositories:
    site:github.com "JohnDoe@example.com"
  • Search for breached email data (Dehashed API):
    curl -u "user:password" -X GET "https://api.dehashed.com/search?query=test@example.com"
  • Check SPF, DKIM, and DMARC records for an email domain:
    dig TXT example.com | grep "spf"
    dig TXT _dmarc.example.com | grep "v=DMARC1"
  • Find subdomains linked to an email provider (for company investigation):
    amass enum -d example.com
  • Extract emails from a webpage using regex (wget & grep):
    wget -qO- "https://example.com" | grep -E -o "[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}"
  • Generate possible email variations for a person:
    echo "John Doe" | awk '{print tolower($1$2"@example.com"), tolower($1"."$2"@example.com"), tolower(substr($1,1,1)$2"@example.com")}'

👤 Advanced People Search

  • Find hidden social media profiles using Google dorks:
    site:instagram.com | site:tiktok.com | site:twitter.com "John Doe" "New York"
  • Find someone's aliases, old usernames, and accounts:
    site:usernamecheck.com OR site:checkusernames.com "JohnDoe"
  • Check if a phone number is linked to an online account (PhoneInfoga):
    phoneinfoga scan -n "+11234567890"
  • Check for leaked personal details on public databases:
    site:publicrecords.directory "John Doe" "Los Angeles"
  • Find associated domains with a name or business:
    curl -s "https://crt.sh/?q=%25example.com&output=json" | jq .
  • Reverse lookup a street address to find past owners:
    site:rehold.com OR site:spokeo.com OR site:truthfinder.com "123 Main St, NY"
  • Find images linked to a name (Google Reverse Image):
    site:images.google.com "John Doe"

📧 Advanced Email Investigation

  • Extract emails from a website recursively:

    theharvester -d example.com -l 100 -b google
  • Find all mentions of an email in forum posts:

    site:reddit.com OR site:quora.com "test@example.com"
  • Search for email leaks in plaintext files:

    "test@example.com" ext:txt OR ext:csv OR ext:log OR ext:sql
  • Find old email addresses linked to a domain:

    curl -s "http://web.archive.org/cdx/search/cdx?url=example.com&fl=original"
  • Find the social media accounts linked to an email:

    holehe test@example.com
  • Check if an email is linked to a PayPal account:

    curl -s -X POST -d "cmd=_notify-validate&receiver_email=test@example.com" https://www.paypal.com/cgi-bin/webscr
  • Generate potential email variations for a target:

    echo "John Doe" | awk '{print tolower($1$2"@example.com"), tolower($1"."$2"@example.com"), tolower(substr($1,1,1)$2"@example.com")}'
  • Check SPF, DKIM, and DMARC for an email domain:

    nslookup -q=TXT example.com
  • Check if an email is being used in spam campaigns (Spamhaus API):

    curl -s "https://check.spamhaus.org/test@example.com"
  • Find an old username linked to a person via Pastebin dumps:

    site:pastebin.com "John Doe" OR "johndoe123"
  • Find hidden profiles & associated links using WHOIS history:

    curl -s "https://whois-history.whoisxmlapi.com/api/v1?apiKey=YOUR_API_KEY&domainName=example.com"
  • Discover someone’s political donations (USA only):

    site:fec.gov "John Doe" "New York"
  • Check court records, arrest logs & criminal history:

    site:unicourt.com OR site:pacer.gov OR site:arrestfacts.com "John Doe"
  • Find if a person has been involved in a lawsuit:

    site:justia.com "John Doe" lawsuit OR defendant OR plaintiff
  • Reverse search job applications & résumés online:

    site:linkedin.com/in OR site:indeed.com "John Doe" "resume"
  • Find possible relatives or family members linked to a person:

    site:familytreenow.com "John Doe" "New York"
  • Get personal details leaked in public government databases:

    site:data.gov "John Doe" OR "123-45-6789"

