file_name
stringlengths 5
73
| relative_path
stringlengths 7
117
| extension
stringclasses 6
values | size_bytes
int64 0
971k
| content
stringlengths 0
960k
|
|---|---|---|---|---|
README.md
|
README.md
|
.md
| 39,403
|
[](https://github.com/sindresorhus/awesome)
[](https://github.com/EthicalML/awesome-artificial-intelligence-guidelines/graphs/commit-activity)



[](https://twitter.com/AxSaucedo/)
<table>
<tr>
<td width="60%">
<h1>Awesome AI Regulation, Principles & Guidelines</h1>
</td>
<td>
<a href="https://youtu.be/dKjCWfuvYxQ?t=147"><img src="images/bosstown.gif"></a> <br> (AKA Writing AI Responsibly)
</td>
</td>
</table>
## Overview
As AI systems become more prevalent in society, we face bigger and tougher societal challenges. Given many of these challenges have not been faced before, practitioners will face scenarios that will require dealing with hard ethical and societal questions.
There has been a large amount of content published which attempts to address these issues through “Principles”, “Ethics Frameworks”, “Checklists” and beyond. However navigating the broad number of resources is not easy.
This repository aims to simplify this by mapping the ecosystem of guidelines, principles, codes of ethics, standards and regulation being put in place around artificial intelligence.
## Quick links to sections in this page
### National Regulation by Economic Area
| | | |
|-|-|-|
|[Austria 🇦🇹](#austria)|[Brazil 🇧🇷](#brazil)|[Canada 🇨🇦](#canada)|[China 🇨🇳](#china)|
|[Israel 🇮🇱](#israel)|[European Union 🇪🇺](#european-union)|[India 🇮🇳](#india)|
|[Mexico 🇲🇽](#mexico)|[Singapore 🇸🇬](#singapore)|[Switzerland 🇨🇭](#switzerland)
|[United Arab Emirates 🇦🇪](#united-arab-emirates)|[United States of America 🇺🇸](#united-states-of-america)|[United Kingdom 🇬🇧](#united-kingdom)||
### Other Sections
| | | |
|-|-|-|
|[🔍 High Level Frameworks & Principles](#high-level-frameworks-and-principles) |[🔏 Processes & Checklists](#processes-and-checklists) | [🔨 Interactive & Practical Tools](#interactive-and-practical-tools)|
|[📜 Industry standards initiatives](#industry-standards-initiatives)|[📚 Online Courses](#online-courses-and-learning-resources)|[🤖 Research and Industry Newsletters](#research-and-industry-newsletters)|
## Other relevant resources
<table>
<tr>
<td width="30%">
You can join the <a href="https://ethical.institute/mle.html">Machine Learning Engineer</a> newsletter. You will receive updates on open source frameworks, tutorials and articles curated by machine learning professionals.
</td>
<td width="70%">
<a href="https://ethical.institute/mle.html"><img src="images/mleng.png"></a>
</td>
</tr>
</table>
# Regulation and Policy
## Austria
* [Artificial Intelligence Mission Austria 2030](https://www.bmk.gv.at/themen/innovation/publikationen/ikt/ai/aimat.html) - Shaping the Future of Artificial Intelligence in Austria. The Austrian ministry for Innovation and Technology published their vision for AI until 2030.
## Canada
* [Artificial Intelligence and Data Act (AIDA)](https://ised-isde.canada.ca/site/innovation-better-canada/en/artificial-intelligence-and-data-act-aida-companion-document) - An Act to enact the Consumer Privacy Protection Act, the Personal Information and Data Protection Tribunal Act and the Artificial Intelligence and Data Act and to make consequential and related amendments to other Acts
## Brazil
* [Brazilian AI Regulation (PL 2338/2023)](https://www25.senado.leg.br/web/atividade/materias/-/materia/157233): A proposed bill in Brazil aiming to establish a comprehensive framework for the development and use of artificial intelligence, emphasizing transparency, accountability, and alignment with international standards.
## China
* [Beijing AI Principles](https://www.baai.ac.cn/blog/beijing-ai-principles) - initiative for the research, development, use, governance and long-term planning of AI, calling for its healthy development to support the construction of a human community with a shared future, and the realization of beneficial AI for humankind and nature.
* [China's Interim Measures for the Management of Generative Artificial Intelligence Services](https://www.cac.gov.cn/2023-07/13/c_1690898327029107.htm) - The first administrative regulation on the management of Generative AI services, which came into effect on August 15, 2023.
* [China Internet Security Law](https://en.wikipedia.org/wiki/China_Internet_Security_Law) - China's law which enacted to increase cybersecurity and national security, safeguard cyberspace sovereignty and public interest, protect the legitimate rights and interests of citizens, legal persons and other organisations, and promote healthy economic and social development (and was argued by the Chinese ministry for industry and information that this law justified the means of pursuing the "Going Out" strategy China has persisted on ever since 1999). [KPMG's summary of the Cybersecurity Law](https://assets.kpmg/content/dam/kpmg/cn/pdf/en/2017/02/overview-of-cybersecurity-law.pdf). Center for strategic & international studies [overview of China's new Data Privacy law](https://www.csis.org/analysis/new-china-data-privacy-standard-looks-more-far-reaching-gdpr)
* [China's Personal Information Security Specification (Translation)](https://www.newamerica.org/cybersecurity-initiative/digichina/blog/translation-chinas-personal-information-security-specification/) - The Chinese Government's first major digital privacy rules which took effect in May 2018, which lays out granular guidelines for consent and how personal data should be collected, used and shared. Center for strategic & international studies [overview of the specification](https://www.csis.org/analysis/chinas-emerging-data-privacy-system-and-gdpr)
* [China's Administrative Provisions on Information Services on Microblogs](http://en.pkulaw.cn/display.aspx?cgid=309714&lib=law) - China's provisions which require microblogging sites (social media sites) to obtain relevant credentials by law, verify users' real identities, establish mechanisms for dispelling and refuting rumors, etc. [Summary of rules](https://www.loc.gov/law/foreign-news/article/china-rules-regulating-microblogs-issued/) by the US Law Library of Congress.
* [Decision on strengthening the protection of online information](https://www.globalprivacyblog.com/privacy/chinas-legislature-adopts-decision-on-strengthening-the-protection-of-online-information/) - The Standing Committee of the National People's Congress (NPC) of the People's Republic of China adopted the decision on strengthening the protection of online information - this is an act that contains 12 clauses applicable to entities both in the public and private sectors in respect to the collection and processing of electronic personal information on the internet.
* [Personal Data Protection Act](https://law.moj.gov.tw/ENG/LawClass/LawAll.aspx?pcode=I0050021) - The personal data protection act of the Republic of China, which is enacted to regulate the collection, processing and use of personal data as so to prevent harm on personality rights, and to facilitate the proper use of personal data.
## Israel
* [The principles of the policy for the responsible development of the field of AI](https://www.gov.il/en/pages/most-news20221117) - The draft policy for regulation and ethics in the field of artificial intelligence, with an emphasis on “responsible innovation”, is intended to ensure the advancement of the industry while safeguarding the public interest
## Dubai
* [Smart Dubai Artificial Intelligence Principles and Ethics - Ethical AI Toolkit](https://www.smartdubai.ae/initiatives/ai-principles-ethics) - created to provide practical help across a city ecosystem. It supports industry, academia and individuals in understanding how AI systems can be used responsibly. It consists of principles and guidelines, and a self-assessment tool for developers to assess their platforms.
## European Union
* [Ethics Guidelines for Trustworthy AI](https://ec.europa.eu/futurium/en/ai-alliance-consultation) - European Commission document prepared by the High-Level Expert Group on Artificial Intelligence (AI HLEG).
* [EU AI Act](https://artificialintelligenceact.eu/) - The EU Artificial Intelligence (AI) Act is a legal framework that regulates AI in the European Union; this was the first regulation implemented on AI ([overview](https://www.europarl.europa.eu/topics/en/article/20230601STO93804/eu-ai-act-first-regulation-on-artificial-intelligence)).
* [General Data Protection Regulation GDPR](https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=celex%3A32016R0679) - Legal text for the EU GDPR regulation 2016/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing Directive 95/46/EC
* [GDPR.EU Guide](https://gdpr.eu/) - A project co-funded by the Horizon 2020 Framework programme of the EU which provides a resource for organisations and individuals researching GDPR, including a library of straightforward and up-to-date information to help organisations achieve GDPR compliance ([Legal Text](https://www.govinfo.gov/content/pkg/USCODE-2012-title5/pdf/USCODE-2012-title5-partI-chap5-subchapII-sec552a.pdf)).
## India
* [The National Strategy for Artificial Intelligence](https://www.niti.gov.in/sites/default/files/2023-03/National-Strategy-for-Artificial-Intelligence.pdf) - The approach in this paper focuses on how India can leverage the transformative technologies to ensure social and inclusive growth in line with the development philosophy of the government. In addition, India should strive to replicate these solutions in other similarly placed developing countries.
* [The Principles for Responsible AI](https://www.niti.gov.in/sites/default/files/2021-02/Responsible-AI-22022021.pdf) - The paper incorporates insights, feedback and experiences consolidated through inter-ministerial consultations, large-scale global multi-stakeholder consultations and a series of 1-1 consultations with AI ethics experts in India and globally, as well as wider public consultations, conducted over the last 15 months. This paper is meant to serve as an essential roadmap for the AI ecosystem, encouraging adoption of AI in a responsible manner in India and building public trust in the use of this technology, placing the idea of ‘AI for All’ at its very core.
* [The Digital Personal Data Protection (DPDP) Act](https://www.meity.gov.in/writereaddata/files/Digital%20Personal%20Data%20Protection%20Act%202023.pdf) - India's DPDP Act aims to provide for the processing of digital personal data in a manner that recognises both the right of individuals to protect their personal data and the need to process such personal data for lawful purposes and for matters connected therewith or incidental thereto. The DPDP Act was passed in the Parliament of India in August 2023 and it's implementation is being driven by [MeitY](https://www.meity.gov.in/), which has released draft rules based on the act for public consultation on 3rd January 2025. The draft DPDP rules are available for public review and feedback [here](https://innovateindia.mygov.in/dpdp-rules-2025/).
## Mexico
* [Artificial Intelligence National Agenda Proposal for Mexico](https://www.ania.org.mx/_files/ugd/447d95_c7e6ebee6cf44b38a0d386cc9534f6e5.pdf) - Recommendations for multi-faceted commitment to guide the development and use of artificial intelligence in Mexico in an ethical and responsible manner.
## Singapore
* [Data Protection Act 2012](https://sso.agc.gov.sg/Act/PDPA2012) - The Personal Data Protection Act 2012 (the "Act") sets out the law on data protection in Singapore. Apart from establishing a general data protection regime, the Act also regulates telemarketing practices.
* [Protection from Online Falsehoods and Manipulation Act 2019](https://sso.agc.gov.sg/Acts-Supp/18-2019/Published/20190625?DocDate=20190625) - An act to prevent the electronic communication in Singapore of false statements of fact, to suppress support for and counteract the effects of such communication, to safeguard against the use of online accounts for such communication and for information manipulation, to enable measures to be taken to enhance transparency of online political advertisements and for related matters.
## Switzerland
* [New Federal Act on Data Protection (nFADP)](https://www.fedlex.admin.ch/eli/cc/2022/491/en) - The New Federal Act on Data Protection (nFADP) was passed in the Swiss Parliament in 2020 and came into effect from September 1, 2023. It aims to improve the processing of personal data and grant new rights to the people concerned, and also comes with a number of obligations for companies. Every company, Swiss or otherwise, offering goods and services to Swiss citizens and processing their personal data is subject to the nFADP. More highlights on nFADP available [here](https://www.kmu.admin.ch/kmu/en/home/facts-and-trends/digitization/data-protection/new-federal-act-on-data-protection-nfadp.html).
## United Arab Emirates
* [UAE National Strategy for AI](https://ai.gov.ae/wp-content/uploads/2021/07/UAE-National-Strategy-for-Artificial-Intelligence-2031.pdf) - This paper outlines the UAE's ambitions to become a fast adopter of emerging AI technologies across Government, as well as attract top AI talent to experiment with new technologies and work in a sophisticated, secure ecosystem to solve complex problems.
## United States of America
* [The White House Executive Order in AI](https://www.whitehouse.gov/briefing-room/presidential-actions/2023/10/30/executive-order-on-the-safe-secure-and-trustworthy-development-and-use-of-artificial-intelligence/) - The USA Executive Order on the Safe, Secure, and Trustworthy Development and Use of Artificial Intelligence
* [California Consumer Privacy Act (CCPA)](http://leginfo.legislature.ca.gov/faces/billCompareClient.xhtml?bill_id=201720180AB375) - Legal text for California's consumer privacy act
* [EU-U.S. and Swiss-U.S. Privacy Shield Frameworks](https://www.privacyshield.gov/welcome) - The EU-U.S. and Swiss-U.S. Privacy Shield Frameworks were designed by the U.S. Department of Commerce and the European Commission and Swiss Administration to provide companies on both sides of the Atlantic with a mechanism to comply with data protection requirements when transferring personal data from the European Union and Switzerland to the United States in support of transatlantic commerce.
* [Fair Credit Reporting Act 2018](https://www.ftc.gov/enforcement/statutes/fair-credit-reporting-act) - The Fair Reporting Act is a federal law that regulates the collection of consumers' credit information and access to their credit reports.
* [Gramm-Leach-Billey Act (for financial institutions)](https://www.ftc.gov/tips-advice/business-center/privacy-and-security/gramm-leach-bliley-act) - The Graham-Leach-Billey Act requires financial institutions (companies that offer consumers financial projects or services like loans, financial, or investment advice, or insurance) to explain their information-sharing practices to their customers and to safeguard sensitive data.
* [Health Insurance Portability and Accountability Act of 1996](https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html) - The HIPAA required the secretary of the US department of health and human services (HHS) to develop regulations protecting the privacy and security of certain health information, which then HHS published what is known as the HIPAA [Privacy Rule](https://www.hhs.gov/hipaa/for-professionals/privacy/index.html), and the HIPAA [Security Rule](https://www.hhs.gov/hipaa/for-professionals/security/index.html).
* [Executive Order on Maintaining American Leadership in AI](https://www.whitehouse.gov/presidential-actions/executive-order-maintaining-american-leadership-artificial-intelligence/) - Official mandate by the President of the US to
* [Privacy Act of 1974](https://www.justice.gov/opcl/privacy-act-1974) - The privacy act of 1974 which establishes a code of fair information practices that governs the collection, maintenance, use and dissemination of information about individuals that is maintained in systems of records by federal agencies.
* [Privacy Protection Act of 1980](https://epic.org/privacy/ppa/) - The Privacy Protection Act of 1980 protects journalists from being required to turn over to law enforcement any work product and documentary materials, including sources, before it is disseminated to the public.
* [DoD's Ethical Principles for AI](https://www.diu.mil/responsible-ai-guidelines) - The U.S.A. Department of Defense responsible AI guidelines for tech contractors. The guidelines provide a step-by-step process to follow during the planning, development, and deployment phases of the technical lifecycle.
## United Kingdom
* [UK's AI regulation: a pro-innovation approach](https://www.gov.uk/government/publications/ai-regulation-a-pro-innovation-approach) - This white paper details the UK's plans for implementing a pro-innovation approach to AI regulation.
* [UK Data Protection Act of 2018](http://www.legislation.gov.uk/ukpga/2018/12/contents/enacted) - The DPA 2018 enacts the GDPR into UK Law, however in doing so has included various "derogations" as permitted by the GDPR, resulting in some key differenced (which although small are not of insignificance impact and may have a greater impact after Brexit).
* [The Information Commissioner's Office guide to Data Protection](https://ico.org.uk/for-organisations/guide-to-data-protection/) - This guide is for data protection officers and others who have day-to-day responsibility for data protection. It is aimed at small and medium-sized organisations, but it may be useful for larger organisations too.
# High Level Frameworks and Principles
* [AI & Machine Learning 8 principles for Responsible ML](https://ethical.institute/principles.html) - The Institute for Ethical AI & Machine Learning has put together 8 principles for responsible machine learning that are to be adopted by individuals and delivery teams designing, building and operating machine learning systems.
* [An Evaluation of Guidelines - The Ethics of Ethics](https://arxiv.org/ftp/arxiv/papers/1903/1903.03425.pdf) - A research paper that analyses multiple Ethics principles
* [Association for Computer Machinery's Code of Ethics and Professional Conduct](https://www.acm.org/code-of-ethics) - This is the code of ethics that has been put together in 1992 by the Association for Computer Machinery and updated in 2018. The Code is designed to inspire and guide the ethical conduct of all computing professionals, including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. Additionally, the Code serves as a basis for remediation when violations occur. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration.
* [From What to How: An initial review of publicly available AI Ethics Tools, Methods and Research to translate principles into practices](https://arxiv.org/abs/1905.06876) - A paper published by the UK Digital Catapult that aims to identify and present the gap between principles and their practical applications.
* [European Commission's Guidelines for Trustworthy AI](https://digital-strategy.ec.europa.eu/en/library/ethics-guidelines-trustworthy-ai) - The Ethics Guidelines for Trustworthy Artificial Intelligence (AI) is a document prepared by the High-Level Expert Group on Artificial Intelligence (AI HLEG). This independent expert group was set up by the European Commission in June 2018, as part of the AI strategy announced earlier that year.
* [IEEE's Ethically Aligned Design](https://ethicsinaction.ieee.org/) - A Vision for Prioritizing Human Wellbeing with Artificial Intelligence and Autonomous Systems that encourages technologists to prioritize ethical considerations in the creation of autonomous and intelligent technologies.
* [Montréal Declaration for a responsible development of artificial intelligence](https://www.montrealdeclaration-responsibleai.com/the-declaration) - ethical principles and values that promote the fundamental interests of people and group created as an initiative by Université de Montréal
* [Oxford's Recommendations for AI Governance](https://www.fhi.ox.ac.uk/wp-content/uploads/Standards_-FHI-Technical-Report.pdf) - A set of recommendations from Oxford's Future of Humanity institute which focus on the infrastructure and attributes required for efficient design, development, and research around the ongoing work building & implementing AI standards.
* [PWC's Responsible AI](https://www.pwc.com/gx/en/issues/data-and-analytics/artificial-intelligence/what-is-responsible-ai.html) - PWC has put together a survey and a set of principles that abstract some of the key areas they've identified for responsible AI.
* [Singapore Data Protection Govt Commission's AI Governance Principles](https://www.pdpc.gov.sg/help-and-resources/2020/01/model-ai-governance-framework) - The Singapore government's Personal Data Protection Commission has put together a set of guiding principles towards data protection and human involvement in automated systems, and comes with a report that breaks down the [guiding principles and motivations](https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Resource-for-Organisation/AI/Primer-for-2nd-edition-of-AI-Gov-Framework.pdf?la=en).
* [Toronto Declaration](https://www.accessnow.org/the-toronto-declaration-protecting-the-rights-to-equality-and-non-discrimination-in-machine-learning-systems/) Protecting the right to equality and non-discrimination in machine learning systems by accessnow.
* [UK Government's Data Ethics Framework Principles](https://www.gov.uk/government/publications/data-ethics-framework/data-ethics-framework) - A resource put together by the Department for Digital, Culture, Media and Sport (DCMS) which outlines an overview of data ethics, together with a 7-principle framework.
* [Algorithm charter for Aotearoa New Zealand](https://data.govt.nz/use-data/data-ethics/government-algorithm-transparency-and-accountability/algorithm-charter) - The Algorithm Charter for Aotearoa New Zealand is an evolving piece of work that needs to respond to emerging technologies and also be fit-for-purpose for government agencies.
* [Montreal AI Ethics Institute State of AI Ethics June 2020 Report](https://montrealethics.ai/the-state-of-ai-ethics-report-june-2020/) - A resource put together by the [Montreal AI Ethics Institute](https://montrealethics.ai) that captures the most relevant research and reporting in the domain of AI ethics between March 2020 and June 2020.
* [Montreal AI Ethics Institute State of AI Ethics October 2020 Report](https://montrealethics.ai/oct2020/) - A resource put together by the [Montreal AI Ethics Institute](https://montrealethics.ai) that captures the most relevant research and reporting in the domain of AI ethics between July 2020 and October 2020.
* [Technical and Organizational Best Practices](https://www.fbpml.org/the-best-practices/the-best-practices) - A resource put together by [Foundation for Best Practices in Machine Learning (FBPML)](https://www.fbpml.org/) with technical guidelines (e.g. fairness and non-discrimination, monitoring and maintenance, data quality, product traceability, explainability) and organizational guidelines (e.g. data governance, product management, human resources management, compliance and auditing). Community contributions are welcome via the [FBPML Wiki](https://wiki.fbpml.org/wiki/Main_Page).
* [Understanding artificial intelligence ethics and safety](https://www.turing.ac.uk/research/publications/understanding-artificial-intelligence-ethics-and-safety) - A guide for the responsible design and implementation of AI systems in the public sector by David Leslie from the [Alan Turing Institute](https://www.turing.ac.uk/).
* [Declaration for responsible and intelligent data practice](https://www.declaration.org.uk/) - a shared vision of what best practice in data looks like by [Open Data Manchester](https://www.opendatamanchester.org.uk/).
* [Recommendation on the Ethics of Artificial Intelligence](https://unesdoc.unesco.org/ark:/48223/pf0000381137) - The Recommendation by the UNESCO is a comprehensive international framework aiming to shape the development and use of AI technologies and establishes a set of values in line with the promotion and protection of human rights, human dignity, and environmental sustainability. It has been adopted by acclamation by 193 Member States at UNESCO’s General Conference in November 2021. For more information, refer to UNESCO's 2023 publication on key facts [here](https://www.unesco.org/en/articles/unescos-recommendation-ethics-artificial-intelligence-key-facts).
# Processes and Checklists
* [AI RFX Procurement Framework](https://ethical.institute/rfx.html) - A procurement framework for evaluating the maturity of machine learning systems put together by cross functional teams of academics, industry practitioners and technical individuals at The Institute for Ethical AI & Machine Learning to empower industry practitioners looking to procure machine learning suppliers.
* [Checklist for data science projects](http://deon.drivendata.org/) – Deon by DrivenData is a command line tool that allows you to easily add an ethics checklist to your data science projects.
* [Designing Ethical AI Experiences Checklist and Agreement](https://resources.sei.cmu.edu/library/asset-view.cfm?assetid=636620) - document to guide the development of accountable, de-risked, respectful, secure, honest, and usable artificial intelligence (AI) systems with a diverse team aligned on shared ethics. Carnegie Mellon University, Software Engineering Institute.
* [Ethical OS Toolkit](https://ethicalos.org/) - A toolkit that dives into 8 risk zones to assess the potential challenges that a technology team may face, together with 14 scenarios to provide examples, and 7 future-proofing strategies to help take ethical action.
* [Ethics Canvas](https://www.ethicscanvas.org/index.html) - A resource inspired by the traditional business canvas, which provides an interactive way to brainstorm potential risks, opportunities and solutions to ethical challenges that may be faced in a project using post-it note-like approach.
* [Kat Zhou's Design Ethically Resources](https://www.designethically.com/toolkit) - A set of workshops that can be organised across teams to identify challenges, assess current risks and take action on potential issues around ethical challenges that may be faced.
* [Markula Center's Ethical Toolkit for Engineering/Design Practice](https://www.scu.edu/ethics-in-technology-practice/ethical-toolkit/) - A practical and comprehensible toolkit with seven components to aid practitioners reflect, and judge the moral grounds in which they are operating.
* [Open Ethics Maturity Model (OEMM)](https://openethics.ai/oemm/) - The Open Ethics Maturity Model (OEMM) is a five-level framework. It embarks the organization on a journey toward transparent governance of AI and autonomous systems.
* [San Francisco City's Ethics & Algorithms Toolkit](https://ethicstoolkit.ai/) - A risk management framework for government leaders and staff who work with algorithms, providing a two part assessment process including an algorithmic assessment process, and a process to address the risks.
* [UK Government's Data Ethics Workbook](https://www.gov.uk/government/publications/data-ethics-workbook/data-ethics-workbook) - A resource put together by the Department for Digital, Culture, Media and Sport (DCMS) which provides a set of questions that can be asked by practitioners in the public sector, which address each of the principles in their [Data Ethics Framework Principles](https://www.gov.uk/government/publications/data-ethics-framework/data-ethics-framework).
* [World Economic Forum's Guidelines for Procurement](https://www.weforum.org/press/2019/09/uk-government-first-to-pilot-ai-procurement-guidelines-co-designed-with-world-economic-forum/) - The WEF has put together a set of guidelines for governments to be able to safely and reliably procure machine learning related systems, which has been trialled with the UK government.
* [Machine Learning Assurance](https://monitaur.ai/blog/machine-learning-assurance/) - Quick look at machine learning assurance: process of recording, understanding, verifying, and auditing machine learning models and their transactions.
* [ODEP's Checklist for Employers: Facilitating the Hiring of People with Disabilities Through the Use of eRecruiting Screening Systems, Including AI](https://www.peatworks.org/wp-content/uploads/2020/10/EARN_PEAT_eRecruiting_Checklist.pdf) - The Employer Assistance and Resource Network on Disability Inclusion (EARN) and the Partnership on Employment & Accessible Technology (PEAT), which are both funded through the U.S. Department of Labor's Office of Disability Employment Policy (ODEP), collaborated on an inclusive AI checklist for employers. The checklist provides direction for leadership, human resources personnel, equal employment opportunity managers, and procurement officers for reviewing AI tools used in recruiting and candidate assessment for fairness and inclusion of individuals with disabilities.
* [Microsoft AI Fairness Checklist](https://www.microsoft.com/en-us/research/project/ai-fairness-checklist/)
* [US NIST AI Risk Management Framework](https://www.nist.gov/itl/ai-risk-management-framework) - The Framework is intended to help developers, users and evaluators of AI systems better manage AI risks which could affect individuals, organizations, society, or the environment.
# Interactive and Practical Tools
* [Aequitas' Bias & Fairness Audit Toolkit](http://aequitas.dssg.io/) - The Bias Report is powered by Aequitas, an open-source bias audit toolkit for machine learning developers, analysts, and policymakers to audit machine learning models for discrimination and bias, and make informed and equitable decisions around developing and deploying predictive risk-assessment tools.
* [Awesome Machine Learning Production List](https://github.com/ethicalml/awesome-production-machine-learning) - A list of tools and frameworks that support the design, development and operation of production machine learning systems, currently maintained by The Institute for Ethical AI & Machine Learning.
* [Cape Python](https://github.com/capeprivacy/cape-python) - Easily apply privacy-enhancing techniques for data science and machine learning tasks in Pandas and Spark. Can be used in conjunction with [Cape Core](https://github.com/capeprivacy/cape) to collaborate on privacy policies and distribute those policies for data projects across teams and organizations.
* [eXplainability Toolbox](https://ethical.institute/xai.html) - The Institute for Ethical AI & Machine Learning proposal for an extended version of the traditional data science process which focuses on algorithmic bias and explainability, to ensure a baseline of risks around undesired biases can be mitigated.
* [FAT Forensics](https://fat-forensics.org/) is a Python toolkit for evaluating Fairness, Accountability and Transparency of Artificial Intelligence systems. It is built on top of SciPy and NumPy, and distributed under the 3-Clause BSD license (new BSD).
* [IBM's AI Explainability 360 Open Source Toolkit](http://aix360.mybluemix.net/) - This is IBM's toolkit that includes large number of examples, research papers and demos implementing several algorithms that provide insights on fairness in machine learning systems.
* [Linux Foundation AI Landscape](https://landscape.lfai.foundation/) - The official list of tools in the AI landscape curated by the Linux Foundation, which contains well maintained and used tools and frameworks.
* [Open Ethics Data Passport](https://openethics.ai/oedp/) - The Open Ethics Data Passport ([OEDP](https://github.com/OpenEthicsAI/OEDP)) is focused on describing the origins of the models by sheding light on how the training datasets were collected, cleaned, labeled, and used for training of the AI models.
* [Open Ethics Label: AI nutrition labels](https://openethics.ai/label/) - Open Ethics Label ([OEL](https://github.com/OpenEthicsAI/OEL)) is a “nutrition label” for digital products, including AI systems. It brings standard of self-disclosure to digital products to make these products transparent and safe for consumers.
* [Taking action on digital ethics](https://www.avanade.com/en-us/thinking/research-and-insights/trendlines/digital-ethics) from Avanade
* [Microsoft Fairlearn](https://fairlearn.org/) - An open-source toolkit for assessing and improving fairness in machine learning products developed by Microsoft
* [Microsoft Interpret ML](https://interpret.ml/) - An open-source toolkit for improving explainability/interpretability developed by Microsoft
* [Alibi](https://github.com/SeldonIO/alibi) - An open-source Python library for machine learning model inspection and interpretation.
# Industry standards initiatives
* [ACS Code of Professional Conduct - PDF](https://www.acs.org.au/content/dam/acs/rules-and-regulations/Code-of-Professional-Conduct_v2.1.pdf) - Australian ICT (Information and Communication Technology) sector professional organization.
* [Association for Computer Machinery's Code of Ethics and Professional Conduct](https://www.acm.org/code-of-ethics) - This is the code of ethics that has been put together in 1992 by the Association for Computer Machinery and updated in 2018. The Code is designed to inspire and guide the ethical conduct of all computing professionals, including current and aspiring practitioners, instructors, students, influencers, and anyone who uses computing technology in an impactful way. Additionally, the Code serves as a basis for remediation when violations occur. The Code includes principles formulated as statements of responsibility, based on the understanding that the public good is always the primary consideration.
* [IEEE Global Initiative for Ethical Considerations in Artificial Intelligence (AI) and Autonomous Systems (AS)](https://ethicsinaction.ieee.org/) - IEEE Approved Standards Projects specifically focused on the Ethically Aligned Design principles, and includes 14 (P700X) standards which cover topics from data collection to privacy, to algorithmic bias and beyond.
* [ISO/IEC's Standards for Artificial Intelligence](https://www.iso.org/committee/6794475/x/catalogue/) - The ISO's initiative for Artificial Intelligence standards, which include a large set of subsequent standards ranging across Big Data, AI Terminology, Machine Learning frameworks, etc.
* [Open Ethics Transparency Protocol](https://openethics.ai/oetp/) - The Open Ethics Transparency Protocol ([OETP](https://github.com/OpenEthicsAI/OETP) or Protocol) describes the creation and exchange of voluntary ethics Disclosures for products that involve Automated Decision-Making (ADM), including AI-powered services, Robotic process automation (RPA) tools, and robots. It is brought as a solution to increase the transparency of how digital products with full or partial automation are built and deployed.
# Online Courses and Learning Resources
* [Udacity's Secure & Private AI Course](https://www.udacity.com/course/secure-and-private-ai--ud185) - Free course by Udacity which introduces three cutting-edge technologies for privacy-preserving AI: Federated Learning, Differential Privacy, and Encrypted Computation.
* [Data science ethics](https://www.coursera.org/learn/data-science-ethics) - Free course by Prof. Jagadish from the University of Michigan (via Coursera) that covers data ownership, privacy and anonymity, data validity, and algorithmic fairness.
* [Practical Data Ethics](https://ethics.fast.ai/) - Free course by Rachel Thomas from the University of San Francisco Data Institute (via fast.ai) that covers disinformation, bias and fairness, foundations of ethics, privacy and surveillance, algorithmic colonialism
* [Bias and Discrimination in AI](https://www.edx.org/course/bias-and-discrimination-in-ai) - Free course by the University of Montreal and IVADO (via edX) about the discriminatory effects of algorithmic decision-making and responsible machine learning (institutional and technical strategies to identify and address bias).
* [Intro to AI ethics](https://www.kaggle.com/learn/intro-to-ai-ethics) - Free course by Kaggle introducing the base concepts of ethics in AI and how to mitigate related problems.
* [Introduction to AI Safety, Ethics, and Society](https://www.aisafetybook.com/) - Developed by Dan Hendrycks, director of the [Center for AI Safety](https://www.safe.ai/), this free online textbook aims to provide an accessible introduction to students, practitioners and others looking to better understand issues pertaining to AI Safety and Ethics. Apart from online reading, this book is available as a PDF [here](https://www.aisafetybook.com/download) and also as a free virtual course [here](https://www.aisafetybook.com/virtual-course).
# Research and Industry Newsletters
* [Import AI](https://jack-clark.net/) - A newsletter curated by OpenAI's Jack Clark which curates the most resent and relevant AI research, as well as relevant societal issues that intersect with technical AI research.
* [Matt's thoughts in between](https://www.getrevue.co/profile/mattclifford) - Newsletter curated by Entrepreneur First CEO Matt Clifford that provides a curated critical analysis on topics surrounding geopolitics, deep tech startups, economics and beyond.
* [The Machine Learning Engineer](https://ethical.institute/mle.html) - A newsletter curated by The Institute for Ethical AI & Machine Learning that contains curated articles, tutorials and blog posts from experienced Machine Learning professionals and includes insights on best practices, tools and techniques in machine learning explainability, reproducibility, model evaluation, feature analysis and beyond.
* [Montreal AI Ethics Institute Weekly AI Ethics newsletter](https://aiethics.substack.com) - A weekly newsletter curated by [Abhishek Gupta](https://atg-abhishek.github.io) and his team at the [Montreal AI Ethics Institute](https://montrealethics.ai) that presents accessible summaries of technical and academic research papers along with commentary on the latest in the domain of AI ethics.
* [AI Safety Newsletter](https://newsletter.safe.ai/) - A weekly newsletter from the Center for AI Safety providing updates on AI research, policy, and other areas for a non-technical audience.
* [ML Safety Newsletter](https://newsletter.mlsafety.org/) - A newsletter from the Center for AI Safety providing occasional deep-dives on key results in technical AI research.
|
README.md
|
README.md
|
.md
| 182,141
|
<base target="_blank">
<!---<script src='https://cdn.jsdelivr.net/gh/eddymens/[email protected]/main.min.js'></script>
--->
<h1 align="center">
<b>Awesome OSINT For Everything</b> <img src="https://awesome.re/badge-flat.svg"/></h1>
<p align="center">
A list of osint tools/websites for pentration testing, Reverse Searching, Red team Oprations, information gathering, bugbounty and almost cover everything in single file.
</p>
<!---<p align="center">
<a href="https://github.com/astrosp/osint-tools#PRODUCTIVITY" target="_blank">Productivity</a>
<a href="https://github.com/astrosp/osint-tools#FILE UPLOAD" target="_blank">File Upload</a>
<a href="https://github.com/astrosp/osint-tools#TOOLSET" target="_blank">Toolset</a></p>
--->
## Index
[AI](#ai) ⁕ [Breaches & Leaks](#breaches-and-leaks) ⁕ [Recon](#recon) ⁕ [Productivity](#productivity) ⁕ [File Upload](#file-upload) ⁕ [Toolset](#toolset) ⁕ [Top Search Engines](#search-engines) ⁕ [Whois](#whois) ⁕ [Source Codes](#source-codes) ⁕ [Domain / IP / DNS](#domain--ip--dns) ⁕ [Malware](#malware) ⁕ [Dataset](#dataset) ⁕ [Geo](#geo) ⁕ [IoT](#iot) ⁕ [Darknet](#darknet) ⁕ [Cryptocurrency](#cryptocurrency) ⁕ [Username](#username) ⁕ [Email](#email) ⁕ [Phone](#phone) ⁕ [Whatsapp](#whatsapp) ⁕ [Social Media](#social-media) ⁕ [Facebook](#facebook) ⁕ [Twitter](#twitter) ⁕ [Youtube](#youtube) ⁕ [Instagram](#instagram) ⁕ [Reddit](#reddit) ⁕ [LinkedIn](#linkedin) ⁕ [Google](#google) ⁕ [Discord](#discord) ⁕ [Twitch](#twitch) ⁕ [Telegram](#telegram) ⁕ [Snapchat](#snapchat) ⁕ [TikTok](#tiktok) ⁕ [Steam](#steam) ⁕ [Search Engine](#search-engines) ⁕ [News](#news) ⁕ [Clubhouse](#clubhouse) ⁕ [Bot](#bot) ⁕ [Analysis](#analytics) ⁕ [Blog](#blog) ⁕ [Throwaway Contact](#throwaway-contact) ⁕ [ID Generator](#id-generator) ⁕ [Emulator](#emulator) ⁕ [Hash Recovery](#hash-recovery) ⁕ [Downloader](#downloader) ⁕ [Privacy / Security](#privacy--security) ⁕ [Secure Communication](#secure-communication) ⁕ [Resources](#resources) ⁕ [Threat Intel](#threat-intel) ⁕ [Identity Resolution](#identity-resolution) ⁕ [People](#people) ⁕ [Google CSE](#google-cse) ⁕ [Radio](#radio) ⁕ [Open Directory](#open-directory) ⁕ [Maps](#maps) ⁕ [Data Dump](#data-dump) ⁕ [Informant](#informant) ⁕ [Public Record](#public-records) ⁕ [Government](#government) ⁕ [Image and Audio](#images-and-audio)
#### <i>Some of other OSINT tools List</i>
- [osinttools.io](https://osinttools.io/) - Discover and compare the top OSINT tools in one place.
## Breaches and Leaks
- [greynoise](https://viz.greynoise.io/) - Search for IPs, Tags, CVEs, vpn, dns...
- [Dehashed](https://www.dehashed.com/) - You can search for your email if its leak in some databases of anything..
- [HaveIbeenPwned?](https://haveibeenpwned.com/) - check if your email address is in a data breach
- [ScamSearch](https://scamsearch.io/) - search to find phone, email, profile if is tobe a scammer.
- [Intelligence X](https://intelx.io/) - Intelligence X is a search engine and data archive. · The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs...
- [spycloud](https://portal.spycloud.com/endpoint/enriched-stats/[YOUR-MAIL]) - put your mail in YOUR-MAIL.
- [weleakinfo](https://weleakinfo.io/) - We Leak Info - Leaked Dehashed Databases, search for leaks.
- [breachdirectory](https://breachdirectory.org/) - CHECK IF YOUR EMAIL OR USERNAME WAS COMPROMISED
- [leakcheck](https://leakcheck.io/) - Find out if your credentials have been compromised
- [Findemail.io](https://findemail.io/) - Find email addresses for given company.
- [LibraryOfLeaks](https://search.libraryofleaks.org) - Search for leak documents, companies, people, database and more
- [LeakRadar](https://leakradar.io/) - Instant search across 2 B+ plain-text info-stealer credentials; email, domain, metadata queries, monitoring & API
- [InfoStealers](https://infostealers.info/en/info) - Indexes darknet-exposed infostealer logs and makes them searchable and actionable for security teams, investigators, researchers, and digital forensics professionals.
## Basic OSINT
Data Leak, scam, username, domain, social
- [Lampyre](https://lampyre.io/) - Data analysis & osint tool, obtain, visualize and analyze data in one place to see what other's can't.
- [OffshoreLeaks](https://offshoreleaks.icij.org/) - find out who's behind offshore companies.
- [WorldWide OSINT Map](http://cybdetective.com/osintmap/) - gather basic info around the world.
- [WhatsMyName](https://whatsmyname.app/) - This tool allow to enumerate usernames across many websites.
- [os-surveillance](https://os-surveillance.io/) - Gather real-time intelligence from Social media, Cameras, Internet of Things or Crimes and Amber Alerts
In addition search for Wifi networks and look for planes, vessels, trains and city traffic
- [Chiasmodon](https://github.com/chiasmod0n/chiasmodon) - Chiasmodon is an OSINT tool designed to assist in the process of gathering information about a target domain. Its primary functionality revolves around searching for domain-related data, including domain emails, domain credentials, CIDRs , ASNs , and subdomains, the tool also allows users to search Google Play application ID.
- [Tookie-osint](https://github.com/alfredredbird/tookie-osint) - Tookie is a advanced OSINT information gathering tool that finds social media accounts based on inputs.
- [dangerzone](https://github.com/freedomofpress/dangerzone) - Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs
- [COMB](https://www.proxynova.com/tools/comb/) - the largest dataset of leaked credentials (emails, usernames, and passwords)
- [Face Detection and comparison](https://6mzld2.csb.app/) - compare two uploaded faces
- [Prospeo](https://prospeo.io/) - Find business email addresses for outreach, find mobile, domain search, email verifier.
- [RepoAnalyzer](https://repoanalyzer.site/) - Discover authentic blockchain projects through comprehensive analysis of on-chain data, GitHub activity, and community engagement.
- [Reverse Contact](https://www.reversecontact.com/) - Find real-time contact and company data from an email address.
<br>
## AI
AI tools/Site
- [anonchatgpt](https://anonchatgpt.com) - AnonChatGPT is a ChatGPT client that provides a convenient way to interact with ChatGPT without needing an account or disclosing any personal information. Unlike other chatbot platforms, AnonChatGPT doesn't require users to create an account, making it completely anonymous and free to use for anyone.
- [ai-toolkit](https://huggingface.co/spaces/JournalistsonHF/ai-toolkit) - The Essential AI Toolkit for Journalists and Content Creators, All the tools listed here are free to use and open-source!
