OSINT

And Cyber Tools

Full OSINT focused on the most popular web-based, Open Source intelligence and Cybersecurity Tools.

Tools

Essential OSINT Tools





Attack Surface

01

Lupovis Prowl ⭐️

CVE Exploitation and Malicious IP Search Engine

04

Full Hunt

Attack Surface Management

07

ShadowServer

Free Daily Reports Subscription

10

Security Trails

Attack Surface Intelligence API

13

Greynoise

Vulnerability Search Engine

02

Shodan

Intelligence Search Engine

05

PhoneBook

Retrieve URLs from given Domain by IntelligenceX

08

SOCRadar

Extended Threat Intelligence

11

Hunter

Hunter Internet Search

03

Zoomeye

Intelligence Search Engine

06

Onyphe

Cyber Defense Search Engine

09

CriminalIP

Intelligence Search

12

IntelligenceX

Intelligence Search Engine

Sandbox and Reputation

01

Lupovis Prowl

IP Reputation Lookup

04

AppAnyRun

Interactive Malware Analysis

07

IP Quality Score

IP Reputation Lookup

10

Abuse IP

Asset Reputation Lookup

13

Triage

Analyze Malware Samples

16

MobSF

Mobile Security Framework (Android/iOS/Win)

17

Bluecoat Review

URL Reputation by Symantec

20

MetaDefender

Scan Anything with OPSWAT

23

Blacklist Checker

IP, Domain and Email Blacklist Check

25

Broweser ling

Online Browser Sandbox

02

VirusTotal

Free Malware Scanner by Google

05

URLScan

Public Sandbox

08

Google Safe

Google Transparency Report

11

URL Void

Website Reputation Lookup

14

Joe Sandbox

Windows, MacOS and Android Sanbox

14

IBM X-Force

Malware Analysis by IBM

18

Malwares

Hash, IP and Domain Malware Scan

21

FileScan

Sandbox by OPSWAT

24

France Verif

E-commerce Reputation Checker (Extension Available)

03

HybridAnalysis

Free Malware Scanner by Crowdstrike

06

Cuckoo CERT

Online Malware Analysis Tool

09

Talos

Asset Reputation Lookup by Cisco

12

Scam Adviser

E-commerce Website Reputation Lookup

15

Cyber Gordon

Amazing Multi-engine Cyber Reputation Check

15

PA Filtering

URL Reputation by Palo Alto

19

DocGuard

Malware Threat Scan from Hash

22

RST Cloud

IoC (Indicators of Compromise) Lookup by RST Cloud

Network

01

Lupovis Prowl

Malicious IP Lookup and

04

HPing

Send Custom Ping for security assessment 

07

Nmap Online

Nmap IP Ports Scan

10

BGP Tools

BGP Info

02

KeyCDN

IP Lookup

05

PeeringDB

Network, Internet Exchange and Facility DB

08

Wigle

Wireless Networks Mapping 

11

IP Void

Popular IP Tools

03

IPInfo

Trusted IP address data

06

IPTools

Basic IP and Network Tools

09

Port Scanner

Port scanner

DNS

01

Dig

DNS Dig

04

MXT Toolbox

MX DNS Audit

07

WhatsmyDNS

DNS Whois Details 

10

Dig GUI

DNS Dig (modern interface)