📧 Email Investigation - Advanced Tactics

  • Find websites & domains registered with an email:

    curl -s "https://www.whoxy.com/?whois=test@example.com"
  • Find hidden email leaks in public FTP servers:

    intitle:"index of" "test@example.com" ext:txt | ext:csv | ext:sql
  • Check if an email is linked to an Apple ID:

    curl -X POST "https://iforgot.apple.com/password/verify/appleid" -d "id=test@example.com"
  • Find metadata in email headers (SPF, DKIM, DMARC validation):

    exiftool email.eml
  • Check for compromised accounts in combo lists:

    grep -i "test@example.com" breached-database.txt
  • Extract all emails from a PDF file:

    pdfgrep -o "[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}" file.pdf
  • Find email-associated subdomains via DNS:

    subfinder -d example.com
  • Check if an email is linked to cryptocurrency wallets:

    site:blockchain.com OR site:etherscan.io "test@example.com"
  • Find disposable or temporary emails linked to a person:

    site:temp-mail.org OR site:10minutemail.com "test@example.com"
  • Check for SMTP open relay on an email server:

    swaks --to test@example.com --server mail.example.com --data "Subject: Test"
  • Check if a person’s phone number is in a spam database:

    curl -s "https://api.callinsider.com/v1/search?number=+11234567890&apikey=YOUR_API_KEY"
  • Find deleted social media posts (cached Google & Bing results):

    cache:twitter.com/johndoe OR cache:facebook.com/johndoe
  • Search for user profiles in data breaches:

    site:haveibeenpwned.com "John Doe" OR "test@example.com"
  • Find out if someone has a Medium or Substack account:

    site:medium.com OR site:substack.com "John Doe"
  • Check for public Amazon wishlists linked to a name:

    site:amazon.com "John Doe" wishlist
  • Search property ownership records (USA only):

    site:realtor.com OR site:zillow.com "123 Main St, NY"
  • Check past travel history via flight logs (Private Jet owners):

    site:flightaware.com OR site:flightradar24.com "John Doe"
  • Look for someone's online dating profiles (Tinder, Bumble, etc.):

    site:tinder.com OR site:bumble.com "John Doe"
  • Find a person's reviews on websites (Amazon, Yelp, TrustPilot):

    site:amazon.com OR site:yelp.com OR site:trustpilot.com "John Doe"
  • Check if a person has been mentioned in news articles:

    site:bbc.com OR site:cnn.com OR site:forbes.com "John Doe"

📧 Email Investigation - Pro Level

  • Find alternate emails linked to a domain using Hunter.io:

    curl -s "https://api.hunter.io/v2/domain-search?domain=example.com&api_key=YOUR_API_KEY"
  • Extract email addresses from a CSV file:

    awk -F, '{print $2}' emails.csv | grep -E -o "[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}"
  • Check if an email is linked to a Steam account:

    curl -s "https://steamcommunity.com/actions/WhoIsOnline/test@example.com"
  • Search old forum posts linked to an email (4chan, Reddit, etc.):

    site:4chan.org OR site:reddit.com "test@example.com"
  • Find if an email is listed in PGP key databases:

    gpg --search-keys test@example.com
  • Extract emails from a Word document (.docx):

    strings file.docx | grep -E -o "[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}"
  • Find subdomains linked to an email provider:

    amass enum -d example.com
  • Check if an email is used in crypto forums (BitcoinTalk, etc.):

    site:bitcointalk.org "test@example.com"
  • Check if an email is linked to a Patreon account:

    site:patreon.com "test@example.com"
  • Verify if an email has been involved in fraud cases:

    site:ripoffreport.com OR site:scamwarners.com "test@example.com"
  • Find a person’s past usernames across multiple platforms:

    site:namemc.com OR site:usersearch.org OR site:instantusername.com "JohnDoe"
  • Check if a person is registered on genealogy websites:

    site:ancestry.com OR site:familysearch.org OR site:genealogy.com "John Doe"
  • Look up past marriages & divorces (US only):

    site:divorcerecords.org OR site:marriagerecords.com "John Doe"
  • Check public campaign donations (US politicians & donors):

    site:opensecrets.org OR site:fec.gov "John Doe"
  • Find someone’s car registration details (some countries):