- [Decktopus](https://www.decktopus.com/) - Create beautiful & professional presentations in just minutes.
- [Monica](https://monica.im/) - Monica is a ChatGPT copilot in Chrome, who can help you: Summarize articles, Translate text, Define words
- [Poised](https://www.poised.com/) - It's a personal communication coach that gives real-time feedback to help you speak with more energy, clarity, & confidence.
- [StockimgAI](https://stockimg.ai/) - This AI tool helps you create beautiful images for your brand, such as: Logos, Wallpaper, Book covers.
- [ChatPDF](https://www.chatpdf.com/) - Upload a PDF and ask it questions. It's simple, straightforward, and great to learn information from
- [SheetplusAI](https://sheetplus.ai/) - Excel & Google spreadsheets are incredibly tedious work. Luckily, this AI tool will write the formulas for you. Sheets+ can save you 80% of your time by translating text into formulas.
- [10web](https://10web.io/) - Fill out a short questionnaire about your business, and 10Web will build an entire Wordpress website for you.
- [AgentGPT](https://agentgpt.reworkd.ai/) - AutoGPT's are all the rage right now, and this is among the best ones out there. ive your agent a goal and it'll autonomously give itself tasks, browse the web, and execute it for you.
- [LonardoAI](https://leonardo.ai/) - Leonardo.ai is a website for a company that offers AI-powered image and video editing tools. The website is designed with a sleek and modern look, featuring a black and white color scheme with pops of orange.
- [Adobe FireFly](https://firefly.adobe.com/) - A tool from adobe to generate Images from text prompt with added customization.
- [Groq](https://groq.com/) - Fastest LLM Model
- [YouLearn](https://www.youlearn.ai/) - Learn from an AI tutor that understands your pdfs, videos, and slides.
- [Anything](https://anything.com) - just describe what you want, and anything builds it. Everything you need built in.
- [Exa.ai](https://exa.ai) - ai search engine
<br>
[⇧ Top](#index)
## Recon
Tools for Image/Audio/Video/Doc reconnaissance
- [FOCA](https://github.com/ElevenPaths/FOCA) - Tool to find metadata and hidden information in the documents.
- [FaceCheck](https://facecheck.id/) - Upload a face of a person of interest and discover their social media profiles, appearances in blogs, video, and news websites.
- [Osmedeus](https://github.com/j3ssie/osmedeus) - Osmedeus is a Workflow Engine for Offensive Security. It was designed to build a foundation with the capability and flexibility that allows you to build your own reconnaissance system and run it on a large number of targets.
- [log4j-scan](https://github.com/fullhunt/log4j-scan) - A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
- [Odin](https://search.odin.io/) - A Internet Scanning, Thread hunting tool. Can used for domain, ip, port, cve...
- [cyscan.io](https://cyscan.io/) - Cyber URL Scanner is an advanced tool for analyzing website security. Using the latest cybersecurity technologies, we offer comprehensive URL scanning to detect potential threats.
<br>
[⇧ Top](#index)
## PRODUCTIVITY
- [it-tools](https://it-tools.tech/) - Collection of handy online tools for developers
- [unfurl](https://dfir.blog/unfurl/) - Break down url into pieces and find out what each thing do.
- [Wolfram|Alpha](https://www.wolframalpha.com/) - solve mathematical Equations
- [Cryptpad.fr](https://cryptpad.fr/) - Flagship instance of CryptPad, the end-to-end encrypted and open-source collaboration suite. Administered by the CryptPad development team.
- [Recontool.org](https://recontool.org/) - Recon tools
- [MindMup 2](https://app.mindmup.com/map/new) - Create MindMap online
- [Dotspotter](https://www.forensicdots.de/) - Discover the tracking dots on a scanned document. Upload an image (600 dpi) of your print out. Dottspotter will try to detect the yellow dot code (MIC)
- [Encrypted Pastebin](https://defuse.ca/pastebin.htm) - Pre-Internet Encryption for Text
- [PrivateBin](https://privatebin.net/) - PrivateBin is a minimalist, open source online pastebin where the server has zero knowledge of pasted data
- [Bin.disroot.org](https://bin.disroot.org/) - same as PrivateBin
- [~~Framadrop~~](https://framadrop.org/en/) - <font color=red>site closed</font>
- [Pad.riseup.net](https://pad.riseup.net/) - Etherpad is a software libre web application that allows for real-time group collaboration of text documents. Riseup does not store IP addresses, we require https, and pads are automatically destroyed after 60 days of inactivity
- [EtherCalc](https://ethercalc.net/) -
EtherCalc is a web spreadsheet.
- [Proofread Bot](https://proofreadbot.com/) - Proofread Bot gives you unlimited simple punctuation, style and grammar checks. For advanced checks (including plagiarism, comma splices, tenses....)
- [Write.as](https://write.as/) - Write.as is the easiest way to publish your writing on the web
- [Cryptee](https://crypt.ee/) - A private home for all your digital belongings
- [dudle](https://dudle.inf.tu-dresden.de/anonymous/) - Create Poll
- [Airborn.io](https://www.airborn.io/) - Create encrypted documents
- [ZOOM URL Generator](https://skyzh.github.io/zoom-url-generator/) - Create Zoom meeting url
- [Tor2web](https://www.tor2web.org/) - Tor is a software project that lets you anonymously browse the Internet. Tor2web is a project to let Internet users access Tor Onion Services without using Tor Browser
- [archive.is](https://archive.is/) - Archive.today is a time capsule for web pages!
It takes a 'snapshot' of a webpage that will always be online even if the original page disappears
- [Wayback Machine](https://web.archive.org/) - Internet archive of everything
- [waybackpy](https://pypi.org/project/waybackpy/) - Python package that interfaces with the Internet Archive's Wayback Machine APIs. Archive pages and retrieve archived pages easily.
- [CachedPages](http://www.cachedpages.com/) - A cached page is a snapshot or a version of a web page saved at a specific time and stored by a web server as a backup copy.
- [Google Cached Pages of Any Website](https://cachedview.com/) - The Google Cache Browser for any page on Internet
- [Oldweb.today](http://oldweb.today/) - see old web browser
- [Unpaywall](https://unpaywall.org/products/extension) - Read research papers for free paywall on millions of peer-reviewed journal articles. It's fast, free, and legal
- [DeepL](https://www.deepl.com/translator) - DeepL translate
- [Project CSV](https://projectcsv.github.io/) - view/modify csv files
- [CSV to HTML](https://codepen.io/RYJASM/pen/LVEWgV) - convert csv file to html
- [Monaco Editor](https://microsoft.github.io/monaco-editor/playground.html) - Online IDE
- [Online FlowChart Editor](https://mermaid-js.github.io/mermaid-live-editor/) - Generation of diagrams like flowcharts or sequence diagrams from text in a similar manner as markdown
- [Markdown Editor](https://markdown-editor.github.io/) - Markdown editor
- [SQL Editor](https://www.mycompiler.io/new/sql) - sql editor
- [SQLite Viewer](https://inloop.github.io/sqlite-viewer/) - drop sqlite file and view content, sqlite viewer
- [SQLable](https://sqlable.com/) - A collection of SQL tools
- [OCR Text Extractor](https://osint.sh/ocr/) - OCR text extractor from png, jpeg, webp and pdf
- [Wetranscriber](https://www.wetranscriber.com/) - A free, simple and efficient transcription platform for individuals or teams
- [Tophonetics.com](https://tophonetics.com/) - This online converter of English text to IPA phonetic transcription will translate your English text into its phonetic transcription using the International Phonetic Alphabet.
- [Google Translate](https://translate.google.com/) - Google Translator
- [Multi Translate](https://translate.mix.pink/)
- [Yandex.Translate](https://translate.yandex.com/) - translator from yandex
- [Bing Microsoft Translator](https://www.bing.com/translator) - translator from microsoft
- [Reverso](https://www.reverso.net/text_translation.aspx?lang=EN) - Enjoy cutting-edge AI-powered translation from Reverso in 25+ languages
including Arabic, Chinese, Italian, Portuguese, Dutch, Hebrew, Turkish, and Polish
- [Translate](https://www.translatedict.com/) -
- [text to speech online](https://www.naturalreaders.com/online/) - text to speech translator online
- [TTSReader](https://ttsreader.com/) - Read out loud webpages, texts, pdf's and ebooks with natural sounding voices
- [Online Sequencer](https://onlinesequencer.net/) - is an online music sequencer. Make tunes in your browser and share them with friends
- [FetchRSS](https://fetchrss.com/) - generate RSS out of anything
- [Sci-hub](https://sci-hub.st/) - the first pirate website in the world to provide mass and public access to tens of millions of research papers
- [Libgen.fun](https://libgen.fun/) - Free Book site to download
- [Z-lib.org](https://zlibrary24tuxziyiyfr7zd46ytefdqbqd2axkmxm4o5374ptpc52fad.onion.pet/) - The world's largest ebook library
- [PDF Drive](https://www.pdfdrive.com/) - PDF Drive is your search engine for PDF files.
- [arXiv.org](https://arxiv.org/) - arXiv is a free distribution service and an open-access archive for 2,142,712 scholarly articles in the fields of physics, mathematics, computer science, quantitative biology, quantitative finance, statistics, electrical engineering and systems science, and economics
- [bioRxiv.org](https://www.biorxiv.org/) - The preprint server for biology
- [Project Gutenberg](https://www.gutenberg.org/) - Gutenberg is a library of over 60,000 free eBooks
- [Trantor.is](https://trantor.is/) - There are 1479512 books on the library.
- [Shadowlibraries.github.io](https://shadowlibraries.github.io/) - A Pirate Library Archive
- [Editor.typely.com](https://editor.typely.com/) - Free online proofreading and essay editor
- [annas-archive](https://annas-archive.li) - largest collection of variety books and blogs
<br>
[⇧ Top](#index)
## OSINT Challenge
- [billingcat](https://challenge.bellingcat.com/) - Test your open source research skills with these challenges.
## Whatsapp
- [checkleaked](https://whatsapp.checkleaked.cc) - check whatsapp user profile without saving contact number and some other info.
## FILE UPLOAD
- [MEGA](https://mega.io/) - Secure Cloud Storage and Communication Privacy by Design Get 20GB of storage for free.
- [transfer.sh](https://transfer.sh/) -
- [Upload | Disroot](https://disroot.org/en/services/upload) - Lufi - Encrypted temporary file upload service
- [Chibisafe.moe](https://chibisafe.moe/) - Blazing fast file uploader. For real A modern and self-hosted file upload service that can handle anything you throw at it
- [Bunker.is](https://bunker.is/) -
- [Send](https://send.actionsack.com/) - Send lets you share files with end-to-end encryption and a link that automatically expires upload upto 2GB
- [Zz.fo](https://zz.fo/) -
- [Upload files to IPFS from Browser](https://anarkrypto.github.io/upload-files-to-ipfs-from-browser-panel/public/) - decentralize file shearing
- [BlackHole](https://blackhole.run/) - BlackHole is a file transfer application built on top of blockchain for the new internet. You can share any super security file with ease and be sure the data is yours forever. You can use BlackHole for free, with no storage or bandwidth limit, but for files bigger than 512 MB
<br>
[⇧ Top](#index)
## TOOLSET
- [NullSec Linux](https://github.com/bad-antics/nullsec-linux) - Security-focused Linux distribution with 135+ pre-configured OSINT and security tools for penetration testing and reconnaissance.
- [shell.how](https://www.shell.how/) - This website provides a comprehensive overview of a command's functionality, including detailed explanations of its constituent fragments.
- [bgp.tools](https://bgp.tools/) - BGP.tools is a website that provides a collection of tools and utilities related to the Border Gateway Protocol (BGP), which is the protocol used for routing Internet traffic between autonomous systems (ASes).
- [Seekr](https://github.com/seekr-osint/seekr) - All-In-One OSINT tool with neat web interface
- [CyberChef](https://gchq.github.io/CyberChef/) - Ecode/Decode strings
- [Dencode.com](https://dencode.com/) - DenCode is a web application for encoding and decoding values.
- [mitaka](https://github.com/ninoseki/mitaka) - A browser extension for OSINT search
- [pywhat](https://pypi.org/project/pywhat/) - The easiest way to identify anything
- [theHarvester](https://pypi.org/project/theHarvester/) - theHarvester is a very simple, yet effective tool designed to be used in the early stages of a penetration test. Use it for open source intelligence gathering and helping to determine a company's external threat landscape on the internet. The tool gathers emails, names, subdomains, IPs, and URLs using multiple public data sources
- [Online Tools](https://emn178.github.io/online-tools/) - A tool to encode,decode,hash,file hash etc.
- [Graphviz Online](https://dreampuf.github.io/GraphvizOnline/) - create svg graph
- [CodePen](https://codepen.io/) - CodePen is a social development environment. At its heart, it allows you to write code in the browser, and see the results of it as you build. A useful and liberating online code editor for developers of any skill, and particularly empowering for people learning to code. We focus primarily on front-end languages like HTML, CSS, JavaScript, and preprocessing syntaxes that turn into those things.
- [Diceware Generator](https://www.rempe.us/diceware/#eff) - Diceware is used to generate cryptographically strong passphrases. Don't let that frighten you away though, a passphrase is just a password made of words you can remember.
- [Checkphish.ai](https://checkphish.ai/) - Free URL scanner to detect phishing and fraudulent sites
- [x86 and x64 Intel Assembler](https://defuse.ca/online-x86-assembler.htm) - This tool takes x86 or x64 assembly instructions and converts them to their binary representation (machine code). It can also go the other way, taking a hexadecimal string of machine code and transforming it into a human-readable representation of the instructions. It uses GCC and objdump behind the scenes.
- [Big Number Calculator](https://defuse.ca/big-number-calculator.htm) - Online big number calculator.
- [Text and File Hash Calculator](https://defuse.ca/checksums.htm) - This page lets you hash ASCII text or a file with many different hash algorithms. Checksums are commonly used to verify the integrety of data. The most common use is to verify that a file has been downloaded without error. The data you enter here is 100% private, neither the data nor hash values are ever recorded.
- [HTML Sanitizer Tool](https://defuse.ca/html-sanitize.htm) - This tool will take your text and convert all the special characters to their proper HTML codes, so you can paste text with special characters or HTML code onto your website. It has been carefully designed so that the HTML produced by this tool looks and behaves exactly like the original text does in a text editor
- [URL Decoder/Encoder](https://meyerweb.com/eric/tools/dencoder/) - encode/decode URL in url form.
- [ODA - The Online Disassembler](https://onlinedisassembler.com/odaweb/) - A lightweight, online service for when you don’t have the time, resources, or requirements to use a heavier-weight alternative. Explore executables by dissecting its sections, strings, symbols, raw hex and machine level instructions.
- [Disasm.pro](https://disasm.pro/) - A realtime assembler/disassembler (formerly known as disasm.ninja)
- [Fotor](https://www.fotor.com/photo-editor-app/editor/basic) - Online image editor remove bg, crop, edit...
- [Decompiler.com](http://www.decompiler.com/) - online decompiler for java, apk, lua ....
- [Google Colaboratory](https://colab.research.google.com/notebooks/intro.ipynb) - Colab, or "Colaboratory", allows you to write and execute Python in your browser, with Zero configuration required Access to GPUs free of charge Easy sharing.
- [Compiler Explorer](https://godbolt.org/) - Run compilers interactively from your web browser and interact with the assembly
- [HTML editor](https://onlinehtmleditor.dev/) - Online HTML editor
- [Online Color Picker](https://colorpicker.me/) - Online color picker in HSL, Hex code, RGB, HSV
- [Convert text to image file](https://text2image.com/en/) - Generate online free an image from text (words) you supply. Then download your image file or link to it on our system. You can have text up to 500 characters; size (width/height): between 10 and 1500 pixels; format: one of several popular formats - GIF, JPEG or PNG; font: the size of your letters in a range from 6pt to 54pt (6 point to 54 point); colors: the forecolor (color of the letters in your text) and backcolor (background color behind the letters)
- [relational algebra calculator](https://dbis-uibk.github.io/relax/calc/local/uibk/local/0) - If you want to learn SQL you take a database system and try some queries. But if you want to learn relational algebra what do you use? Pen and paper? The relational algebra calculator helps you learn relational algebra (RelAlg) by executing it.
- [Data Structure : Infix Postfix Prefix - Converter & Evaluator](https://raj457036.github.io/Simple-Tools/prefixAndPostfixConvertor.html) - This is a simple infix to prefix or postfix Converter.
- [RSA encryption, decryption and prime calculator](https://canihavesomecoffee.github.io/js-rsa-tool/) - RSA encryption, decryption and prime calculator
- [Tools.digitalmethods.net](https://tools.digitalmethods.net/beta/searchEngineScraper/) - The Search Engine Scraper allows you to scrape the search results for a given search query, and has as output a list of results the search engine returned for the query
- [Steganography Online](https://stylesuxx.github.io/steganography/) - Steganography is a process which can encode message in image. In this site just upload a image then enter a text and hit encode to encode message.
- [Torrent to Magnet](https://nutbread.github.io/t2m/) - Convert .torrent file to magnet URI's just drop the file
- [Anonymous YouTube Playlists](https://neverducky.github.io/anonymous-youtube-playlists/) - A simple tool for generating a YouTube playlist that isn't tied to an account
- [Vega Editor](https://vega.github.io/editor/#/) - create pie, charts and more through your browser
- [DISA Code Template Generator](https://duncanford.github.io/disa-code-generator) - To purpose of this generator is to quickly create the content for all the separate five files you need to create a template DISA integration. Almost everything can be keyed from a single name: the name of the plugin
- [Canary Tokens](http://canarytokens.org/generate) -You'll be familiar with web bugs, the transparent images which track when someone opens an email. They work by embedding a unique URL in a page's image tag, and monitoring incoming GET requests. Canarytokens helps track activity and actions on your network.
- [explainshell.com](https://explainshell.com/) - write down a command-line to see the help text that matches each argument
- [ShowTheDocs](http://showthedocs.com/) - showthedocs is a documentation browser that finds the relevant docs for your code. It works by parsing the code and connecting parts of it to their explanation in the docs
- [osint-cli-tool-skeleton](https://pypi.org/project/osint-cli-tool-skeleton/) - OSINT cli tool skeleton
- [Wifispc.com](https://wifispc.com/) - Free map of Wi-Fi passwords anywhere you go!
- [Wiman](https://www.wiman.me/) - Seamless connections to millions mobile Free WiFi hotspots.
- [Dorkgpt](https://www.dorkgpt.com/) - Generate google dork with AI.
<br>
[⇧ Top](#index)
## THROWAWAY CONTACT/Temporary contact
- [10minutemail.com](https://10minutemail.com/) - Disposable mail for 10 min.
- [AnonAddy](https://anonaddy.com/) - Anonymous Email Forwarding Create Unlimited Email Aliases For Free and best part Its OpenSource
- [SimpleLogin](https://simplelogin.io/) - Receive and send emails anonymously
- [MailDrop](https://maildrop.cc/) - Save your inbox from spam. Use Maildrop when you don't want to give out your real address No signup required - Maildrop is free for anyone to use when you need a quick, disposable email address.
- [Send text free](https://globfone.com/send-text/) - Send text online without worrying about phone bills. Free SMS to hundreds of GSM operators worldwide
- [SendaText](https://www.sendatext.co/) - SENDaTEXT allows you to send free text and SMS from your computer or smartphone. All you need to use SENDaTEXT is a standard web browser and internet. You can now send free text online from your computer or smartphone. No need to sign up. No need to make any payment. Send a text now!
- [Free Fax](https://faxzero.com/) -Send faxes for free to anywhere in the U.S. and Canada Or, Send an International Fax
- [Receive SMS Online](http://receive-sms-online.com/) - On this site you will find some numbers you can send SMS text messages to and the messages will show up on the web.
- [Receive-sms-now.com](http://receive-sms-now.com/) -
- [Receive SMS Online](https://hs3x.com/) - receive sms online
- [Receive SMS Online for FREE](http://freesmsverification.com/) - Free SMS Verification Receive SMS Online Verify your SMS received from any place in the World. The messages will show up on the webpage.
- [Smstome.com](https://smstome.com/) - Virtual Temporary and Disposable Phone Numbers
- [Amazon SNS](https://aws.amazon.com/sns/) - Amazon Simple Notification Service (SNS) sends notifications two ways, A2A and A2P. A2A provides high-throughput, push-based, many-to-many messaging between distributed systems, microservices, and event-driven serverless applications. These applications include Amazon Simple Queue Service (SQS), Amazon Kinesis Data Firehose, AWS Lambda, and other HTTPS endpoints. A2P functionality lets you send messages to your customers with SMS texts, push notifications, and email.
- [Twilio](https://www.twilio.com/) - api for sms services
<br>
[⇧ Top](#index)
## ID GENERATOR
- [Username Generator](https://www.lastpass.com/features/username-generator) - Random username generator tool
- [Fake Name Generator](https://www.fakenamegenerator.com/) - Randomly Generated Identity
- [Resume Generator](https://thisresumedoesnotexist.com/) - With this AI resume generator, we wanted you to try and see best resumes you can ever think of building. The AI often goes haywire when writing a resume content - both credit and criticism goes to TextgenRNN.
- [International Name Generator](https://www.behindthename.com/random/) - random name generator
- [Windows Phone IMEI Generator](https://wpimeigenerator.github.io/) - Windows Phone IMEI Generator
- [IMEI Number Generator](https://dyrk.org/tools/imei/) - fake IMEI number generator
- [US SSN / Driver License / State ID / Passport / Tax ID Generator](https://www.elfqrin.com/usssndriverlicenseidgen.php) - US SSN / Driver License (DL) / State ID / Passport / Tax ID Generator
- [Washington State Driver’s License Generator](https://mmarvick.github.io/wa-drivers-license/) - Washington State Driver's License Generator
- [Fake Drivers License Generator](https://fakeinfo.net/drivers-license-generator) - Get a false authorized Driver's License to fool your college friends and gain popularity using the Fake Driver License Generator. Use this tool for legal purposes only until you get an original one
- [This Rental Does Not Exist](https://thisrentaldoesnotexist.com/) - Rental Does not Exist
- [Face Photo Generator](https://thispersondoesnotexist.com/) - random Photo generator
- [Random Face Generator](https://fakeinfo.net/random-face-generator) - Want to make your profile more attractive to boost your account reach? Then try our Random Face Generator Tool. It lets you select your favorite image among the variety of options
- [Credit Card Generator](https://www.fakenamegenerator.com/credit-card-validator.php) - Fake credit card number generator
- [PIC/CIC Code Database](https://www.allredtech.com/) - A PIC or CIC code is a 4-digit prefix that identifies a long distance carrier in North America or the Caribbean to a LEC. The LEC uses the code to properly route the call.
- [SIN Generator](https://www.fakenamegenerator.com/social-insurance-number.php) - Canadian Social Insurance Number (SIN)
- [ABA Generator](https://www.fakenamegenerator.com/aba-validator.php) - ABA/Routing Number Validator
- [VIN Generator](https://www.fakenamegenerator.com/vehicle-identification-number.php) - Vehicle Identification Number
- [NINO Generator](https://www.fakenamegenerator.com/national-insurance-number.php) - UK National Insurance Number (NINO)
- [SSN Generator](https://www.fakenamegenerator.com/social-security-number.php) - US Social Security Number (SSN)
- [IID Generator by Georgy Bunin](https://georgybu.github.io/IID_Generator/) - Israel ID generator and validator
- [GUID/UUID and short GUID generator](https://richardkundl.github.io/shortguid/) - GUID/UUID and short GUID generator
- [Nano ID CC](https://zelark.github.io/nano-id-cc/) - Nano ID is a library for generating random IDs. Likewise UUID, there is a probability of duplicate IDs. However, this probability is extremely small.
- [Generate SA ID Numbers](https://chris927.github.io/generate-sa-idnumbers/) - Generate (Fake) South-African ID Numbers
- [Decoding Social Security Numbers](https://stevemorse.org/ssn/ssn.html) - Decoding Social Security Numbers in One Step
- [Encoding and Decoding Driver’s License Numbers](https://stevemorse.org/dl/dl.html) - Encoding and Decoding Driver's License Numbers in One Step
- [Dating Profile Generator](https://www.dating-profile-generator.org.uk/) - The aim of Dating Profile Generator is to help you fill that all-important free text field on online dating sites. Give us a feel for the kind of person that you are, and we'll write a description of you in the tone we think you'd take if you bothered to write it yourself
- [Fake Identity ID Random Name Generator](https://www.elfqrin.com/fakeid.php) - Generate a random character with a fake name for games, novels, or alter ego avatars of yourself. Create a new virtual disposable identity instantly. Note that characters are not totally random: they are statistically adjusted, so that you can generate a credible population of realistic virtual people.
- [Fake Company Name Generator](https://fakeinfo.net/company-name-generator) - Random Company Name Generator tool is designed to gratify the entrepreneur's needs. Generate catchy brand names within seconds for your new startups using our tool.
- [Twitter Profile Generator](https://fakeinfo.net/fake-twitter-profile-generator) - If you want to have an attractive profile to gain more followers, then use our Fake Twitter Profile Generator tool. It lets you create a fake Twitter profile with a false number of followers and posts.
- [Fake Tiktok Profile Generator](https://fakeinfo.net/fake-tiktok-profile-generator) - Who doesn't love to have a huge number of followers and posts on the popular social media platform TikTok? Everybody loves to. One may create a fake TikTok profile with a higher follower count using our Fake Tiktok Profile Generator tool.
- [Fake Youtube Channel Generator](https://fakeinfo.net/fake-youtube-channel-generator) - d you ever wish to become a YouTuber with a large number of subscribers? Well, dreams do come true. By using the Fake Youtube Channel Generator tool, you may create a fake youtube channel with an attractive channel name and several subscribers.
- [Resume Builder](https://vinaysomawat.github.io/Resume-Builder/) - simple resume builder
- [Fake Generator Tools](https://fauxid.com/tools) - Here are a list of tools that can help you create fake identities, fake emails, fake credit cards, fake driver's license, and a fake company.
<br>
[⇧ Top](#index)
## EMULATOR
- [Kasm](https://kasmweb.com/) - Streaming containerized apps and desktops to end-users. The Workspaces platform provides enterprise-class orchestration, data loss prevention, and web streaming technology to enable the delivery of containerized workloads to your browser.
- [Bluestacks](https://www.bluestacks.com/) - Android emulator
- [Genymotion](https://www.genymotion.com/) - Android Virtual Devices for all your team, project, development & testing needs
- [PrimeOS](https://www.primeos.in/) - PrimeOS, the ideal Android based OS for mobile games on PC/Laptop
- [BigNox](https://www.bignox.com/) - NoxPlayer, the perfect Android emulator to play mobile games on PC
- [Memuplay.com](https://www.memuplay.com/) - The most powerful android emulator enjoy ultimate mobile gaming experience on PC
- [Ldplayer.net](https://www.ldplayer.net/) - Your Best Partner for Mobile Games
<br>
[⇧ Top](#index)
## HASH RECOVERY
- [CrackStation](https://crackstation.net/) - CrackStation uses massive pre-computed lookup tables to crack password hashes. These tables store a mapping between the hash of a password, and the correct password for that hash. The hash values are indexed so that it is possible to quickly search the database for a given hash.
- [Hashmob Community](https://hashmob.net/search) - We want to elevate password research and recovery to new heights. Passwords chosen by users are fundamentally flawed, and the best way to make users choose better passwords is showing them that Cryptographic methods - regardless of strength - are not enough to protect them. Their passwords themselves must be strong enough to withstand even the most rigorous of attacks. HashMob wants to provide a platform for users to collaborate together so that password research can be improved upon and trends can be discovered. We aggregate data and publish statistics, wordlists, rules, resources, tutorials, guides, and other things that researchers and penetration testers can use to further improve themselves
- [Hashes.com](https://hashes.com/en/decrypt/hash) - Hashes.com is a hash lookup service. This allows you to input an MD5, SHA-1, Vbulletin, Invision Power Board, MyBB, Bcrypt, Wordpress, SHA-256, SHA-512, MYSQL5 etc hash and search for its corresponding plaintext ("found") in our database of already-cracked hashes
- [Online Password Hash Crack](https://www.onlinehashcrack.com/) - Cloud-based service that attempts to recover passwords (hashes, WPA dumps, Office, PDF, iTunes Backup, Archives) obtained in a legal way (pentest, audit,..).
- [Md5 Decrypt & Encrypt](https://md5decrypt.net/en/) - encrypt decrypt md5 hashes
- [MD5 reverse lookup](https://md5.gromweb.com/) - MD5 conversion and reverse lookup
- [Ultimate Hashing](https://md5hashing.net/) - [En|De]crypt Hash — Generate hash out of the string and lookup (unhash) for hash value in our pre-computed hash-tables
- ~[Hashes.org](https://hashes.org/search.php)~ <font color="red">Dead!</font>
<br>
[⇧ Top](#index)
## DOWNLOADER
- [yt-dlp](https://github.com/yt-dlp/yt-dlp) - Command-line program to download videos from YouTube.com and other video sites
- [Media-downloader.net](https://media-downloader.net/) -
- [Imgur Album Downloader](https://dschep.github.io/imgur-album-downloader/#/) - A Pure client-side webapp to download entire or parts of Imgur albums.
- [Export Comments](https://exportcomments.com/) - Easily exports all comments from your social media posts to Excel file.
- [Image Extractor](https://extract.pics/) - Extract Images From any public website by using a virtual browser
- [Loader.to](https://loader.to/) - YouTube MP3 Playlist Downloader Online
- [Commentexporter.com](https://www.commentexporter.com/) - Export and save facebook comment to your computer. Nested comment supported.
Enter your "Post URL" to export
- [Twitch Tools](https://twitch-tools.rootonline.de/followerlist_viewer.php) - This tool lets you view the followers on any Twitch account.
- [Link Gopher](https://sites.google.com/site/linkgopher/) - Link Gopher is a simple extension to extract links from Firefox or Google Chrome. It extracts all links from web page (including embedded links), sorts them, removes duplicates, and displays them in a new tab for copy and paste into other systems. Also, Link Gopher does the same for unique domains.
- [Page Links Extractor Tool](https://shadowcrypt.net/tools/pagelinks) - Pagelink Extractor scans the entire web page and lists down all hyperlinks on the website. It is useful for research purpose and uses regex to extract the link. It will be regularly updated.
- [Online Tool to Extract Links from any Web Page](https://hackertarget.com/extract-links/) - This tool will parse the html of a website and extract links from the page. The hrefs or "page links" are displayed in plain text for easy copying or review.
<br>
[⇧ Top](#index)
## PRIVACY / SECURITY
- [EmailFinder](https://snov.io/email-finder) - Find any company mail
- [companyresearcher](https://companyresearcher.exa.ai/) - Enter a company URL for detailed research info. Instantly know any company inside out.
- [The Hitchhiker’s Guide to Online Anonymity](https://anonymousplanet.org/guide.html) - The Hitchhiker’s Guide to Online Anonymity
- [Privacy Guides](https://privacyguides.org/) - The guide to restoring your online privacy.
- [Surveillance Self-Defense](https://ssd.eff.org/) - Surveillance Self-Defense Tips, Tools and How-tos for Safer Online Communications
- [Consumer Reports Security Planner](https://securityplanner.consumerreports.org/) - Keep Your Data Secure With a Personalized Plan
Cut down on data collection and protect your sensitive personal information, health data, and geolocation. Answer a few simple questions to get customized recommendations to help you
- [Security in a Box](https://securityinabox.org/en/) - digital security tools and tactics
- [PRISM Break](https://prism-break.org/en/) - opt out of global data survelliance programs like PRISM, XKeyscore and Tempora
- [Security First - Umbrella](https://secfirst.org/umbrella/) - Umbrella is the only security handbook you'll ever need in a free, open source app. It's up-to-date information you can trust. And it's always in your pocket
- [Matweb.info](https://matweb.info/) - Remove Metadata The file you see is just the tip of the iceberg. Remove the hidden metadata with MAT2
- [Metacleaner.com](https://metacleaner.com/) - MetaCleaner helps you stay anonymous Clean your files MetaData online
- [Image Scrubber](https://everestpipkin.github.io/image-scrubber/) - This is a tool for anonymizing photographs taken at protests. It will remove identifying metadata (Exif data) from photographs, and also allow you to selectively blur parts of the image to cover faces and other identifiable information
- [View Exif data online, remove Exif online](http://www.verexif.com/en/) - View and remove Exif online
- [Bitcoinprivacy.guide](https://bitcoinprivacy.guide/) - Bitcoin privacy guide a beginners guide to Bitcoin privacy
- [LocalBitcoins](https://localbitcoins.com/) - Buy and Sell Bitcoin Everywhere
- [Localmonero.co](https://localmonero.co/) - Buy Monero.Sell Monero.Cash or online.Anywhere.
- [Paxful](https://paxful.com/) - Trade Bitcoin with Paxful.
- [Speech Jammer](https://mynoise.net/NoiseMachines/audioJammerNoiseGenerator.php) - Audio jammers are popular tools used during confidential meetings. They produce a unique sound for masking and protecting conversations from external listening devices, such as a smartphone running an audio recording app, hidden in one of your guests' pocket
- [Stutterbox](https://www.stutterbox.co.uk/) - A speech jammer is a device that inhibits a user from speaking in coherent sentences due to the user hearing their own voice played back to them with a slight delay.
- [StegOnline](https://stegonline.georgeom.net/upload) - A web-based, enhanced and open-source port of StegSolve. Upload any image file, and the relevant options will be displayed.
- [WhatsMyName](https://whatsmyname.app/) - This tool allows you to enumerate usernames across many websites, just enter username and this tool show you how many websites have that username.
- [ScamSearch](https://scamsearch.io/) - Find your scammer online & report them. Don't let them get away. Search by Profile Picture, Email, Username, Pseudo Name, Phone Number, crypto address or website
<br>
[⇧ Top](#index)
## SECURE COMMUNICATION
- [Signal](https://signal.org/) - Signal is a simple, powerful, and secure messenger like whatsapp but opensource
- [Element](https://element.io/) - Secure communication and collaboration
- [Briar](https://briarproject.org/) - Peer-to-peer encrypted messaging and forums
- [Jami.net](https://jami.net/) - Share, freely and privately
- [Jitsi Meet](https://meet.jit.si/) - start and join meetings for free No account needed
- [Rocket.Chat](https://rocket.chat/) - We use communication platforms on a daily basis to collaborate with colleagues, other companies, customers and communities. Most of them give you very little in terms of control and customizations; except Rocket.Chat.
- [Wire](https://wire.com/en/) - Modern day communication meets the most advanced security and superior user experience. Protect your privacy and data like never before.
START FOR FREE
- [Telegram](https://www.telegram.org/) - Telegram is a cloud-based mobile and desktop messaging app with a focus on security and speed.
- [Brave Talk](https://talk.brave.com/) - unlinited private video calls, right in your browser. No app required
- [The Tor Project](https://www.torproject.org/download/) - Protect yourself against tracking, surveillance, and censorship.
- [Brave Browser](https://brave.com/) - Browse privately. Search privately. And ditch Big Tech.
- [Psiphon](https://www.psiphon.ca/) - Secure and high-performance, Psiphon provides open access to the uncensored internet for millions of people around the world
- [ProtonVPN](https://protonvpn.com/) - High-speed Swiss VPN that safeguards your privacy.
- [hide.me VPN](https://hide.me/en/) - hide.me VPN is trusted by more than 25 million users globally because of its simplicity, privacy features & speed.
- [AdGuard VPN](https://adguard-vpn.com/en/welcome.html) - Use any browser or app and never worry about your anonymity again. The entire world is at your fingertips with AdGuard VPN.
- [I2P](https://geti2p.net/en/download) - The Invisible Internet Project (I2P) is a fully encrypted private network layer that has been developed with privacy and security by design in order to provide protection for your activity, location and your identity. The software ships with a router that connects you to the network and applications for sharing, communicating and building.
- [VPN Services](https://privacyguides.org/providers/vpn/) - Find a no-logging VPN operator who isn’t out to sell or read your web traffic.
- [Browser Recommendations](https://privacyguides.org/browsers/) - These are our currently recommended desktop web browsers and configurations for standard/non-anonymous browsing. If you need to browse the internet anonymously, you should use Tor instead. In general, we recommend keeping your browser extensions to a minimum; they have privileged access within your browser, require you to trust the developer, can make you stand out, and weaken site isolation.
<br>
[⇧ Top](#index)
## RESOURCES
- [The Ultimate OSINT Collection](https://start.me/p/DPYPMz/the-ultimate-osint-collection) - This page is for anyone who loves open source investigating, and feels overwhelmed by the amount of resources and information out there. This is my personal one-stop shop for the best OSINT content available online, and I hope it helps you find new ways to learn from some amazing people
- [OSINT Resources in Canada](https://start.me/p/aLe0vp/osint-resources-in-canada) - OSINT Resources in Canada. This is a free resource dedicated to open source tools located in the different provinces and territories in Canada
- [FAROS OSINT Resources](https://start.me/p/1kvvxN/faros-osint-resources) - Financial Open Source Intellige
- [TI](https://start.me/p/rxRbpo/ti) - collection of CTI resources. originally created this to track valuable investigation resources (mostly OSINT)
- [TOOLKIT](https://start.me/p/W1AXYo/toolkit) - toolkit for osint
- [Trouble Fake](https://start.me/p/QRQb0O/trouble-fake) -
- [OSINT Is A State Of Mind](https://medium.com/secjuice/osint-as-a-mindset-7d42ad72113d) - Dutch guy with Open Source Intelligence & Analysis skills • Osint • Security Awareness • Opsec
- [sinwindie/OSINT](https://github.com/sinwindie/OSINT) - Collections of tools and methods created to aid in OSINT collection
- [New Online Investigation (OSINT) Resources – IntelTechniques Blog](https://inteltechniques.com/blog/2019/04/09/new-online-investigation-osint-resources/) - New Online Investigation (OSINT) Resources
- [Technisette](https://www.technisette.com/p/home) - Here you'll find my collected tutorials, tools, databases, addons, search engines and more to help you with your Open Source Intelligence (OSINT) research.
- [OSINT Framework](https://osintframework.com/) - OSINT framework focused on gathering information from free tools or resources. The intention is to help people find free OSINT resources. Some of the sites included might require registration or offer more data for $$$, but you should be able to get at least a portion of the available information for no cost.
- [jivoi/awesome-osint](https://github.com/jivoi/awesome-osint) - A curated list of amazingly awesome OSINT
- [Google Dork Cheatsheet](https://github.com/robyfirnandoyusuf/Google-Dork-Cheatsheet) - google dorks cheatsheet
- [START CARING STOP SHARING](https://medium.com/@Dutchosintguy/start-caring-stop-sharing-9c108d957b2c) - An Open Source Intelligence perspective on the online sharing behavior of humans as effect of COVID19 pandemic to enable better Security Awareness.
- [Osint Curious OSINT Resource List](https://docs.google.com/document/d/14li22wAG2Wh2y0UhgBjbqEvZJCDsNZY8vpUAJ_jJ5X8/edit) - OSINT Curious Project Resource List! Below you can find links to all the blog posts and 10 Minute Tips that we’ve created to help share knowledge and skills with the OSINT Community. The list is regularly updated as we create new content but you can also find us at OSINTCurio.us
- [OSINT Tools](https://www.osinttechniques.com/osint-tools.html) - OSINT Tools
- [OSINT tools for investigating websites](https://www.aware-online.com/en/osint-tools/website-tools/) -
- [Shodan Cheat Sheet](https://thedarksource.com/shodan-cheat-sheet/) -
- [Week in OSINT](https://sector035.nl/articles/category:week-in-osint)
- [Osint.team](https://osint.team/)
- [QueryTool](https://github.com/oryon-osint/querytool) - Querytool is an OSINT framework based on Google Spreadsheets. With this tool you can perform complex search of terms, people, email addresses, files and many more.
- [Investigating the source code of a website](https://www.aware-online.com/en/osint-tutorials/investigating-the-source-code-of-a-website/) - The source code of a website can be seen as the readable text written by a programmer in a programming language. Simply said, the source code consists of a variety of code lines, which together ensure that a website ‘ works ‘ and that a website looks a certain way.
- [Find open FTP Servers](https://www.aware-online.com/en/osint-tutorials/find-open-ftp-servers/) - find an open ftp server osint
- ~~[Choose your wallet](https://bitcoin.org/en/choose-your-wallet)~~
- [10 Minute Tips](https://osintcurio.us/10-minute-tips/) - a library of OSINT tips, tricks, tools, and techniques.
- ~~[Webint Master](https://webintmaster.com/)~~
- ~~[DFIR Diva](https://dfirdiva.com/hooked-on-osint/)~~
- [Boolean Strings | Tools](https://booleanstrings.com/tools/) - 150+ Top Sourcing / #OSINT Tools
- [osintme.com](https://www.osintme.com/) - 3 years an OSINT blog
- ~~[Jake Creps](https://jakecreps.com/)~~
- ~~[reKnowledge](https://www.reknowledge.tech/)~~
- [Bellingcat’s Online Investigation Toolkit](https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607) - This toolkit includes satellite and mapping services, tools for verifying photos and videos, websites to archive web pages, and much more.