02

DNS Dumpster

Deep DNS Lookup

05

DNSLytics

Reverse IP to get hosted domains on server

08

DomainTools

DNS Whois Lookup

11

DNS Security

DNS Security Check & DMARC by Merox

03

Security Trails

DNS Lookup

06

Where Goes

Where does a link go

09

DNS History

Domain DNS Records History

Image

01

Tiny Eye

Reverse Image Search

02

PimEyes

Reverse Face Specialized Image Search

03

Pic2map

Image EXIF Data Viewer

Vulnerability Exploitation and Scanner

01

Lupovis Prowl

Malicious IP

04

OpenVAS Online

Online Vulnerability Scanner

07

Wappalizer

Website Technologies Scanner

10

Sucuri

Website Approximative Traffic and Ranking

13

NetCraft

Website Technologies and Infrastructure Scanner

02

SSL Labs

Website SSL Certificate Scanner by Qualys

05

WEB Archive

Internet Archive Machine

08

CMSSecurityScan

WordPress, Joomla and Drupal Security Scan

11

Similar Web

Website Approximative Traffic and Ranking

14

BuildWith

Assets Technologies Scanner

03

Cloudflare Radar

Amazing URL Scanner

06

SSL Scan

SSL/TLS Scan

09

WAFwoo

WAF Detection

12

Web Check

All-in-one Web site OSINT tool

Exploits and CTI

01

Lupovis Prowl

Threat Intelligence Based on Deception

04

Pulse Dive

Free Threat Intelligence

07

Vulners

Exploit Search Engine

10

OpenCTI

CTI Structuring Platform by French ANSSI

13

RiskIQ

Internet Intelligence by Microsoft

16

LOLBin

Attackers Binaries used out of their Purpose

02

LeakIX

Assets Leaks and Security Incident

05

CVE Shield

Crowdsources CVE Intel

08

ExploitDB

Vulnerabilities Advanced Database

11

CarbonBlack

VMware CB Real-time threat research data

14

First.org

CVSS Score Adapted to your Context

17

GTFOBins

Binaries to Bypass Misconfigured Systems

03

Threatbook CTI

Efficient Cyber Threat Intelligence

06

CVE Details

Vulnerabilities database

09

Alienvault OTX

Community Powered Open Threat Exchange Platform

12

Palo Alto Atoms

Actionable Threat Objects and Mitigations 

15

Filesec

Latest Attackers File Extensions

18

Abuse.ch

Community Driven Threat Intelligence

Active Directory

01

Purple Knight

Active Directory Security Audit by Semperis

04

HardenAD

AD and M365 Infrastructure Hardening-

07

Adalanche

Open-Source Active Directory ACL Visualizer

02

Ping Castle

Active Directory Security at 80% by Vincent Le Toux

05

CRT

CrowdStrike Reporting Tool for Azure AD / O365

03

BloodHound

AD and AAD Complex Attack Path Audit

06

AAD Internals

Extract openly available tenant information

Authentication

01

CRT

Certificate History Search Engine

04

NTLM

Database of +8,7 billion Password Hashes

02

2FA Directory

Check if MFA/2FA is Supported

03

CyberChef

Analyzing and Encoding Data

End Point

01

Browser Test

Web Browser Scan

04

Wicar

Test Your Anti-Malware Anti-Virus

02

Ransomware Risk

Ransomware Risk Assessment by Zscaler

05

OTX Endpoint Security

Community Powered Endpoint Security Tool

03

Grabify

Track Clicks on Your URL 

06

SurfShark

DNS Leak Test

Additional

01

GrayHat Warfare

Buckets and Shorteners finder 

04

OSINT Tracker

Track Your Investigations Online

07

Meta Crawler

Aggregates Search Engines

02

Blackbird

Map Accounts by Username 

05

Pastebin

Combine with Google Dorks 

08

Search Code

Search repositories

03

Grep

Search Across Git Repositories

06

Coalition

Cyber Score for your Company 

Advisory

01

NCSC

NCSC

04

CERT-FR

French CERT Security Advisories

07

CERT-BE

Go

02

CISA KEV

Know Exploited Vulnerabilities Catalog

05

MyCERT

Malaysia CERT Security Advisories

03

CERT-EU

European Union CERT Security Advisories

06

ORANGE CERT

Orange CERT

Data Breach

01

Have I Been Pwned

Search Email across multiple data breaches

02

Leak-Lookup

Search across multiple data breaches

03

LeakIX

Find Data Leaks