    site:vehiclehistory.com OR site:carfax.com "John Doe"
  • Search for hidden YouTube channels linked to a person:

    site:youtube.com "John Doe"
  • Find someone’s frequently used locations via check-ins:

    site:foursquare.com OR site:swarmapp.com "John Doe"
  • Look up private business records or LLC registrations:

    site:opencorporates.com "John Doe" OR "Doe Enterprises"
  • Check if a person has published academic papers or research:

    site:researchgate.net OR site:academia.edu "John Doe"
  • Find an author’s books, blog posts, or past writings:

    site:goodreads.com OR site:medium.com OR site:substack.com "John Doe"

📧 Email Investigation - Next Level Tactics

  • Check if an email is linked to a Facebook account:
    curl -X POST -d "email=test@example.com" https://www.facebook.com/login/identify
  • Find if an email is mentioned in Telegram groups:
    site:t.me OR site:telegram.me "test@example.com"
  • Look up emails linked to an IP address using AbuseIPDB:
    curl -s "https://api.abuseipdb.com/api/v2/check?ipAddress=1.2.3.4&apiKey=YOUR_API_KEY"
  • Extract email addresses from HTML source code of a website:
    curl -s "http://example.com" | grep -oP '[a-zA-Z0-9._%+-]+@[a-zA-Z0-9.-]+\.[a-zA-Z]{2,}'
  • Find all emails ever used on a specific website:
    site:example.com "email"
  • Search for past email leaks using HIBP API:
    curl -s "https://haveibeenpwned.com/api/v2/breachedaccount/test@example.com"
  • Generate common email permutations for OSINT scanning:
    python3 EmailPermutator.py -n "John Doe" -d example.com
  • Check if an email is linked to a Zoom account:
    curl -X POST "https://zoom.us/signup" -d "email=test@example.com"
  • Find if an email is associated with a LinkedIn account:
    curl -X POST "https://www.linkedin.com/checkpoint/lg/login-submit" -d "session_key=test@example.com"
  • Discover if an email is linked to an Instagram account:
    curl -X POST "https://www.instagram.com/accounts/account_recovery_send_ajax/" -d "email_or_username=test@example.com"

🚀 Twitter (X) Advanced OSINT

# Extract tweets, likes, and followers via API
twint -u username --followers --following --tweets
# Search for leaked credentials in tweets  
twint -s "password OR API_KEY OR AWS_SECRET_ACCESS_KEY"
# Extract Twitter followers without rate limits
twint -u username --followers --csv -o followers.csv
# Find accounts linked to a phone number  
twint -s "+1234567890"
# Monitor target’s tweets in real-time
twint -u username --rt
# Find tweets with geotagged locations  
twint -s "keyword" --near "New York"

📘 Facebook Advanced OSINT

# Find all Facebook groups a user is in  
google "site:facebook.com/groups username"
# Extract hidden friends list from a Facebook profile  
curl -s "https://graph.facebook.com/v14.0/username/friends?access_token=YOUR_ACCESS_TOKEN"
# Scrape Facebook public posts by a user  
facebook-scraper username --posts
# Search for leaked Facebook IDs in breaches  
google "site:pastebin.com facebook.com/profile.php?id="
# Find Facebook posts from a specific location  
google "site:facebook.com intext:'📍 New York'"

📸 Instagram Advanced OSINT

# Download all Instagram stories from a target  
instaloader --stories username
# Extract Instagram metadata (location, device info, etc.)  
instaloader --metadata-json username
# Find all Instagram profiles linked to an email  
google "site:instagram.com intext:email@example.com"
# Extract geotagged Instagram posts  
google "site:instagram.com intext:'📍 London'"
# Find Instagram users with similar interests  
google "site:instagram.com intext:'#hacking #cybersecurity'"

💼 LinkedIn Advanced OSINT

# Scrape all employees from a company  
linkedin-scraper -c "Google"
# Extract job postings and hidden email contacts  
google "site:linkedin.com/jobs 'Cybersecurity Analyst' 'Remote'"
# Find LinkedIn profiles with leaked credentials  
google "site:linkedin.com/in 'password' OR 'email@example.com'"
# Identify LinkedIn users who worked for a company in the past  
google "site:linkedin.com/in 'Worked at Google'"
# Find LinkedIn profiles linked to an IP address  
shodan search "org:'LinkedIn Corp'"