- [@Ivan30394639 OSINT tools collection](https://cipher387.github.io/osint_stuff_tool_collection/) - different services, techniques, tricks and notes about OSINT and more. I collect all the links from my tweets in this collection (already 1000+ services for a wide variety of purposes).
- [The Top 132 Osint Open Source Projects](https://awesomeopensource.com/projects/osint) - The Top 1,309 Osint Open Source Projects
- [30 best OSINT extensions for Google Chrome – osintme.com](https://www.osintme.com/index.php/2021/06/30/30-best-osint-extensions-for-google-chrome/) - 30 best OSINT extensions for Google Chrome
- ~~[Where Can I Find… - Free DFIR Related Training](https://freetraining.dfirdiva.com/where-can-i-find)~~
- [Awesome Deblurring](https://github.com/subeeshvasu/Awesome-Deblurring) - A curated list of resources for Image and Video Deblurring
- [OSINT.SH](https://osint.sh/) - All in one Information Gathering Tools
- [OSINT Techniques](https://www.osinttechniques.com/) - Resources for Open Source Intelligence and Social Media Investigations.
- ~~[OSINT aka Atvirųjų šaltinių žvalgyba](https://blog.parakomanai.lt/osint-387e80bdc901)~~
- [CTI & OSINT Online Resources](https://docs.google.com/spreadsheets/d/1klugQqw6POlBtuzon8S0b18-gpsDwX-5OYRrB7TyNEw/edit#gid=0) -
- [Emsisoft Decryptor for Avaddon](https://www.emsisoft.com/ransomware-decryption-tools/avaddon) - Use our free ransomware decryption tools to unlock your files without paying the ransom
- [hwosint (@harrywald80)](https://twitter.com/harrywald80) - follow this twitter account for daily osint updates
- [Awesomelists.top](http://awesomelists.top/) - AwesomeSearch makes you find what you want in awesome lists more quickly.
- [GitHub Awesome Search](https://github.motakasoft.com/awesome/) - github awesome repo's
- [Ph055a OSINT_Collection](https://github.com/Ph055a/OSINT_Collection) - Maintained collection of OSINT related resources. (All Free & Actionable)
- [MetaOSINT](https://metaosint.github.io/) - A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time during investigations, research, and analysis.
- [Osint.support](https://osint.support/) - Open Source Intelligence (OSINT) is the collection and analysis of information that is gathered from public, or open, sources. OSINT is primarily used in national security, law enforcement, and business intelligence functions and is of value to analysts who use non-sensitive intelligence in answering classified, unclassified, or proprietary intelligence requirements across the previous intelligence disciplines
- ~~[Sprp77/My-Google-CSE](https://github.com/Sprp77/My-Google-CSE/blob/master/List%201)~~
- ~~[How to Build an OSINT Super Machine for People Surveillance and Sourcing](https://outline.com/GZbkZA)~~
- [How to find anyone with an advanced LinkedIn People Search](https://nubela.co/blog/how-to-find-anyone-with-an-advanced-linkedin-people-search/) - How To Find Anyone With An Advanced LinkedIn People Search
- [Calls Node Status](https://www.broadcastify.com/calls/status/) - Current Active Call Ingest Nodes
- [Free WiFi Search Engine](http://instabridge.com/free-wifi/) - Search WiFi spots worldwide
<br>
[⇧ Top](#index)
## WEATHER
- [OpenWeatherMap](https://openweathermap.org/) - Weather forecasts, nowcasts and history in a fast and elegant way
- [Weather History & Data Archive](https://www.wunderground.com/history) - Find historical weather by searching for a city, zip code, or airport code. Include a date for which you would like to see weather history
- [World Temperatures — Weather Around The World](https://www.timeanddate.com/weather/) - World Temperatures Weather Around The World
- [AccuWeather](https://www.accuweather.com/) - Weather around the world
<br>
[⇧ Top](#index)
## World clock
- Los Angeles (United States): 3:16
- Houston (United States): 5:16
- New York (United States): 6:16
- London (United Kingdom): 11:16
- Berlin (Germany): 12:16
- Cairo (Egypt): 12:16
- Tehran (Iran): 14:46
- New Delhi (India): 15:46
- Hong Kong: 18:16
- Japan: 19:16
- Sydney (Australia): 20:16
<br>
[⇧ Top](#index)
## THREAT INTEL
- [Threatbutt](https://threatbutt.com/map/) - Threatbutt Internet Hacking Attack Attribution Map
- [Cyberthreat Real-Time Map](https://cybermap.kaspersky.com/) - cyberthreat real-time attack map of the world
- [Live Cyber Attack Threat Map](https://www.checkpoint.com/ThreatPortal/livemap.html) - Live cyber threat map
- [Digital Attack Map](https://www.digitalattackmap.com/) - Live Global DDoS Attack
- [Cyber Threat Map](https://www.fireeye.com/cyber-map/threat-map.html) -
- [Bitdefender Threat Map](https://threatmap.bitdefender.com/) - cyberthreat realtime map
- [Cyber Threat Intelligence](https://pulsedive.com/) - Frictionless threat intelligence solutions for growing teams
- [Cisco Talos Intelligence Group](https://talosintelligence.com/) - Gather Intelligence for IPs, Domain, network of file
- [Fortinet Threat Map](https://threatmap.fortiguard.com/) -
- [FortiGuard](http://www.fortiguard.com/) - AI-Powered Threat Intelligence for an Evolving Digital World.
- [Hunt](https://www.hunt.io/) - Hunt is a threat hunting tool with good open directory counter intelligence and IOC hunting that detects and neutralizes malicious activities.
- [ThreatMiner](https://www.threatminer.org/) - ThreatMiner is a threat intelligence portal designed to enable analysts to research under a single interface.
- [cymon](https://cymon.io/) -
- [intelowlproject/IntelOwl](https://github.com/intelowlproject/IntelOwl) - manage your Threat Intelligence at scale
- ~~[Visualizing Global Internet Performance](https://www.akamai.com/us/en/solutions/intelligent-platform/visualizing-akamai/real-time-web-monitor.jsp)~~
- [THREAT MAP by LookingGlass](https://map.lookingglasscyber.com/)
- [NETSCOUT Cyber Threat Horizon](https://horizon.netscout.com/) - NETSCOUT Cyber Threat Horizon (Horizon) is a global cybersecurity situational awareness platform that provides organizations with highly contextualized visibility into 'over the horizon' threat activity on the landscape.
- [APTnotes](https://github.com/aptnotes/data) - APTnotes is a repository of publicly-available papers and blogs (sorted by year) related to malicious campaigns/activity/software that have been associated with vendor-defined APT (Advanced Persistent Threat) groups and/or tool-sets.
- [Hudson Rock Free Cybercrime Intelligence Tools](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools) - Check if a specific domain or email address was compromised by Infostealer infections.
<br>
[⇧ Top](#index)
## OTHER
- [https://cryptome.wikileaks.org/](https://cryptome.wikileaks.org/) - WikiLeaks is a multi-national media organization and associated library. It was founded by its publisher Julian Assange in 2006.
- [Nextstrain](https://nextstrain.org/) - Real-time tracking of pathogen evolution ; pathogen genome data
## IDENTITY RESOLUTION
- [Clearbit](https://dashboard.clearbit.com/lookup) - Clearbit is the first HubSpot Native Data Provider.
Enrich your records, score and route instantly
- [FullContact API](https://dashboard.fullcontact.com/login) - We provide the data + intelligence you need in your platforms to accurately identify people and optimize experiences—while putting privacy and security first
- [Aeroleads.com](https://aeroleads.com/) - Search database of 500 Million Business Emails, 120M Personal Emails and 20M Phone Numbers
<br>
[⇧ Top](#index)
## UNIFIED SEARCH
- [SynapsInt](https://synapsint.com/) - Synapsint is a 100% free service, the data that is presented for each search is the result of consulting different intelligence services, search engines, datasets, etc.
You will find a lot of information related to a domain, a IP Address or to an ASN. Information like metatags, web site records, ISP, virus analysis, open ports, vulnerabilities, subdomains, location, network, WHOIS, DNS records, technologies used, pastes, social media accounts, blacklisted IP, links and other stuff, also you can know if an URL belongs to a phishing site.
- [InfoTracer](https://infotracer.com/) - Instant Public Records Search Contact Info, Criminal Records, Arrests, Assets, Social Profiles & More
- [MetaDefender](https://metadefender.opswat.com/) - Find threats in File, url, ip addr, hash ....
- [Username Search](https://usersearch.org/) - Find someone by username or email on Social Networks, Dating Sites, Forums, Crypto Forums, Chat Sites and Blogs. 600+ sites Supported! Largest Reverse User Search Online
- [SpyTox](https://www.spytox.com/) - Find people, personal info & phone numbers
- [Effect Group](https://effectgroup.io/) - Open Source Research Platform: Our open Source Research Platform allows journalists, lawyers, private investigators and more to find information on people that is openly available on the web
- [osrframework](https://pypi.org/project/osrframework/) - OSRFramework, the Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.
- [Google Custom Search](https://cse.google.com/cse?cx=017648920863780530960:lddgpbzqgoi) - google custom search engine
- [OSINT Search Engine](https://cse.google.com/cse/publicurl?cx=006290531980334157382:qcaf4enph7i) - custom search engine
- [LinkScope](https://github.com/AccentuSoft/LinkScope_Client) - LinkScope allows you to perform online investigations by representing information as discrete pieces of data, called Entities.
- [IOA](https://www.io-archive.org/) - The Information Operation Archive hosts publicly available and rigorously attributed datapoints from known Information Operations on social media platforms.
<br>
[⇧ Top](#index)
## PEOPLE
- [IDCrawl](https://www.idcrawl.com/) - People Search a friend, relative, yourself, or someone else you may know (US ONLY).
- [WebMii](https://webmii.com/) - people search engine
- [TruePeopleSearch](https://www.truepeoplesearch.com/) - people search
- [Free People Search](https://www.peoplefinder.com/) - Police Records, Background Checks, Social Media, Photos, Assets, Contact Information and Much More! (us only)
- [Yandex People Search](https://yandex.ru/people) - Yandex people search engine
- ~~[FamilyTree](https://www.familytreenow.com/)~~ - 404
- [fastpeoplesearch](https://fastpeoplesearch.com/) - Find a person by name, phone number, or street address.
- ~~[TruePeopleSearch](https://truepeoplesearch.com/)~~ - 404
- [People Search](http://itools.com/search/people-search) - Use the best people search tools to find someone's contact information. Find a person's street address, phone number or email address.
- [People Search Engine](https://cse.google.com/cse?cx=14db36e158cd791c0) - people search engine
- [Dating Sites Search Engine](https://cse.google.com/cse?cx=c7b340447e1e12653) - custom dating sites search engine
- [192](https://www.192.com/) - Search for People, Businesses & Places in the UK
- [International](https://www.infobel.com/) - Find a business or an individual in the world
- [People search Tool](https://www.aware-online.com/en/osint-tools/people-search-tool/) - A custom OSINT tool can help you to effectively search for people on the internet.
- [PeekYou](https://www.peekyou.com/) - PeekYou is a free people search engine site that places people at the center of the Internet. It lets you discover the people most important and relevant to your life.
- [White Pages](https://www.whitepages.com/) - Find people, contact info & background checks
- [New Canada 411](https://www.canada411.ca/) - people search for canada
- [411](http://411.com/) - people search for canada
- [TruthFinder](https://www.truthfinder.com/) - Social Media, Photos, Police Records, Background Checks, Civil Judgments, Contact Information and Much More! (US)
- [zaba search](https://www.zabasearch.com/) - Free People Search and Public Information Search Engine! (US)
- [Thats them](https://thatsthem.com/) - Free People Search Engine Find Addresses, Phones, Emails, and Much More
- [People search](https://radaris.com/) - Fast People Search Contact Information & Public Records
- [Free People Search](http://www.yasni.com/) -
- [Gofindwho.com](https://gofindwho.com/) - 404
- [xlek](https://xlek.com/) - USA Data Search Search Public Data Instantly
- [Ufind.name](https://ufind.name/) - free people search
<br>
[⇧ Top](#index)
## USERNAME
- [namechk](https://namechk.com/) - Check available username across 30 domain 90 social sites.
- [Phantom Finder (iOS)](https://apps.apple.com/gb/app/phantom-finder-username-search/id6736408372) - Mobile reverse username search with direct profile links.
- [WhatsMyName Web](https://whatsmyname.app/) - username search
- [Username Checker](https://analyzeid.com/username/) - Social media username checker. Gather information on the taken username and get a summary of who the person is.
- [Username Search](https://www.idcrawl.com/username) - Uncover social media profiles and real people behind a username
- [maigret](https://pypi.org/project/maigret/) - Maigret collect a dossier on a person by username only, checking for accounts on a huge number of sites and gathering all the available information from web pages
- [sherlock](https://github.com/sherlock-project/sherlock) - Hunt down social media accounts by username across social networks
- [socialscan](https://pypi.org/project/socialscan/) - socialscan offers accurate and fast checks for email address and username usage on online platforms.
- [socid-extractor](https://pypi.org/project/socid-extractor/) - Extract information about a user from profile webpages / API responses and save it in machine-readable format.
- [social-analyzer](https://pypi.org/project/social-analyzer/) - Social-Analyzer - API, CLI & Web App for analyzing & finding a person’s profile across social media websites. It includes different string analysis and detection modules, you can choose which combination of modules to use during the investigation process.
- [KnowEm](https://knowem.com/) - KnowEm allows you to check for the use of your brand, product, personal name or username instantly on over 500 popular and emerging social media websites
- [Check Usernames](https://checkusernames.com/) - Check the use of your brand or username on 160 Social Networks
- [Username Checker](https://checkuser.org/) - Check Your Desired Usernames Across 70+ Popular Social Network Sites
- [user-scanner](https://github.com/kaifcodec/user-scanner) - Check a username's presence across popular dev/social/creator sites and games
- [Lullar Com](https://com.lullar.com/) - Profile search by email, username or first name
- ~~[OSINT Toolkit](https://one-plus.github.io/EmailUsername)~~
- [Username search tool](https://www.aware-online.com/en/osint-tools/username-search-tool/) - username search with customization
- [snoop](https://github.com/snooppr/snoop) - Snoop Project One of the most promising OSINT tools to search for nicknames. Over 4000+ sites (THE BEST ONE)
<br>
[⇧ Top](#index)
## EMAIL
- [Email Lookup](https://epieos.com/) - The ultimate OSINT tool for email and phone reverse lookup
- [holehe](https://pypi.org/project/holehe/) - holehe allows you to check if the mail is used on different sites like twitter, instagram , snapchat and will retrieve information on sites with the forgotten password function.
- [user-scanner](https://github.com/kaifcodec/user-scanner.git) - Takes an email, scan on various popular sites, games and retrieve info if the email is registered there or not.
- ~~[Infoga](http://github.com/m4ll0k/Infoga)~~ - 404
- ~~[Trumail](https://trumail.io/)~~ - Purchase by emailable.
- [Email Verifier](https://hunter.io/email-verifier) - Verify any email address with the most complete email checker.
- [Reverse Whois](https://osint.sh/reversewhois/) - Allow you to find domain names owned by an email address
- [Email Dossier](https://centralops.net/co/emaildossier.aspx) - check if email address is valid or not.
- [Email Format](https://www.email-format.com/) - find the email address formats in use at thousands of companies.
- [Email Header Analyzer](https://mxtoolbox.com/EmailHeaders.aspx) - Email headers are present on every email you receive via the Internet and can provide valuable diagnostic information like hop delays, anti-spam results and more. If you need help getting copies of your email headers
- [E-mail search tool](https://www.aware-online.com/osint-tools/e-mail-search-tool/) - Email search tool - Research on email addresses
- [Proofy](https://proofy.io/) - Email address verifier, or email checker, is a tool that can clean your email list from temporary or invalid emails.
- [Email Permutator](http://metricsparrow.com/toolkit/email-permutator/) - create unique email address of given info
- [Phonebook.cz](https://phonebook.cz/) - Phonebook lists all domains, email addresses, or URLs for the given input domain.
You are searching 121 billion records.
- [Email Breach Analysis](https://www.hotsheet.com/inoitsu/) - Use this free service to check if an email address is in any hacked data from known database breaches. Get a summary of what specific information may be at risk, critical personal identity alerts, a relative exposure rating and more. Results are shown immediately - no verification, upgrades or extra steps are required.
- [Emailrep.io](https://emailrep.io/) - check email reputation
- ~~[Email Finder](https://osint.sh/email/)~~ - 404
- [EmailHarvester](https://pypi.org/project/EmailHarvester/) - A tool to retrieve Domain email addresses from Search Engines
- [h8mail](https://pypi.org/project/h8mail/) - Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or using your local data
- [WhatBreach](https://github.com/Ekultek/WhatBreach) - OSINT tool to find breached emails, databases, pastes, and relevant information
- [email2phonenumber](https://github.com/martinvigo/email2phonenumber) - A OSINT tool to obtain a target's phone number just by having his email address
- [buster](https://github.com/sham00n/buster) - An advanced tool for email reconnaissance
- [Anymailfinder.com](https://anymailfinder.com/) - Find the email address of a person by entering their name and the company name or domain.
- [SimpleMail](https://www.simplemail.dev/) - A simple API to send transactional emails to users, without needing to worry about SMTP, templates, etc..
- [Protonmail](https://proton.me/mail) - Proton Mail is a Swiss end-to-end encrypted email service
- [Tuta](https://tuta.com/) - Tuta is the world's most secure email service, easy to use and private by design.
- [Predicta Search](https://predictasearch.com) - Get the digital footprint from an email or phone number
<br>
[⇧ Top](#index)
## PHONE
- [CallSpy](https://callspy.profiler.me/) - Get real-time details about any phone number from our 10+ sources, including Truecaller, Eyecon, CallApp, and many more
- [PhoneInfoga](https://sundowndev.github.io/phoneinfoga/) - PhoneInfoga is one of the most advanced tools to scan international phone numbers. It allows you to first gather standard information such as country, area, carrier and line type on any international phone number, then search for footprints on search engines to try to find the VoIP provider or identify the owner.
- [Phonerator](https://www.martinvigo.com/tools/phonerator/) - An advanced valid phone number generator.
- [Reverse Phone Lookup](https://www.idcrawl.com/phone) - Find out who's behind the phone: Reverse phone lookup made easy
- [Nuwber](https://nuwber.com/) - to find phone numbers, addresses, police records, social profiles and much more.
- [ignorant](https://pypi.org/project/ignorant/) - ignorant allows you to check if a phone is used on different sites like snapchat.
- [Validnumber.com](https://validnumber.com/) - Valid Number offers a free reverse phone lookup service to let you identify a caller associated with any 10-digit phone number from the US and Canada.
- [NumLookup](https://www.numlookup.com/) - NumLookup can be used to perform a completely free reverse phone lookup for any phone number
- [Reverse Phone Lookup](https://www.reversephonecheck.com/) - Look up names, addresses, phone numbers, or emails and anonymously discover information about yourself, family, friends, or old schoolmates.
- [Phone Number Lookup Tool](https://shadowcrypt.net/tools/phone) - Phone Number Lookup will check if the given number is valid.
- [SYNC.me](https://sync.me/) - you can search a number here. truecaller alternative
- [OpenCelliD](https://opencellid.org/) - The world's largest Open Database of Cell Towers
- ~~[Find GSM base stations cell id coordinates](https://cellidfinder.com/)~~ - DEAD
- [Moriarty-Project](https://github.com/AzizKpln/Moriarty-Project) - Moriarty Project is a powerful web based phone number investigation tool. It has 6 features and it allows you to choose either all features, or the features you like
- [Phone Scoop](https://www.phonescoop.com/phones/) - Search for phones by specs and features
- [GSM Arena](https://www.gsmarena.com/) - NEWS about Mobile phones, updates, launches etc
- [Oldphonebook.com](http://www.oldphonebook.com/) - search a large selection from the past 20 years of USA phone listing
- [carrier lookup](https://www.carrierlookup.com/) - Look Up A Cell Phone Carrier Right Now For Free!
- [Free Reverse Phone Lookup](https://spydialer.com/default.aspx) - free reverse lookup search and more
<br>
[⇧ Top](#index)
# SOCIAL MEDIA
- [Who posted what?](https://whopostedwhat.com/) - whopostedwhat.com is a non public Facebook keyword search for people who work in the public interest. It allows you to search keywords on specific dates.
- [SOCMINT](https://start.me/p/Wp1kpe/socmint) - some of the best tools
- [SocialMap](https://vincos.it/world-map-of-social-networks/) - World map of social media.
- [Vimeo search tool](https://www.aware-online.com/en/osint-tools/vimeo-search-tool/) - on Vimeo . Quickly search for videos, people, channels and groups
- [Kribrum.io](https://kribrum.io/) - NOTE: IF YOU FIND OUT IST'S WORKING LET ME KNOW-
- [Social Search Engine](https://www.socialsearchengine.org/) - Search social information from multiple social networking sites including Facebook, Twitter, Steemit, Google Plus, Blogspot, LinkedIn and more at same time.
- [Instagram, Reddit & Snapchat](https://one-plus.github.io/Instagram) - search people, posts ...
- [Google to search profiles on Dribbble](https://recruitin.net/dribbble.php) - Dribbble is good for finding front end developers, graphic designers, illustrators, typographers, logo designers, and other creative types.
<br>
[⇧ Top](#index)
## FACEBOOK
- [sowsearch](https://www.sowsearch.info/) - get facebook data by id and more
- [Facebook Search Engine](https://cse.google.com/cse?cx=95ae46262a5f2958e)
- [Facebook Photo Search Engine](https://cse.google.com/cse/publicurl?cx=013991603413798772546:jyvyp2ppxma)
- [Facebook Scraped Data search](http://4wbwa6vcpvcr3vvf4qkhppgy56urmjcj2vagu2iqgp3z656xcmfdbiqd.onion.to/) - search in facebook scaped data (if onion[.]to is not working open in tor browser without .to) OR [Click Here](https://fr.4everproxy.com/secure/zHLV62xyZZROpM~9TGrMISNsG3Yk6QS167xKdMmQ1tMKKloKw3TsCdU~fpQ7gOsk1m7t39p1sYlsg9ThAyYdCAeYqI1pOWMT39tWTRf5i4I-)
- ~~[Facebook Search](https://www.social-searcher.com/facebook-search/)~~ - 404
- [Facebook Video Downloader](https://fbdown.github.io/) - Download Facebook Videos and Save them directly from facebook to your computer or mobile for Free without Software
- [Have I Been Zucked?](https://haveibeenzuckered.com/) - Check if your telephone number is present within the Facebook data breach.
- ~~[Facebook Profile Directory](https://www.facebook.com/directory/)~~ - 404
- [Find My Facebook ID](https://commentpicker.com/find-facebook-id.php) - Find your Facebook ID for your Facebook profile, group or page.
<br>
[⇧ Top](#index)
## TWITTER
- [BirdHunt](https://birdhunt.co/) - BirdHunt will show you all tweets within the chosen geographic location
- [Nitter](https://github.com/zedeus/nitter/) - Alternative Twitter front-end
- [Twitter Search Engine](https://cse.google.com/cse?cx=5857bab69c8b8e37e) - custom search engine for twitter
- [Twitter Photo Search](https://cse.google.com/cse/publicurl?cx=006290531980334157382:_ltcjq0robu) - custom search engine for twitter
- [twint](https://pypi.org/project/twint/) - Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter's API.
- [Tweet Archive Search](https://cse.google.com/cse/publicurl?cx=005797772976587943970:kffjgylvzwu) - custom search engine for twitter
- [Twitter Advanced Search](https://twitter.com/search-advanced) - search with additional filters
- [Twitter search tool](https://www.aware-online.com/en/osint-tools/twitter-search-tool/) - create advanced search queries within Twitter. In addition, we refer you to useful tools that allow you to analyze and monitoran account on Twitter
- [Google to search profiles on Twitter](https://recruitin.net/twitter.php) - Easily use Google to search profiles on X (Twitter)
- [Search Twitter Bios and Profiles](https://followerwonk.com/bio) - 404
- [The one million tweet map](https://onemilliontweetmap.com/) - create map of tweets from hashtag, username, keywords.
- [Tweet Binder](https://www.tweetbinder.com/) - Free Twitter Hashtag Analytics of up to 200 posts from the last 7 days.
- [Thread Reader](https://threadreaderapp.com/) - Thread Reader helps you read and share Twitter threads easily!
- ~~[Search Twitter Users](https://pushshift.io/twitter-user-search/)~~ - 404
- [Getdewey.co](https://getdewey.co/) - Save your favorite X (Twitter) and Bluesky bookmarks in one place
- [geosocial footprint](http://geosocialfootprint.com/) - GeoSocial Footprint: A geosocial footprint is the combined bits of location information that a user divulges through social media, which ultimately forms the users location "footprint". For Twitter.com users, this footprint is created from GPS enabled tweets, social check-ins, natural language location searching (geocoding), and profile harvesting.
- [Twitter Analytics](https://foller.me/) - Looking for someone in the United States? Our free people search engine finds social media profiles, public records, and more!
- [getdaytrends](https://getdaytrends.com/) - Twitter trends worldwide
- [Twitter Trending Hashtags and Topics](https://www.trendsmap.com/) - Trendsmap has been providing unique and powerful analytical and visualisation tools to analyse Twitter data. With the demise of Twitter, we are now providing access to over ten years historical data
- [Socialbearing](https://socialbearing.com/) - Insights & analytics for tweets & timelines
- [SocialData API](https://socialdata.tools/) - SocialData is an unofficial Twitter API that allows scraping tweets, user profiles, lists and Twitter spaces without using Twitter's API.
<br>
[⇧ Top](#index)
## YOUTUBE
- [Filmot](https://https://filmot.com/) - Search within YouTube subtitles, captions and transcripts.
- [yt-dlp](https://pypi.org/project/yt-dlp/) - Youtube downloader with additional features.
- [Location Search](https://mattw.io/youtube-geofind/location) - Search YouTube by location for geotagged videos. Find videos near you or anywhere in the world.
- [YouTube Metadata Bulk](https://mattw.io/youtube-metadata/bulk) - Metadata bulk grabs details about multiple YouTube videos, a playlist's videos, or a channel's public videos.
- [Hadzy.com](https://hadzy.com/) - Search, sort and analyze youtube comments
- [Youtube channel ID](https://commentpicker.com/youtube-channel-id.php) - Find YouTube Channel ID, and related channel information and statistics.
- [Extract Meta Data YouTube](https://citizenevidence.amnestyusa.org/) - Youtube DataViewer
- [Youtube Geo Search Tool](https://youtube.github.io/geo-search-tool/search.html) - a simple model of how News organizations could use Google APIs to help find citizen journalism on YouTube. It uses YouTube and Google APIs to generate location based search results which are stack ranked by upload time.
- [Yout](https://yout.com/) - search for something in the search bar, click your video, and then record it as a Mp3 (Audio), you can toggle to Mp4 (Video), or Gif (Image) if you want those instead.
- [YouTube Comment Finder](https://ytcomment.kmcat.uk/) - Search for a video, channel or VideoID
- [Youtube, Periscope, Twitch & Dailymotion](https://one-plus.github.io/Youtube) - general search tool for youtube
- [Unlistedvideos.com](https://unlistedvideos.com/) - A website for submitting, searching for, and watching unlisted YouTube videos.
- [Youtube Comments Downloader](https://youtubecommentsdownloader.com/) - Effortlessly export comments from YouTube videos, live streams, shorts, and community posts. Perfect for YouTubers, social media managers, researchers [PAID]
- [ActiveTK](https://www.activetk.jp/tools/yt-not-well-known) - This web application allows you to search for Youtube videos by
the number of views or likes.
- [youtubetranscript](https://youtubetranscript.com/) - Extremely fast free online service for converting YouTube videos to text. Not perfect quality, but quite acceptable and very fast.
<br>
[⇧ Top](#index)
## REDDIT
- [Vapor](https://vapor.selva.ee/) - Get Profile data by username
- [Reveddit.com](https://www.reveddit.com/) - Reveal Reddit's secretly removed content. Search by username or subreddit
- ~~[Karma Decay](http://karmadecay.com/)~~ - 404
- [redditsfinder](https://pypi.org/project/redditsfinder/) - Archive a reddit user's post history. Formatted overview of a profile, JSON containing every post, and picture downloads.
- [SocialGrep](https://www.socialgrep.com/search) - Search reddit posts and comments. Advanced filters via date, score, subreddit, keywords, website urls and more. All searches can be exported via csv or json.
- [Redective](https://www.redective.com/) - Redective works in realtime by querying reddit each time you do a search
- [Reddit_Persona](https://github.com/n2itn/reddit_persona) - A Python module to extract personality insights, sentiment & keywords from reddit accounts.
- [Reddit Downloader](https://redditdownloader.github.io/) - Download media from reddit like image, audio, video.
- [Reddit Search Engine](https://cse.google.com/cse?cx=0728740ab68a619ba) - custom google search for reddit
- [Reddit Search Engine](https://cse.google.com/cse/publicurl?cx=017261104271573007538:bbzhlah6n4o) - custom google search for reddit
- [Reddit User Analyser](https://reddit-user-analyser.netlify.app/) - Analyse a Reddit user by username
- ~~[reddit search](https://www.redditsearch.io/)~~ - 500
- [RedditMetis](https://redditmetis.com/) - See statistics for your Reddit account
- [Search Reddit Comments by User](https://www.redditcommentsearch.com/) - Search through comments of a particular reddit user. Just enter the username and a search query
- ~~[Reddit Investigator](https://www.redditinvestigator.com/)~~ - 404
- [Pushshift API Guide](https://github.com/pushshift/api) - The pushshift.io Reddit API was designed and created by the /r/datasets mod team to help provide enhanced functionality and search capabilities for searching Reddit comments and submissions.
<br>
[⇧ Top](#index)
## LINKEDIN
- [LinkedIn Search](https://recruitin.net/) - Easily use Google to search profiles on LinkedIn
- [LinkedIn Search Engine](https://cse.google.com/cse?cx=daaf18e804f81bed0) - custom google search for linkedin
- [LinkedIn Email Reverse Lookup](https://osint.support/chrome-extensions/2019/09/03/linkedin-email-reverse-lookup.html) - chrome extention for linkedin Simply provide an email address which is of interest to you and click Search. If a match is found the name, profile id, username will be returned as well as the profile image if one exists.
- [Proxycurl](https://nubela.co/proxycurl/) - Pull rich data about people and companies
## GOOGLE
- [Google Finder](https://tools.epieos.com/google-account.php) - Find out google info like name by email id
- [Google Social Search](https://www.social-searcher.com/google-social-search/) - Top Social Networks Search Results Dashboard
- [Google+ & LinkedIn](https://one-plus.github.io/G+Link) - search by fields
- [GHunt](https://github.com/mxrch/GHunt) - Offensive Google framework.
- [Google+ Photo Custom Search](https://cse.google.com/cse/publicurl?cx=006205189065513216365:uo99tr1fxjq) - custom google search
<br>
[⇧ Top](#index)
## DISCORD
- ~~[Discord User Search](https://discordhub.com/user/search)~~ - 502
- [Discord Me](https://discord.me/) - Public Discord Servers and Bots
- [Discord History Tracker](https://dht.chylex.com/) - Discord History Tracker lets you save chat history in your servers, groups, and private conversations, and view it offline.
- [DiscordOSINT](https://github.com/atoncehussein/DiscordOSINT) - This repository contains useful resources to conduct research and OSINT investigations on Discord accounts ,servers and bots
- [DiscordServers](https://discordservers.com/) - Public Discord servers you may like
- [DISBOARD](https://disboard.org/) - Disboard is the place where you can list/find Discord servers.
- [Discord ID Lookup](https://discord.id/) - Unofficial discord lookup
- [Discord Bots](https://discordbotlist.com/) - Find the best Discord Bots, Apps and Servers with our Discord Bot List, including the top music and economy apps.
- [Discord Bots](https://top.gg/) - Explore millions of Discord Bots
- [Discord Bots](https://discord.bots.gg/) - This site is a list of publicly available Discord bots, intended to accompany the Discord Bots, Discord server. The bots presented here are created and maintained by community members and serve all kinds of purposes
<br>
[⇧ Top](#index)
## TWITCH
- [TwitchTracker](https://twitchtracker.com/) - track info about twitch user
- [Twitch Payout Search](https://sizeof.cat/project/twitch-payout-search/) - Twitch Payout Search
- [Search for a Twitch channel](https://sullygnome.com/channelsearch) - Search for a Twitch channel (stats for past 7 days)
- [Searchstream.live](https://searchstream.live/) - twitch live stream filter search
- [Username Availability](https://cactus.tools/twitch/username) - search for Twitch Username Availability
- [Check channel badges](https://cactus.tools/twitch/badges) - Check channel badges
- [Twitch Following](https://cactus.tools/twitch/following) - Check the Twitch channels someone is following
- [All Twitch Streamers Search](https://twitchstats.net/allstreamers) - All Twitch Streamers You can search any twitch streamers/channels here...
- [Twitchmetrics.net](https://www.twitchmetrics.net/) - This website gives a meaningful insights about Twitch activity to subs and plebs alike
<br>
[⇧ Top](#index)
## INSTAGRAM
- [InstaHunt](https://instahunt.co/) - InstaHunt shows you Instagram places and posts surrounding the chosen geographic location
- [Instagram Deep Photo Search Engine](https://cse.google.com/cse?cx=017261104271573007538:ffk_jpt64gy) - custom instagram deep photo search
- [Instagram analyzer and viewer](https://gramho.com/) - Reviwu is a platform for reviewing influencers, i.e., popular Instagram, YouTube, TikTok and OnlyFans content creators. Today, many influencers delete and block everything that does not suit them, which creates a false image of everyone liking and supporting them. Reviwu allows you to give your honest opinion and to review the chosen influencer in a neutral place without fear of censorship
- [Find Instagram User ID](https://codeofaninja.com/tools/find-instagram-user-id/) - Find Instagram User ID
- [Instagram User ID](https://commentpicker.com/instagram-user-id.php) - Find any Instagram User ID by Instagram username.
- [instalooter](https://pypi.org/project/instalooter/) - InstaLooter is a program that can download any picture or video associated from an Instagram profile, without any API access
- [instaloader](https://pypi.org/project/instaloader/) - Download pictures (or videos) along with their captions and other metadata from Instagram.
- [osi.ig](https://github.com/th3unkn0n/osi.ig) - Information Gathering Instagram.
- [Osintgram](https://github.com/Datalux/Osintgram) - Osintgram is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname
- [SoIG](https://github.com/yezz123/SoIG) - OSINT Tool gets a range of information from an Instagram account
- [yesitsme](https://github.com/blackeko/yesitsme) - Simple OSINT script to find Instagram profiles by name and e-mail/phone
<br>
[⇧ Top](#index)
## TELEGRAM
- [Telegago](https://cse.google.com/cse?&cx=006368593537057042503:efxu7xprihg#gsc.tab=0) - custom google search for telegram
- [Telegram Search](https://cse.google.com/cse?cx=004805129374225513871:p8lhfo0g3hg) - custom google search for telegram
- [Telegram Search. Search for posts](https://tgstat.com/search) - TGStat offers a full range of possibilities for a comprehensive search of posts and messages in Telegram
- [Lyzem Blog](https://lyzem.com/) - search telegram posts
- [maltego-telegram](https://github.com/vognik/maltego-telegram/) - OSINT Maltego Transforms for investigating Telegram channels, groups, and users, including deanonymization via stickers, forwarded messages, similar channels, deleted posts, and more.
- [Telegram Channels List](https://tlgrm.eu/channels) - Discover interesting channels for your Telegram
- [Readergram.com](https://readergram.com/) - Here you can find channels, chats and groups for every taste and preference
- [Find Telegram Channels/Bots/Groups](https://xtea.io/ts_en.html) - search for telegram group, channels, bots
- [Telegram Group: Find Telegram Channels, Bots & Groups](https://www.telegram-group.com/en/) - Telegram Channels, Groups, and Bots
- [TelegramDB.org](https://telegramdb.org/) - TelegramDB is a service that allows you to search for channels, groups and their members.
- [Global Telegram Database](https://t.me/s/privatelinks) - Telegram Database: channels, groups and users
- [Nekogram X](https://f-droid.org/packages/nekox.messenger/) - NekoX is an third-party Telegram client, based on Telegram-FOSS with features added.
<br>
[⇧ Top](#index)
## SNAPCHAT
- [Snap Map](https://map.snapchat.com/) - World map of snap just tap on location and watch
- ~~[Snapdex](https://snapdex.com/)~~ - 404
- ~~[Snapchat User Search](https://sovip.io/)~~ - 503
- [SnapScraper](https://rhematt.github.io/Snap-Scraper/) - SnapScraper is an open source intelligence tool which enables users to download media uploaded to Snapchat’s Snap Map using a set of latitude and longitiude co-ordinates.
- [snapmap-archiver](https://pypi.org/project/snapmap-archiver/) - Download all Snapmaps content from a specific location.
<br>
## TIKTOK
- [TIKTOK Search Engine](https://cse.google.com/cse?cx=011444696387487602669:aqf7d9w73om) - custom search for tiktok
- [TikTok User Search](https://vidnice.com/search/) - Make a TikTok search to find some users or hashtags.
- [TikTok downloader](https://tiktokd.com/) - 522
- [Hashtags for Likes](https://hashtagsforlikes.co/) - Tool for finding the best hashtags for TikTok posts.
- [HypeAuditor](https://hypeauditor.com/) - Tool for analyzing the authenticity of TikTok influencers.
- [Influence Grid](https://www.influencegrid.com/) - Tool for finding TikTok influencers.
- [InstaFollowers](https://www.instafollowers.co/) - Tool for finding TikTok user IDs.
- [Mavekite.com](https://mavekite.com/) - Tool for managing and analyzing TikTok campaigns.
- [OSINT Combine TikTok Quick Search](https://osintcombine.com/) - Quick search tool for TikTok profiles.
- [Savefrom.net](https://savefrom.net/) - Tool for downloading TikTok videos.
- [Sinwindie TikTok Bookmarklet Tools](https://sinwindie.com/) - Bookmarklet tools for TikTok OSINT.
- [Snaptik.app](https://snaptik.app/) - Tool for downloading TikTok videos.
- [Socid_extractor](https://socidextractor.com/) - Tool for extracting social media IDs.
- [Tikbuddy](https://tikbuddy.com/) - Tool for analyzing TikTok profiles and content.
- [TikTok API](https://developers.tiktok.com/) - API for interacting with TikTok.
- [TikTok Creative Center Statistics](https://www.tiktok.com/business/creativecenter) - Tool for finding trending hashtags and content on TikTok.
- [TikTok Downloader](https://tiktokdownloader.org/) - Tool for downloading TikTok videos.
- [TikTok Hashtags](https://www.tiktok.com/hashtag/) - Tool for generating TikTok hashtags.
- [TikTok Scraper](https://tiktokscraper.com/) - Tool for scraping TikTok profiles and videos.
- [TikTok Timestamp](https://www.tiktoktimestamper.com/) - Tool for analyzing timestamps on TikTok videos.
- [TikView](https://www.tikview.com/) - Tool for searching TikTok profiles and content.
- [tikvstock](https://tikvstock.com/) - Tool for stock and analyzing TikTok videos.
- [Tokvid](https://tokvid.com/) - Tool for downloading TikTok videos.
- [TubeHi](https://www.tubehi.com/) - Tool for analyzing TikTok and YouTube content.
<br>
[⇧ Top](#index)
## STEAM
- [Steam Community :: Search](https://steamcommunity.com/search/users/) - Search the Steam Community by alias.
- [Steam ID Finder](https://steamidfinder.com/lookup/) - Lookup and convert your Steam Hex, SteamID, SteamID3, SteamID64, Custom URL and Community ID
- [steamdb.info/calculator](https://steamdb.info/calculator/) - Lookup a SteamID and calculate the value of any Steam account
<br>
## CLUBHOUSE
- [Clubhouse Database](https://clubhousedb.com/) - Clubhouse Database - User Search & Analytics
- [Rooms of Clubhouse](https://roomsofclubhouse.com/) - Search open and scheduled Rooms in the Clubhouse App
- ~~[ClubSearch – search Clubhouse rooms](https://clubsearch.io/)~~ - 404
<br>
[⇧ Top](#index)
## BOT
- [Bot Sentinel Dashboard ‹ Bot Sentinel](https://botsentinel.com/) - Bot Sentinel to help fight disinformation and targeted harassment. We believe Twitter users should be able to engage in healthy online discourse without inauthentic accounts, toxic trolls, foreign countries, and organized groups manipulating the conversation.
- [Botometer by OSoMe](https://botometer.osome.iu.edu/) - a centralized place to share annotated datasets of Twitter social bots. We also provide list of available tools on bot detection.
- [FollowerAudit](https://www.followeraudit.com/) - Check fake followers and analyze the followers of any X (Twitter) account
- [Twitter Bot Checker](https://circleboom.com/twitter-management-tool/twitter-circle-tool/twitter-bot-checker) - Find Twitter bots and check your friends and followers' authenticity, and be safe!
<br>
[⇧ Top](#index)
## ANALYTICS
- [SEO Resources Search Engine](https://cse.google.com/cse/publicurl?cx=005797772976587943970:i7q6z1kjm1w) - custom google search
- [Hashatit](https://www.hashatit.com/) - Everywhere on social media, content is being generated at unheard of speeds. Hashtags help you navigate the ever-expanding internet, and HASHATIT keeps you on top of hashtags.
- [Social Mentions](https://www.social-searcher.com/media-monitoring/) - Maintaining an excellent reputation is crucial for any company, no matter its size. Start your mentions monitoring right now and grow safely.
- [Social Trends](https://www.social-searcher.com/social-trends/) - Find top social posts, statuses, photos and videos, which were recently published about specific topic.
- [Semrush](https://www.semrush.com/) - Do SEO, content marketing, competitor research, PPC and social media marketing from just one platform.
- [Network Tool](https://osome.iu.edu/tools/networks/#/) - The Network Tool generates an interactive network to explore how information spreads across Twitter using the OSoMe data archive. You may search the archive using a single hashtag or comma-separated list of hashtags. The timespan between start and end dates cannot exceed 30 days.
- [Trends Tool](https://osome.iu.edu/tools/trends/#/) - Analyze the volume of tweets with a given hashtag or URL over a given period of time using OSoMe data.
<br>
[⇧ Top](#index)
## BLOG
- [Blogs Search Engine](https://cse.google.com/cse?cx=013991603413798772546:8c1g6f0frp8#gsc.tab=0) - custom google search for blog posts
- [WordPress Content Snatcher](https://cse.google.com/cse/publicurl?cx=011081986282915606282:w8bndhohpi0) - custom google search wordpress content
- [WordPress Custom Search](https://cse.google.com/cse?cx=011081986282915606282:w8bndhohpi0) - wordpress custom sesarch
- [OSINT Blogs Search Engine](https://cse.google.com/cse?cx=fd4729049350a76d0) - custom google search for blogs
<br>
[⇧ Top](#index)
## NEWS
- [News Search Engine](https://cse.google.com/cse?cx=013991603413798772546:fvmtax6anhd) - custom google search for news only results
- [Mailing List Archives Search Engine](https://cse.google.com/cse/publicurl?cx=013991603413798772546:sipriovnbxq) - custom google search for mailing list archives of news
- [Google News](https://news.google.com/) - google news feed around the world
- [News Search](https://upstract.com/search) - Upstract is the ultimate attempt in delivering the entire Internet on a single page search the news
- [Welcome to Dealstrap!](http://correctsearch.com/) - Find Breaking news around the world
- [Beautiful News](https://informationisbeautiful.net/beautifulnews/) - A collection of good news, positive trends, uplifting statistics and facts — all beautifully visualized by Information is Beautiful.
- [GoodGopher.com](https://goodgopher.com/) - GoodGopher is the world's first privacy-protected search engine that filters our corporate propaganda and government disinformation for those searching for information and news on liberty, natural healing, central banks, food freedom, advanced science and a multitude of other topics no longer allowed in NSA-controlled search engines.
- [Newsnow](https://www.newsnow.co.uk/) - NewsNow: The Independent News Discovery Platform for UK,US,CA
- ~~[Mereku.com](https://mereku.com/)~~ - 404
- [Newspapers.com](https://www.newspapers.com/) - The largest online newspaper archive, established in 2012. Used by millions for genealogy and family history, historical research, crime investigations, journalism, and entertainment. Search for obituaries, marriage announcements, birth announcements, social pages, national and local news articles, sports, advertisements, entertainment, fashion and lifestyle pages, comics, and more.
- [Talkwalker](https://www.talkwalker.com/alerts) - Best free and easy alternative to Google Alerts Talkwalker Alerts monitors every single mention of your brand, products, and keywords across the internet - including news platforms, blogs, forums, websites, and even Twitter (X).
- [Google Alerts](https://www.google.com/alerts) - Monitor the web for interesting new content create an email alert about any topic in mind
- [Hoaxy: How claims spread online](https://hoaxy.osome.iu.edu/) - Visualize the spread of information on Twitter
- [Snopes](https://www.snopes.com/?s=) - The definitive fact-checking site and reference source for urban legends, folklore, myths, rumors, and misinformation.
- [ReviewMeta](https://reviewmeta.com/) - ReviewMeta analyzes Amazon product reviews and filters out reviews that our algorithm detects may be unnatural.
- [Verification Handbook](https://datajournalism.com/read/handbook/verification-1) - Need to learn new data skills, increase your data journalism knowledge or advance your career?
- [Truth or Fiction](https://www.truthorfiction.com/) - Truth or Fiction? – Seeking truth, exposing fiction
- [Debunking False Stories Archives](https://www.factcheck.org/fake-news/) - FactCheck.org is one of several organizations working with Facebook to debunk misinformation shared on the social media network
- [Fact-Checking](https://reporterslab.org/fact-checking/) - The Reporters’ Lab is a center for journalism research in the Sanford School of Public Policy at Duke University. Our core projects focus on fact-checking, but we also do occasional research about trust in the news media and other topics.
<br>
[⇧ Top](#index)
## SEARCH ENGINES
- [Google Advanced Search](https://www.google.com/advanced_search) - its like filter particular information according to needs
- [Bing](https://www.bing.com/) - microsoft's Bing search engine
- [Yandex](https://yandex.com/) - Yandex search engine
- [MetaGer: Privacy Protected Search](https://metager3.de/en/) - MetaGer is different from other search engines. This is reflected not only in our public good orientation and focus on privacy, Possibility of creating a personal blacklist Function of the search in the search Advertising-free search possible Integration of search engine projects like YaCy The only German search engine that combines results from several large web indexes
- [Duck Duck Go](https://duckduckgo.com/) - Search and browse more privately with the DuckDuckGo. Unlike Chrome and other browsers, we don't track you
- [Search Engines Index](https://www.searchenginesindex.com/) - Search Engines in all countries in the world
- [carrot2](https://search.carrot2.org/#/search/web) - Carrot2 organizes your search results into topics. With an instant overview of what's available, you will quickly find what you're looking for
- [Qwant](https://www.qwant.com/) - The search engine that respects your privacy
- [Startpage](https://startpage.com/) - A safer way to search and browse online without personal data collection, tracking or targeting.
- [Mailing List Search](https://cse.google.com/cse/publicurl?cx=013991603413798772546:sipriovnbxq) - custom google mailing list search
- [swisscows](https://swisscows.com/) - anonymous search engine protects the privacy of our users when searching and from inappropriate content when finding it. We do not use cookies or other tracking technologies, with us each search query remains anonymous and each user a guest without a user profile.
- [Crossref](https://search.crossref.org/) - Search the metadata of journal articles, books, standards, datasets & more
- [Brave](https://search.brave.com/) - Brave search engine
- [Mojeek](https://www.mojeek.com/) - Mojeek is a growing independent search engine which does not track you.
- [Yahoo Search](https://search.yahoo.com/) - Yahoo search engine
- [Baidu](https://www.baidu.com/) - chaina's search engine
- [Ecosia](https://www.ecosia.org/) - a search engine used its revenue to plant trees around the World
- [Dogpile](https://www.dogpile.com/) - Dogpile is a metasearch engine for information on the World Wide Web that fetches results from Google, Yahoo!, Yandex, Bing, and other popular search engines, including those from audio and video content providers such as Yahoo
- [Zoo Search](https://www.metacrawler.com/) - Metacrawler is a type of search engine that aggregates results from multiple sources, such as other search engines and specialized web directories, and presents them in a unified format.
- [App Store and iTunes search engine](https://fnd.io/) - Experience the App Store and iTunes Anywhere
- [Ask](https://www.search.ask.com/) - a search engine cum news feed
- [ZorexEye](http://zorexeye.com/) - ZorexEye is a search engine that helps you find direct download links for premium apps, software, books and other files for free with the help of AI and Google's Database.
- [keys.openpgp.org](https://keys.openpgp.org/) - The keys.openpgp.org server is a public service for the distribution and discovery of OpenPGP-compatible keys, commonly referred to as a "keyserver".
- [MIT PGP Key Server](https://pgp.mit.edu/) - pgp key server by MIT
- ~~[Ipfs-search.com](https://ipfs-search.com/#/search)~~ - Temporary Suspended
- [Debate.cards](http://debate.cards/) - Search engine for finding and downloading debate evidence
- [Argumentsearch.com](http://argumentsearch.com/) - allows to search for natural-language arguments in large document collections. Neural networks find and summarize the pros and cons of your topic in real time
- [Meganzsearch.com](https://www.meganzsearch.com/) - Mega.nz File Search Engine Search File. Search Movies. Search Music. Search Application. Search Document. More Search
- [Engine.presearch.org](https://engine.presearch.org/) - Presearch is a community-powered, decentralized search engine that provides better results while protecting your privacy and rewarding you when you search.
- [Blockscan.com](https://blockscan.com/) - Blockscan, the search engine for the decentralized web
- [Publc.com](https://publc.com/) - PUBLC is more open and collaborative search engine enhanced by cutting edge AI technology, that empowers its users and revolutionizes the way people share, discover and monetize the content of the web
- [CachedViews.com](https://cachedviews.com/) - Cached view of any page on Internet through multiple cached sources.
- [MAC Address Lookup](https://maclookup.app/) - Find the vendor name of a device by entering an OUI or a MAC address
- [sploitus](https://sploitus.com/) - Sploitus is a everyday tool that helps security researchers find exploits and tools.
- [Vulmon](https://vulmon.com/) - Search anything related to vulnerabilities on Vulmon, from products to vulnerability types. Start your journey to free vulnerability intelligence.
- [Vulnerability & Exploit Database](https://www.rapid7.com/db/) - Technical details for over 180,000 vulnerabilities and 4,000 exploits are available for security professionals and researchers to review.
- [Google Hacking Database](https://www.exploit-db.com/google-hacking-database) - The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers.
- [Vulert-DB](https://vulert.com/vuln-db) - Vulert's vulnerability database lists recent security issues found in open-source packages for languages like PHP, Java, Python, Node.js, and others.
- [Google & Bing](https://one-plus.github.io/GoogleBing) - Google has a large library of search operators that can help with internet-based research, below is just a selection of them.
- [Boardreader - Forum Search](https://boardreader.com/) - connecting communities through search
- [Libgen.rs](http://libgen.rs/) - largest Book library FREE
- [Stacksearch](https://stacksear.ch/) - 404
- [SearchTempest](https://www.searchtempest.com/) - All of Facebook Marketplace, craigslist & more in one search.
- [2lingual](https://2lingual.com/) - 2lingual makes it easy to Google Search in 2 languages. Get Google Search Results alongside Google Cross Language Search Results. In addition, a Query Translation Option can be activated or deactivated for Google Cross Language Searches.
- [Milled](https://milled.com/search) - The search engine for ecommerce emails
- [btdig](https://btdig.com/) - BTDigg is the BitTorrent DHT search engine.
- [Osint Open Source Projects](https://awesomeopensource.com/projects/osint) - The Top 23 Osint Open Source Projects
- [Monster Crawler Search](http://monstercrawler.com/) - Monster Crawler combines the power of all the leading search engines together in one search box to deliver the best combined results. This is what we call metasearch. The process is more efficient and yields many more relevant results.
- [Arabo.com](http://arabo.com/) - The Arab Middle East Search Engine & Directory
- [Google Scholar](https://scholar.google.com/) - Google Scholar provides a simple way to broadly search for scholarly literature. From one place, you can search across many disciplines and sources: articles, theses, books, abstracts and court opinions, from academic publishers, professional societies, online repositories, universities and other web sites. Google Scholar helps you find relevant work across the world of scholarly research.
- [Million Short](https://millionshort.com/) - web search engine that allows you to filter and refine your search results set. Million Short makes it easy to discover sites that just don't make it to the top of the search engine results for whatever reason – whether it be poor SEO, new site, small marketing budget, or competitive keywords. The Million Short technology gives users access to the wealth of untapped information on the web.
- [BeVigil](https://bevigil.com/) - Instantly find the risk score of any app The internet's first and only security search engine for mobile apps
- [WordPress.com](https://en.search.wordpress.com/) - search millions of blogs
- [Octosearch.dootech.com](https://octosearch.dootech.com/) - Helps you search the repositories starred by people you follow on Github
- [Search craigslist](http://searchcraigslist.org/) - All of Craigslist pages with simple click Searchcraigslist is a classified ad search engine for Craigslist nationwid
- [Public AWS S3 & Azure Search](https://buckets.grayhatwarfare.com/) - Search Public Buckets
- [Public Buckets](https://osint.sh/buckets/) - Find public buckets on AWS S3 & Azure Blob by a keyword
- [Search Atlas](https://searchatlas.org/) - Visualizing Divergent Search Results Across Geopolitical Borders
- [Dorki](https://dorki.io) - A partially free online tool that allows to collect search results from different search engines (Alexandria, Yahoo, Wikispecies, Yep, Wiby etc) and export them to JSON/TXT.
- [Hackxy](https://hackxy.io/) - cybersecurity search engine for ctf write and bugbounty reports
<br>
[⇧ Top](#index)
## GOOGLE CSE
custom made google search engine for perticular fields
- [Homepage Search Engine](https://cse.google.com/cse?cx=005797772976587943970:3tu7im1-rdg#gsc.tab=0)
- [Amazon Cloud Search Engine](https://cse.google.com/cse?cx=005797772976587943970:g-6ohngosio#gsc.tab=0)
- [Google CSE instances Search Engine](https://cse.google.com/cse?cx=009462381166450434430:vggeu3dhhgg#gsc.tab=0)
- [Robots.txt Search Engine](https://cse.google.com/cse?cx=013991603413798772546:zu7epjqvunu)
- [Short URL Search Engine](https://cse.google.com/cse?cx=017261104271573007538:magh-vr6t6g#gsc.tab=0)
- [Wikispaces Search Engine](https://cse.google.com/cse/publicurl?cx=005797772976587943970:afbre9pr2ly)
- [Dog Bites Search Engine](https://cse.google.com/cse?cx=partner-pub-8216357153102971:3267723418)
- [Google Domain Hacker](https://cse.google.com/cse/publicurl?cx=005797772976587943970:ca2hiy6hmri)
- [Google Drive Folder Search Engine](https://cse.google.com/cse/publicurl?cx=013991603413798772546:nwzqlcysx_w)
- [Chrome Extension Archive Search Engine](https://cse.google.com/cse/publicurl?cx=000501358716561852263:h-5uyshsclq)
- [Github with Awesome-List Search Engine](https://cse.google.com/cse/publicurl?cx=017261104271573007538:fqn_jyftcdq)
- [Better Chrome Web Store Search Engine](https://cse.google.com/cse/publicurl?cx=006205189065513216365:pn3lumi80ne)
- [App Store Custom Search Engine](https://cse.google.com/cse/publicurl?cx=006205189065513216365:aqogom-kfne)
- [Google.com Hack Attack](https://cse.google.com/cse/publicurl?cx=017648920863780530960:lddgpbzqgoi)
- [Search by FileType](https://cse.google.com/cse/publicurl?cx=013991603413798772546:mu-oio3a980)
- [Search Engine Finder](https://cse.google.com/cse?cx=016621447308871563343:nyvaorurd5l)
- [Mindmap Search Engine](http://cse.google.com/cse?cx=013991603413798772546:gj6rx9spox8#gsc.tab=0)
<br>
[⇧ Top](#index)
## IMAGES and Audio
### Image
- [Image verification assisant](https://mever.gr/forensics/) - Imge verification assisant helps you to analyse the varacity of online media
- [Google Images](https://images.google.com/) - Google image search
- [Yandex Images](https://yandex.com/images/) - Yandex Image search
- [Bing Images](https://www.bing.com/images) - Bing Image search
- [See it, search it](https://www.bing.com/visualsearch) - Bing visualsearch, search whats on a image
- [Images Search Engine](https://cse.google.com/cse?cx=281566d4e61dcc05d) - custom google image search engine
- [miniPaint](https://viliusle.github.io/miniPaint/) - Online paint and image editor
- [PimEyes](https://pimeyes.com/en/) - Face Search Engine Reverse Image Search
- [TinEye](https://tineye.com/) - Reverse Image Search Find where images appear online
- [Findclone](https://findclone.ru/) - Let's help you find your double.
- [Image Raider](https://infringement.report/api/raider-reverse-image-search/) - Image Raider is our reverse image search tool for completing individual searches. When you upload an image to this page, we'll scour the internet to find its source and all of the other pages where it has been posted.
- [same.energy](https://same.energy/) - Same Energy is a visual search engine. You can use it to find beautiful art, photography, decoration ideas, or anything else.
- [Baidu](https://image.baidu.com/) - chaina's Baidu Image search engine
- [Yahoo Image Search](https://images.search.yahoo.com/images)- Yahoo Image Search engine
- [Photo Album Finder](https://cse.google.com/cse/publicurl?cx=013991603413798772546:bldnx392j6u) - custom google search photo album finder
- [MyHeritage Photo Enhancer](https://www.myheritage.com/photo-enhancer) - Upgrade your photos automatically with the world’s best machine learning technology. Faces will become more pronouncer! It enhance blury photos
- [SVG Editor](https://svg-edit.github.io/svgedit/) - SVGEdit is a fast, web-based, JavaScript-driven SVG drawing editor that works in any modern browser.
- [Neural network image super-resolution and enhancement](https://letsenhance.io/) - Make your pics high resolution - HD, 4k and beyond. Enlarge and sharpen photos for printing and web in a single click.
- [Pixsy](https://www.pixsy.com/) - Find and fight image theft Take back control of your images. See where & how your images are being used online!
- [FotoForensics](https://fotoforensics.com/) - FotoForensics provides budding researchers and professional investigators access to cutting-edge tools for digital photo forensics.
- [image identify](https://www.imageidentify.com/) - The Wolfram Language Image Identification Project
- [EXIF Data Viewer](http://exifdata.com/) - EXIF is short for Exchangeable Image File, a format that is a standard for storing interchange information in digital photography image files using JPEG compression. Almost all new digital cameras use the EXIF annotation, storing information on the image such as shutter speed, exposure compensation, F number, what metering system was used, if a flash was used, ISO number, date and time the image was taken, whitebalance, auxiliary lenses that were used and resolution. Some images may even store GPS information so you can easily see where the images were taken!
- [Background Removal Tool](https://photoscissors.com/) - Remove a background and replace it with a transparent, solid color or background image with just a few clicks!
- [Museo](https://museo.app/) - Museo is a visual search engine that connects you with the Art Institute of Chicago, the Rijksmuseum, the Harvard Art Museums, the Minneapolis Institute of Art, the The Cleveland Museum of Art, and the New York Public Library Digital Collection
- [Diff Checker](https://www.diffchecker.com/image-diff/) - Find the difference between pictures or other images!
Enter two images and the difference will show up below
- [Forensically](https://29a.ch/photo-forensics/#forensic-magnifier) - Forensically is a set of free tools for digital image forensics. It includes clone detection, error level analysis, meta data extraction and more.
- [Pictriev](http://pictriev.com/) - Find look-alike celebrities on the web using the face recognition.
- [WhatTheFont](https://www.myfonts.com/WhatTheFont/) - Instant font identification powered by the world’s largest collection of fonts, Identify font in given image
- [Sogou](https://pic.sogou.com/) -
- [Pixabay](https://pixabay.com/images/search/) - Free Image gallery
- [picarta.ai](https://www.picarta.ai/) - find where a photo has been taken using AI
- []
### Music
- [Free Music Search](http://musgle.com/) - To see Musgle in action just type a song title, or the artist name, or both in a search bar and hit 'Enter' - you will be redirected to the Google page with relevant search results
- [Search for Music Using Your Voice](https://www.midomi.com/) - Search for Music Using Your Voice by Singing or Humming, View Music Videos, Join Fan Clubs, Share with Friends, Be Discovered and Much More For Free!
- [Listen Notes](https://www.listennotes.com/) - Search the whole Internet's podcasts. Curate your own podcast playlists. Listen on your favorite podcast player apps.
- [Discover Podcasts Here!](https://podsearch.com/) - PodSearch is the easiest way to discover podcasts on your favorite topics. Listen to short show samples, learn more about the show and hosts
<br>
[⇧ Top](#index)
## LICENSE PLATE/VIN/VEHICLE
- [Plate Recognizer](https://platerecognizer.com/) - Automatic License Plate Recognition software that works in all environments, optimized for your location
- [License Plates of the World](http://www.worldlicenseplates.com/) - License plates of the world
- [VIN decoder](http://www.vindecoderz.com/) - VIN decoder is intended to provide detailed information about a vehicle's history, specifications, and ownership based on its unique 17-character identifier.
- [Poctra.com](https://poctra.com/) - Poctra is salvage car auction archive from US and EU markets.
- [FAXVIN](https://www.faxvin.com/) - Vehicle History Reports
- [AutoCheck](https://www.autocheck.com/) - FREE Vehicle Search: Enter a VIN or Plate
- [VINCheck®](https://www.nicb.org/vincheck) - NICB's VINCheck is a free lookup service provided to the public to assist in determining if a vehicle may have a record of an insurance theft claim, and has not been recovered, or has ever been reported as a salvage vehicle by participating NICB member insurance companies.
- [Nomerogram.ru](https://www.nomerogram.ru/) - In Numberogram, you can break the car for free on the state room. Vin is not needed. We are looking for photos of cars in social networks and the Internet, in addition to the photo we know runs and prices, we find on the public. taxi number, dtp and accidents.
- [🚗License Plates in Canada 🇨🇦](https://www.google.com/maps/d/viewer?mid=1zXYL2BF2MByEduLzYN5brVnli9J3cIlv)
- [Vehical Info](https://www.vehicleinfo.in/) - 404
- [CarInfo](https://www.carinfo.app/) - Get Your Vehicle Details by RC
<br>
[⇧ Top](#index)
## FLIGHT TRACKER
- [Flightera](https://www.flightera.net/) - Flightera is one of the leading aviation tracker and flight data websites worldwide.
- [FlightAirMap](https://www.flightairmap.com/) - Real or virtual flights are displayed in real-time on a 2D or 3D map. Airports are also available on map. Statistics for pilots and/or owners are generated.
- [ADS-B Exchange](https://globe.adsbexchange.com/) - ADS-B Exchange - track aircraft live
- [Icarus.flights](https://icarus.flights/) - Icarus Flights is a tool for analyzing uncensored aircraft activity data and tracing global aircraft ownership records
- [FlightAware](https://flightaware.com/) - As the leader in providing advanced, accurate, actionable data and insights that inform every aviation decision, FlightAware is Central to Aviation
- [Flightradar24](https://www.flightradar24.com/) - Live Flight Tracker - Real-Time Flight Tracker Map
- [Live Air Traffic Control](https://www.liveatc.net/) - Live Air traffic form thir headsets
- [Planespotters.net](https://www.planespotters.net/) - Aviation Photos, Airline Fleets and more
- [Skyscanner](https://www.skyscanner.com/) - Millions of cheap flights, hotels & cars. One simple search.
- [RadarBox](https://www.radarbox.com/) - RadarBox is a flight tracking company that displays aircraft & flight information in real-time on a map. RadarBox offers flight data such as latitude and longitude positions, origins and destinations, flight numbers, aircraft types, altitudes, headings and speeds
- [FlightAirMap](https://www.flightairmap.com/) - Real or virtual flights are displayed in real-time on a 2D or 3D map. Airports are also available on map. Statistics for pilots and/or owners are generated.
<br>
[⇧ Top](#index)
## MARITIME
- [Marine Traffic](https://www.marinetraffic.com/) - seaways / marine live map
- [VesselFinder](https://www.vesselfinder.com/) - Free AIS Ship Tracker - VesselFinder
- [OSINT on the Ocean](https://wondersmithrae.medium.com/osint-on-the-ocean-maritime-intelligence-gathering-techniques-2ee39e554fe1) - Article on Maritime Intelligence Gathering
<br>
[⇧ Top](#index)
## OPEN DIRECTORY
- [FilePhish](https://neonpangolin.github.io/FilePhish/) - A simple Google query builder for document file discovery
- [Open Directory Finder](https://odfinder.github.io/) - This small Program allows you to find open directories on the web. This program uses Google advance search. Can find any video, audio or other files
- [Opendirsearch.abifog.com](https://opendirsearch.abifog.com/) - Find open directories with this tool. It uses google's engine for the actual search.
- [Archive-it.org](https://archive-it.org/) - a digital library of Internet sites and other cultural artifacts in digital form. Like a paper library, we provide free access to researchers, historians, scholars, people with print disabilities, and the general public
- [Odcrawler.xyz](https://odcrawler.xyz/) - A search engine for open directories. Find millions of publicly available files!
- [Google Docs CSE](https://cse.google.com/cse/publicurl?cx=013991603413798772546:rse-4irjrn8#gsc.tab=0) - custom google search engine for documents search
- [Documents Search Engine](https://cse.google.com/cse?cx=e6756edc507bcfa91) - custom google search
- [Cybersec Documents Search Engine](https://cse.google.com/cse?cx=013991603413798772546:ekjmizm8vus#gsc.tab=0) - custom google search
- [GoogleDrive Search Engine](https://cse.google.com/cse?cx=c64ba311eb8c31896) - custom google search
- [SlideShare Search Engine](https://cse.google.com/cse?cx=465eeeb114c7f523f) - custom google search
- [Document Search](https://one-plus.github.io/DocumentSearch) - To use the document search tools, please insert a name or company into the relevant boxes
- [Pdfsearch.io](https://www.pdfsearch.io/) - Document Search Engine - browse more than 18 million document
- [awesome-public-datasets](https://github.com/awesomedata/awesome-public-datasets) - A topic-centric list of HQ open datasets.
- [Drivesearch.kwebpia.net](http://drivesearch.kwebpia.net/) - You can quickly and easily search for videos, lyrics, songs, knowledge, medical, science associated with the file. Supports the following topics: Google Drvie, Google Docs, All web search, Video, Lyrics, Knowledge, Movie, Health, Medical, Science, Pandora, Last.fm, SoundCloud...
- [Filepursuit.com](https://filepursuit.com/) - Search the web for files, videos, audios, eBooks & much more
- [Open Directory Search](http://eyeofjustice.com/od/) - Open Directory Search Portal
- [LENDX](http://lendx.org/) - All over the world, people like you and me connect their computers to the internet. Some of those users allow their computers to operate as servers (for hosting their websites and such). Those websites have folders that contain the images, documents and text that makeup the website's content. These folders are the directory of the website. In that directory, those users can store any files and any data they wish to put there. Lendx simply allows you to access this data.
- [Direct Download Almost Anything](https://ewasion.github.io/opendirectory-finder/) - Get direct download links for almost anything.
<br>
[⇧ Top](#index)
## DATASET
- [Datasetsearch.research.google.com](https://datasetsearch.research.google.com/) - Dataset Search is a search engine for datasets. Using a simple keyword search, users can discover datasets hosted in thousands of repositories across the Web.
- [Databasd](https://databasd.com/search) - is a search engine to find open datasets. The search technology leverages alien artifical intelligence (AAI) to conduct predictive bloackchain data analysis
- [Data.gov](https://www.data.gov/) - Here you will find data, tools, and resources to conduct research, develop web and mobile applications, design data visualizations, and more.
- [data.world](https://data.world/) - The Data Catalog Platform
- [BigQuery public datasets](https://cloud.google.com/bigquery/public-data/) - A public dataset is any dataset that is stored in BigQuery and made available to the general public through the Google Cloud Public Dataset Program
- [DSC Data Science Search Engine](https://www.datasciencecentral.com/page/search) - Data Science Central is the industry’s leading online resource for data practitioners. From Statistics and Analytics to Machine Learning and AI, Data Science Central provides a community experience that includes a rich editorial platform, social interaction, forum-based support, and the latest information on technology, tools, trends, and careers
- [Datasetlist.com](https://www.datasetlist.com/) - A list of machine learning datasets from across the web.
- [Search Datasets](https://datahub.io/search) - Build elegant data-driven sites with markdown & deploy in seconds.
- [Opensanctions.org](https://opensanctions.org/) - OpenSanctions helps investigators find leads, allows companies to manage risk and enables technologists to build data-driven products
- [Kaggle](https://www.kaggle.com/search?q=) - Join over 17M+ machine learners to share, stress test, and stay up-to-date on all the latest ML techniques and technologies. Discover a huge repository of community-published models, data & code for your next project
<br>
[⇧ Top](#index)
## SOURCE CODES
- [Pastes Search Engine](https://cse.google.com/cse?cx=661713d0371832a02) - custom google search
- [Pastes Search Engine 2](https://cse.google.com/cse?cx=006896442834264595052:fawrl1rug9e) - custom google search
- [GitHub Search Engine](https://cse.google.com/cse?cx=1b053c8ec746d6611) - custom google search
- [Source Code Search Engine](https://publicwww.com/) - Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.
- [Google to search profiles on GitHub](https://recruitin.net/github.php) - Easily use Google to search profiles on GitHub
- [Grep.app](https://grep.app/) - grep.app searches code from over a half million public repositories on GitHub.
- [NerdyData](https://www.nerdydata.com/) - NerdyData will help you find which websites use certain SaaS technologies.
- [Paste Search](https://psbdmp.ws/) - Leaks monitor The biggest archive of {paste} dumps
- [GitHub Code Search](https://github.com/search) - github code search
- [Bitbucket Repo Search](https://bitbucket.org/repo/all/) - find code in bitbucket
- [Shhgit](https://github.com/eth0izzle/shhgit) - Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories
- [git-hound](https://github.com/tillson/git-hound) - Reconnaissance tool for GitHub code search. Scans for exposed API keys across all of GitHub, not just known repos and orgs.
- [Webfinery | Source Code Search](https://webfinery.com/search) - Search the source code of the web
- [Online IDE and Paste Search Engine](https://redhuntlabs.com/online-ide-search) - This Custom Search Tool by @RedHuntLabs Team looks for keywords/strings in following Online IDEs, Paste(s) sites and Code Sharing Platforms.
- [searchcode](https://searchcode.com/) - Search 75 billion lines of code from 40 million projects
- [Sourcegraph](https://about.sourcegraph.com/) - Sourcegraph allows developers to rapidly search, write, and understand code by bringing insights from their entire codebase right into the editor
- [Awesome Open Source](https://awesomeopensource.com/) - Find And Compare Open Source Projects
- [Zen](https://github.com/s0md3v/Zen) - Find emails of Github users
- [GitDorker](https://github.com/obheda12/GitDorker) - A Python program to scrape secrets from GitHub through usage of a large repository of dorks.
<br>
[⇧ Top](#index)
## WHOIS
- [WHOIS Service](https://whoismind.com/) - search any ip address
- [Whois Search](https://webwhois.verisign.com/webwhois-ui/index.jsp?language=en_US) - Verisign’s Whois tool allows users to look up records in the registry database for all registered .com, .net, .name, .cc and .edu domain names.
- [Who.is](https://who.is/) - WHOIS Search, Domain Name, Website, and IP Tools
- [Whoxy](https://www.whoxy.com/) - whoxy domain search engine
- [Whois History](https://osint.sh/whoishistory/) - Lets you see all the historical WHOIS records of a domain name
<br>
[⇧ Top](#index)
## DOMAIN / IP / DNS
### URL's
- [Focsec](https://focsec.com) - IP Threat Intelligence, provides general IP information, Proxy, TOR and VPN Detection
- [favihash](https://www.favihash.com/) - Get the hash of a favicon to identify websites using the same. Works on both open web and dark web.
- [domain digger](https://digger.tools/) - Find all dns recoreds, whois data, ssl/tls certificate history, subdomain and more
- [dnslytics](https://dnslytics.com/) - search for domain IPv4, IPv6 or Provider
- [dnstwist](https://dnstwist.it) - scan phishing domain
- [SecurityTrails](https://securitytrails.com/) - search for domain, IPs, keyword or Hostname
- [Shodan](https://shodan.io/) - Shodan is a search engine that lets users search for various types of servers connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client.
- [Internetdb.shodan.io](https://internetdb.shodan.io/) - The InternetDB API provides a fast way to see the open ports for an IP address. It gives a quick, at-a-glance view of the type of device that is running behind an IP address to help you make decisions based on the open ports.
- [GreyNoise Intelligence](https://www.greynoise.io/viz/) - GreyNoise identifies internet scanners and common business activity in your security events so you can make confident decisions, faster. Whether you use our Visualizer, API, or integrate GreyNoise data into your security tools, find what's important in your security logs and get back to business.
- [FOFA](https://fofa.so/) -
- [zoomeye](https://www.zoomeye.org/) - ZoomEye is a freemium online tool aimed to help aid cybersecurity in the areas of reconnaissance and threat evaluation.
- [Censys](https://censys.io/domain) - is a web-based search platform for assessing attack surface for Internet connected devices. The tool can be used not only to identify Internet connected assets and Internet of Things/Industrial Internet of Things (IoT/IIoT), but Internet-connected industrial control systems and platforms.
- [ViewDNS.info](https://viewdns.info/) - Reverse IP Lookup Find all sites hosted on a given server. Domain / IP. Reverse Whois Lookup Find domain names owned by an individual or company.
- [Internet Census 2012](http://census2012.sourceforge.net/paper.html) - Overview of 180 Billion service probe records from May to December 2012.
- [ONYPHE](https://www.onyphe.io/) - ONYPHE is an Attack Surface Management & Attack Surface Discovery solution built as a Cyber Defense Search Engine. We scan the entire Internet and Dark Web for exposed assets and crawl the links just like a Web search engine. Our data is searchable with a Web form or directly from our numerous APIs.
- [IPLeak](https://ipleak.net/) -
- [Robtex](https://www.robtex.com) - Robtex is used for various kinds of research of IP numbers, Domain names, etc
- [Wappalyzer](https://www.wappalyzer.com/lookup/) - Instantly reveal the technology stack of any website, such as CMS, ecommerce platform or payment processor, as well as company and contact details.
- [photon](https://pypi.org/project/photon/) - Incredibly fast crawler designed for OSINT.
- [Technology Lookup](https://osint.sh/stack/) - Technology stack checker tool. Check out the technologies used on any website.
- [BuiltWith Technology Lookup](https://builtwith.com/) - Find out what websites are Built With
- [OSINT.SH](https://osint.sh/) - All in one Information Gathering Tools
- [Nmap Checker Tool](https://shadowcrypt.net/tools/nmap) - Online Free Hacking Tools - ShadowCrypt
- [Free online network tools](https://centralops.net/co/) - Free online network tools - traceroute, nslookup, dig, whois lookup, ping - IPv6
- [Google Transparency Report](https://transparencyreport.google.com/https/certificates) - HTTPS encryption on the web report
- [Certificate Search](https://osint.sh/crt/) - Find information about the target assets from their SSL certificate
- [CRT](https://crt.sh/) - certificate search
- [CertKit](https://www.certkit.io/tools/ct-logs/) - Fast search for the Certificate Transparenc Logs
- [LeakIX](https://leakix.net/) - This project goes around the Internet and finds services to index them.
- [URL and website scanner](https://urlscan.io/) - urlscan.io is a free service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates.
- [dnsdumpster](https://dnsdumpster.com/) - DNSdumpster.com is a FREE domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers perspective is an important part of the security assessment process.
- [Domain Codex](https://www.domaincodex.com/search.php) - private investigation search, legal and case research, IP & Digital piracy..
- [SimilarWeb](https://www.similarweb.com/) - SimilarWeb is a tool that estimates the total amount of traffic different websites get. It allows you to see competitors' top traffic sources, broken down into six major categories, including referring sites, social traffic, and top search keywords
- [IP search - Network Entity Reputation Database](https://nerd.cesnet.cz/nerd/ips/) - The NERD system gathers data about sources of cyber threats from a number of sources and builds a constantly-updated database of the known malicious network entities (currently only IP addresses).
- [Reverse Domain](https://osint.sh/domain/) - Allow you to find domain names by a keyword
- [IANA — Root Zone Database](https://www.iana.org/domains/root/db) - The Root Zone Database represents the delegation details of top-level domains, including gTLDs such as .com, and country-code TLDs such as .uk. As the manager of the DNS root zone, we are responsible for coordinating these delegations in accordance with our policies and procedures.
- [Punkspider](https://punkspider.org/) - Searching for vulnerable websites is coming back soon! Are you new to web security and have no idea what the heck we're talking about
- [metabigor](https://github.com/j3ssie/metabigor) - OSINT tools and more but without API key
- [urldna](https://urldna.io) - Gather info about URL: ssl cert, ip, header, metadat ...
- [Check-The-Sum](https://check-the-sum.fr/) - Database of IP addresses, domains and malicious files collected from a network of honeypots
- [SubDomainRadar.io](https://subdomainradar.io/) - All-in-one recon platform: 50+ data sources for subdomain discovery, port & vulnerability scans, screenshots, and API access
<br>
[⇧ Top](#index)
## MALWARE
- [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - Malpedia is to provide a resource for rapid identification and actionable context when investigating malware. Openness to curated contributions shall ensure an accountable level of quality in order to foster meaningful and reproducible research.
- [Interactive Online Malware Analysis Sandbox](https://app.any.run/) - check malware for free. With our online malware analysis tools you can research malicious files and URLs and get result with incredible
- [Free Automated Malware Analysis Service](https://hybrid-analysis.com/) - This is a free malware analysis service for the community that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
- [VirusTotal](https://www.virustotal.com/gui/) - Analyse suspicious files, domains, IPs and URLs to detect malware and other breaches, automatically share them with the security community.
- [Maltiverse](https://maltiverse.com/search) - We are here to help companies to adopt quality Threat Intelligence in a simple, quick and effective way
- [Malware News Search](https://cse.google.com/cse?cx=003248445720253387346:turlh5vi4xc) - custom google search for malware news
- [AlienVault Open Threat Exchange](https://otx.alienvault.com/) - The World's First Truly Open Threat Intelligence Community · Gain FREE access to over 20 million threat indicators contributed daily
- [Jotti’s malware scan](https://virusscan.jotti.org/) - Jotti's malware scan is a free service that lets you scan suspicious files with several anti-virus programs. You can submit up to 5 files at the same time. There is a 250MB limit per file. Please be aware that no security solution offers 100% protection, not even when it uses several anti-virus engines
- [IObit Cloud](https://cloud.iobit.com/index.php) - IObit Cloud is an advanced automated threat analysis system. We use the latest Cloud Computing technology and Heuristic Analyzing mechanic to analyze the behavior of spyware, adware, trojans, keyloggers, bots, worms, hijackers and other security-related risks in a fully automated mode.
- [theZoo](https://github.com/ytisf/theZoo) - A repository of LIVE malwares for your own joy and pleasure. theZoo is a project created to make the possibility of malware analysis open and available to the public.
- [Vx-underground.org](https://vx-underground.org/) - vx-underground also known as VXUG, is an educational website about malware and cybersecurity. It claims to have the largest online repository of malware.
- [aptnotes/data](https://github.com/aptnotes/data) - APTnotes is a repository of publicly-available papers and blogs (sorted by year) related to malicious campaigns/activity/software that have been associated with vendor-defined APT (Advanced Persistent Threat) groups and/or tool-sets.
- [exploit-database-papers](https://github.com/offensive-security/exploitdb-papers) - The legacy Exploit Database paper repository
<br>
[⇧ Top](#index)
## IoT
- [Webcam Search Engine](https://cse.google.com/cse?cx=013991603413798772546:gjcdtyiytey#gsc.tab=0) - custom google search for webcams search
- [Insecam](http://www.insecam.org/) - Live cameras directory
- [Camhacker.com](https://www.camhacker.com/) - Finds thousands of public live webcam streams and unprotected security cameras from all over the world.
- [EarthCam](https://www.earthcam.com/) - Providing a virtual window to the world, viewers can freely explore the globe from unparalleled vantage points, such as the torch balcony of the Statue of Liberty, which has been closed to the public since 1916. EarthCam.com derives revenue from advertising and licensing of its proprietary webcam content.
- [Airport Webcams](https://airportwebcams.net/) - LIVE Airport Webcams From Around The World
- [The Webcam Network](http://www.the-webcam-network.com/) - Most webcam-directories offer listings of places where webcams are located
- [Webcams Abroad live images](https://www.webcamsabroad.com/) - Webcams Abroad is a fast growing international directory with webcams all over the world.
- [WEBCAM LIVE](https://www.whatsupcams.com/en/) - search live webcams
- [city-webcams.com](https://city-webcams.com/) - local webcams and live streaming from around the world
- [thingful](http://www.thingful.net/) - Thingful.net is a search engine for the Internet of Things, providing a unique geographical index of real-time data from connected objects around the world, including energy, radiation, weather, and air quality devices as well as seismographs, iBeacons, ships, aircraft and even animal trackers.