📺 YouTube Advanced OSINT

# Download metadata from a YouTube channel  
yt-dlp -J "https://www.youtube.com/c/username"
# Extract subtitles and hidden keywords from videos  
yt-dlp --write-auto-sub --skip-download "https://www.youtube.com/watch?v=VIDEO_ID"
# Find YouTube videos from a specific geolocation  
google "site:youtube.com intext:'📍 New York'"
# Extract YouTube video analytics & insights  
google "site:socialblade.com youtube username"
# Find deleted YouTube videos  
google "site:archive.org youtube.com/watch?v="

🎯 Extra OSINT Techniques

# Reverse search social media profile pictures  
google "site:tineye.com inurl:result image.jpg"
# Find deep-web social media leaks  
google "site:pastebin.com OR site:ghostbin.com 'email@example.com'"
# Extract hidden metadata from social media images  
exiftool image.jpg
# Search for hidden social media accounts using an IP  
shodan search "ip:xxx.xxx.xxx.xxx"

🕵️ General Social Media OSINT

# Find accounts linked to an email or phone
whatsmyname -u email@example.com
# Check username presence across 500+ platforms
python3 sherlock username
# Scrape all social media links from a website
python3 photon.py -u example.com
# Identify hidden social media accounts of a target
theHarvester -d target.com -b all
# Check for social media accounts linked to an IP
shodan search "org:'Target ISP' http.title:'Login'"

🔧 Twitter (X) OSINT

# Get all tweets from a specific time range
twint -u username --since 2024-01-01 --until 2024-03-01
# Extract user email from tweets (if leaked)
twint -u username --email
# Find accounts created in a specific year
twint --year 2010
# Get tweets containing geolocation data
twint -u username --geocode
# Identify all hashtags used by a user
twint -u username --hashtags
# Extract all retweets of a specific user
twint -u username --retweets

👨‍👩‍👦 Facebook OSINT

# Find a user’s Facebook ID
curl -s "https://graph.facebook.com/username?access_token=YOUR_ACCESS_TOKEN"
# Find Facebook pages associated with an email
google "site:facebook.com intext:'email@example.com'"
# Extract all friends of a target (if public)
google "site:facebook.com intext:'Friends' username"
# Get public posts mentioning a keyword
google "site:facebook.com/public keyword"
# Search for Facebook profiles linked to a phone number
google "site:facebook.com intext:'+1234567890'"

📸 Instagram OSINT

# Find Instagram accounts linked to an email
google "site:instagram.com intext:email@example.com"
# Search for Instagram users by location
google "site:instagram.com intext:'📍 Location'"
# Extract all captions from an Instagram profile
instaloader --comments --metadata-json profile_username
# Get all Instagram stories from a public account
instaloader --stories username
# Extract all tagged photos of a user
google "site:instagram.com inurl:tags username"

💼 LinkedIn OSINT

# Find all employees of a company
theHarvester -d company.com -b linkedin
# Extract LinkedIn profile email from commits
git log --pretty=format:"%ae" | sort -u
# Search for LinkedIn users by job title
google "site:linkedin.com/in 'Cybersecurity Researcher' 'India'"
# Extract all skills listed on a LinkedIn profile
google "site:linkedin.com/in username 'Skills'"
# Search for LinkedIn profiles linked to a phone number
google "site:linkedin.com/in intext:'+1234567890'"

📺 YouTube OSINT

# Find all videos uploaded by a user
google "site:youtube.com/c/username"
# Extract metadata from a YouTube video
yt-dlp -J "https://www.youtube.com/watch?v=VIDEO_ID"
# Search for YouTube comments mentioning a keyword
google "site:youtube.com 'keyword' 'comments'"
# Download all subtitles from a YouTube channel
yt-dlp --write-auto-sub --sub-lang en --skip-download "https://www.youtube.com/c/username"