- [Live World Webcam](http://liveworldwebcam.net/) - LiveWorldWebcam.net, search engine of thousands of live webcams from around the world!
- [Webcamtaxi](https://www.webcamtaxi.com/en/) - Webcamtaxi is a platform for live streaming HD webcams from around the globe that will give you the opportunity to travel live online and discover new and distant places. If you are passionate about travelling, we are the right choice for you.
- [Explorecams.com](https://explorecams.com/) - search engine allows you to search through thousands of images that people took on a specific digital cameras and compatible lenses, so you know what to expect from your next gear purchase.
- [Opentopia](http://www.opentopia.com/) - free live webcams
- [WorldCam](https://worldcam.eu/) - webcams form around the world
- [Hawaii Traffic Cameras](http://goakamai.org/home) - hawaii tarffic cameras
- [Toronto area Live Traffic Cams](https://gtaupdate.com/traffic/)
- [Lake County Fire Cameras](https://www.arcgis.com/apps/webappviewer/index.html?id=0f7aa08cc4b74fc6a0c4308d4eace6b3)
- [VDOT Traffic Cams](https://www.arcgis.com/apps/dashboards/a0d3fb34cda44f5b8b10be1b245f24a3)
- [Lubbock Live Traffic Cameras](https://www.arcgis.com/apps/webappviewer/index.html?id=affe50ac55824c7a8c757d3980787e31)
- [Hong Kong Traffic Data & Cams](https://www.arcgis.com/apps/dashboards/47be6372a0434beaba99ae9c9f1d598d)
- [Baton Rouge Traffic Cams](https://www.arcgis.com/apps/webappviewer/index.html?id=0ec05ffb0d2d4735a969e8f31f820a7b)
<br>
[⇧ Top](#index)
## RADIO
- [Broadcastify](https://www.broadcastify.com/listen/) - Broadcastify - Listen Live to Police, Fire, EMS, Aviation, and Rail Audio Feeds
- [RadioReference](https://www.radioreference.com/apps/db/) - radioreference database search by city, name, system, frequency...
- [Feeds.talonvoice.com](https://feeds.talonvoice.com/) - This a website transcribing scanner feeds to text in real-time, in response to recent events
- [Automated transcription for radio stations](https://sonix.ai/radio-stations) - Convert your radio shows or podcast episodes to text and publish these transcripts to get more traffic with Sonix: The world’s most advanced audio transcription platform.
- [WiGLE: Wireless Network Mapping](https://wigle.net/) - all the networks found by everyone
- [Ham Radio QRZ Callsign Database Search](https://www.qrz.com/lookup) - radio database search
- [Radio-Locator](https://radio-locator.com/) - the most trusted AM and FM radio station search engine on the internet. We have links to over 17,100 radio stations' web pages and over 12,800 stations' audio streams from radio stations in the U.S. and around the world.
- [RadioID Database](https://database.radioid.net/database/search#!) - radio database
- [Radio-Sherlock](http://dxmaps.com/search.html) - Your professional and amateur radio search engine
- [Radiocells.org](https://radiocells.org/) - 404
- [@murph_live](https://twitter.com/murph_live) - Murph is a police scanner transcriber tool. See real-time scanner conversation.
- [Radio Garden](http://radio.garden/search) - live radio aroud the world (The Best)
<br>
[⇧ Top](#index)
## RESOLVERS
- [PSN Resolver](https://playstationresolver.xyz/) -
- [Cloudflare Resolver](http://www.skypeipresolver.net/cloudflare.php)
- [Cloudflare Resolver Tool](https://shadowcrypt.net/tools/cloudflare)
- [Discord Resolver](https://www.leaked.site/index.php?resolver/discord.0/)
- [Xboxresolver.com](https://xboxresolver.com/)
## REAL ESTATE
- [PrimeLocation](https://www.primelocation.com/) - find homes to buy or rent
- [Realtor](https://www.realtor.com/) - find estate by school, address or zip
- [rehold](https://rehold.com/) - Rehold Has the Most Extensive Database and Reverse Address Directory in the USA
- [Zillow](https://www.zillow.com/) - Recommendations are based on your location and search activity, such as the homes you've viewed and saved and the filters you've used. We use this information to bring similar homes to your attention
- [Zoopla](https://www.zoopla.co.uk/) - Find homes to buy or rent and check house prices
- [homemetry](https://homemetry.com/) - Homemetry is an all-in-one real estate information site that provides a comprehensive overview of homes for sale, apartments for rent, markets, trends and neighborhood insights to help you make the right decisions on exactly what, when and where to buy, sell or rent.
- [Explore Canada’s Real Estate Market](https://www.remax.ca/find-real-estate) - Explore Canada's Real Estate Market
<br>
[⇧ Top](#index)
## [CAN] CORPORATION
- [RJSC Connect](https://rjsc.novascotia.ca/) - Search the Registry of Joint Stock Companies
- [FederalCorporation](https://federalcorporation.ca/) - Find Federal Corporations in Canada
- [Corporate Affairs Registry Database](https://www.pxw2.snb.ca/card_online/cardsearch.aspx) - Corporate Affairs Registry Database
- [MRAS Business Registry Search](https://beta.canadasbusinessregistries.ca/search) - canada's business registries
- [Alberta Business Search](https://albertacorporations.com/) - Search for a company by name, or browse the newest companies registered in Alberta, Canada
- [LeoList](https://www.leolist.cc/) - LeoList to buy, sell, or trade almost anything! Personals, escorts, cars, real estate, jobs, services, vacation rentals and more virtually anywhere
- [Rental in Canada](https://www.n49.com/search/rental/1/canada/) - rental in canada
- [Business Directory | OCC](https://occ.ca/business-directory/) - The Ontario Chamber of Commerce (OCC) is the indispensable partner of business and Canada’s largest, most influential provincial chamber.
- [Rechercher par entreprise](https://www.pes.rbq.gouv.qc.ca/RegistreLicences/Recherche?mode=Entreprise) - Register of RBQ Licence Holders
- [Services en ligne](https://www.pes.ctq.gouv.qc.ca/pes/faces/dossierclient/recherche.jsp) - Consultation of a dossier
- [Online Services PEI Business / Corporate Registry](https://www.princeedwardisland.ca/en/feature/pei-business-corporate-registry-original#/service/LegacyBusiness/LegacyBusinessSearch) - PEI Business / Corporate Registry Original
- [XBRL Voluntary Filing Program](https://www.sedar.com/issuers/issuers_en.htm) - File, disclose and search for issuer information in Canada’s capital markets
<br>
[⇧ Top](#index)
## MAPS
- [Google Maps](https://www.google.com/maps) - google map
- [Bing Maps](https://www.bing.com/maps) - microsoft bing map
- [Yandex.Maps](https://yandex.com/maps/) - yandex map
- [Mapillary](https://www.mapillary.com/app/) - Access street-level imagery and map data from all over the world. Fill in the gaps by capturing coverage yourself.
- [Geonarrative.com](https://geonarrative.usgs.gov/landsat-collection/) - Explore remote-sensing satellites that have orbited our Earth for 50 years.
- [Waze](https://www.waze.com/live-map) - Navigation and map
- [百度地图](https://map.baidu.com/) - baidu map
- [DigitalGlobe](https://discover.digitalglobe.com/) - 404
- [MapQuest](https://www.mapquest.com/) - find driving directions, maps, live traffic updates and road conditions. Find nearby businesses, restaurants and hotels. Explore!
- [OpenStreetMap](https://www.openstreetmap.org/) - OpenStreetMap is a free, open geographic database updated and maintained by a community of volunteers via open collaboration. Contributors collect data from surveys, trace from aerial imagery and also import from other freely licensed geodata sources.
- [ArcGIS Wildfire Map](https://www.arcgis.com/home/webmap/viewer.html?webmap=df8bcc10430f48878b01c96e907a1fc3#!) - This is a map of US wildfire locations (active/recent) and other sources of information related to wildfires.
- [Living Atlas of the World | ArcGIS](https://livingatlas.arcgis.com/en/browse/) - ArcGIS Living Atlas of the World
- [FIRMS](https://firms.modaps.eosdis.nasa.gov/map/) - Global Fire information for Resource management system
- [COVID-19 Map](https://coronavirus.jhu.edu/map.html) - covid-19 cases world map
- [Ukraine Interactive map](https://liveuamap.com/) - Live Universal Awareness Map, is an internet service to monitor and indicate activities on online geographic maps, particularly of locations with ongoing armed conflict in ukraine russia
- [Israel-Palestine](https://israelpalestine.liveuamap.com/) - Live Universal Awareness Map, is an internet service to monitor and indicate activities on online geographic maps, particularly of locations with ongoing armed conflict in israel palestine
- [Satellites.pro](https://satellites.pro/) - satellite world map
- [Military bases around the world. - uMap](https://umap.openstreetmap.fr/en/map/military-bases-around-the-world_510207) - Militarty bases around the world
- [Wikimapia](http://wikimapia.org/) - Wikimapia is an online editable map - you can describe any place on Earth. Or just surf the map discovering tonns of already marked places
- [Map of Syrian Civil War](https://syria.liveuamap.com/) - syrian civil war map
- [Windy](https://www.windy.com/-Webcams/webcams) - wind map weather forecast
- [Gpx File Editor](https://gpx.studio/) - gpx.studio is a free online GPX viewer and editor which allows visualize multiple traces, edit traces, edit waypoints and more.
- [fgdc_gp_demos’s public fiddles](https://jsfiddle.net/user/fgdc_gp_demos/fiddles/) -
- [KartaView](https://kartaview.org/map/) - Collect and share street level imagery from around the world to an open repository, available to everyone.
- [Google Map Search Engine](https://cse.google.com/cse?cx=013991603413798772546:mofb1uoaebi) - custom google search for google search
- [Power Plants in the United States](https://www.arcgis.com/apps/dashboards/201fc98c0d74482d8b3acb0c4cc47f16) - map of power plants in the United States using data from the U.S. Energy Information Administration and U.S. Environmental Protection Agency
- [UK Onshore Oil and Gas Activity](https://www.arcgis.com/apps/webappviewer/index.html?id=29c31fa4b00248418e545d222e57ddaa) - 404
- [Walmart Store Status](https://www.arcgis.com/apps/dashboards/4e573c79e1224081805165d25b4f33c7) - walmart store location map
- [MODIS Wildfire](https://www.arcgis.com/apps/dashboards/bf5df3a49a624521844a2e5e1ec7df05) - a Live Feeds layer showing Thermal activity detected by the MODIS sensors on the NASA Aqua and Terra satellites during the last 48 hours.
- [Earthquake Watch](https://www.arcgis.com/apps/dashboards/c8af9c5411814584b460cc87cb7c3780) - Earthquake watch
- [Earth](https://earth.nullschool.net/#current) - live wind
- [US Labor Strike Map](https://www.google.com/maps/d/viewer?mid=1hE1nDR-Ff_sVgOS67IteJSxGZlvqIP3k) - US labor strike map
- [Active Agency Map](https://www.google.com/maps/d/viewer?mid=1eYVDPh5itXq5acDT9b0BVeQwmESBa4cB) - The following is a list of public safety agencies that have joined Neighbors by Ring. This map is updated regularly.
- [Ukraine Live Cams](https://nagix.github.io/ukraine-livecams) - Live cams from Ukraine
- [Live map of London Underground trains](https://traintimes.org.uk/map/tube/) - Live london underground train map
- [TfL JamCams](https://www.tfljamcams.net/) - Trafic cams from London
- [atlas.co](https://app.atlas.co) - a tool for visualising geodata
- [felt](https://felt.com) - create map-based visualizations
- [TradeMap](https://www.trademap.org/Index.aspx) - Trade map of world by counties (import/export)
<br>
[⇧ Top](#index)
## GEO
- [GeoSpy](https://geospy.web.app/) - Photo location prediction using AI
- [GEOINT](https://start.me/p/W1kDAj/geoint) - every tools you need for geographical data gathering
- [GeoNames](https://www.geonames.org/) - The GeoNames geographical database covers all countries and contains over eleven million placenames that are available for download free of charge.
- [Geoseer.net](https://www.geoseer.net/) - Search over 3.5 million distinct spatial GIS WMS, WCS, WMTS datasests hosted on over 40k live services from around the world.
- [GeoINT Search](https://cse.google.com/cse?cx=015328649639895072395:sbv3zyxzmji#gsc.tab=0) - coustom google search for geographical related search queries.
- [GeoIP Tracker tool](https://shadowcrypt.net/tools/geoip) - Got an intruder in your network? Want to know where the intruder is from? Use this tool. Geo IP tracker uses geographical location technology and utilizes public records to track down the location of the IP address. It may not be accurate, but it will give you idea of IP addresses whereabouts.
- [Earth Engine Dataset](https://developers.google.com/earth-engine/datasets/) - Earth Engine's public data archive includes more than forty years of historical imagery and scientific datasets, updated and expanded daily.
- [GeoPlatform Portal](https://www.geoplatform.gov/) - The Geospatial Platform is a cross-agency collaborative effort and Shared Service that embodies the principles and spirit of Open Government, emphasizing government-to-citizen communication, accountability, and transparency.
- [FAO Map Catalog](https://data.apps.fao.org/map/catalog/srv/eng/catalog.search#/home)
- [geocreepy](http://www.geocreepy.com/) - A Geolocation OSINT Tool. Offers geolocation information gathering through social networking platforms.
- [US Crisis Monitor](https://acleddata.com/special-projects/us-crisis-monitor/) - The United States Crisis Monitor provides in-depth coverage of demonstration and political violence trends across the US
- [Toronto Live](https://apps.esri.ca/torontolive/) - toronto live ; like public schools, traffic, bike share, ttc.
- [Residential Fire Fatalities in Indiana](https://www.arcgis.com/apps/dashboards/4d1289ab105145a1b1f80c1ad3cf19fb)
- [geoprotests API](https://rapidapi.com/gisfromscratch/api/geoprotests/) - Query protests worldwide and visualize them using spatial aggregations.
- [geoint-py](https://github.com/gisfromscratch/geoint-py) - A bunch of geospatial intelligence workflows implemented using Python
<br>
[⇧ Top](#index)
## CRYPTOCURRENCY
- [Cryptocurrency Alerting](https://cryptocurrencyalerting.com/) - Real-time customizable price alert for cryptocurrencies, coins, stocks with many way to receive alert email, telegram, discord.
- [Bitcoin Explorer](https://blockchair.com/bitcoin) - Bitcoin's blockchain is a publicly accessible ledger that records all transactions made with the cryptocurrency Bitcoin. It utilizes a decentralized network of computers (nodes) to maintain a chronological series of data blocks that are secured using cryptographic principles, ensuring the integrity and verifiability of each transaction.
- [Ethereum Block Explorer](https://etherscan.io/) - Etherscan is the leading block explorer and search, API & analytics platform for Ethereum
- [Flowscan.org](https://flowscan.org/)
- [Bitcoin Forums Search Engine](https://cse.google.com/cse?cx=f49f9d5e679b15787) - custom google search for bitcoin
- [Blockchain Explorer](https://www.blockchain.com/explorer) - Blockchain.com is a cryptocurrency financial services company. The company began as the first Bitcoin blockchain explorer in 2011 and later created a cryptocurrency wallet that accounted for 28% of bitcoin transactions between 2012 and 2020
- [Blockcypher](https://live.blockcypher.com/) - Find info that other block explorers don't have, search the block chain.
- [Addresschecker.eu](http://addresschecker.eu/)
- [Coinwink.com](https://coinwink.com/) - Track important price changes of your favorite cryptocurrencies with the help of Coinwink crypto alerts
<br>
[⇧ Top](#index)
## DARKNET
- [onionland](https://onionland.io/) - search engine for onion sites
- [Danex.io](http://danex.io/) - Dark web search Engine tool.
- [OnionLinksV3](https://github.com/01Kevin01/OnionLinksV3) - List of onion site (Forum,Chats,Markets)
- [Dark Tracer](https://darktracer.io/) - 404
- [ransomwatch 👀 🦅 ](https://ransomwatch.telemetry.ltd/#/INDEX) - the transparent ransomware claim tracker
- [Ransomware Darknet websites](https://sizeof.cat/post/ransomware-darknet-websites/) - ransomware darknet websites
- [Ahmia — Search Tor Hidden Services](https://ahmia.fi/) - Ahmia searches hidden services on the Tor network. To access these hidden services, you need the Tor browser bundle
- [Onion search engine](https://onionsearchengine.com/) - onion search engine
- [onionsearch](https://pypi.org/project/onionsearch/) - OnionSearch is a script that scrapes urls on different .onion search engines.
- [Tor2Web: Tor Hidden Services Gateway](https://tor2web.onionsearchengine.com/) - access onion sites through regular web
- [Ransomware Group Sites](http://ransomwr3tsydeii4q43vazm7wofla5ujdajquitomtd47cxjtfgwyyd.onion.pet/) - ransomware group sites
- [Blockpath.com](https://blockpath.com/) - bitcoin accounting simplified
- [Onions - Darknetlive](https://darknetlive.com/onions/) - massive list of onion service links
- [Darkweb Forums](https://darknetlive.com/forums/)
- [Onion.pet](http://onion.pet) - Onion.pet acts as a proxy between the Tor Darknet, also known as hidden services, and you on the regular, or clearnet
- [Tool | path](https://learnmeabitcoin.com/tools/path/) - search bitcoin transaction, block, address.
- [ProPublica](https://p53lf57qovyuvwsc6xnrppyply3vtqm7l6pcobkmyqsiofyeznfu5uqd.onion/) - ProPublica is a popular online publication that won five Pulitzer in 2016. It aims to expose abuses of power and betrayal of public trust through investigative journalism.
- [Sci-Hub](http://scihub22266oqcxt.onion/) - Sci-Hub is a massive database that eliminates the barriers to getting scientific knowledge. It contains millions of scientific research documents from around the world. The site seeks to liberate information by making it free to individuals and institutions.
- [Hidden Answers](http://answerszuvs3gg2l64e6hmnryudl5zgrmwm3vh65hzszdghblddvfiqd.onion/) -
- Access Onion site through visible web: 1. [tor2web](https://tor2web.activetk.jp/)
1. [browserling](https://www.browserling.com/)
2. [4everproxy](https://www.4everproxy.com/tor-proxy)
<br>
[⇧ Top](#index)
## DATA DUMP
- [Have I been pwned](https://haveibeenpwned.com/) - check if your email address is in a data breach
- ~~[DeepSearch](http://xjypo5vzgmo7jca6b322dnqbsdnp3amd24ybx26x5nxbusccjkm4pwid.onion.pet/)~~
- [Personal Data Leak Checker](https://cybernews.com/personal-data-leak-check/) - Find out if your email, phone number or related personal information might have fallen into the wrong hands.
- [DDoSecrets](https://ddosecrets.com/wiki/Special:AllPages) - Distributed Denial of Secrets (DDoSecrets) is a non-profit journalist organization focused on publishing, archiving and analyzing public interest information, creating news coverage from around the world. DDoSecrets specializes in large datasets that have been leaked or hacked, and in verifying and researching the data while protecting sources
- [Leakedpassword.com](https://leakedpassword.com/) - Find out if a password hack has exposed your password to the world.
- [DeHashed](https://dehashed.com/) - Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks
- [Snusbase](https://www.snusbase.com/) - Enhance the security of your personal accounts, as well as those of your employees and loved ones, by proactively monitoring the exposure of your online identities.
- [Ashley Madison hacked email checker](https://ashley.cynic.al/) - Was your profile compromised in the Ashley Madison hack
- [Search Ashley Madison Leaked Data](http://checkashleymadison.com/) - Search Ashley Madison Leaked Data
- [Sony Archives](https://wikileaks.org/sony/emails/) - You will find this data in there .onion site
<br>
[⇧ Top](#index)
## EXTREMIST / FAR-RIGHT
- [Unicorn Riot: Discord Leaks](https://discordleaks.unicornriot.ninja/discord/) - Unicorn Riot obtained hundreds of thousands of messages from white supremacist and neo-nazi Discord chat servers after Charlottesville. Unicorn Riot Discord Leaks opens far-right activity centers to public scrutiny through data journalism.
- [Data | DDoSecrets Search](https://search.ddosecrets.com/data/) - DDoSecrets is a non-profit journalist organization focused on publishing, archiving and analyzing public interest information, creating news coverage from around the world. DDoSecrets specializes in large datasets that have been leaked or hacked, and in verifying and researching the data while protecting sources. Founded in 2018, it has published over 100 million files from nearly 60 countries, worked with hundreds of outlets and half a dozen cross-border collaborations.
- [Adatascientist](https://adatascienti.st) - exploring how money and ideas move around
- [Parler Capitol Videos](https://projects.propublica.org/parler-capitol-videos/) - What Parler Saw During the Attack on the Capitol
- [Project Whispers](https://whispers.ddosecrets.com/) - whispers data leak
- [4chansearch.org](https://4chansearch.org/) - news search
- [archived.moe](https://archived.moe/) - archive data
- [Extremist Profiles](https://www.splcenter.org/fighting-hate/extremist-files/individual) - extremist file
- [Database of suspected terrorists](https://www.nsatt.org/) - NSAT&T is an independent, non-government organization and is in no way affiliated with any branch of any government or any company that provides telephone or telegraph communications services
- [TSA No-Fly List](https://www.no-fly-list.com/) - No fly list
- [RAND](http://rand.org) - RAND is a research organization that develops solutions to public policy challenges to help make communities throughout the world safer and more secure, healthier and more prosperous.
- [Global Terrorism Database](https://www.start.umd.edu/gtd/access/) - The Global Terrorism Database™ (GTD) is an open-source database including information on terrorist events around the world from 1970 through 2020 (with annual updates planned for the future). Unlike many other event databases, the GTD includes systematic data on domestic as well as international terrorist incidents that have occurred during this time period and now includes more than 200,000 cases.
- [Sanctions List Search](https://sanctionssearch.ofac.treas.gov/) - Sanctions List Search
- [Trump Twitter Archive](https://www.thetrumparchive.com/) - trump twitter archive
- [OFAC Sanctioned Search Engine](https://cse.google.com/cse?cx=e96467889fb82b9b0) - custom google search for OFAC Sanction search
- [INFORMNAPALM](https://informnapalm.org/db/russian-aggression/#lang=en&page=m_unit) - InformNapalm volunteer intelligence community presents its interactive database, mapping Russian aggression against Ukraine as well as Georgia and Syria. More than 2000 OSINT investigations performed by InformNapalm
- [gogettr](https://pypi.org/project/gogettr/) - Extraction tool for GETTR, a "non-bias [sic] social network."
- [FBI Most Wanted Search Engine](https://cse.google.com/cse?cx=1ee952e6584aa91f9) - custom google search engine for FBI most wanted list
- [Interpol Most Wanted Search Engine](https://cse.google.com/cse?cx=b1746754c83012613) - costom google search for Interpol most wanted list
- [Europol Most Wanted Search Engine](https://cse.google.com/cse?cx=f08e8dc2172da1ba8) - custom google search for Europol most wnated list
<br>
[⇧ Top](#index)
## FINANCE
- [Greylist Trace](https://greylisttrace.com/) - enterprise risk management and asset tracing
- [Tradint Research Tool](https://tradint.io/) - This tool enables users to conduct a full-scale Tradint (Trade Intelligence) investigation using the best tools and methods.
- [analytics-engine](https://github.com/mashiox/analytics-engine) - An environment of open source services used for market analysis
- [Ppp.adatascienti.st](https://ppp.adatascienti.st/) - ppp load search
- [CoVi Analytics](https://www.covianalytics.com/) - At CoVi Analytics, we create easy-to-use tools (Apps) specifically for the operations team to help streamline operations, enhance efficiency, and empower growth through tech-driven solutions that simplify business activities, automate operations and deliver greater insights
- [Search Our PPP Loan Database](https://ppp.directory/search) - ppp load database search
- [Search for Investment Fund Documents](https://www.sedar.com/search/search_form_mf_en.htm) - File, disclose and search for issuer information in Canada’s capital markets
<br>
[⇧ Top](#index)
## BUSINESS
- [Companies & Orgs Search Engine](https://cse.google.com/cse?cx=72ea9d8cfefc142d3) - custom google search for companies and organization search
- [AllPeople](https://allpeople.com/) - AllPeople is the largest free directory of business contacts for America. Find leads for companies including name, position, email, address, phone number and more!
- [Corporation Wiki](https://www.corporationwiki.com/) - Corporation Wiki exists to provide corporate transparency and historical data on companies. This allows officers to be held accountable for the actions they take through their corporations
- [PA PPP Database](https://public.flourish.studio/visualisation/3105919/) - loan database
- [Companies House](https://www.gov.uk/government/organisations/companies-house) - UK gov companies houses
- [Global Brownbook](https://www.brownbook.net/) - global business listing database
- [list-org](https://www.list-org.com/) - Basic information about any Russian legal entity or entrepreneur
- [OpenCorporates](https://opencorporates.com/) - Fresh, standardized, auditable information direct from official primary sources across 140+ jurisdictions — all underpinned by our Legal-Entity Data Principles and world-leading expertise in legal-entity data.
- [ICIJ Offshore Leaks Database](https://offshoreleaks.icij.org/) - Find out who’s behind more than 810,000 offshore companies, foundations and trusts from the Pandora Papers, Paradise Papers, Bahamas Leaks, Panama Papers and Offshore Leaks investigations.
- [XRefer](https://www.xrefer.com/) - Find top rated verified local companies
- [Startup Tracker](https://startuptracker.io/home) - Discover and track startups from MVP to IPO
- [Shopsearchengine.com](http://shopsearchengine.com/) - shopsearchengine.com the internets premiere shopping site, find it fast.
- [LA County CA Restaurant Health Violations](https://b2.caspio.com/dp.asp?AppKey=22341000af0b9c98ebf047f1b9f2)
- [Kansas Restaurant Inspections](https://b2.caspio.com/dp/a1a31000af3bac4c5e434987a857)
- [Lexington-Fayette County KY Health Department Restaurant Inspections](https://b2.caspio.com/dp.asp?AppKey=c8521000c641ab80b6d2448e89d9)
- [FL Energy Money in Politics](https://b2.caspio.com/dp.asp?AppKey=c73210001174b8c2a8d444768f5c)
- [ValidFleetList (unknown Sail Boat database)](https://c0eru285.caspio.com/dp/0dc330002829dcc1ad864b5bb094)
- [Viking Rifle Series Shooter Live Results](https://vikingrifleseries.caspio.com/dp/c8ac5000f29041f935cf42b6a641)
<br>
[⇧ Top](#index)
## POLICE / LE / FED
- [Openoversight](https://openoversight.com/) - OpenOversight: A public, searchable database of law enforcement officers.
- [The Philadelphia Police Misconduct Database](https://datawrapper.dwcdn.net/3GbVI/1/) - Philadelphia Police database
- [NYPD Misconduct Complaint Database](https://nyclu.shinyapps.io/CCRB_combo/) - NYPD Database
- [Maine County Law Enforcement Discipline Chart](https://public.flourish.studio/visualisation/4443849/?utm_source=showcase&utm_campaign=visualisation/4443849) - Search 5 years of Maine county law enforcement discipline
- [Arizona LE Database - ABC15](https://datawrapper.dwcdn.net/kkg90/6/) - List of Arizona law enforcement officials with credibility, honesty issues, compiled by ABC15.
- [Police Complaint Lookup](http://complaints.cuapb.org/) - Police complaint lookup
- [Boston Police Internal Affairs Cases, 2010-2020](https://apps.bostonglobe.com/graphics/2020/law-enforcement/index.html?initialWidth=1029&childId=police-embed&parentTitle=Database%3A%20Search%2010%20years%27%20worth%20of%20Boston%20Police%20Department%20disciplinary%20action&parentUrl=https%3A%2F%2Fwww.bostonglobe.com%2F2020%2F11%2F24%2Fmetro%2Fheres-searchable-database-boston-police-department-internal-investigations-disciplinary-actions-more%2F) - Full Disclosure: Boston Police Internal Affairs Cases, 2010-2020
- [Police Decertifcations Search and Report](https://c0acu882.caspio.com/dp/07da6000e467ebc2a444430c9c1d) - Search for decertified officers
- [EFF Atlas of Surveillance](https://atlasofsurveillance.org/) - Search our database of police tech — enter a city, county, state or agency in the United States.
- [Clearview AI US taxpayer-funded entities](https://datawrapper.dwcdn.net/VOOIE/16/) - search for US taxpayer-funded entities that have used or tried Clearview AI as of February 2020 based on internal data.
- [Oregon DPSST Professional Standards Cases Database](https://www.oregon.gov/dpsst/CJ/Pages/Cases.aspx)
- [Plain View Project](https://www.plainviewproject.org/data) - a research project that has identified thousands of Facebook posts and comments by current and former police officers.
- [wikileaks](https://wikileaks.org) - WikiLeaks specializes in the analysis and publication of large datasets of censored or otherwise restricted official materials involving war, spying and corruption
- [RCMP Death Search](https://c0cqk108.caspio.com/dp/9156100036f195cdf0934662917c) - The RCMP National Grave Discovery Database
- [Policecrime.bgsu.edu](https://policecrime.bgsu.edu/) - The Henry A. Wallace Police Crime Database
- [Citizens Police Data Project](https://beta.cpdp.co/) - collects and publishes information
about police misconduct in Chicago
- [Fatal Encounters](https://fatalencounters.org/people-search/) - This database contains records of people who’ve been killed through interactions with law enforcement since Jan. 1, 2000.
- [The NYPD Files](https://projects.propublica.org/nypd-ccrb/) - Search Thousands of Civilian Complaints Against New York City Police Officers
- [Open Data Policing](https://opendatapolicing.com/) - Search all known North Carolina traffic stops
- [Police Surveillance in Chicago](https://redshiftzero.github.io/policesurveillance/)
- [Mappingpoliceviolence.org](https://mappingpoliceviolence.org/) - Police Surveillance in Chicago
- [Police Protest Videos](https://projects.propublica.org/protest-police-videos/) - We Tracked What Happens to Police After They Use Force on Protesters
- [GeorgeFloyd Protest police brutality videos](https://docs.google.com/spreadsheets/u/1/d/1YmZeSxpz52qT-10tkCjWOwOGkQqle7Wd1P7ZM1wMW0E/htmlview?pru=AAABcql6DI8*mIHYeMnoj9XWUp3Svb_KZA#) - GeorgeFloyd Protest - police brutality videos on Twitter
- [Police Body-Worn Camera Footage Access Map](https://www.rcfp.org/resources/bodycams/) - Access to police body-worn camera video
- [Civilian Office of Police Accountability](https://www.chicagocopa.org/data-cases/case-portal/) - case portal
- [Project Comport - IMPD/BPD/WPD [Datasets]](https://www.projectcomport.org/)
- [How many untested r@pe kits does your city police department or county sheriff’s office have?](https://datawrapper.dwcdn.net/uOdaT/4/) - How many untested r@pe kits does your city police department or county sheriff's office have?
- [Gun Dealer Inspections | The Trace](https://projects.thetrace.org/inspections/)
- [Secret Surveillance Catalogue](https://theintercept.com/surveillance-catalogue/) - A Secret Catalogue of Government Gear for Spying on Your Cellphone
- [Chicago Police Department Demographics](https://public.flourish.studio/visualisation/1089756/) - Demographic Composition of Chicago Police Department Compared to Population
- [George Floyd - Where black people are most disproportionately killed by police](https://public.flourish.studio/visualisation/2646234/) - George Floyd - Where black people are most disproportionately killed by police
- [Iowa Cities police budgets](https://public.flourish.studio/visualisation/3168834/) - Amount of General Fund Budgets allocated to police in cities in Iowa
- [TGCG Members Page](https://c2ffn114.caspio.com/dp/e6a74000833e44e23c324a10987c)
- [LELU](https://github.com/the-legal-aid-society/LELU) - Data from Legal Aid Society's Law Enforcement Lookup
<br>
[⇧ Top](#index)
## INFORMANT
- [WhosaRat.com](https://whosarat.com/) - Largest online database of Police informants and corrupt Police/Agents
- [Snitch List](https://web.archive.org/web/20200115091633/http://sniitch.com/all/)- Your public blog diary where you can write about anything and anyone. You are anonymous to the world but yet your blogs matter.(archive of Sniitch) for site [click Here](https://sniitch.com/)
- [Goldensnitches](https://goldensnitches.com/) - 500
## RESIDENT DATABASE
- [Michigan Resident Database](https://www.michiganresidentdatabase.com/) - Michigan residents public records search
- [Ohio Resident Database](https://www.ohioresidentdatabase.com/) - Ohio residents public records search
- [Florida Residents Directory](https://www.floridaresidentsdirectory.com/) - public recored search for Florida
- [North Carolina Resident Database](https://northcarolinaresidentdatabase.com/) - North corolina public record search
- [NY Rent Regulated Building Search](https://apps.hcr.ny.gov/BuildingSearch/) - Rent regulated building search from New York state division of housing and community
<br>
[⇧ Top](#index)
## PUBLIC RECORDS
- [JudyRecords](https://www.judyrecords.com/) - 740 million US court cases
- [CourtListener](https://www.courtlistener.com/) - Search millions of legal decisions by case name, topic, or citation.
- [Public Access to Court Electronic Records](https://pacer.uscourts.gov/) - public access to court electronic records
- [Parallelsearch case law](https://parallelsearch.casetext.com/) - Find a case by phrase
- [Canadian Legal Information Institute](https://www.canlii.org/en/)
- [Supreme Court of Canada - Cases](https://www.scc-csc.ca/case-dossier/index-eng.aspx)
- [Offender Tracking Information System (OTIS)](https://mdocweb.state.mi.us/OTIS2/otis2.aspx)
- [New York State Prison Records](https://stevemorse.org/prison/prison.html)
- [Texas Public Records Search](https://publicrecords.searchsystems.net/United_States_Free_Public_Records_by_State/Texas_Public_Records/)
- [Arrest Bookings Search and Report](https://b2.caspio.com/dp/a1a3100009b7083c53a9405f8c6b)
- [Credibly Accused](https://projects.propublica.org/credibly-accused/)
- [Sortedbybirthdate](https://sortedbybirthdate.com/)
- [NJParcels.com](http://njparcels.com/property/)
- [Social Security Death Master File](https://ssdmf.info/)
- [SortedByName.com](https://sortedbyname.com/)
- [Sortedbybirthdate.com](https://sortedbybirthdate.com/)
- [Cemetery.directory](https://cemetery.directory/)
- [Social Security Death Index](https://stevemorse.org/ssdi/ssdi.html)
- [FamilySearch’s United States Record Collections](https://stevemorse.org/fhl/websitesunitedstates.html)
- [Chicago Cook County Genealogy](https://stevemorse.org/vital/cook.html)
- [BoatInfoWorld](https://www.boatinfoworld.com/)
- [Street Name Changes](https://stevemorse.org/census/changes.html)
- [Brooklyn Genealogy](http://bklyn-genealogy-info.stevemorse.org/index.html)
- [Little Rock AR Crime Search](https://b2.caspio.com/dp.asp?AppKey=88321000961d92fc4ed343f38a0e)
- [New England Facts](https://newenglandfacts.com/)
- [Michigan State Records](https://michigan.staterecords.org/)
- [Cancelthesefunerals.com](http://cancelthesefunerals.com/)
- [Independent fundamental Baptist sexual misconduct database](https://datawrapper.dwcdn.net/UyECh/20/)
- [York County PA 2017 Write in Report](https://b2.caspio.com/dp/0a9210000bece9f2f50642ff9cac)
- [PA teacher salary average](https://b2.caspio.com/dp/0a921000a059622d4771466aab79)
- [High schools that received NRA grants 2010-2016](https://b4.caspio.com/dp/55073000c492127ebd8d4a03a06a)
- [Corrections Books Approval Search](https://b2.caspio.com/dp/0a921000cae47f9702f44d2bb94b)
- [Wisconsin Fox River Veterans’ Grave Registration Database](https://c3cqk813.caspio.com/dp/b201500011643c5f4c7f4bfba7d1)
- [OH marijuana docs](https://c0eru132.caspio.com/dp/95d310003d6c2e38182a48ef9bb2)
- [FAFSA Search and Report](https://c0dcb948.caspio.com/dp/726780004ccd83a96316450caead)
- [AL Local Surety Association Directory](https://c0gaf106.caspio.com/dp/2d4e1000c7506b7686a540d3b10f)
- [Ohio obituaries, death & marriage Search](https://c0abe732.caspio.com/dp/679e5000cbc8c6a587bb42efa9ef)
- [SECO Verification of Course Attendance 2018](https://c0esh132.caspio.com/dp/9040200005c29c35a74342e2b357)
- [IUS The Horizon Search and Report](https://c0acy802.caspio.com/dp/cf3b6000f61f1e0724984cb28f5c)
- [Katrina Spending Search](https://b2.caspio.com/dp/a4321000cb4905373d1946e5b33f)
- [AR College University 2017 Salaries](https://b2.caspio.com/dp.asp?AppKey=883210005c5e51279b424364aab2)
- [The Weapons ID Database](http://www.smallarmssurvey.org/weapons-and-markets/tools/weapons-id-database.html)
<br>
[⇧ Top](#index)
## GOVERNMENT
- [data.occrp.org](https://data.occrp.org/)
- [The Pegasus Project | OCCRP](https://cdn.occrp.org/projects/project-p/#/)
- [COP26 registered attendees](https://datawrapper.dwcdn.net/UCUWs/3/)
- [MuckRock](https://www.muckrock.com/)
- [GovSalaries](https://govsalaries.com/)
- [Openpayrolls.com](https://openpayrolls.com/)
- [SeeThroughNY :: Pensions](https://www.seethroughny.net/pensions)
- [Scotussearch.com](https://www.scotussearch.com/)
- [Nonprofit Explorer](https://projects.propublica.org/nonprofits/)
- [Coronavirus Bailouts](https://projects.propublica.org/coronavirus/bailouts/)
- [Nursing Home Inspect](https://projects.propublica.org/nursing-homes/)
- [Macron Campaign Emails](https://wikileaks.org//macron-emails/)
- [DNC email database](https://wikileaks.org//dnc-emails/)
- [GI Files](https://search.wikileaks.org/gifiles/)
- [AKP email database/](https://wikileaks.org//akp-emails/)
- [LittleSis](https://littlesis.org/)
- [Lexington KY Employee Salaries 2021](https://c0ect130.caspio.com/dp/c852100055664d756c6e441aa963)
- [Greater Sacramento Area Public Salaries](https://b2.caspio.com/dp/c48210000605c38aa22f4080a1be)
- [Illinois Public Salaries](https://c0ctb111.caspio.com/dp/1a7210001e4dbabdb7204962bc03)
- [St. Louis County salaries fiscal 2020](https://c0bkr141.caspio.com/dp/936b1000d0c132c8cbbb4f0c8c1f)
- [Milwaukee Wisconsin City Employee Salaries 2019](https://c0ebl104.caspio.com/dp/eab010008ed5ca97d7404269bf89)
- [Texas Local Superintendent Salaries Search and Report](https://b3.caspio.com/dp/5a5b1000b41b35162a3844b4b7ec)
- [Baytown TX Employee Directory](https://c0ctb134.caspio.com/dp/c5f5200097e7aef4edb54e09bd5e)
- [MA Middlesex County City employee salary 2019](https://c0eib112.caspio.com/dp/6ee01000497ba7e2d63b46229a99)
- [KY State Salary 2019](https://c0ect130.caspio.com/dp/c8521000065e102da08c40e696ad)
- [UKY Salaries 2019](https://c0ect130.caspio.com/dp/c8521000eca729c2125e46c487fd)
- [Mobile AL Salaries Search and Report](https://b2.caspio.com/dp/362210004ae292fb5cf34f0fb079)
- [NC State Government Salaries Search and Report](https://b2.caspio.com/dp/96073000345d59bc5b1744109afe)
- [NC State Employee Overtime 2018 Search and Report](https://c0eib112.caspio.com/dp/6ee01000325ae85bbfe24ade9bea)
- [PA 2017 Certificate Actions (Education)](https://b2.caspio.com/dp/0a9210006dbe656876084f9b9f59)
- [First Philadelphia Preparatory Charter School Staff Public Release 2017](https://b2.caspio.com/dp/0a921000842668d3d3e644d2bd8f)
- [PA School Districts Deeds user-facing web search](https://b2.caspio.com/dp/0a92100000938817df46468fa2a0)
- [PA Perry County 2017 Compensation Search and Report](https://b2.caspio.com/dp/0a921000e05cf4b592b245aeae20)
- [Gettysburg PA Adams County 2017 Payroll Search and Report](https://b2.caspio.com/dp/0a9210006f0ddf22afd8417f9711)
- [Lebanon County PA 2017 Search and Report](https://b2.caspio.com/dp/0a9210001cc98f2f21004ce4a3d4)
- [Dauphin County PA 2017 Compensation](https://b2.caspio.com/dp/0a921000a2f20d556db84221a92c)
- [York City PA Compensation](https://b2.caspio.com/dp/0a92100001903125816c4d34a37a)
- [York County VA 2017 Public Salaries](https://b2.caspio.com/dp/0a921000b12e238357df42e7affc)
- [OH Court Costs](https://b2.caspio.com/dp/95d31000da9841d5980644c98761)
- [German Gov Employee Database (Unknown)](https://c0acz339.caspio.com/dp/E171600054612b9f79fb4ddf8f2b)
- [Brazilian Address CEP Search and Report](https://c2abn462.caspio.com/dp/6c2d80006c6adb825b3b45079cb8)
- [Darpan NGO Search](https://c7ect427.caspio.com/dp/c45e900062d54a7f263942979465)
- [UNC System employees with the biggest paychecks](https://c0dzk127.caspio.com/dp/b95b1000e0821c125a8a43cd9cc1)
- [HEALTHCARE EDUCATION PROVIDERS](https://c3dug085.caspio.com/dp/1fec4000740ace75fdb94ec5bca5)
- [Cal Poly Email Search](https://c0acw966.caspio.com/dp/5dbe60009c7190a3b0bb407eaea0)
- [Dutchess and Ulster bridge safety ratings 2015](https://b2.caspio.com/dp.asp?AppKey=996f1000109b0cd3b24b408daf60)
- [Lou Barletta 2017 Donors](https://b2.caspio.com/dp/0a9210001cdd2eaac90941488478)
- [Worcester MA Employee Gross Pay](https://c0acu481.caspio.com/dp/e0536000108787410ed749fdb240)
<br>
[⇧ Top](#index)
## ONLYFANS
- [Onlysearch.co](https://onlysearch.co/)
- [OnlyFinder](https://onlyfinder.com/)
- [Search OnlyFans profiles](https://hubite.com/onlyfans-search/)
<br>
<a href="https://www.buymeacoffee.com/astrosp" target="_blank"><img src="https://cdn.buymeacoffee.com/buttons/v2/default-yellow.png" alt="Buy Me A Coffee" style="height: 45px !important;width: 157px !important;" ></a>
[Top](#index)
|
.linkcheck.json
|
.linkcheck.json
|
.json
| 246
|
{
"default": true,
"MD004": { "style": "dash"},
"MD007": {"indent": 4},
"MD013": false,
"MD024": { "siblings_only": true},
"MD029": false,
"MD033": { "allowed_elements": [ "details" , "summary" ]},
"MD040": false
}
|
package.json
|
package.json
|
.json
| 809
|
{
"devDependencies": {
"markdownlint-cli": "^0.26.0",
"textlint": "^11.6.3",
"textlint-filter-rule-comments": "^1.2.2",
"textlint-filter-rule-whitelist": "^2.0.0",
"textlint-rule-terminology": "^2.1.4"
},
"scripts": {
"test": "npm run lint-markdown && npm run lint-terminology",
"lint-terminology": "textlint ./README.md",
"lint-markdown": "markdownlint ./README.md --ignore node_modules",
"link-check": find . -name README.md -exec markdown-link-check -c markdown-link-check-config.json 1> log 2> err {} \\;
// "link-check": "find README -name \\*.md -exec markdown-link-check -c markdown-link-check-config.json 1> log 2> err {} \\; && if [ -e err ] && grep -q \"ERROR:\" err ; then exit 113 ; else echo -e \"All good\"; fi"
}
}
|
markdown-link-check-config.json
|
markdown-link-check-config.json
|
.json
| 347
|
{
"ignorePatterns": [
{
"pattern": "^bundle.zip"
},
{
"pattern": "^/"
}
],
"httpHeaders": [
{
"urls": ["https://", "http://"],
"headers": {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:64.0) Gecko/20100101 Firefox/64.0"
}
}
]
}
|
FUNDING.yml
|
.github/FUNDING.yml
|
.yml
| 797
|
# These are supported funding model platforms
github: [Astrosp]
patreon: # Replace with a single Patreon username
open_collective: # Replace with a single Open Collective username
ko_fi: # Replace with a single Ko-fi username
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
liberapay: # Replace with a single Liberapay username
issuehunt: # Replace with a single IssueHunt username
lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
polar: # Replace with a single Polar username
buy_me_a_coffee: # Replace with a single Buy Me a Coffee username
custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']
|
md-link-check.yml
|
.github/workflows/md-link-check.yml
|
.yml
| 1,490
|
name: Check Markdown links
on: push
jobs:
markdown-link-check:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@master
- uses: gaurav-nelson/github-action-markdown-link-check@v1
# name: Markdown Link Check
# on:
# push:
# pull_request:
# branches:
# - dev
# jobs:
# link-check:
# runs-on: ubuntu-22.04
# env:
# CI: true
# steps:
# - name: Setup Action
# uses: actions/checkout@master
# # - name: Setup Node
# # uses: actions/setup-node@v4
# # with:
# # node-version: 12.x
# - name: Install dependencies
# run: npm install
# - name: Run link check
# run: npm run link-check
# - name: Show broken links
# if: failure()
# run: |
# cat log | awk -v RS="FILE:" 'match($0, /(\S*\.md).*\[✖\].*(\d*\slinks\schecked\.)(.*)/, arr ) { print "FILE:"arr[1] arr[3] > "brokenlinks"}'
# rm -f err log
# cat brokenlinks
# links=`cat brokenlinks`
# links="${links//'%'/'%25'}"
# links="${links//$'\n'/'%0A'}"
# links="${links//$'\r'/'%0D'}"
# echo ::set-output name=links::**Following links are broken:** %0A$links
# - name: Send comment to PR with broken links
# if: failure() && github.event_name == 'pull_request'
# uses: thollander/actions-comment-pull-request@main
# with:
# message: ${{ steps.brokenlinks.outputs.links }}
# # GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
|
settings.json
|
.vscode/settings.json
|
.json
| 3,447
|
{
"cSpell.words": [
"Accu",
"Addy",
"Aeroleads",
"Airborn",
"Anymailfinder",
"Atvirųjų",
"Avaddon",
"Awesomelists",
"backcolor",
"Bellingcat’s",
"Bitcoinprivacy",
"Bitdefender",
"Bluestacks",
"bugbounty",
"Canarytokens",
"cheatsheet",
"Cheatsheet",
"Checkphish",
"Chibisafe",
"Clearbit",
"Colab",
"Colaboratory",
"Commentexporter",
"Creps",
"Cryptee",
"Cryptpad",
"Cyberthreat",
"cymon",
"Darknet",
"Deblurring",
"Decktopus",
"decompiler",
"Decompiler",
"Decryptor",
"DFIR",
"Diceware",
"digitalmethods",
"DISA",
"disasm",
"Disasm",
"disroot",
"Disroot",
"Dotspotter",
"Dottspotter",
"dudle",
"Ecode",
"Emailrep",
"Emsisoft",
"Etherpad",
"Exif",
"explainshell",
"fastpeoplesearch",
"FOCA",
"forecolor",
"Forti",
"Fotor",
"Framadrop",
"Genymotion",
"geolocation",
"Georgy",
"Gofindwho",
"Graphviz",
"harrywald",
"Hashmob",
"holehe",
"hotspots",
"hrefs",
"hwosint",
"IMEI",
"Imgur",
"Infoga",
"integrety",
"Intellige",
"intelowlproject",
"Invision",
"IPFS",
"Jitsi",
"jivoi",
"Kasm",
"Keyscore",
"Ldplayer",
"Libgen",
"Localmonero",
"Lonardo",
"Lufi",
"Lullar",
"Maildrop",
"Matweb",
"Memuplay",
"Metacleaner",
"minutemail",
"mitaka",
"Monero",
"Namechk",
"NETSCOUT",
"Nextstrain",
"NINO",
"objdump",
"Oldweb",
"opensource",
"Oprations",
"Opsec",
"osint",
"OSINT",
"osintme",
"osrframework",
"Pagelink",
"pastebin",
"Pastebin",
"Paxful",
"pentest",
"pentration",
"Permutator",
"Phonebook",
"phonenumber",
"Proofy",
"Psiphon",
"pywhat",
"Querytool",
"Recontool",
"riseup",
"Riseup",
"Rxiv",
"šaltinių",
"Seekr",
"Senda",
"Shadowlibraries",
"Sheetplus",
"Shodan",
"showthedocs",
"signup",
"sinwindie",
"Smstome",
"socialscan",
"socid",
"Sprp",
"Steg",
"Steganography",
"Stockimg",
"Stutterbox",
"survelliance",
"Synaps",
"Technisette",
"Tempora",
"Textgen",
"Threatbutt",
"Tiktok",
"Toolset",
"TOOLSET",
"Tophonetics",
"Trantor",
"Trumail",
"typely",
"Ufind",
"Unflurl",
"unhash",
"unlinited",
"Unpaywall",
"upto",
"Vbulletin",
"Wayback",
"waybackpy",
"Webint",
"webp",
"Wetranscriber",
"Whois",
"Wifispc",
"Wiman",
"wordlists",
"xlek",
"zaba",
"žvalgyba"
],
}
|
README.md
|
README.md
|
.md
| 17,580
|
# CamSniff
> **Automated IP Camera & Network Video Stream Reconnaissance Toolkit**
> Smart, mode-aware reconnaissance that maps every camera and stream across your infrastructure, from living rooms to datacenters.
<div align="center">
[](https://github.com/John0n1/CamSniff/commits/main)
[](#)
[](#)
[](LICENSE)
**Current version:** `2.2.3` ·
<img src="docs/camsniff.png" alt="CamSniff logo" width="320" />
</div>
---
# Table of contents
1. [Overview](#overview)
2. [Why CamSniff?](#why-camsniff)
3. [Feature matrix](#feature-matrix)
4. [Architecture & flow](#architecture--flow)
5. [Project layout](#project-layout)
6. [Scanning modes](#scanning-modes)
7. [Install & quick start](#install--quick-start)
8. [Command line examples](#command-line-examples)
9. [Output format & artifacts](#output-format--artifacts)
10. [Discovery & profiling logic (short)](#discovery--profiling-logic-short)
11. [Credential probing behavior](#credential-probing-behavior)
12. [Configuration & extending dictionaries](#configuration--extending-dictionaries)
13. [Analysis helper & IVRE integration](#analysis-helper--ivre-integration)
14. [Dependencies](#dependencies)
15. [Troubleshooting & tips](#troubleshooting--tips)
16. [Hardening, ethics & responsible use](#hardening-ethics--responsible-use)
17. [Contributing & roadmap](#contributing--roadmap)
18. [License](#license)
---
# Overview
**CamSniff** is a modular reconnaissance toolkit focused on discovering, profiling and opportunistically acquiring snapshots/streams from IP cameras and networked video sources on *local networks*. It blends active scanning (Nmap, optional Masscan), passive discovery (Avahi/mDNS/SSDP), short traffic sampling (TShark), HTTP/ONVIF banner pulls, and vendor templates (`data/catalog/paths.csv`) to produce structured, reproducible results.
Key design points:
* Mode-aware: tune from **stealth** → **nuke** for noise vs coverage tradeoffs
* Multi-protocol: RTSP, ONVIF, HLS, WebRTC, SRT, RTMP, CoAP probes, etc.
* Output: structured JSON (`discovery.json`, `credentials.json`) + thumbnails & logs
* Offline-friendly: no external lookups required — vendor intelligence lives in `data/`
> ⚠️ **Responsible use only** — Do **not** scan or capture media from devices/networks you are not explicitly authorized to test. Treat captured imagery and credentials as highly sensitive.
---
# Why CamSniff?
* Reduce repetitive manual recon: one command yields a consistent, auditable dataset.
* Templated vendor intelligence speeds up discovery of likely snapshot/RTSP endpoints.
* Tunable credential probing keeps operations traceable and bounded by the chosen mode.
* Designed to be integrated with IVRE for persistent, queryable reconnaissance databases.
---
# Feature matrix
| Area | Highlights |
| ------------------- | ---------------------------------------------------------------------------------- |
| Discovery | Nmap TCP/UDP scan, NSE RTSP brute, optional Masscan + SSDP broadcast sweep |
| Target specification| Auto-detect local network or load from JSON/text files with `--targets` |
| Passive | Avahi/mDNS & SSDP filtering for camera/service keywords; HTTP banner harvesting |
| Traffic sampling | Targeted TShark captures to extract observed URIs |
| Protocols | ONVIF (incl. device info), RTSP, HLS, WebRTC/STUN, RTMP, SRT, CoAP `/.well-known/core` |
| Vendor profiling | `data/catalog/paths.csv` maps OUI/heuristics → RTSP/HTTP templates + CVEs |
| Credential strategy | Mode-limited curated username/password lists, default combos |
| Acquisition | ffmpeg RTSP grabs, HTTP snapshot requests, optional ASCII previews (chafa) |
| Output | `discovery.json`, `credentials.json`, thumbnails, HTTP/ONVIF/SSDP metadata logs |
| Extras | IVRE sync script, post-scan analysis scripts, enrichers |
---
# Architecture & flow (concise)
1. Decide mode (timings, breadth, credential caps) via `scripts/core/mode-config.sh`.
2. Active scan: Nmap (scripted RTSP brute NSE); optional Masscan merges ports.
3. Passive discovery: SSDP broadcast sweep + Avahi/mDNS for camera/service keywords.
4. Traffic sampling: TShark capture on observed hosts to find candidate URIs.
5. UDP micro-scan for STUN/WS-Discovery/SRT indicators.
6. CoAP probe to `/.well-known/core` for constrained devices.
7. HTTP metadata & ONVIF device-info pulls for banner/realm correlation.
8. Vendor matching using `data/catalog/paths.csv` → produce candidate RTSP/HTTP templates.
9. Assemble `discovery.json` and run credential/media acquisition phase.
10. Optionally, push to IVRE with `--extra ivre`.
---
# Project layout
* `scripts/camsniff.sh` — launcher/orchestrator for every scan phase.
* `scripts/core/` — mode/port profile logic and other shared knobs.
* `scripts/setup/` — dependency/bootstrap helpers (libcoap build, package install).
* `scripts/probes/` — SSDP, ONVIF, credential probe, and related active modules.
* `scripts/helpers/` — Python utilities for catalog enrichment, HTTP parsing, RTSP summaries.
* `scripts/integrations/` — IVRE sync and manager utilities.
* `scripts/tools/` — analysis/reporting helpers.
* `scripts/ui/` — banner and terminal rendering helpers.
* `data/catalog/` — vendor templates + CVEs.
* `data/dictionaries/` — credentials, HTTP/RTSP dictionaries.
* `data/examples/` — sample target lists.
* `data/protocols/` — NSE RTSP brute script and protocol assets.
---
# Scanning modes (summary)
Each mode adjusts port profiles, timing, Masscan usage, NSE breadth, and maximum credential attempts.
| Mode | Masscan | Nmap speed | Creds (max) | TShark (s) | Use case |
| -----------: | :-----: | :------------------: | :---------: | :--------: | ----------------------- |
| `stealth+` | no | -T1 | 8 | 15 | Minimal noise, slowest |
| `stealth` | no | -T2 | 12 | 20 | Quiet local scans |
| `medium` | yes | -T4 | 32 | 35 | Default balanced |
| `aggressive` | yes | -T4 -A | 64 | 45 | More scripts/versioning |
| `war` | yes | -T5 -A | 96 | 55 | Broad vendor coverage |
| `nuke` | yes | -T5 -A --script vuln | 128 | 75 | Full sweep (1–65535) |
Default: `--mode medium`. Example: `sudo camsniff --mode stealth`.
---
# Install & quick start
## A — From releases (Debian package)
```bash
# download latest release .deb
sudo apt install ./camsniff_*amd64.deb
# run
sudo camsniff --mode medium
```
## B — From source (developer / live edits)
```bash
git clone https://github.com/John0n1/CamSniff.git
cd CamSniff
chmod +x scripts/*.sh data/*.sh
sudo scripts/camsniff.sh # first run bootstraps dependencies if needed
```
> On first run the script attempts to install or build missing runtime tooling (where possible). Read logs in `dev/results/<run>/logs/` if a dependency fails.
---
# Command line examples
```bash
# quick balanced scan (default intensity)
sudo camsniff --mode medium
# quiet scan (low footprint)
sudo camsniff --mode stealth+
# aggressive, include IVRE ingestion
sudo camsniff --mode aggressive --extra ivre
# skip confirmation (non-interactive)
sudo camsniff --yes
# pin output location and tag the run
sudo camsniff --output-root /mnt/scan-results --run-name office
# force a specific capture interface for tshark
sudo camsniff --interface eth0
# skip automated credential probing
sudo camsniff --skip-credentials
# skip dependency installation (assumes tools are already present)
sudo camsniff --skip-install
# generate a markdown or HTML report
sudo camsniff --report markdown
sudo camsniff --report html
# smart target shaping and confidence ranking
sudo camsniff --smart --smart-min 35 --smart-max 60
# enrich SSDP results with device descriptions
sudo camsniff --ssdp-describe
# encrypt results (auto-selects age/gpg)
sudo camsniff --encrypt-results --encrypt-recipient "age1example..."
# force gpg encryption with a key id
sudo camsniff --encrypt-results gpg --encrypt-recipient "KEYID"
# scan specific IP ranges from a JSON file
sudo camsniff --mode medium --targets /path/to/targets.json
# scan specific IP ranges from a text file
sudo camsniff --mode war --targets /path/to/targets.txt
# show help / version
sudo camsniff --help
sudo camsniff --version
```
---
# Output format & artifacts
All run outputs live in `dev/results/<UTC_TIMESTAMP>/` by default:
You can override the base directory with `--output-root` and append a label with
`--run-name`. Example: `/mnt/scan-results/20250101T000000Z-office/`.
Reports are written as `report.md` or `report.html` inside each run directory.
When `--encrypt-results` is enabled an encrypted `.tar.gz.age` or `.tar.gz.gpg`
archive is created alongside the run directory (plaintext remains on disk).
For GPG symmetric encryption without prompts, set `CAM_ENCRYPT_PASSPHRASE`.
* `discovery.json` — canonical host dataset with enrichment metadata + confidence scoring
* `credentials.json` — credential attempts & successes per host
* `thumbnails/` — JPEG snapshots of successful grabs (organized per run)
* `logs/` — raw phase logs (`nmap-output.txt`, `masscan-output.json`, `avahi-services.txt`, `tshark-traffic.csv`, `coap-probe.log`, `http-metadata.jsonl`, `ssdp-discovery.jsonl`, `onvif-discovery.jsonl`)
* `analysis/` — optional aggregated statistics from `scripts/tools/analyze.sh`
`discovery.json` snapshot example (trimmed):
```jsonc
{
"ip": "192.168.1.42",
"mac": "AA:BB:CC:DD:EE:FF",
"sources": ["Nmap","TShark","Avahi"],
"ports": [80,554,8443],
"observed_paths": ["/onvif/device_service", "rtsp://..."],
"profile_match":{
"vendor":"VendorX",
"model":"ModelY",
"matched_by":"oui",
"rtsp_candidates":[...],
"http_snapshot_candidates":[...],
"cve_ids":["CVE-2024-XXXX"]
},
"confidence": {
"score": 78,
"level": "high",
"classification": "camera",
"reasons": ["rtsp url discovered", "onvif detected"]
}
}
```
---
# Discovery & profiling logic (short)
* **Observed evidence**: Nmap + TShark + Avahi merge into a host record.
* **Heuristics**: port fingerprints, OUI regex, observed HTTP/RTSP URIs, ONVIF/SSDP/HTTP banners.
* **Vendor templates**: `data/catalog/paths.csv` contains OUI & port heuristics → RTSP/HTTP templates + CVEs.
* **Enrichment**: small Python post-processor ranks candidates and annotates `discovery.json`.
* **Smart targeting**: `--smart` prioritizes deeper probes using early signals and prints a confidence ranking.
* **SSDP describe**: `--ssdp-describe` fetches device descriptions to boost fingerprints.
---
# Credential probing behavior
`scripts/credential-probe.sh` uses:
1. Vendor default combos (from `data/catalog/paths.csv`) + blank/empty password checks.
2. Curated, mode-bounded username/password pair lists (`data/dictionaries/usernames.txt`, `data/dictionaries/passwords.txt`).
3. Enumerated RTSP paths (profile + brute + observed from TShark).
4. HTTP snapshot templated endpoints (`data/dictionaries/http-paths.txt`).
Successful attempts record: credential pair, endpoint used, thumbnail path, timestamp. **Credentials are stored in plain JSON** — treat them as sensitive material and secure results directories accordingly.
---
# Target file formats
CamSniff can ingest IP addresses and CIDR ranges from external files using the `--targets` flag. This allows for pre-defined target lists and integration with other reconnaissance tools.
## JSON format
```json
{
"targets": [
"192.168.1.0/24",
"10.0.0.1",
"172.16.0.0/28"
]
}
```
The JSON file must contain a `targets` array with IP addresses and/or CIDR ranges as strings.
## Text format
```
# Comment lines starting with # are ignored
192.168.1.0/24
10.0.0.1
# Another network
172.16.0.0/28
```
Text files support one IP address or CIDR range per line. Empty lines and lines starting with `#` are ignored. Whitespace is automatically trimmed.
## Usage examples
```bash
# Scan targets from JSON file
sudo camsniff --mode medium --targets /path/to/targets.json
# Scan targets from text file
sudo camsniff --mode war --targets /path/to/targets.txt
# Use the included example files
sudo camsniff --mode medium --targets data/examples/example-targets.json
```
Example target files are provided in the `data/` directory:
- `data/examples/example-targets.json` — JSON format example
- `data/examples/example-targets.txt` — Text format example
When using `--targets`, the script bypasses automatic network detection and scans only the specified targets.
---
# Configuration & extending dictionaries
All dictionaries live in `data/` and are editable:
* `catalog/paths.csv` — vendor OUI regex → default creds, RTSP/HTTP templates, CVE IDs
* `dictionaries/rtsp-urls.txt` — extend RTSP brute dictionary for NSE
* `dictionaries/http-paths.txt` — fallback HTTP snapshot endpoints (templated)
* `dictionaries/usernames.txt` / `dictionaries/passwords.txt` — curated credential lists (comments ignored)
* `vendors/<vendor>/http-paths.txt` — vendor-specific HTTP snapshot templates
* `vendors/<vendor>/rtsp-paths.txt` — vendor-specific RTSP templates
* `core/port-profiles.sh` — logical named port sets used per scanning mode
After edits, next run will use updated files. Keep additions concise, verifiable, and documented (one vendor per row ideally).
Vendor dictionary format:
- HTTP: `template|port|channel|stream|label`
- RTSP: `template|port|channel|stream|transport|label`
Templates may include `{{ip_address}}`, `{{username}}`, `{{password}}`, `{{port}}`,
`{{channel}}`, and `{{stream}}` placeholders.
---
# Analysis helper & IVRE integration
* `scripts/tools/analyze.sh` — prints host counts, vendor diversity, RTSP discovery volume, credential success rate.
* `scripts/integrations/ivre-manager.sh` — optionally bootstraps a Python venv with IVRE + pymongo and pushes enriched hosts into IVRE (use `--extra ivre`).
---
# Dependencies
Core runtime (auto-installed where possible):
* nmap, masscan (optional), tshark (wireshark/tshark), avahi-utils, ffmpeg, curl, jq, python3 (+ venv), chafa (optional, for ASCII previews), libpcap.
* Build tools for libcoap / `coap-client` (`git`, `cmake`, `build-essential`, `pkg-config`) — script `scripts/setup/build-coap.sh` will attempt to build if missing.
---
# Troubleshooting & tips
* **Empty `discovery.json`** — verify interface, ARP visibility, run non-stealth mode for testing.
* **Masscan skipped** — ensure `--mode` permits it (e.g., `medium`+).
* **No thumbnails** — check `ffmpeg` availability and per-host logs in `dev/results/<run>/logs/`.
* **ONVIF false negatives** — SSL/certificate redirects or nonstandard ports can hide endpoints — try `curl -k` manually against suspected endpoints.
* **CoAP probes failing** — build `coap-client` via `scripts/setup/build-coap.sh`, inspect `logs/coap-probe.log`.
* **Performance** — if `nuke` takes too long, use `medium` or a custom port profile.
Environment toggles:
* `NO_ANIM=1` — skip ASCII/intro animation (useful in CI).
* `CAM_MODE_PORT_PROFILE` — override port profile programmatically (advanced).
---
# Hardening, ethics & responsible use
* **Authorization** — never use CamSniff on networks/devices without explicit, written permission.
* **Data protection** — captured images, device metadata and credentials are sensitive — encrypt and limit access.
* **Least impact** — start with `stealth` modes during discovery and escalate only when authorized.
* **CVE data** — treated as advisory; manual verification and safe disclosure practices required.
* **Avoid uncontrolled credential spraying** — credential attempts are mode-bounded; respect target operational stability.
---
# Contributing
1. Fork → create feature branch.
2. Make focused changes (one concern per PR).
3. Run `make lint` (uses `shellcheck`) and `scripts/test` if available.
4. Add sample outputs or before/after notes where relevant.
5. Submit PR and reference related issues.
Guidelines:
* Document every vendor template change and source of truth.
* Prefer small, testable commits; avoid large binary additions.
* Keep default dictionaries conservative — do not include proprietary credential lists.
---
# Roadmap (short)
* Web dashboard: realtime JSON + thumbnails.
* Live mosaic / timeline capture mode.
* Encrypted credential store & role-based access.
* Pluggable exporters: Markdown/HTML summary reports.
* Additional protocol signatures (MQTT, SIP, more proprietary APIs).
Have a feature idea? Please open an issue describing the use case.
---
# License
MIT — see [LICENSE](LICENSE). <sub>© 2025 John Hauger Mitander. The authors disclaim responsibility for misuse. Practice ethical security research.</sub>
|
copilot-instructions.md
|
.github/copilot-instructions.md
|
.md
| 3,461
|
## Orientation
- CamSniff is a Bash-driven reconnaissance pipeline for IP cameras; the orchestrator lives in `scripts/camsniff.sh` and must run as root because it invokes packet captures and low-level scans.
- Startup calls `scripts/setup/deps-install.sh` with a spinner to ensure Nmap/Masscan/TShark/ffmpeg, builds libcoap if missing, and resolves per-mode knobs from `scripts/core/mode-config.sh`.
- Modes in `scripts/core/mode-config.sh` feed port profiles (`scripts/core/port-profiles.sh`), RTSP threads, credential caps, curl/ffmpeg timeouts, and optional NSE extras; adjust both files together to keep UI labels accurate.
## Workflow
- Use `sudo scripts/camsniff.sh --mode medium --yes` for an end-to-end scan; the script derives the target CIDR from the default route and stages artifacts under `dev/results/<UTC>/`.
- Pre-flight tooling with `sudo scripts/setup/deps-install.sh` or `sudo make install-deps`; follow with `make lint` (shellcheck + bash -n) and `make dev` for a dpkg dry run when iterating.
- The Makefile’s `make run MODE=war RUN_FLAGS='--extra ivre'` wraps the launcher; IVRE sync only stays enabled if MongoDB and the Python `ivre` package are available.
- After scans, inspect `dev/results/<stamp>/discovery.json` and `credentials.json` with `scripts/tools/analyze.sh`; logs live in `dev/results/<stamp>/logs/`, thumbnails under `thumbnails/`.
## Data & Extension Points
- Vendor fingerprints, default credentials, CVEs, and HTTP/RTSP templates live in `data/catalog/paths.csv`; edits immediately change enrichment and credential probing.
- `scripts/core/port-profiles.sh` maps logical profiles to Nmap/Masscan specs and RTSP thread hints—update labels if you add or rename a profile so banners stay truthful.
- Credential attempts pull from `data/dictionaries/usernames.txt`, `data/dictionaries/passwords.txt`, and fallback HTTP routes in `data/dictionaries/http-paths.txt`; keep comment lines starting with `hash` so the parsers skip them.
- Protocol heuristics (`detect_onvif`, `detect_hls`, `detect_webrtc`, `detect_srt_from_ports`) live in `scripts/camsniff.sh`; use `record_protocol_hit` and `track_port` helpers to keep discovery JSON consistent.
## Results Contract
- `discovery.json` stores a `hosts[]` array with `sources`, `ports`, `observed_paths`, `rtsp_bruteforce`, and `additional_protocols`; preserve these keys if you extend the schema because `scripts/ivre-sync.py` consumes them.
- `credentials.json` is a flat list written by `scripts/credential-probe.sh`; each item records `ip`, `username`, `password`, `success`, `method`, and optional media artifacts used by thumbnail generation.
- IVRE integration calls `scripts/ivre-sync.py` after discovery when `--extra ivre` is set; it expects the virtualenv at `venv/` and logs to `dev/results/<stamp>/logs/ivre-sync.log`.
- GeoIP databases under `share/geoip/` seed IVRE lookups; keep the `.version` sidecar files in sync when updating datasets.
## Conventions
- Bash code consistently uses `set -euo pipefail`, associative arrays, and helper functions close to their call sites; prefer pure functions and guard external commands with `command -v` checks.
- UI rendering comes from `scripts/ui/banner.sh`; keep additions terminal-safe (tput-aware) because the launcher clears the screen around prompts and progress output.
- Avoid touching unrelated `dev/results/` artifacts in code changes; they are user-generated outputs and should be ignored by automation.
|
FUNDING.yml
|
.github/FUNDING.yml
|
.yml
| 810
|
# These are supported funding model platforms
github: John0n1
patreon: # Replace with a single Patreon username
open_collective: # Replace with a single Open Collective username
ko_fi: # Replace with a single Ko-fi username
tidelift: # Replace with a single Tidelift platform-name/package-name e.g., npm/babel
community_bridge: # Replace with a single Community Bridge project-name e.g., cloud-foundry
liberapay: # Replace with a single Liberapay username
issuehunt: # Replace with a single IssueHunt username
lfx_crowdfunding: # Replace with a single LFX Crowdfunding project-name e.g., cloud-foundry
polar: # Replace with a single Polar username
buy_me_a_coffee: John0n1
thanks_dev: # Replace with a single thanks.dev username
custom: # Replace with up to 4 custom sponsorship URLs e.g., ['link1', 'link2']
|
customisation.md
|
docs/customisation.md
|
.md
| 4,966
|
## Customisation hints
- Extend `data/catalog/paths.csv` with new vendor fingerprints, CVE IDs, default credentials, and snapshot/stream templates.
- Update `data/dictionaries/usernames.txt` and `data/dictionaries/passwords.txt` to broaden credential probing.
- Swap in an alternate RTSP dictionary by editing `data/protocols/rtsp-url-brute.nse` or passing `rtsp-url-brute.urlfile=<path>` through the Nmap script arguments (see comments in the script).
- Add vendor-specific dictionaries in `data/vendors/<vendor>/http-paths.txt` and `data/vendors/<vendor>/rtsp-paths.txt` using the `template|port|channel|stream|label` / `template|port|channel|stream|transport|label` formats.
- Modes, timeouts, and credential limits are centralised in `scripts/core/mode-config.sh`.
- Protocol heuristics for ONVIF/RTMP/HLS/WebRTC/SRT are implemented in `scripts/camsniff.sh` under `probe_additional_protocols`; adjust or extend them there.
## IVRE Integration
CamSniff includes full integration with [IVRE](https://ivre.rocks), an open-source network reconnaissance framework that stores scan results in MongoDB for advanced querying, analysis, and visualization.
### Features
The IVRE integration provides:
- **Fully automatic setup**: MongoDB and IVRE are installed and configured automatically when using `--extra ivre`
- **Automated schema mapping**: Discovery data is automatically converted to IVRE's Nmap-compatible format
- **Vendor enrichment**: MAC address-based vendor identification from `data/catalog/paths.csv`
- **Credential tracking**: Successful authentication attempts are tagged and searchable
- **Thumbnail references**: Links to captured camera snapshots are stored in host metadata
- **CVE tracking**: Known vulnerabilities are associated with discovered cameras
- **Protocol categorization**: Cameras are tagged by supported protocols (RTSP, ONVIF, CoAP, WebRTC, SRT)
### Automatic Usage
Simply add `--extra ivre` to any CamSniff scan:
```bash
sudo scripts/camsniff.sh --mode medium --extra ivre --yes
```
CamSniff will automatically:
1. Check if IVRE is installed
2. Install MongoDB if needed
3. Create Python virtual environment
4. Install IVRE Python packages
5. Initialize IVRE databases
6. Sync discovery results after the scan
No additional configuration is required!
### Manual Operations
The unified IVRE manager handles all operations:
```bash
# Check IVRE status
scripts/integrations/ivre-manager.sh check
# Manual setup (if needed)
sudo scripts/integrations/ivre-manager.sh setup
# Ingest specific run
scripts/integrations/ivre-manager.sh ingest dev/results/20251010T215139Z/discovery.json
# Bulk ingest all historical runs
scripts/integrations/ivre-manager.sh bulk-ingest
# Show summary statistics
scripts/integrations/ivre-manager.sh summary
# Export results
scripts/integrations/ivre-manager.sh export json > cameras.json
scripts/integrations/ivre-manager.sh export csv > cameras.csv
```
### Querying IVRE Data
Use the query helper for common analysis:
```bash
# Use the original query script for detailed analysis
scripts/ivre-query.sh summary
scripts/ivre-query.sh vendors
scripts/ivre-query.sh credentials
scripts/ivre-query.sh dashboard
```
Or access IVRE directly:
```bash
source venv/bin/activate
# Show all CamSniff discoveries
ivre scancli --category camsniff
# Filter by vendor
ivre scancli --category vendor:hikvision
# Show cameras with credentials
ivre scancli --category credentials-found
# Export to JSON
ivre scancli --category camsniff --json > all_cameras.json
```
### IVRE Web Interface
Launch the web interface for interactive exploration:
```bash
scripts/ivre-query.sh web
# Or directly:
source venv/bin/activate
ivre httpd
```
Access at `http://localhost:8080` to view interactive maps, statistics, and detailed host information.
### Schema Details
CamSniff maps discovery data into IVRE with these fields:
**Host-level scripts:**
- `camsniff-summary`: Mode, network, sources, vendor, credentials, protocols
- `camsniff-vendor`: Company, model, CVEs, credentials (if found)
- `camsniff-protocols`: List of detected protocols (ONVIF, CoAP, etc.)
- `camsniff-rtsp-responses`: RTSP probe results
**Categories (tags):**
- `camsniff`: All CamSniff hosts
- `camsniff-mode:<name>`: Hosts discovered in specific mode
- `vendor:<company>`: Hosts from specific vendor
- `credentials-found`: Hosts with successful authentication
**Credential structure:**
```json
{
"username": "admin",
"password": "12345",
"method": "rtsp",
"rtsp_url": "rtsp://...",
"http_url": "http://...",
"thumbnail": "/path/to/snapshot.jpg"
}
```
### Troubleshooting
**Check IVRE status:**
```bash
scripts/integrations/ivre-manager.sh check
```
**Re-setup IVRE:**
```bash
sudo scripts/integrations/ivre-manager.sh setup
```
**View sync logs:**
```bash
tail -f dev/results/*/logs/ivre-sync.log
```
**Clear all CamSniff data:**
```bash
source venv/bin/activate
ivre scancli --category camsniff --delete
```
|
dev-helpers.md
|
docs/dev-helpers.md
|
.md
| 806
|
## Development helpers
The top-level `Makefile` bundles a few convenience targets:
```bash
make build # dpkg-buildpackage -us -uc (Debian package build)
make clean # drop build artefacts and staging directories
make lint # shellcheck + bash -n across project scripts
make dev # run lint plus a smoke dpkg-buildpackage --dry-run
```
All targets respect the repository layout, so you can iterate locally before publishing `.deb` builds.
Key entrypoints in the tree:
* `scripts/camsniff.sh` — orchestrator (call via `sudo`).
* `scripts/core/` — mode/port profiles and shared knobs.
* `scripts/setup/` — dependency/bootstrap helpers.
* `scripts/probes/` — credential probe + SSDP/ONVIF helpers.
* `scripts/tools/analyze.sh` — quick stats for `dev/results/<run>/`.
|
rtsp-urls.txt
|
data/dictionaries/rtsp-urls.txt
|
.txt
| 3,510
|
#!comment: The following dictionary contains a list of well-known RTSP URLs
#!comment: used by common video surveillance equipment.