🎵 TikTok OSINT

# Scrape TikTok videos from a user
tiktok-scraper user username -n 50 -d
# Find TikTok videos based on geolocation
google "site:tiktok.com intext:'📍 New York'"
# Extract TikTok user bio information
tiktok-scraper user username -d --store

💌 WhatsApp OSINT

# Find public WhatsApp groups
google "site:chat.whatsapp.com keyword"
# Check if a phone number is linked to WhatsApp
curl -s "https://api.whatsapp.com/send?phone=+1234567890"

🔍 Advanced OSINT Tricks

# Reverse search social media profile pictures
google "site:tineye.com inurl:result image.jpg"
# Find data leaks related to an email
dehashed -q email@example.com
# Extract EXIF metadata from social media images
exiftool image.jpg
# Search for hidden social media accounts using an IP
shodan search "ip:xxx.xxx.xxx.xxx"

📌 Extract Geolocation from Metadata

🔹 Check image metadata for GPS coordinates

exiftool image.jpg | grep -i "GPS"

🔹 Extract metadata from videos (if available)

ffmpeg -i video.mp4 -f ffmetadata metadata.txt

🔹 Check metadata of PDFs for location info

pdfinfo file.pdf

📍 IP Geolocation

🔹 Find location from an IP address

curl -s "http://ip-api.com/json/8.8.8.8"

🔹 More detailed IP location data (including ISP & ASN)

curl -s "https://ipinfo.io/8.8.8.8/json"

🔹 Check IP geolocation with MaxMind

geoiplookup 8.8.8.8

🔹 Get approximate IP location from Shodan

shodan host 8.8.8.8

🗺 Reverse Geocoding & Mapping

🔹 Find address from GPS coordinates

curl -s "https://nominatim.openstreetmap.org/reverse?format=json&lat=40.748817&lon=-73.985428"

🔹 Find nearby locations using OpenStreetMap

curl -s "https://nominatim.openstreetmap.org/search?q=Eiffel+Tower&format=json"

🔹 Search places via Google Maps API

curl -s "https://maps.googleapis.com/maps/api/geocode/json?address=Eiffel+Tower&key=YOUR_API_KEY"

🔹 Find historical satellite images

https://livingatlas.arcgis.com/wayback/

📌 Wi-Fi, Bluetooth, & Mobile Data OSINT

🔹 Find location from Wi-Fi BSSID (if known)

curl "https://wigle.net/api/v2/network/search?netid=XX:XX:XX:XX:XX:XX"

🔹 Check if a Wi-Fi SSID has been mapped

curl -s "https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=XX:XX:XX:XX:XX:XX"

🔹 Check Bluetooth device locations (if tracked)

https://www.bluetooth.com/specifications/assigned-numbers/company-identifiers/

🔹 Check cell tower geolocation (for mobile tracking)

curl -s "https://opencellid.org/cell/get?mcc=310&mnc=410&lac=7033&cellid=17811&key=YOUR_API_KEY"

📍 Social Media Geolocation OSINT

🔹 Find location from Instagram post (if geotagged)

https://www.instagram.com/p/POST_ID/

🔹 Find location from Twitter post (if enabled)

https://twitter.com/username/status/POST_ID

🔹 Extract location from Facebook check-ins

https://www.facebook.com/search/places/?q=locationname

🔹 Reverse search a Snapchat map story

https://map.snapchat.com/

🚗 Vehicle & Transport Tracking

🔹 Track Uber/Lyft rides (if shared link available)

https://www.uber.com/track/TRACKING_CODE

🔹 Look up a car’s geotagged photos (if available)

https://www.instagram.com/explore/tags/carnumberplate/

🔹 Find ship locations (via AIS data)

https://www.marinetraffic.com/

🔹 Find aircraft locations (real-time flight tracking)

https://www.flightradar24.com/

🛰 Satellite & Aerial OSINT

🔹 View live satellite imagery (if available)

https://www.planet.com/explorer/

🔹 Search for satellite images from past years

https://eos.com/landviewer/

🔹 NASA Earth data for environmental tracking

https://earthdata.nasa.gov/

📌 Extract GPS from images (Exif metadata)

exiftool image.jpg | grep -E "GPS Latitude|GPS Longitude"