/
/0
/0/video1
/0/profile2/media.smp
/1
/1.AMP
/1/1
/1/1:1/main
/1/2
/1/cif
/1/h264major
/1/stream1
/1/profile2/media.smp
/11
/12
/4
/CAM_ID.password.mp2
/CH001.sdp
/CH002.sdp
/GetData.cgi
/H264
/HighResolutionVideo
/HighResolutionvideo
/Image.jpg
/LiveChannel/0/media.smp
/LiveChannel/1/media.smp
/LowResolutionVideo
/MJPEG.cgi
/MediaInput/h264
/MediaInput/h264/stream_1
/MediaInput/mpeg4
/ONVIF/MediaInput
/ONVIF/channel1
/PSIA/Streaming/channels/0?videoCodecType=H.264
/PSIA/Streaming/channels/1
/PSIA/Streaming/channels/1?videoCodecType=MPEG4
/PSIA/Streaming/channels/h264
/Possible
/ROH/channel/11
/Streaming/Channels/1
/Streaming/Channels/101
/Streaming/Channels/102
/Streaming/Channels/103
/Streaming/Channels/2
/Streaming/Unicast/channels/101
/Streaming/channels/101
/Video?Codec=MPEG4&Width=720&Height=576&Fps=30
/VideoInput/1/h264/1
/access_code
/access_name_for_stream_1_to_5
/av0_0
/av0_1
/av2
/avn=2
/axis-media/media.amp
/axis-media/media.amp?videocodec=h264&resolution=640x480
/axis-media/media.amp?videocodec=h265
/cam
/cam/realmonitor
/cam/realmonitor?channel=1&subtype=0
/cam/realmonitor?channel=1&subtype=00
/cam/realmonitor?channel=1&subtype=01
/cam/realmonitor?channel=1&subtype=1
/cam/realmonitor?channel=1&subtype=0&unicast=true&proto=Onvif
/cam0_0
/cam0_1
/cam1/h264
/cam1/h264/multicast
/cam1/mjpeg
/cam1/mpeg4
/cam1/onvif-h264
/cam4/mpeg4
/camera.stm
/cgi-bin/viewer/video.jpg?resolution=640x480
/ch0
/ch0.h264
/ch001.sdp
/ch01.264
/ch0_0.h264
/ch0_unicast_firststream
/ch0_unicast_secondstream
/ch1/main/av_stream
/ch1/sub/av_stream
/channel1
/dms.jpg
/dms?nowprofileid=2
/h264
/h264.sdp
/h264/ch1/main/av_stream
/h264/ch1/sub/av_stream
/h264/ch1/sub/
/h264/media.amp
/h264Preview_01_main
/h264Preview_01_sub
/h265Preview_01_main
/h265Preview_01_sub
/h264_vga.sdp
/image.jpg
/image.mpg
/image/jpeg.cgi
/img/media.sav
/img/video.asf
/img/video.sav
/ioImage/1
/ipcam.sdp
/ipcam/stream.cgi?nowprofileid=2
/ipcam_h264.sdp
/jpg/image.jpg?size=3
/live
/live.sdp
/live/av0
/live/ch0
/live/ch00_0
/live/ch00_1
/live/ch1
/live/ch2
/live/h264
/live/h264/ch1
/live/main
/live/mpeg4
/live/sub
/live0.264
/live1.264
/live1.sdp
/live2.sdp
/live3.sdp
/live_h264.sdp
/live_mpeg4.sdp
/livestream
/livestream/
/media
/media.amp
/media/media.amp
/media/video1
/media/video2
/media/video3
/medias1
/mjpeg.cgi
/mjpeg/media.smp
/mobotix.mjpeg
/mp4
/mpeg4
/mpeg4/1/media.amp
/mpeg4/media.amp
/mpeg4/media.amp?resolution=640x480
/mpeg4/media.smp
/mpeg4cif
/mpeg4unicast
/mpg4/rtsp.amp
/multicaststream
/multicast/stream0/mobotix.mjpeg
/now.mp4
/nph-h264.cgi
/nphMpeg4/g726-640x
/nphMpeg4/g726-640x480
/nphMpeg4/nil-320x240
/onvif-media/media.amp
/onvif/live/2
/onvif1
/onvif2
/onvif/profile1/media.smp
/play1.sdp
/play2.sdp
/profile
/profile1
/profile2
/profile3/media.smp
/recognizer
/rtpvideo1.sdp
/rtsp_tunnel
/rtsph264
/rtsph2641080p
/stream1
/stream2
/stream3
/streaming/mjpeg
/synthesizer
/tcp/av0_0
/ucast/11
/unicast/c1/s0/live
/unicast/c1/s1/live
/user.pin.mp2
/user_defined
/video
/video.3gp
/video.cgi
/video.cgi?resolution=VGA
/video.cgi?resolution=vga
/video.h264
/video.mjpg
/video.mp4
/video.pro1
/video.pro2
/video.pro3
/video/mjpg.cgi
/video1
/video1+audio1
/video2.mjpg
/videoMain
/videoSub
/videostream.asf
/videostream.cgi
/videostream.cgi?rate=0
/videoinput_1:0/h264_1/onvif.stm
/vis
/wfov
/user=admin_password=tlJwpbo6_channel=1_stream=0.sdp?real_stream
|
http-paths.txt
|
data/dictionaries/http-paths.txt
|
.txt
| 4,217
|
# template|port|channel|stream|label
http://{{username}}:{{password}}@{{ip_address}}/snapshot.jpg|80|1|0|generic snapshot
http://{{username}}:{{password}}@{{ip_address}}/image.jpg|80|1|0|generic image
http://{{username}}:{{password}}@{{ip_address}}/jpg/image.jpg|80|1|0|grandstream image
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/snapshot.cgi|80|1|0|generic cgi snapshot
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/api.cgi?cmd=Snap&channel={{channel}}&rs={{stream}}|80|1|0|reolink api
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/snapshot.cgi?channel={{channel}}&subtype={{stream}}|80|1|0|dahua subtype snapshot
http://{{username}}:{{password}}@{{ip_address}}/Streaming/channels/{{channel}}01/picture|80|1|0|hikvision legacy snapshot
http://{{username}}:{{password}}@{{ip_address}}/ISAPI/Streaming/channels/{{channel}}01/picture|80|1|0|hikvision isapi snapshot
http://{{username}}:{{password}}@{{ip_address}}/axis-cgi/jpg/image.cgi|80|1|0|axis jpg image
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/viewer/video.jpg|80|1|0|vivotek viewer
http://{{username}}:{{password}}@{{ip_address}}/webcapture.jpg?command=snap&channel={{channel}}|80|1|0|swann webcapture
http://{{username}}:{{password}}@{{ip_address}}/image/jpeg.cgi|80|1|0|panasonic/dlink jpeg
http://{{username}}:{{password}}@{{ip_address}}/GetData.cgi?CH={{channel}}&Codec=mjpeg|80|1|0|wirepath mjpeg
https://{{username}}:{{password}}@{{ip_address}}/cgi-bin/snapshot.cgi|443|1|0|https snapshot
http://{{username}}:{{password}}@{{ip_address}}/video.jpg|80|1|0|amcrest/generic snapshot
http://{{username}}:{{password}}@{{ip_address}}/onvif-http/snapshot?channel={{channel}}&stream={{stream}}|80|1|0|onvif snapshot
http://{{username}}:{{password}}@{{ip_address}}/snap.jpg|80|1|0|bosch snapshot
http://{{username}}:{{password}}@{{ip_address}}/record/current.jpg|80|1|0|mobotix current
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/faststream.jpg|80|1|0|mobotix faststream
http://{{username}}:{{password}}@{{ip_address}}/LAPI/V1.0/Channels/{{channel}}/Media/Video/Streams/{{stream}}/Snapshot|80|1|0|uniview lapi snapshot
http://{{username}}:{{password}}@{{ip_address}}/images/snapshot.jpg|80|1|0|uniview legacy
http://{{username}}:{{password}}@{{ip_address}}/jpeg|80|1|0|pelco sarix jpeg
http://{{username}}:{{password}}@{{ip_address}}/jpeg/pull|80|1|0|pelco sarix pull
http://{{username}}:{{password}}@{{ip_address}}/snapshot.jpg?user={{username}}&pwd={{password}}&strm={{channel}}|80|1|0|avtech snapshot
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/guest/Video.cgi?media=JPEG|80|1|0|geovision guest
http://{{username}}:{{password}}@{{ip_address}}/cam{{channel}}.jpg|80|1|0|geovision cam
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/mjpeg|80|1|0|basler mjpeg
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/media.cgi?action=getSnapshot|80|1|0|brickcom snapshot
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/CGIProxy.fcgi?cmd=snapPicture&usr={{username}}&pwd={{password}}|80|1|0|foscam cgi proxy
http://{{username}}:{{password}}@{{ip_address}}/oneshotimage.jpg|80|1|0|sony oneshot
http://{{username}}:{{password}}@{{ip_address}}/img/snapshot.cgi?size=3|80|1|0|cisco snapshot
http://{{username}}:{{password}}@{{ip_address}}/image|80|1|0|arecont/generic image
http://{{username}}:{{password}}@{{ip_address}}/tmpfs/auto.jpg|80|1|0|zkteco/generic
http://{{username}}:{{password}}@{{ip_address}}/api/v1/snap.cgi?chn=0|80|1|0|wansview api
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/net_jpeg.cgi?ch={{channel}}|80|1|0|wansview legacy
http://{{username}}:{{password}}@{{ip_address}}/snap.jpeg|80|1|0|ubiquiti anonymous
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/video.cgi?msubmenu=jpg|80|1|0|hanwha/samsung
http://{{username}}:{{password}}@{{ip_address}}/goform/video2|80|1|0|trendnet/linksys
http://{{username}}:{{password}}@{{ip_address}}/cgi-bin/jpg/image.cgi|80|1|0|trendnet jpg
http://{{username}}:{{password}}@{{ip_address}}/-wvhttp-01-/GetOneShot?frame_id=1|80|1|0|canon vb
http://{{username}}:{{password}}@{{ip_address}}/image/jpeg.cgi?profileid=1|80|1|0|dlink profile
http://{{username}}:{{password}}@{{ip_address}}/dms.jpg|80|1|0|dlink dms
|
passwords.txt
|
data/dictionaries/passwords.txt
|
.txt
| 907
|
admin
12345
123456
12345678
password
username
root
camera
000000
1111
1234
4321
9999
ubnt
pass
default
admin123
support
changeme
security
supervisor
system
user
guest
123456789
1234567890
888888
666666
777777
00000000
qwerty
letmein
admin1234
adminadmin
123qwe
1q2w3e4r
passw0rd
P@ssw0rd
password1
password123
camera123
guest123
monitor
surveillance
stream
onvif
vision
111111
1111111
222222
555555
123123
1234567
54321
123456789abc
1234567890a
a1234567
vizxv
xc3511
meinsm
service
technician
installer
install
setup
config
operator
manage
manager
realtime
upgrade
ipcam
ipcamera
cctv
dvr
nvr
hvr
xvr
hikvision
dahua
foscam
axis
samsung
panasonic
polycom
cisco
jvc
blue
ubiquiti
ms1234
ikwb
7ujMko0admin
tlJwpbo6
admin!123
Admin123
Admin@123
Password123
123456aA
1qaz2wsx
qazwsx
zxcvbn
asdfgh
147258
2580
0000
admin01
admin888
webadmin
sysadmin
master
superuser
pass@1234
klv123
klv1234
jido
system
actadmin
|
usernames.txt
|
data/dictionaries/usernames.txt
|
.txt
| 852
|
admin
Admin
ADMIN
administrator
Administrator
admin1
admin01
admin123
admin888
webadmin
sysadmin
root
Root
ROOT
superuser
superadmin
super
rootadmin
master
system
sys
service
service1
servicetech
support
support1
tech
techsupport
technician
installer
install
maintenance
supervisor
supervisor1
manager
man
operator
operator1
viewer
view
monitor
security
guard
guest
guest1
user
User
user1
user01
default
public
anonymous
demo
test
tester
debug
shell
bin
daemon
ftp
ftpuser
telnet
ubnt
ubiquiti
hik
hikvision
dahua
vizxv
amcrest
foscam
axis
polycom
cisco
realtek
bosch
sanyo
samsung
jvc
sony
mobotix
synnet
adv
kiosk
camera
cam
ipcam
ipcamera
webcam
cctv
dvr
nvr
hvr
xvr
onvif
video
stream
live
media
av
666666
888888
1111
1234
1000
1001
2000
12345
123456
udp
tcp
http
mac
monitor1
spy
owner
mother
father
meinsm
3xLogic
8888
6666
admin2
user2
operator2
|
cves.json
|
data/catalog/cves.json
|
.json
| 14,311
|
[
{
"id": "CVE-2025-60855",
"severity": "Critical",
"cvss": 9.8,
"summary": "Reolink Video Doorbell Wi-Fi (DB_566128M5MP_W) performs insufficient validation of firmware update signatures, allowing remote attackers to upload malicious images and achieve root RCE.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-60855"]
},
{
"id": "CVE-2025-60856",
"severity": "High",
"cvss": 7.6,
"summary": "Reolink Video Doorbell Wi-Fi exposes an unsecured UART serial console that grants direct root shell access without authentication to attackers with physical access.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-60856"]
},
{
"id": "CVE-2025-31700",
"severity": "Critical",
"cvss": 9.8,
"summary": "Dahua ONVIF request handler stack-based buffer overflow allowing unauthenticated remote code execution (RCE) via crafted packets.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-31700"]
},
{
"id": "CVE-2025-39247",
"severity": "Critical",
"cvss": 9.8,
"summary": "Hikvision HikCentral Professional access control bypass allowing unauthenticated remote attackers to gain full administrative privileges.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-39247"]
},
{
"id": "CVE-2025-30023",
"severity": "Critical",
"cvss": 9.0,
"summary": "Axis Camera Station Pro and Device Manager critical remote code execution (RCE) vulnerability via the proprietary 'Remoting' protocol.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-30023"]
},
{
"id": "CVE-2025-34065",
"severity": "Critical",
"cvss": 9.8,
"summary": "AVTECH IP cameras and NVRs authentication bypass in the 'streamd' web server via URL manipulation (e.g., /nobody/..).",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-34065"]
},
{
"id": "CVE-2025-34067",
"severity": "Critical",
"cvss": 10.0,
"summary": "Hikvision Integrated Security Management Platform deserialization vulnerability via Fastjson, leading to unauthenticated RCE.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-34067"]
},
{
"id": "CVE-2025-4975",
"severity": "High",
"cvss": 8.8,
"summary": "TP-Link Tapo Android app contains a privilege escalation vulnerability where interacting with a 'low battery' notification on a shared device grants full power control permissions.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-4975"]
},
{
"id": "CVE-2025-1099",
"severity": "High",
"cvss": 7.5,
"summary": "TP-Link Tapo C500 Wi-Fi cameras contain a hardcoded RSA private key in the firmware, enabling man-in-the-middle (MitM) attacks against device communications.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-1099"]
},
{
"id": "CVE-2025-9383",
"severity": "Critical",
"cvss": 9.8,
"summary": "FNKvision Y215 CCTV Camera critical weakness in /etc/passwd handling allowing unauthenticated root access.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-9383"]
},
{
"id": "CVE-2025-1316",
"severity": "Critical",
"cvss": 9.8,
"summary": "Edimax IC-7100 and related IoT devices allow unauthenticated remote code execution, actively exploited by Mirai botnets.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-1316"]
},
{
"id": "CVE-2025-5572",
"severity": "Critical",
"cvss": 8.7,
"summary": "D-Link DCS-932L stack-based buffer overflow via setSystemEmail parameter allows unauthenticated RCE.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2025-5572"]
},
{
"id": "CVE-2024-8956",
"severity": "Critical",
"cvss": 9.1,
"summary": "PTZOptics camera authentication bypass allows unauthenticated remote attackers to overwrite configuration and gain control.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2024-8956"]
},
{
"id": "CVE-2024-6476",
"severity": "Medium",
"cvss": 4.2,
"summary": "Axis Camera Station Pro privilege escalation via file deletion redirect during service restart.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2024-6476"]
},
{
"id": "CVE-2023-28478",
"severity": "Critical",
"cvss": 9.8,
"summary": "TP-Link Kasa EC70 Spot Pan Tilt cameras contain a stack-based buffer overflow in the authentication header, allowing unauthenticated remote code execution as root.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2023-28478"]
},
{
"id": "CVE-2023-31994",
"severity": "High",
"cvss": 7.5,
"summary": "Hanwha Vision (Samsung) cameras (A/X/P series) are vulnerable to Denial of Service (DoS) via empty UDP packets sent to the WS-Discovery service.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2023-31994"]
},
{
"id": "CVE-2023-47353",
"severity": "High",
"cvss": 8.8,
"summary": "Imou GO (Dahua) Android app arbitrary file download vulnerability.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2023-47353"]
},
{
"id": "CVE-2023-51625",
"severity": "High",
"cvss": 8.0,
"summary": "D-Link DCS-8300LHV2 ONVIF command injection via malicious XML timezone parameters.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2023-51625"]
},
{
"id": "CVE-2023-26609",
"severity": "High",
"cvss": 7.2,
"summary": "ABUS TVIP cameras allow RCE via /cgi-bin/mft/wireless_mft.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2023-26609"]
},
{
"id": "CVE-2023-39509",
"severity": "High",
"cvss": 7.2,
"summary": "Bosch IP cameras command injection for authenticated administrators.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2023-39509"]
},
{
"id": "CVE-2022-30525",
"severity": "Critical",
"cvss": 9.8,
"summary": "Ubiquiti Edge devices allow remote code execution through crafted HTTP requests.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2022-30525"]
},
{
"id": "CVE-2022-37255",
"severity": "Critical",
"cvss": 9.8,
"summary": "TP-Link Tapo C310 cameras (firmware 1.3.0) use hardcoded RTSP credentials, allowing any unauthenticated network user to view the live video feed.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2022-37255"]
},
{
"id": "CVE-2022-21199",
"severity": "High",
"cvss": 7.5,
"summary": "Reolink RLC-410W cameras allow unauthenticated information disclosure via the 'netserver' service, leaking device configuration details.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2022-21199"]
},
{
"id": "CVE-2022-27145",
"severity": "High",
"cvss": 8.8,
"summary": "Vivotek cameras allow remote command injection through crafted CGI parameters.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2022-27145"]
},
{
"id": "CVE-2022-38700",
"severity": "High",
"cvss": 8.8,
"summary": "OpenHarmony OS (used in various smart cameras) authentication bypass in multimedia subsystem.",
"references": ["https://app.opencve.io/cve/CVE-2022-38700"]
},
{
"id": "CVE-2021-36260",
"severity": "Critical",
"cvss": 9.8,
"summary": "Hikvision cameras and NVRs command injection vulnerability in the web server component.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2021-36260"]
},
{
"id": "CVE-2021-28372",
"severity": "Critical",
"cvss": 9.6,
"summary": "ThroughTek Kalay P2P SDK remote code execution vulnerability affects millions of IoT devices (Wyze, OEM cams).",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2021-28372"]
},
{
"id": "CVE-2021-40127",
"severity": "High",
"cvss": 8.1,
"summary": "Reolink IP cameras allow authentication bypass via predictable session tokens.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2021-40127"]
},
{
"id": "CVE-2021-33044",
"severity": "High",
"cvss": 8.8,
"summary": "Uniview NVR allows remote code execution via crafted RPC call.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2021-33044"]
},
{
"id": "CVE-2020-25506",
"severity": "High",
"cvss": 9.1,
"summary": "Dahua cameras allow remote command execution via crafted ONVIF requests.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-25506"]
},
{
"id": "CVE-2020-8190",
"severity": "High",
"cvss": 8.8,
"summary": "Ubiquiti UniFi Video cameras vulnerable to authentication bypass on the management API.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-8190"]
},
{
"id": "CVE-2020-13545",
"severity": "High",
"cvss": 8.1,
"summary": "Hanwha Techwin Wisenet devices allow stack-based buffer overflow via crafted HTTP request.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-13545"]
},
{
"id": "CVE-2020-25169",
"severity": "High",
"cvss": 7.5,
"summary": "Reolink P2P cameras do not sufficiently protect data transfers, allowing attackers to reconstruct cleartext video/audio streams from captured P2P traffic.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-25169"]
},
{
"id": "CVE-2020-19054",
"severity": "High",
"cvss": 8.6,
"summary": "Foscam cameras vulnerable to stack overflow via RTSP DESCRIBE command.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-19054"]
},
{
"id": "CVE-2020-10964",
"severity": "High",
"cvss": 8.1,
"summary": "Uniview devices vulnerable to authentication bypass in web management interface.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-10964"]
},
{
"id": "CVE-2020-12271",
"severity": "Critical",
"cvss": 9.8,
"summary": "Geovision GV-Control Center stack-based buffer overflow allowing RCE.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2020-12271"]
},
{
"id": "CVE-2019-15223",
"severity": "High",
"cvss": 8.8,
"summary": "Axis network cameras allow remote code execution due to insufficient sanitisation of the action parameter.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-15223"]
},
{
"id": "CVE-2019-9483",
"severity": "Critical",
"cvss": 9.1,
"summary": "Amazon Ring Video Doorbell Pro mishandles encryption during setup, allowing nearby attackers to intercept Wi-Fi credentials and spoof video feeds.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-9483"]
},
{
"id": "CVE-2019-5035",
"severity": "High",
"cvss": 8.8,
"summary": "Google Nest Cam IQ Indoor (Weave protocol) allows brute-forcing of the pairing code, potentially giving an attacker full control over the device.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-5035"]
},
{
"id": "CVE-2019-3949",
"severity": "High",
"cvss": 7.6,
"summary": "Arlo Base Stations (VMB4000/5000) lack sufficient physical protection on the UART interface, allowing attackers with physical access to obtain a root shell.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-3949"]
},
{
"id": "CVE-2019-3950",
"severity": "High",
"cvss": 8.8,
"summary": "Arlo Base Stations expose a 'passthru' API endpoint that allows authenticated users to upload arbitrary files, leading to potential code execution.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-3950"]
},
{
"id": "CVE-2019-3948",
"severity": "High",
"cvss": 9.8,
"summary": "Multiple Dahua OEM products allow remote command execution due to improper authentication.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-3948"]
},
{
"id": "CVE-2019-12223",
"severity": "High",
"cvss": 7.8,
"summary": "Hanwha Techwin (Samsung) NVRs allow a system crash and reboot (DoS) by submitting a username exceeding 117 characters.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2019-12223"]
},
{
"id": "CVE-2018-6298",
"severity": "Critical",
"cvss": 10.0,
"summary": "Hanwha Techwin (Samsung) SmartCam devices allow remote code execution with root privileges due to improper input validation in the media server.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2018-6298"]
},
{
"id": "CVE-2018-6299",
"severity": "High",
"cvss": 7.5,
"summary": "Hanwha Techwin (Samsung) SmartCam devices allow authentication bypass, enabling attackers to register new administrative accounts without credentials.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2018-6299"]
},
{
"id": "CVE-2018-10660",
"severity": "High",
"cvss": 8.8,
"summary": "Axis Camera Station and device firmware vulnerable to directory traversal allowing arbitrary file read.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2018-10660"]
},
{
"id": "CVE-2018-9995",
"severity": "Critical",
"cvss": 9.8,
"summary": "TBK/Novo/Many-OEM DVRs authentication bypass via Cookie: uid=admin.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2018-9995"]
},
{
"id": "CVE-2017-7921",
"severity": "High",
"cvss": 8.8,
"summary": "Hikvision devices (and LaView/Annke OEMs) expose backdoor credentials allowing unauthenticated remote access.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2017-7921"]
},
{
"id": "CVE-2017-8229",
"severity": "High",
"cvss": 8.8,
"summary": "Amcrest cameras expose telnet interface with hardcoded credentials allowing root access.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2017-8229"]
},
{
"id": "CVE-2017-9763",
"severity": "Critical",
"cvss": 9.8,
"summary": "Grandstream cameras contain hidden telnet backdoor credentials enabling full compromise.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2017-9763"]
},
{
"id": "CVE-2015-2884",
"severity": "Critical",
"cvss": 9.8,
"summary": "Vivotek (and LaView OEM) cameras contain a buffer overflow in the RTSP service, allowing remote attackers to execute arbitrary code via long strings.",
"references": ["https://nvd.nist.gov/vuln/detail/CVE-2015-2884"]
}
]
|
example-targets.json
|
data/examples/example-targets.json
|
.json
| 81
|
{
"targets": [
"192.168.1.0/24",
"10.0.0.1",
"172.16.0.0/28"
]
}
|
example-targets.txt
|
data/examples/example-targets.txt
|
.txt
| 213
|
# Example target file for CamSniff
# One IP address or CIDR range per line
# Lines starting with # are comments
# Local network scan
192.168.1.0/24
# Specific IP address
10.0.0.1
# Another subnet
172.16.0.0/28
|
README.md
|
data/vendors/README.md
|
.md
| 588
|
Vendor dictionaries
===================
Each vendor directory can include two optional files:
- `http-paths.txt` for HTTP snapshot templates
- `rtsp-paths.txt` for RTSP stream templates
Format
------
HTTP entries:
```
template|port|channel|stream|label
```
RTSP entries:
```
template|port|channel|stream|transport|label
```
Templates may include `{{ip_address}}`, `{{username}}`, `{{password}}`,
`{{port}}`, `{{channel}}`, and `{{stream}}`.
Notes
-----
- Keep lists short and high-signal.
- Prefer paths confirmed by vendor docs or field testing.
- Avoid including credentials.
|
rtsp-paths.txt
|
data/vendors/axis/rtsp-paths.txt
|
.txt
| 333
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/axis-media/media.amp|554|1|0|tcp|axis-media
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/axis-media/media.amp?videocodec=h264|554|1|0|tcp|axis-h264
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/axis-media/media.amp?videocodec=h265|554|1|0|tcp|axis-h265
|
http-paths.txt
|
data/vendors/axis/http-paths.txt
|
.txt
| 318
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/axis-cgi/jpg/image.cgi|80|1|0|axis-image
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/axis-cgi/mjpg/video.cgi|80|1|0|axis-mjpeg
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/axis-cgi/jpg/image.cgi?resolution=640x480|80|1|0|axis-image-640
|
rtsp-paths.txt
|
data/vendors/avigilon/rtsp-paths.txt
|
.txt
| 291
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/defaultPrimary|554|1|0|tcp|default-primary
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/defaultSecondary|554|1|1|tcp|default-secondary
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live.sdp|554|1|0|tcp|live-sdp
|
http-paths.txt
|
data/vendors/avigilon/http-paths.txt
|
.txt
| 244
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snap.jpg|80|1|0|snap
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/image.jpg|80|1|0|image
|
rtsp-paths.txt
|
data/vendors/bosch/rtsp-paths.txt
|
.txt
| 269
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/rtsp_tunnel|554|1|0|tcp|rtsp-tunnel
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live.sdp|554|1|0|tcp|live-sdp
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/video.sdp|554|1|0|tcp|video-sdp
|
http-paths.txt
|
data/vendors/bosch/http-paths.txt
|
.txt
| 244
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snap.jpg|80|1|0|snap
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/image.jpg|80|1|0|image
|
rtsp-paths.txt
|
data/vendors/sony/rtsp-paths.txt
|
.txt
| 277
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/media/video1|554|1|0|tcp|media-video1
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/media/video2|554|1|1|tcp|media-video2
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live.sdp|554|1|0|tcp|live-sdp
|
http-paths.txt
|
data/vendors/sony/http-paths.txt
|
.txt
| 254
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/image.jpg|80|1|0|image
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/image/jpeg.cgi|80|1|0|jpeg-cgi
|
rtsp-paths.txt
|
data/vendors/geovision/rtsp-paths.txt
|
.txt
| 263
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live/av0|554|1|0|tcp|live-av0
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live/ch0|554|1|0|tcp|live-ch0
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live/main|554|1|0|tcp|live-main
|
http-paths.txt
|
data/vendors/geovision/http-paths.txt
|
.txt
| 268
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/Image.jpg|80|1|0|image
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/jpeg/image.jpg|80|1|0|jpeg-image
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi
|
rtsp-paths.txt
|
data/vendors/vivotek/rtsp-paths.txt
|
.txt
| 265
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live.sdp|554|1|0|tcp|live-sdp
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live1.sdp|554|1|0|tcp|live1-sdp
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live2.sdp|554|1|1|tcp|live2-sdp
|
http-paths.txt
|
data/vendors/vivotek/http-paths.txt
|
.txt
| 309
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/viewer/video.jpg|80|1|0|viewer-jpg
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/viewer/video.jpg?resolution=640x480|80|1|0|viewer-jpg-640
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
|
rtsp-paths.txt
|
data/vendors/dahua/rtsp-paths.txt
|
.txt
| 351
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/cam/realmonitor?channel={{channel}}&subtype={{stream}}|554|1|0|tcp|realmonitor-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/cam/realmonitor?channel={{channel}}&subtype=1|554|1|1|tcp|realmonitor-sub
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live|554|1|0|tcp|live
|
http-paths.txt
|
data/vendors/dahua/http-paths.txt
|
.txt
| 353
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi?channel={{channel}}|80|1|0|snapshot-channel
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapManager.cgi?action=snap&channel={{channel}}|80|1|0|snap-manager
|
rtsp-paths.txt
|
data/vendors/uniview/rtsp-paths.txt
|
.txt
| 298
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/unicast/c1/s0/live|554|1|0|tcp|unv-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/unicast/c1/s1/live|554|1|1|tcp|unv-sub
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/Channels/101|554|101|0|tcp|stream-101
|
http-paths.txt
|
data/vendors/uniview/http-paths.txt
|
.txt
| 306
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi?channel={{channel}}|80|1|0|snapshot-channel
|
rtsp-paths.txt
|
data/vendors/lorex/rtsp-paths.txt
|
.txt
| 351
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/cam/realmonitor?channel={{channel}}&subtype={{stream}}|554|1|0|tcp|realmonitor-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/cam/realmonitor?channel={{channel}}&subtype=1|554|1|1|tcp|realmonitor-sub
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/live|554|1|0|tcp|live
|
http-paths.txt
|
data/vendors/lorex/http-paths.txt
|
.txt
| 317
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapManager.cgi?action=snap&channel={{channel}}|80|1|0|snap-manager
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
|
rtsp-paths.txt
|
data/vendors/hanwha/rtsp-paths.txt
|
.txt
| 263
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/onvif1|554|1|0|tcp|onvif1
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/onvif2|554|1|1|tcp|onvif2
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/profile1/media.smp|554|1|0|tcp|profile1
|
http-paths.txt
|
data/vendors/hanwha/http-paths.txt
|
.txt
| 278
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/stw-cgi/image.cgi|80|1|0|stw-image
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/image/jpeg.cgi|80|1|0|jpeg-cgi
|
rtsp-paths.txt
|
data/vendors/amcrest/rtsp-paths.txt
|
.txt
| 272
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/cam/realmonitor?channel={{channel}}&subtype={{stream}}|554|1|0|tcp|realmonitor-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/cam/realmonitor?channel={{channel}}&subtype=1|554|1|1|tcp|realmonitor-sub
|
http-paths.txt
|
data/vendors/amcrest/http-paths.txt
|
.txt
| 353
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi?channel={{channel}}|80|1|0|snapshot-channel
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapManager.cgi?action=snap&channel={{channel}}|80|1|0|snap-manager
|
rtsp-paths.txt
|
data/vendors/hikvision/rtsp-paths.txt
|
.txt
| 314
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/Channels/101|554|101|0|tcp|stream-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/Channels/102|554|102|1|tcp|stream-sub
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/h264/ch1/main/av_stream|554|1|0|tcp|h264-main
|
http-paths.txt
|
data/vendors/hikvision/http-paths.txt
|
.txt
| 351
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/ISAPI/Streaming/channels/101/picture|80|101|0|isapi-picture-main
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/ISAPI/Streaming/channels/102/picture|80|102|1|isapi-picture-sub
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/channels/1/picture|80|1|0|legacy-picture
|
rtsp-paths.txt
|
data/vendors/panasonic/rtsp-paths.txt
|
.txt
| 301
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/MediaInput/h264|554|1|0|tcp|media-h264
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/MediaInput/h264/stream_1|554|1|0|tcp|media-h264-1
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/MediaInput/mpeg4|554|1|0|tcp|media-mpeg4
|
http-paths.txt
|
data/vendors/panasonic/http-paths.txt
|
.txt
| 289
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/SnapshotJPEG|80|1|0|snapshotjpeg
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/SnapshotJPEG?Resolution=640x480|80|1|0|snapshotjpeg-640
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
|
rtsp-paths.txt
|
data/vendors/ezviz/rtsp-paths.txt
|
.txt
| 314
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/Channels/101|554|101|0|tcp|stream-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/Channels/102|554|102|1|tcp|stream-sub
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/h264/ch1/main/av_stream|554|1|0|tcp|h264-main
|
http-paths.txt
|
data/vendors/ezviz/http-paths.txt
|
.txt
| 351
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/ISAPI/Streaming/channels/101/picture|80|101|0|isapi-picture-main
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/ISAPI/Streaming/channels/102/picture|80|102|1|isapi-picture-sub
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/channels/1/picture|80|1|0|legacy-picture
|
rtsp-paths.txt
|
data/vendors/reolink/rtsp-paths.txt
|
.txt
| 202
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/h264Preview_01_main|554|1|0|tcp|preview-main
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/h264Preview_01_sub|554|1|1|tcp|preview-sub
|
http-paths.txt
|
data/vendors/reolink/http-paths.txt
|
.txt
| 235
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/api.cgi?cmd=Snap&channel={{channel}}|80|0|0|reolink-snap
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/api.cgi?cmd=Snap&channel=0|80|0|0|reolink-snap0
|
rtsp-paths.txt
|
data/vendors/tiandy/rtsp-paths.txt
|
.txt
| 279
|
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/profile1|554|1|0|tcp|profile1
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/profile2|554|1|1|tcp|profile2
rtsp://{{username}}:{{password}}@{{ip_address}}:{{port}}/Streaming/Channels/101|554|101|0|tcp|stream-101
|
http-paths.txt
|
data/vendors/tiandy/http-paths.txt
|
.txt
| 281
|
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.jpg|80|1|0|snapshot
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/snapshot.cgi|80|1|0|snapshot-cgi
http://{{username}}:{{password}}@{{ip_address}}:{{port}}/cgi-bin/snapshot.cgi|80|1|0|snapshot-cgi-legacy
|
requirements.txt
|
scripts/requirements.txt
|
.txt
| 128
|
bottle==0.13.4
cffi==2.0.0
cryptography==46.0.2
dnspython==2.8.0
ivre==0.9.20
pycparser==2.23
pymongo==4.15.3
pyOpenSSL==25.3.0
|
ivre-sync.py
|
scripts/integrations/ivre-sync.py
|
.py
| 19,685
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""CamSniff to IVRE integration bridge."""
from __future__ import annotations
import argparse
import csv
import datetime as dt
import json
import sys
from pathlib import Path
from typing import Any, Dict, List, Optional, Set
def build_parser() -> argparse.ArgumentParser:
parser = argparse.ArgumentParser(
description="Sync CamSniff discovery data into IVRE"
)
parser.add_argument(
"--input",
required=True,
help="Path to CamSniff discovery.json",
)
parser.add_argument(
"--mode", required=True, help="CamSniff mode label"
)
parser.add_argument(
"--network", required=True, help="Network scope string"
)
parser.add_argument(
"--run-dir",
required=True,
help="Run directory for this execution",
)
parser.add_argument(
"--timestamp",
required=True,
help="UTC timestamp in YYYYMMDDTHHMMSSZ format",
)
parser.add_argument(
"--log",
required=True,
help="Log file to append integration status",
)
parser.add_argument(
"--credentials",
help="Path to CamSniff credentials.json (optional)",
)
parser.add_argument(
"--paths-csv",
help="Path to paths.csv for vendor mapping (optional)",
)
return parser
def utc_now() -> str:
return dt.datetime.now(dt.UTC).isoformat().replace("+00:00", "Z")
def log_line(log_path: Path, message: str) -> None:
log_path.parent.mkdir(parents=True, exist_ok=True)
with log_path.open("a", encoding="utf-8") as handle:
handle.write(f"{utc_now()} {message}\n")
def normalise_port(value: Any) -> int | None:
if value is None:
return None
if isinstance(value, int):
if 0 <= value <= 65535:
return value
return None
if isinstance(value, float):
value_int = int(value)
if 0 <= value_int <= 65535:
return value_int
return None
if isinstance(value, str):
stripped = value.strip()
if not stripped:
return None
try:
value_int = int(stripped, 10)
except ValueError:
return None
if 0 <= value_int <= 65535:
return value_int
return None
def load_vendor_database(
paths_csv: Optional[Path],
) -> Dict[str, Dict[str, str]]:
vendor_db: Dict[str, Dict[str, str]] = {}
if not paths_csv or not paths_csv.is_file():
return vendor_db
try:
with paths_csv.open("r", encoding="utf-8") as handle:
reader = csv.DictReader(handle)
for row in reader:
company = row.get("company", "").strip()
model = row.get("model", "").strip()
oui_regex = row.get("oui_regex", "").strip()
if not company or not oui_regex:
continue
oui_list = oui_regex.strip("()").split("|")
for oui in oui_list:
oui_clean = oui.strip().upper()
if oui_clean:
vendor_db[oui_clean] = {
"company": company,
"model": model,
"cve_ids": row.get("cve_ids", ""),
}
except Exception:
pass
return vendor_db
def match_vendor_by_mac(
mac: Optional[str], vendor_db: Dict[str, Dict[str, str]]
) -> Optional[Dict[str, str]]:
if not mac or not vendor_db:
return None
mac_upper = mac.strip().upper().replace("-", ":")
oui = ":".join(mac_upper.split(":")[:3])
return vendor_db.get(oui)
def load_credentials(
credentials_json: Optional[Path],
) -> Dict[str, Dict[str, Any]]:
creds_db: Dict[str, Dict[str, Any]] = {}
if not credentials_json or not credentials_json.is_file():
return creds_db
try:
with credentials_json.open("r", encoding="utf-8") as handle:
creds_list = json.load(handle)
for entry in creds_list:
ip_addr = entry.get("ip")
if not ip_addr:
continue
creds_db[ip_addr] = {
"success": entry.get("success", False),
"username": entry.get("username", ""),
"password": entry.get("password", ""),
"method": entry.get("method", ""),
"vendor": entry.get("vendor", "Unknown"),
"model": entry.get("model", "Unknown"),
"protocols": entry.get("protocols", []),
"rtsp_url": entry.get("rtsp_url", ""),
"http_url": entry.get("http_url", ""),
"thumbnail": entry.get("thumbnail", ""),
}
except Exception:
pass
return creds_db
def build_host_documents(
data: Dict[str, Any],
*,
mode: str,
network: str,
run_dir: str,
timestamp: dt.datetime,
vendor_db: Dict[str, Dict[str, str]],
creds_db: Dict[str, Dict[str, Any]],
) -> List[Dict[str, Any]]:
from ivre import xmlnmap # type: ignore
hosts = data.get("hosts", []) or []
documents: List[Dict[str, Any]] = []
ts_rendered = timestamp.strftime("%Y-%m-%d %H:%M:%S")
for host in hosts:
ip_addr = host.get("ip")
if not ip_addr:
continue
ports_field = host.get("ports", []) or []
ports_seen: Set[tuple[str, int]] = set()
port_documents: List[Dict[str, Any]] = []
for port_candidate in ports_field:
port_number = normalise_port(port_candidate)
if port_number is None:
continue
key = ("tcp", port_number)
if key in ports_seen:
continue
ports_seen.add(key)
entry: Dict[str, Any] = {
"protocol": "tcp",
"port": port_number,
"state_state": "open",
"state_reason": "script",
}
if port_number in {
80,
81,
88,
8000,
8001,
8080,
8081,
8443,
}:
entry["service_name"] = "http"
if port_number in {443, 7443, 8443, 9443, 10443}:
entry["service_name"] = "http"
entry["service_tunnel"] = "ssl"
if port_number == 554:
entry["service_name"] = "rtsp"
port_documents.append(entry)
rtsp_data = host.get("rtsp_bruteforce", {}) or {}
observed_paths = host.get("observed_paths", []) or []
additional_protocols = (
host.get("additional_protocols", []) or []
)
sources = host.get("sources", []) or []
mac_addr = host.get("mac")
vendor_info = (
match_vendor_by_mac(mac_addr, vendor_db)
if mac_addr
else None
)
cred_info = creds_db.get(ip_addr)
summary_lines = [
f"mode={mode}",
f"network={network}",
f"sources={','.join(sources) if sources else 'n/a'}",
]
if vendor_info:
summary_lines.append(f"vendor={vendor_info['company']}")
if vendor_info.get("model"):
summary_lines.append(f"model={vendor_info['model']}")
if vendor_info.get("cve_ids"):
summary_lines.append(f"cves={vendor_info['cve_ids']}")
elif cred_info:
summary_lines.append(
f"vendor={cred_info.get('vendor', 'Unknown')}"
)
summary_lines.append(
f"model={cred_info.get('model', 'Unknown')}"
)
if cred_info and cred_info.get("success"):
summary_lines.append("credentials=FOUND")
summary_lines.append(
f" username={cred_info['username']}"
)
summary_lines.append(
f" password={cred_info['password']}"
)
summary_lines.append(f" method={cred_info['method']}")
if cred_info.get("rtsp_url"):
summary_lines.append(
f" rtsp_url={cred_info['rtsp_url']}"
)
if cred_info.get("http_url"):
summary_lines.append(
f" http_url={cred_info['http_url']}"
)
if cred_info.get("thumbnail"):
summary_lines.append(
f" thumbnail={cred_info['thumbnail']}"
)
if ports_seen:
summary_lines.append(
"ports="
+ ",".join(
str(port)
for _, port in sorted(
ports_seen, key=lambda item: item[1]
)
)
)
if observed_paths:
summary_lines.append("observed_paths:")
for path in observed_paths[:10]:
summary_lines.append(f" - {path}")
if rtsp_data.get("discovered"):
summary_lines.append("rtsp_found:")
for url in rtsp_data["discovered"][:10]:
summary_lines.append(f" - {url}")
if additional_protocols:
summary_lines.append("protocol_hits:")
for proto in additional_protocols:
proto_name = proto.get("protocol", "unknown")
detail = proto.get("detail", "")
summary_lines.append(f" - {proto_name}: {detail}")
host_scripts: List[Dict[str, Any]] = []
summary_data = {
"mode": mode,
"network": network,
"run_dir": run_dir,
"sources": sources,
"observed_paths": observed_paths,
"rtsp": rtsp_data,
"additional_protocols": additional_protocols,
}
if vendor_info:
summary_data["vendor"] = vendor_info["company"]
summary_data["model"] = vendor_info.get("model", "")
summary_data["cves"] = vendor_info.get("cve_ids", "")
if cred_info:
summary_data["credentials"] = {
"success": cred_info.get("success", False),
"username": cred_info.get("username", ""),
"password": cred_info.get("password", ""),
"method": cred_info.get("method", ""),
"rtsp_url": cred_info.get("rtsp_url", ""),
"http_url": cred_info.get("http_url", ""),
"thumbnail": cred_info.get("thumbnail", ""),
}
host_scripts.append(
{
"id": "camsniff-summary",
"output": "\n".join(summary_lines),
"camsniff-summary": summary_data,
}
)
if additional_protocols:
host_scripts.append(
{
"id": "camsniff-protocols",
"output": "\n".join(
f" {entry.get('detail', '')}"
for entry in additional_protocols
),
"camsniff-protocols": additional_protocols,
}
)
if rtsp_data.get("other_responses"):
formatted = []
for status, urls in sorted(
rtsp_data["other_responses"].items()
):
for url in urls:
formatted.append(f"{status}: {url}")
host_scripts.append(
{
"id": "camsniff-rtsp-responses",
"output": "\n".join(formatted),
"camsniff-rtsp-responses": rtsp_data[
"other_responses"
],
}
)
if vendor_info or cred_info:
vendor_script_output = []
vendor_script_data = {}
if vendor_info:
vendor_script_output.append(
f"Company: {vendor_info['company']}"
)
vendor_script_output.append(
f"Model: {vendor_info.get('model', 'N/A')}"
)
if vendor_info.get("cve_ids"):
vendor_script_output.append(
f"CVEs: {vendor_info['cve_ids']}"
)
vendor_script_data["company"] = vendor_info["company"]
vendor_script_data["model"] = vendor_info.get(
"model", ""
)
vendor_script_data["cves"] = vendor_info.get(
"cve_ids", ""
)
elif cred_info:
vendor_script_output.append(
f"Company: {cred_info.get('vendor', 'Unknown')}"
)
vendor_script_output.append(
f"Model: {cred_info.get('model', 'Unknown')}"
)
vendor_script_data["company"] = cred_info.get(
"vendor", "Unknown"
)
vendor_script_data["model"] = cred_info.get(
"model", "Unknown"
)
if cred_info and cred_info.get("success"):
vendor_script_output.append("Credentials: SUCCESS")
vendor_script_output.append(
f" Username: {cred_info['username']}"
)
vendor_script_output.append(
f" Password: {cred_info['password']}"
)
vendor_script_output.append(
f" Method: {cred_info['method']}"
)
vendor_script_data["credentials_found"] = True
vendor_script_data["username"] = cred_info["username"]
vendor_script_data["password"] = cred_info["password"]
if cred_info.get("thumbnail"):
vendor_script_output.append(
f" Thumbnail: {cred_info['thumbnail']}"
)
vendor_script_data["thumbnail"] = cred_info[
"thumbnail"
]
host_scripts.append(
{
"id": "camsniff-vendor",
"output": "\n".join(vendor_script_output),
"camsniff-vendor": vendor_script_data,
}
)
if host_scripts:
port_documents.append(
{
"protocol": "tcp",
"port": -1,
"state_state": "open",
"state_reason": "script",
"scripts": host_scripts,
}
)
document: Dict[str, Any] = {
"addr": ip_addr,
"state": "up",
"schema_version": xmlnmap.SCHEMA_VERSION,
"starttime": ts_rendered,
"endtime": ts_rendered,
"source": "CamSniff",
"categories": [
"camsniff",
f"camsniff-mode:{mode.lower()}",
],
"ports": port_documents,
}
if vendor_info:
document["categories"].append(
f"vendor:{vendor_info['company'].lower().replace(' ', '-')}"
)
elif cred_info:
vendor_name = cred_info.get("vendor", "unknown")
document["categories"].append(
f"vendor:{vendor_name.lower().replace(' ', '-')}"
)
if cred_info and cred_info.get("success"):
document["categories"].append("credentials-found")
if mac_addr:
document["addresses"] = [
{
"addrtype": "mac",
"addr": str(mac_addr).strip(),
}
]
documents.append(document)
return documents
def main() -> int:
args = build_parser().parse_args()
log_path = Path(args.log)
input_path = Path(args.input)
if not input_path.is_file():
log_line(log_path, f"input file not found: {input_path}")
return 1
try:
run_timestamp = dt.datetime.strptime(
args.timestamp, "%Y%m%dT%H%M%SZ"
).replace(tzinfo=dt.UTC)
except ValueError as exc:
log_line(
log_path, f"invalid timestamp '{args.timestamp}': {exc}"
)
return 1
try:
with input_path.open("r", encoding="utf-8") as handle:
discovery_data = json.load(handle)
except (OSError, json.JSONDecodeError) as exc:
log_line(log_path, f"failed to read discovery payload: {exc}")
return 1
paths_csv_path = Path(args.paths_csv) if args.paths_csv else None
vendor_db = load_vendor_database(paths_csv_path)
log_line(
log_path,
f"loaded {len(vendor_db)} vendor entries from paths.csv",
)
credentials_path = (
Path(args.credentials) if args.credentials else None
)
creds_db = load_credentials(credentials_path)
log_line(log_path, f"loaded {len(creds_db)} credential entries")
try:
from ivre.db import db # type: ignore
except ImportError as exc:
log_line(log_path, f"IVRE not available: {exc}")
return 2
dbase = getattr(db, "nmap", None)
if dbase is None:
log_line(log_path, "IVRE nmap database backend unavailable")
return 2
documents = build_host_documents(
discovery_data,
mode=args.mode,
network=args.network,
run_dir=args.run_dir,
timestamp=run_timestamp,
vendor_db=vendor_db,
creds_db=creds_db,
)
if not documents:
log_line(log_path, "no hosts to sync – skipping IVRE import")
return 0
try:
ips_to_update = [
doc["addr"] for doc in documents if doc.get("addr")
]
if ips_to_update:
removed_count = 0
for ip_addr in ips_to_update:
host_filter = dbase.searchhost(ip_addr)
source_filter = dbase.searchsource("CamSniff")
combined_filter = dbase.flt_and(
host_filter, source_filter
)
existing_scans = list(dbase.get(combined_filter))
for scan in existing_scans:
dbase.remove(scan)
removed_count += 1
if removed_count > 0:
log_line(
log_path,
f"removed {removed_count} hosts before re-ingestion",
)
except Exception as exc:
log_line(
log_path, f"warning: failed to remove old scans: {exc}"
)
try:
stored_count = 0
for doc in documents:
dbase.store_host(doc)
stored_count += 1
log_line(log_path, f"synced {stored_count} hosts into IVRE")
except Exception as exc:
log_line(log_path, f"IVRE ingestion failed: {exc}")
return 1
vendor_count = sum(
1
for doc in documents
if any("vendor:" in cat for cat in doc.get("categories", []))
)
creds_count = sum(
1
for doc in documents
if "credentials-found" in doc.get("categories", [])
)
log_line(log_path, f" - {vendor_count} hosts with vendor info")
log_line(log_path, f" - {creds_count} hosts with credentials")
return 0
if __name__ == "__main__":
sys.exit(main())
|
http_metadata_parser.py
|
scripts/helpers/http_metadata_parser.py
|
.py
| 2,872
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""Extract structured HTTP metadata from captured headers/body."""