📍 Reverse image search location (Google)

curl -F 'encoded_image=@image.jpg' https://www.google.com/searchbyimage

🗺 Find location from Wi-Fi BSSID

curl "https://wigle.net/api/v2/network/search?netid=XX:XX:XX:XX:XX:XX"

📍 Find location from an IP address

curl -s "http://ip-api.com/json/IP_ADDRESS"

🌍 Get geolocation from phone number

python3 phoneinfoga.py -n +1234567890

📌 Check Google Maps Timeline (if accessible)

https://www.google.com/maps/timeline

🛰 Get satellite images of a location

https://www.google.com/maps/place/lat,long

📍 Reverse Geocode Coordinates

curl -s "https://nominatim.openstreetmap.org/reverse?format=json&lat=LAT&lon=LON"

🚗 Track Uber/Lyft ride details (if link available)

https://www.uber.com/track/XXXXXXXX

🌐 Find location from social media posts

https://maps.google.com/?q=LAT,LON
# Search for keywords on Ahmia (Tor Search Engine)
torify curl -s "https://ahmia.fi/search/?q=your_keyword"

# Search on OnionLand (Dark Web Search Engine)
torify curl -s "https://onionlandsearchengine.com/search?q=your_keyword"

# Extract all .onion links from a webpage
torify curl -s "http://example.onion" | grep -oP '(?<=href=")http://[^"]+\.onion'

# Find indexed .onion sites on DuckDuckGo
torify curl -s "https://www.duckduckgo.com/html?q=site:onion your_keyword"

# Check if a dark web site is online
torify curl -Is http://example.onion | head -n 1

Paste Sites OSINT One-Liners

# Search for leaked credentials on Pastebin
curl -s "https://www.google.com/search?q=site:pastebin.com your_keyword"

# Scrape Pastebin for recent pastes (requires API key)
curl -s "https://scrape.pastebin.com/api_scraping.php?limit=10"

# Check for mentions of an email in recent pastes
curl -s "https://www.google.com/search?q=site:pastebin.com your_email@example.com"

# Find pastes mentioning a specific domain
curl -s "https://www.google.com/search?q=site:pastebin.com yourdomain.com"

# Check for leaked credentials using DeHashed (API required)
curl -s "https://api.dehashed.com/search?query=email@example.com" -u "your_api_key"

U.S. FOIA Request Guide (How to Request Public Records)

curl -s "https://www.foia.gov/how-to.html"

U.S. State-Level FOIA Directories

curl -s "https://www.nfoic.org/coalitions/state-foi-resources/"

UK Freedom of Information (FOI) Requests

curl -s "https://www.whatdotheyknow.com/"

EU Public Documents & Transparency Database

curl -s "https://www.asktheeu.org/en/request/new"

🚓 Law Enforcement & Criminal Records

U.S. Department of Justice Press Releases (Cases & Convictions)

curl -s "https://www.justice.gov/news?q=John+Doe"

Interpol Stolen Works of Art Database

curl -s "https://www.interpol.int/en/Crimes/Cultural-heritage-crime/Stolen-Works-of-Art-Database"

U.S. Most Wanted by State

curl -s "https://www.usmarshals.gov/investigations/most_wanted/state.htm?q=Texas"

DEA Fugitives List

curl -s "https://www.dea.gov/fugitives?q=John+Doe"

Australia Criminal Records Check (National Police Certificates)

curl -s "https://www.afp.gov.au/what-we-do/services/criminal-records"

🏛️ Court Cases & Judgments

U.S. Supreme Court Case Lookup (Oyez)

curl -s "https://www.oyez.org/cases?q=John+Doe"

U.S. PACER (Federal Court Case Search) - Requires Login

curl -s "https://pacer.uscourts.gov"

UK Supreme Court Case Tracker

curl -s "https://www.supremecourt.uk/cases/search.html?q=John+Doe"

India Court Case Search (e-Courts Portal)

curl -s "https://ecourts.gov.in/services/cases?q=John+Doe"

European Court of Human Rights Cases

curl -s "https://hudoc.echr.coe.int/eng#{%22fulltext%22:[%22John+Doe%22]}"

💰 Financial, Banking & Tax Records

U.S. Federal Reserve Enforcement Actions

curl -s "https://www.federalreserve.gov/supervisionreg/enforcement-actions.htm?q=John+Doe"

U.S. IRS Exempt Organizations Search (Nonprofits, Churches, etc.)

curl -s "https://apps.irs.gov/app/eos/details/?q=NonprofitName"

U.S. Office of Foreign Assets Control (OFAC) Sanctions List

curl -s "https://sanctionssearch.ofac.treas.gov/"

UK HMRC Tax Evasion & Fraud Reports

curl -s "https://www.gov.uk/government/collections/hmrc-annual-reports"

European Central Bank (ECB) Enforcement Actions

curl -s "https://www.bankingsupervision.europa.eu/banking/sanctions/html/index.en.html?q=John+Doe"

🏠 Property & Real Estate Records

U.S. HUD Housing Data & Records

curl -s "https://www.hud.gov/program_offices/housing/rmra/oe/rpts/mfh_f47/mf_f47?q=123+Main+Street"

Canada Land Registry (Province-Specific)

curl -s "https://www.lro.gov.on.ca/en/home"

UK Land & Property Sales Data

curl -s "https://landregistry.data.gov.uk/app/ppd/"

Germany Real Estate Transactions (Open Data)

curl -s "https://www.govdata.de/web/guest/suchen/-/results/q/immobilien"

📡 Intelligence, Security & Military Records

U.S. CIA FOIA Reading Room (Declassified Documents)

curl -s "https://www.cia.gov/readingroom/search/site/John+Doe"

FBI Vault (Declassified Government Records)

curl -s "https://vault.fbi.gov/search?q=John+Doe"

U.S. Department of Defense Contracts & Spending

curl -s "https://www.defense.gov/News/Contracts/Search?q=CompanyName"

UK Ministry of Defence FOI Disclosures

curl -s "https://www.gov.uk/government/publications?departments%5B%5D=ministry-of-defence&q=John+Doe"

Russia & China Government Tenders & Defense Deals

curl -s "https://www.russiancontracts.ru/"  
curl -s "https://www.chinadefense.com.cn/"

👤 People, Identity & Vital Records

U.S. Census Bureau Public Records Search

curl -s "https://data.census.gov/cedsci/?q=John+Doe"

Canada Birth, Marriage & Death Certificates (Provincial-Level)

curl -s "https://www.canada.ca/en/revenue-agency/services/tax/individuals/identification-information/change-marital-status.html"

UK Births, Marriages & Deaths (GRO Index)

curl -s "https://www.gro.gov.uk/gro/content/certificates/"

Australia Births, Deaths & Marriages Registry

curl -s "https://www.bdm.vic.gov.au/research-and-family-history/search-your-family-history"

India Aadhaar Card Verification (Limited Public Data)

curl -s "https://uidai.gov.in/ecosystem/authentication-services.html"

🎭 Miscellaneous & Hidden OSINT Gems

U.S. FCC License Database (Find Radio Operators, Companies, etc.)

curl -s "https://wireless2.fcc.gov/UlsApp/UlsSearch/searchAdvanced.jsp?q=John+Doe"

U.S. Airline & Pilot License Verification (FAA Database)

curl -s "https://www.faa.gov/licenses-certificates/airmen-inquiry?q=John+Doe"

U.S. Medical License Search (Doctors & Practitioners)

curl -s "https://www.npinumberlookup.org/?q=John+Doe"

UK DVLA Vehicle & License Plate Lookup (Limited Public Access)

curl -s "https://vehicleenquiry.service.gov.uk/"

India RTO Vehicle Registration Check

curl -s "https://vahan.parivahan.gov.in/vahanservice/vahan/ui/statevalidation/homepage.xhtml"

Releases

No releases published

Sponsor this project

Packages

No packages published