from __future__ import annotations
import argparse
import json
import re
from pathlib import Path
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description="Extract HTTP metadata for CamSniff"
)
parser.add_argument(
"--headers", required=True, help="Path to raw HTTP headers"
)
parser.add_argument(
"--body", required=True, help="Path to HTTP response body"
)
parser.add_argument(
"--ip", required=True, help="Target IP address"
)
parser.add_argument(
"--port", type=int, required=True, help="Target TCP port"
)
parser.add_argument(
"--scheme", required=True, help="URL scheme (http/https)"
)
return parser.parse_args()
def read_text(path: Path, limit: int | None = None) -> str:
try:
data = path.read_text(encoding="utf-8", errors="ignore")
except FileNotFoundError:
return ""
if limit is not None:
return data[:limit]
return data
def extract_metadata(headers: str, body: str) -> dict:
status_code = None
server = ""
www_auth = ""
header_lines = headers.splitlines()
if header_lines:
first_line = header_lines[0]
if first_line.startswith("HTTP/"):
parts = first_line.split()
if len(parts) > 1 and parts[1].isdigit():
status_code = int(parts[1])
for line in header_lines[1:]:
lower = line.lower()
if lower.startswith("server:") and not server:
server = line.split(":", 1)[1].strip()
elif lower.startswith("www-authenticate:") and not www_auth:
www_auth = line.split(":", 1)[1].strip()
title = ""
match = re.search(
r"<title[^>]*>(.*?)</title>", body, re.IGNORECASE | re.DOTALL
)
if match:
title = re.sub(r"\s+", " ", match.group(1)).strip()
realm = ""
realm_match = re.search(
r"realm=\"([^\"]+)\"", www_auth, re.IGNORECASE
)
if realm_match:
realm = realm_match.group(1)
return {
"status": status_code,
"server": server,
"realm": realm,
"title": title,
"www_authenticate": www_auth,
}
def main() -> int:
args = parse_args()
headers = read_text(Path(args.headers))
body = read_text(Path(args.body), limit=4096)
metadata = extract_metadata(headers, body)
payload = {
"ip": args.ip,
"port": args.port,
"scheme": args.scheme,
**metadata,
}
print(json.dumps(payload))
return 0
if __name__ == "__main__": # pragma: no cover
raise SystemExit(main())
|
confidence_scorer.py
|
scripts/helpers/confidence_scorer.py
|
.py
| 10,946
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""Compute confidence scores for CamSniff discovery results."""
from __future__ import annotations
import argparse
import json
import re
from pathlib import Path
from typing import Any, Dict, List, Optional
SOURCE_WEIGHTS = {
"SSDP": 25,
"Avahi": 15,
"TShark": 20,
"Nmap": 5,
"Masscan": 4,
"CoAP": 8,
}
PORT_WEIGHTS = {
554: 35,
8554: 30,
10554: 30,
5544: 25,
1935: 12,
1936: 12,
37777: 20,
37778: 20,
37779: 20,
8000: 18,
8001: 18,
8899: 12,
9000: 10,
7001: 10,
5000: 10,
5001: 10,
}
HTTP_PORTS = {80, 81, 82, 88, 443, 7443, 8000, 8080, 8081, 8088, 8443}
PROTOCOL_WEIGHTS = {
"ONVIF": 30,
"RTSP": 25,
"HLS": 15,
"RTMP": 12,
"WebRTC": 12,
"SRT": 8,
"HTTP": 8,
"SSDP": 10,
"CoAP": 8,
}
CAMERA_KEYWORDS = [
"camera",
"ipcam",
"ip cam",
"webcam",
"mjpeg",
"snapshot",
"onvif",
"rtsp",
"surveillance",
"live view",
"liveview",
"stream",
"cctv",
]
VENDOR_KEYWORDS = [
"hikvision",
"dahua",
"axis",
"hanwha",
"bosch",
"uniview",
"vivotek",
"amcrest",
"lorex",
"reolink",
"flir",
"mobotix",
"sony",
"panasonic",
"geovision",
"tiandy",
"avigilon",
"ezviz",
]
RECORDER_KEYWORDS = [
"nvr",
"dvr",
"recorder",
"cms",
]
OBSERVED_PATH_HINTS = [
"rtsp",
"onvif",
"snapshot",
"mjpeg",
"mjpg",
"stream",
"live",
]
PATH_PATTERNS = [
r"/Streaming/Channels/",
r"/cam/realmonitor",
r"/live\.sdp",
r"/live\.m3u8",
r"/streaming/",
r"/video\.mjpg",
r"/mjpeg",
r"/mjpg",
r"/snapshot\.cgi",
r"/cgi-bin/.+snapshot",
r"/onvif/",
r"/ISAPI/",
r"/axis-cgi/",
r"/h264",
r"/video\.cgi",
r"/image\.jpg",
]
SSDP_LOCATION_HINTS = [
"onvif",
"device",
"desc",
"upnp",
"camera",
]
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description="Score CamSniff discovery hosts"
)
parser.add_argument(
"--input",
required=True,
help="Input discovery JSON path",
)
parser.add_argument(
"--output",
required=True,
help="Output discovery JSON path",
)
return parser.parse_args()
def load_json(path: Path) -> Dict[str, Any]:
try:
with path.open("r", encoding="utf-8") as handle:
data = json.load(handle)
if isinstance(data, dict):
return data
except (FileNotFoundError, json.JSONDecodeError):
pass
return {"hosts": []}
def sanitize_text(value: Any) -> str:
if value is None:
return ""
if not isinstance(value, str):
value = str(value)
return value.strip()
def contains_keyword(text: str, keywords: List[str]) -> bool:
lowered = text.lower()
for keyword in keywords:
if keyword in lowered:
return True
return False
def flatten_metadata(host: Dict[str, Any]) -> str:
parts: List[str] = []
for entry in host.get("http_metadata") or []:
if isinstance(entry, dict):
for key in ("server", "realm", "title", "www_authenticate"):
value = sanitize_text(entry.get(key))
if value:
parts.append(value)
for entry in host.get("ssdp") or []:
if isinstance(entry, dict):
for key in (
"server",
"st",
"usn",
"location",
"friendly_name",
"manufacturer",
"model",
"model_number",
"device_type",
"serial",
):
value = sanitize_text(entry.get(key))
if value:
parts.append(value)
for entry in host.get("onvif") or []:
if isinstance(entry, dict):
for key in entry.values():
value = sanitize_text(key)
if value:
parts.append(value)
observed = host.get("observed_paths") or []
if isinstance(observed, list):
parts.extend([sanitize_text(item) for item in observed])
return " ".join(parts)
def score_host(host: Dict[str, Any]) -> Dict[str, Any]:
score = 0
reasons: List[str] = []
signals = set()
def add(points: int, reason: str, signal: Optional[str] = None) -> None:
nonlocal score
score += points
if reason and reason not in reasons:
reasons.append(reason)
if signal:
signals.add(signal)
sources = host.get("sources") or []
for source in sources:
name = sanitize_text(source)
if name in SOURCE_WEIGHTS:
add(SOURCE_WEIGHTS[name], f"{name.lower()} signal", "source")
ports = host.get("ports") or []
for port in ports:
if isinstance(port, int) and port in PORT_WEIGHTS:
add(PORT_WEIGHTS[port], f"port {port} open", "port")
if any(isinstance(port, int) and port in HTTP_PORTS for port in ports):
add(8, "http port open", "port")
protocols = host.get("additional_protocols") or []
for entry in protocols:
if isinstance(entry, dict):
name = sanitize_text(entry.get("protocol"))
if name in PROTOCOL_WEIGHTS:
signal = "protocol"
if name == "RTSP":
signal = "rtsp"
elif name == "ONVIF":
signal = "onvif"
add(PROTOCOL_WEIGHTS[name], f"{name.lower()} detected", signal)
rtsp = host.get("rtsp_bruteforce") or {}
discovered = rtsp.get("discovered") or []
if isinstance(discovered, list) and discovered:
add(35, "rtsp url discovered", "rtsp")
other = rtsp.get("other_responses") or {}
if isinstance(other, dict) and other:
add(10, "rtsp response observed", "rtsp")
observed_paths = host.get("observed_paths") or []
observed_blob = " ".join(
sanitize_text(item) for item in observed_paths if item
)
if observed_blob and contains_keyword(observed_blob, OBSERVED_PATH_HINTS):
add(18, "observed stream path", "path")
if observed_paths:
path_hits = 0
for path in observed_paths:
if not path:
continue
for pattern in PATH_PATTERNS:
if re.search(pattern, str(path), re.IGNORECASE):
path_hits += 1
add(12, "camera path signature", "path")
break
if path_hits >= 2:
add(6, "multiple camera paths", "path")
profile = host.get("profile_match") or {}
vendor = sanitize_text(profile.get("vendor"))
if vendor and vendor.lower() != "unknown":
add(10, "vendor match", "profile")
matched_by = sanitize_text(profile.get("matched_by"))
if matched_by.lower() == "oui":
add(15, "mac oui match", "profile")
meta_blob = flatten_metadata(host)
if meta_blob and contains_keyword(meta_blob, CAMERA_KEYWORDS):
add(20, "camera keyword in banners", "banner")
if meta_blob and contains_keyword(meta_blob, VENDOR_KEYWORDS):
add(12, "vendor keyword in banners", "banner")
elif meta_blob:
add(5, "banner metadata present", "banner")
onvif_entries = host.get("onvif") or []
if onvif_entries:
add(10, "onvif metadata", "onvif")
for entry in onvif_entries:
if not isinstance(entry, dict):
continue
manufacturer = sanitize_text(entry.get("manufacturer"))
model = sanitize_text(entry.get("model"))
firmware = sanitize_text(entry.get("firmware"))
serial = sanitize_text(entry.get("serial"))
if manufacturer or model:
add(25, "onvif device info", "onvif")
if firmware or serial:
add(8, "onvif firmware/serial", "onvif")
ssdp_entries = host.get("ssdp") or []
if ssdp_entries:
add(10, "ssdp metadata", "ssdp")
for entry in ssdp_entries:
if not isinstance(entry, dict):
continue
location = sanitize_text(entry.get("location"))
if location and contains_keyword(location, SSDP_LOCATION_HINTS):
add(10, "ssdp device description", "ssdp")
manufacturer = sanitize_text(entry.get("manufacturer"))
model = sanitize_text(entry.get("model"))
if manufacturer or model:
add(12, "ssdp device info", "ssdp")
if host.get("mac"):
add(3, "mac address observed", "mac")
if len(signals) >= 3:
add(10, "multi-signal confirmation", "boost")
if "rtsp" in signals and "onvif" in signals:
add(10, "rtsp + onvif alignment", "boost")
if score > 100:
score = 100
level = "low"
if score >= 70:
level = "very_high"
elif score >= 40:
level = "high"
elif score >= 20:
level = "medium"
classification = "camera"
model_hint = sanitize_text(profile.get("model"))
vendor_hint = vendor
onvif_hint = ""
if onvif_entries:
for entry in onvif_entries:
if isinstance(entry, dict):
onvif_hint += " " + sanitize_text(entry.get("manufacturer"))
onvif_hint += " " + sanitize_text(entry.get("model"))
recorder_blob = f"{meta_blob} {model_hint} {vendor_hint} {onvif_hint}"
if recorder_blob and contains_keyword(recorder_blob, RECORDER_KEYWORDS):
classification = "recorder"
else:
protocol_names = {
sanitize_text(entry.get("protocol"))
for entry in protocols
if isinstance(entry, dict)
}
if "WebRTC" in protocol_names and "RTSP" not in protocol_names:
classification = "webrtc-camera"
elif "SRT" in protocol_names:
classification = "streamer"
return {
"score": score,
"level": level,
"classification": classification,
"reasons": reasons[:6],
"signals": sorted(signals),
}
def main() -> int:
args = parse_args()
input_path = Path(args.input)
output_path = Path(args.output)
data = load_json(input_path)
hosts = data.get("hosts") or []
if not isinstance(hosts, list):
hosts = []
for host in hosts:
if isinstance(host, dict):
host["confidence"] = score_host(host)
output_path.parent.mkdir(parents=True, exist_ok=True)
with output_path.open("w", encoding="utf-8") as handle:
json.dump(data, handle, indent=2)
return 0
if __name__ == "__main__": # pragma: no cover
raise SystemExit(main())
|
profile_resolver.py
|
scripts/helpers/profile_resolver.py
|
.py
| 18,533
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""Resolve camera/profile hints based on discovery artefacts."""
from __future__ import annotations
import argparse
import csv
import json
import re
import sys
from dataclasses import dataclass, field
from datetime import datetime, timezone
from pathlib import Path
from typing import Any, Dict, List, Optional, Sequence, Tuple
@dataclass
class HostContext:
ip: str
mac: str = ""
ports: Sequence[int] = field(default_factory=list)
observed_paths: Sequence[str] = field(default_factory=list)
http_metadata: Sequence[Dict[str, str]] = field(
default_factory=list
)
@property
def http_banners(self) -> List[str]:
banners: List[str] = []
for entry in self.http_metadata:
for key in ("server", "realm", "title"):
value = (entry.get(key) or "").strip()
if value:
banners.append(value)
return banners
@dataclass
class CatalogRow:
raw: Dict[str, str]
company: str
model: str
type: str
oui_regex: str
rtsp_url: str
http_snapshot_url: str
onvif_profile_path: str
video_encoding: str
port: Optional[int]
streams: List[str]
channels: List[str]
username: str
password: str
is_digest_auth_supported: str
cve_ids: List[str]
user_manual_url: str
class ProfileResolver:
def __init__(self, catalog: Sequence[CatalogRow]):
self.catalog = catalog
def resolve(
self, host: HostContext
) -> Optional[Tuple[CatalogRow, str]]:
matches = self.resolve_many(host, limit=1)
if not matches:
return None
row, matched_by, _score = matches[0]
return row, matched_by
def resolve_many(
self, host: HostContext, *, limit: int = 3
) -> List[Tuple[CatalogRow, str, int]]:
ranked: List[Tuple[int, CatalogRow, str]] = []
for row in self.catalog:
score, matched_by = self._score_row(row, host)
if score <= 0:
continue
ranked.append((score, row, matched_by))
ranked.sort(key=lambda item: item[0], reverse=True)
trimmed: List[Tuple[CatalogRow, str, int]] = []
for score, row, matched_by in ranked[: max(limit, 0)]:
trimmed.append((row, matched_by, score))
return trimmed
def _score_row(
self, row: CatalogRow, host: HostContext
) -> Tuple[int, str]:
score = 0
matched_by = ""
mac = host.mac.upper()
pattern = row.oui_regex
if mac and pattern:
try:
if re.search(pattern, mac, re.IGNORECASE):
score += 100
matched_by = "oui"
except re.error:
pass
if row.port is not None and row.port in host.ports:
score += 10
if not matched_by:
matched_by = "port"
vendor = row.company.lower()
model = row.model.lower()
for banner in host.http_banners:
entry = banner.lower()
if vendor and vendor in entry:
score += 5
if not matched_by:
matched_by = "http"
break
if model and model in entry:
score += 4
if not matched_by:
matched_by = "http"
break
template_path = _extract_template_path(row.rtsp_url)
if template_path:
for observed in host.observed_paths:
normalized = observed.lower()
if template_path in normalized:
score += 2
if not matched_by:
matched_by = "path"
break
return score, matched_by
def _extract_template_path(template: str) -> str:
if not template:
return ""
lower = template.lower()
if "rtsp://" in lower:
stripped = lower.split("rtsp://", 1)[1]
elif "http://" in lower:
stripped = lower.split("http://", 1)[1]
elif "https://" in lower:
stripped = lower.split("https://", 1)[1]
else:
stripped = lower
path = stripped.split("/", 1)
if len(path) == 1:
return ""
return path[1]
def _parse_list(value: str) -> List[str]:
if not value:
return []
return [part.strip() for part in value.split(";") if part.strip()]
def _parse_int(value: Optional[str]) -> Optional[int]:
if value is None:
return None
try:
return int(str(value).strip())
except (TypeError, ValueError):
return None
def _load_catalog(path: Path) -> List[CatalogRow]:
rows: List[CatalogRow] = []
if not path.exists():
return rows
with path.open("r", encoding="utf-8") as handle:
reader = csv.DictReader(handle)
for raw in reader:
port = _parse_int(raw.get("port"))
rows.append(
CatalogRow(
raw=raw,
company=(raw.get("company") or "Unknown").strip(),
model=(raw.get("model") or "").strip(),
type=(raw.get("type") or "").strip(),
oui_regex=(raw.get("oui_regex") or "").strip(),
rtsp_url=(raw.get("rtsp_url") or "").strip(),
http_snapshot_url=(
raw.get("http_snapshot_url") or ""
).strip(),
onvif_profile_path=(
raw.get("onvif_profile_path") or ""
).strip(),
video_encoding=(
raw.get("video_encoding") or ""
).strip(),
port=port,
streams=_parse_list(raw.get("streams") or ""),
channels=_parse_list(raw.get("channels") or ""),
username=(raw.get("username") or "").strip(),
password=(raw.get("password") or "").strip(),
is_digest_auth_supported=(
raw.get("is_digest_auth_supported") or ""
).strip(),
cve_ids=_parse_list(raw.get("cve_ids") or ""),
user_manual_url=(
raw.get("user_manual_url") or ""
).strip(),
)
)
return rows
def _parse_ports(value: str) -> List[int]:
if not value:
return []
result: List[int] = []
for token in value.split():
try:
result.append(int(token.strip()))
except ValueError:
continue
return result
def _parse_paths(value: str) -> List[str]:
if not value:
return []
return [item.strip() for item in value.split() if item.strip()]
def _parse_http_json(value: str) -> List[Dict[str, str]]:
if not value:
return []
try:
data = json.loads(value)
except json.JSONDecodeError:
return []
result: List[Dict[str, str]] = []
if isinstance(data, list):
for entry in data:
if isinstance(entry, dict):
result.append(entry)
return result
def _build_profile_payload(
row: CatalogRow, matched_by: str, score: int = 0
) -> Dict[str, object]:
def coerce_bool(flag: str) -> bool:
lowered = (flag or "").strip().lower()
return lowered in {"1", "true", "yes"}
def build_rtsp_candidates() -> List[Dict[str, object]]:
template = row.rtsp_url
if not template:
return []
streams = row.streams or ["0"]
channels = row.channels or ["1"]
port = row.port if row.port is not None else 554
candidates: List[Dict[str, object]] = []
for channel in channels[:3]:
for stream in streams[:3]:
candidates.append(
{
"template": template,
"port": port,
"channel": channel,
"stream": stream,
"transport": "tcp",
}
)
if len(candidates) >= 6:
return candidates
return candidates
def build_http_candidates() -> List[Dict[str, object]]:
template = row.http_snapshot_url
if not template:
return []
streams = row.streams or ["0"]
channels = row.channels or ["1"]
port_guess = (
row.port
if row.port is not None
else (443 if template.lower().startswith("https") else 80)
)
return [
{
"template": template,
"port": port_guess,
"channel": channels[0],
"stream": streams[0],
}
]
return {
"vendor": row.company or "Unknown",
"model": row.model or "Unknown",
"type": row.type or "Unknown",
"matched_by": matched_by,
"score": score,
"default_username": row.username,
"default_password": row.password,
"digest_auth": coerce_bool(row.is_digest_auth_supported),
"video_encoding": row.video_encoding,
"rtsp_candidates": build_rtsp_candidates(),
"http_snapshot_candidates": build_http_candidates(),
"onvif_profiles": (
row.onvif_profile_path.split(";")
if row.onvif_profile_path
else []
),
"cve_ids": row.cve_ids,
"reference": row.user_manual_url,
}
def _render_text_profile(ip: str, profile: Dict[str, object]) -> str:
lines: List[str] = []
lines.append(
f" Profile match: {profile.get('vendor')} {profile.get('model')}"
)
match_flag = profile.get("matched_by")
if match_flag:
lines.append(f" Matched via: {match_flag}")
rtsp_candidates = profile.get("rtsp_candidates") or []
if rtsp_candidates:
first = rtsp_candidates[0]
template = first.get("template") or ""
port = first.get("port")
channel = first.get("channel")
stream = first.get("stream")
url = template.replace("{{ip_address}}", ip)
url = url.replace("{{port}}", str(port or 554))
url = url.replace("{{channel}}", str(channel or "1"))
url = url.replace("{{stream}}", str(stream or "0"))
url = url.replace("{{username}}", "<username>")
url = url.replace("{{password}}", "<password>")
lines.append(f" Suggested RTSP: {url}")
if profile.get("default_username") or profile.get(
"default_password"
):
username = profile.get("default_username") or "<custom>"
password = profile.get("default_password") or "<password>"
lines.append(f" Default creds: {username}/{password}")
encoding = profile.get("video_encoding")
if encoding:
lines.append(f" Encoding: {encoding}")
snapshot = profile.get("http_snapshot_candidates") or []
if snapshot:
template = snapshot[0].get("template") or ""
if template:
lines.append(f" Snapshot template: {template}")
if profile.get("digest_auth"):
lines.append(" Digest auth: true")
cves = profile.get("cve_ids") or []
if cves:
lines.append(f" CVEs: {', '.join(cves)}")
reference = profile.get("reference")
if reference:
lines.append(f" Reference: {reference}")
return "\n".join(lines)
def command_match(args: argparse.Namespace) -> int:
catalog = _load_catalog(Path(args.paths))
resolver = ProfileResolver(catalog)
context = HostContext(
ip=args.ip,
mac=args.mac or "",
ports=_parse_ports(args.ports or ""),
observed_paths=_parse_paths(args.observed or ""),
http_metadata=_parse_http_json(args.http_json or ""),
)
matches = resolver.resolve_many(context, limit=args.limit)
if not matches:
if args.format == "json":
if args.limit == 1:
json.dump({}, sys.stdout)
else:
json.dump([], sys.stdout)
return 0
print(" No catalog profile matched.")
return 0
profiles = [
_build_profile_payload(row, matched_by, score)
for row, matched_by, score in matches
]
if args.format == "json":
if args.limit == 1:
json.dump(profiles[0], sys.stdout, indent=2)
else:
json.dump(profiles, sys.stdout, indent=2)
return 0
for idx, profile in enumerate(profiles, start=1):
if args.limit > 1:
print(f" Match {idx} of {len(profiles)}:")
print(_render_text_profile(args.ip, profile))
if args.limit > 1 and idx < len(profiles):
print("")
return 0
def command_enrich(args: argparse.Namespace) -> int:
catalog = _load_catalog(Path(args.paths))
resolver = ProfileResolver(catalog)
input_path = Path(args.input)
output_path = Path(args.output)
try:
with input_path.open("r", encoding="utf-8") as handle:
data = json.load(handle)
except FileNotFoundError:
data = {"hosts": []}
hosts = data.get("hosts") or []
for host in hosts:
ports = host.get("ports") or []
observed = host.get("observed_paths") or []
http_meta = host.get("http_metadata") or []
mac = host.get("mac") or ""
context = HostContext(
ip=host.get("ip") or "",
mac=mac,
ports=[
value for value in ports if isinstance(value, int)
],
observed_paths=[
value for value in observed if isinstance(value, str)
],
http_metadata=[
value
for value in http_meta
if isinstance(value, dict)
],
)
matches = resolver.resolve_many(context, limit=args.limit)
if not matches:
continue
payloads = [
_build_profile_payload(row, matched_by, score)
for row, matched_by, score in matches
]
host["profile_matches"] = payloads
host["profile_match"] = payloads[0]
with output_path.open("w", encoding="utf-8") as handle:
json.dump(data, handle, indent=2)
return 0
def command_catalog(args: argparse.Namespace) -> int:
catalog = _load_catalog(Path(args.paths))
generated = datetime.now(timezone.utc).isoformat().replace(
"+00:00", "Z"
)
entries: List[Dict[str, Any]] = []
for row in catalog:
entries.append(
{
"vendor": row.company,
"model": row.model,
"type": row.type,
"oui_regex": row.oui_regex,
"rtsp_url": row.rtsp_url,
"http_snapshot_url": row.http_snapshot_url,
"onvif_profile_path": row.onvif_profile_path,
"video_encoding": row.video_encoding,
"port": row.port,
"streams": row.streams,
"channels": row.channels,
"default_username": row.username,
"default_password": row.password,
"digest_auth": row.is_digest_auth_supported,
"cve_ids": row.cve_ids,
"reference": row.user_manual_url,
}
)
payload = {
"generated_at": generated,
"count": len(entries),
"entries": entries,
}
output = Path(args.output) if args.output else None
if output:
output.parent.mkdir(parents=True, exist_ok=True)
with output.open("w", encoding="utf-8") as handle:
json.dump(payload, handle, indent=2)
else:
json.dump(payload, sys.stdout, indent=2)
return 0
def build_parser() -> argparse.ArgumentParser:
parser = argparse.ArgumentParser(
description="Resolve CamSniff profile matches"
)
subparsers = parser.add_subparsers(dest="command", required=True)
match_parser = subparsers.add_parser(
"match", help="Resolve a single host profile"
)
match_parser.add_argument(
"--paths", required=True, help="Path to paths.csv catalog"
)
match_parser.add_argument(
"--ip", required=True, help="Host IP address"
)
match_parser.add_argument(
"--mac", default="", help="Host MAC address"
)
match_parser.add_argument(
"--ports", default="", help="Whitespace-separated port list"
)
match_parser.add_argument(
"--observed",
default="",
help="Whitespace-separated observed paths",
)
match_parser.add_argument(
"--http-json", default="", help="HTTP metadata JSON array"
)
match_parser.add_argument(
"--format", choices=("text", "json"), default="text"
)
match_parser.add_argument(
"--limit",
type=int,
default=1,
help="Return up to N catalog matches (default: 1)",
)
match_parser.set_defaults(func=command_match)
enrich_parser = subparsers.add_parser(
"enrich", help="Enrich discovery.json with profile data"
)
enrich_parser.add_argument(
"--paths", required=True, help="Path to paths.csv catalog"
)
enrich_parser.add_argument(
"--input", required=True, help="Discovery JSON input path"
)
enrich_parser.add_argument(
"--output", required=True, help="Discovery JSON output path"
)
enrich_parser.add_argument(
"--limit",
type=int,
default=1,
help="Attach up to N catalog matches per host (default: 1)",
)
enrich_parser.set_defaults(func=command_enrich)
catalog_parser = subparsers.add_parser(
"catalog", help="Export the profile catalog as JSON"
)
catalog_parser.add_argument(
"--paths", required=True, help="Path to paths.csv catalog"
)
catalog_parser.add_argument(
"--output", help="Optional output file (defaults to stdout)"
)
catalog_parser.set_defaults(func=command_catalog)
return parser
def main(argv: Optional[Sequence[str]] = None) -> int:
parser = build_parser()
args = parser.parse_args(argv)
return args.func(args)
if __name__ == "__main__": # pragma: no cover
sys.exit(main())
|
rtsp_stream_summary.py
|
scripts/helpers/rtsp_stream_summary.py
|
.py
| 1,797
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""Summarise ffprobe output for CamSniff."""
from __future__ import annotations
import argparse
import json
from pathlib import Path
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description="Summarise ffprobe JSON output"
)
parser.add_argument(
"--input", required=True, help="Path to ffprobe JSON output"
)
parser.add_argument(
"--url", required=True, help="RTSP URL that was probed"
)
return parser.parse_args()
def load_probe(path: Path) -> dict:
try:
with path.open("r", encoding="utf-8") as handle:
return json.load(handle)
except FileNotFoundError:
return {}
except json.JSONDecodeError:
return {}
def build_summary(data: dict, url: str) -> dict:
streams = data.get("streams") or []
codec = ""
width = None
height = None
fps = ""
for stream in streams:
codec = stream.get("codec_name") or codec
width = stream.get("width") or width
height = stream.get("height") or height
fps = stream.get("avg_frame_rate") or fps
if codec and width and height:
break
resolution = None
if width and height:
resolution = f"{width}x{height}"
return {
"url": url,
"codec": codec or "",
"resolution": resolution,
"frame_rate": fps or "",
}
def main() -> int:
args = parse_args()
payload = build_summary(load_probe(Path(args.input)), args.url)
print(json.dumps(payload))
return 0
if __name__ == "__main__": # pragma: no cover
raise SystemExit(main())
|
onvif_device_info.py
|
scripts/probes/onvif_device_info.py
|
.py
| 1,931
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
# shellcheck disable=SC2317
"""Parse ONVIF GetDeviceInformation SOAP responses."""
from __future__ import annotations
import argparse
import json
import re
from pathlib import Path
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description="Extract ONVIF device information"
)
parser.add_argument(
"--input", required=True, help="Path to SOAP response payload"
)
parser.add_argument(
"--ip", required=True, help="Target IP address"
)
parser.add_argument(
"--port", type=int, required=True, help="Target port"
)
parser.add_argument("--scheme", required=True, help="HTTP scheme")
return parser.parse_args()
def read_payload(path: Path) -> str:
try:
return path.read_text(encoding="utf-8", errors="ignore")
except FileNotFoundError:
return ""
def extract_field(payload: str, tag: str) -> str:
pattern = rf"<tds:{tag}>(.*?)</tds:{tag}>"
match = re.search(pattern, payload, re.IGNORECASE | re.DOTALL)
if match:
return re.sub(r"\s+", " ", match.group(1)).strip()
return ""
def main() -> int:
args = parse_args()
payload = read_payload(Path(args.input))
manufacturer = extract_field(payload, "Manufacturer")
model = extract_field(payload, "Model")
firmware = extract_field(payload, "FirmwareVersion")
serial = extract_field(payload, "SerialNumber")
result = {
"ip": args.ip,
"port": args.port,
"scheme": args.scheme,
"manufacturer": manufacturer,
"model": model,
"firmware": firmware,
"serial": serial,
}
print(json.dumps(result))
return 0
if __name__ == "__main__": # pragma: no cover
raise SystemExit(main())
|
ssdp_probe.py
|
scripts/probes/ssdp_probe.py
|
.py
| 5,444
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""Perform a multicast SSDP discovery sweep."""
from __future__ import annotations
import argparse
import json
import socket
import time
import urllib.request
import xml.etree.ElementTree as ET
MCAST_GRP = "239.255.255.250"
MCAST_PORT = 1900
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description="Send SSDP M-SEARCH and capture responses"
)
parser.add_argument(
"--timeout",
type=float,
default=4.0,
help="Listen window in seconds",
)
parser.add_argument(
"--mx", type=int, default=2, help="MX header value"
)
parser.add_argument(
"--st", default="ssdp:all", help="ST header value"
)
parser.add_argument(
"--output",
help="Optional file path to write newline-delimited JSON",
)
parser.add_argument(
"--describe",
action="store_true",
help="Fetch and parse device descriptions from SSDP location URLs",
)
parser.add_argument(
"--describe-timeout",
type=float,
default=3.0,
help="Timeout in seconds for SSDP description fetch",
)
parser.add_argument(
"--max-describe",
type=int,
default=24,
help="Maximum number of SSDP description fetches",
)
return parser.parse_args()
def build_message(st: str, mx: int) -> bytes:
lines = [
"M-SEARCH * HTTP/1.1",
f"HOST: {MCAST_GRP}:{MCAST_PORT}",
'MAN: "ssdp:discover"',
f"MX: {mx}",
f"ST: {st}",
"",
"",
]
return "\r\n".join(lines).encode("utf-8")
def collect_responses(
timeout: float, message: bytes
) -> list[dict[str, str]]:
sock = socket.socket(
socket.AF_INET, socket.SOCK_DGRAM, socket.IPPROTO_UDP
)
sock.setsockopt(socket.IPPROTO_IP, socket.IP_MULTICAST_TTL, 2)
sock.settimeout(max(timeout, 0.1))
try:
sock.sendto(message, (MCAST_GRP, MCAST_PORT))
except OSError:
sock.close()
return []
responses: list[dict[str, str]] = []
deadline = time.time() + timeout
while time.time() < deadline:
remaining = deadline - time.time()
sock.settimeout(max(remaining, 0.1))
try:
data, addr = sock.recvfrom(8192)
except socket.timeout:
break
except OSError:
break
if not data:
continue
text = data.decode("utf-8", errors="ignore")
headers = {}
for line in text.splitlines():
if ":" in line:
key, value = line.split(":", 1)
headers[key.strip().lower()] = value.strip()
responses.append(
{
"ip": addr[0],
"st": headers.get("st", ""),
"usn": headers.get("usn", ""),
"server": headers.get("server", ""),
"location": headers.get("location", ""),
}
)
sock.close()
return responses
def _strip_ns(tag: str) -> str:
if "}" in tag:
return tag.split("}", 1)[1]
return tag
def fetch_description(url: str, timeout: float) -> dict[str, str]:
if not url:
return {}
try:
with urllib.request.urlopen(url, timeout=timeout) as resp:
payload = resp.read()
except Exception:
return {}
if not payload:
return {}
try:
root = ET.fromstring(payload)
except ET.ParseError:
return {}
fields = {
"friendlyName": "friendly_name",
"manufacturer": "manufacturer",
"modelName": "model",
"modelNumber": "model_number",
"deviceType": "device_type",
"serialNumber": "serial",
}
result: dict[str, str] = {}
for elem in root.iter():
tag = _strip_ns(elem.tag)
if tag in fields and elem.text:
result[fields[tag]] = elem.text.strip()
return result
def enrich_with_descriptions(
responses: list[dict[str, str]],
timeout: float,
max_fetches: int,
) -> list[dict[str, str]]:
seen_locations: set[str] = set()
count = 0
for entry in responses:
location = entry.get("location", "")
if not location:
continue
if location in seen_locations:
continue
if count >= max_fetches:
break
seen_locations.add(location)
details = fetch_description(location, timeout)
if details:
entry.update(details)
count += 1
return responses
def emit(responses: list[dict[str, str]], output: str | None) -> None:
if output:
with open(output, "w", encoding="utf-8") as handle:
for entry in responses:
handle.write(json.dumps(entry) + "\n")
else:
for entry in responses:
print(json.dumps(entry))
def main() -> int:
args = parse_args()
message = build_message(args.st, args.mx)
responses = collect_responses(args.timeout, message)
if args.describe:
responses = enrich_with_descriptions(
responses, args.describe_timeout, args.max_describe
)
emit(responses, args.output)
return 0
if __name__ == "__main__": # pragma: no cover
raise SystemExit(main())
|
report.py
|
scripts/tools/report.py
|
.py
| 16,793
|
#!/usr/bin/env python3
#
# https://github.com/John0n1/CamSniff
#
# Copyright (c) 2026 John Hauger Mitander
# License: MIT License https://opensource.org/license/MIT
"""Generate markdown or HTML reports from CamSniff output."""
from __future__ import annotations
import argparse
import html
import json
from collections import Counter
from datetime import datetime, timezone
from pathlib import Path
from typing import Any, Dict, List, Optional, Tuple
def parse_args() -> argparse.Namespace:
parser = argparse.ArgumentParser(
description="Generate reports from CamSniff JSON output"
)
parser.add_argument(
"--discovery",
required=True,
help="Path to discovery.json",
)
parser.add_argument(
"--credentials",
help="Optional path to credentials.json",
)
parser.add_argument(
"--format",
choices=("markdown", "html"),
required=True,
help="Report format",
)
parser.add_argument(
"--output",
required=True,
help="Output report file path",
)
parser.add_argument(
"--run-dir",
default="",
help="Optional run directory for context",
)
parser.add_argument(
"--run-label",
default="",
help="Optional label for the run",
)
return parser.parse_args()
def load_json(path: Path) -> Optional[Any]:
try:
with path.open("r", encoding="utf-8") as handle:
return json.load(handle)
except (FileNotFoundError, json.JSONDecodeError):
return None
def get_metadata(discovery: Dict[str, Any]) -> Dict[str, str]:
meta = discovery.get("metadata") or {}
return {
"mode": str(meta.get("mode") or ""),
"generated_at": str(meta.get("generated_at") or ""),
"network": str(meta.get("network") or ""),
}
def summarize_credentials(
creds: Optional[List[Dict[str, Any]]],
) -> Tuple[List[Dict[str, Any]], List[Dict[str, Any]]]:
if not creds:
return [], []
successes: List[Dict[str, Any]] = []
failures: List[Dict[str, Any]] = []
for entry in creds:
if entry.get("success") is False:
failures.append(entry)
elif entry.get("method"):
successes.append(entry)
return successes, failures
def safe_join(values: List[str]) -> str:
return ", ".join([value for value in values if value])
def build_host_rows(
hosts: List[Dict[str, Any]],
success_ips: set[str],
) -> List[Dict[str, str]]:
rows: List[Dict[str, str]] = []
for host in hosts:
ip = str(host.get("ip") or "")
profile = host.get("profile_match") or {}
vendor = str(profile.get("vendor") or "Unknown")
model = str(profile.get("model") or "Unknown")
matched_by = str(profile.get("matched_by") or "")
confidence = host.get("confidence") or {}
confidence_score = str(confidence.get("score") or "")
confidence_level = str(confidence.get("level") or "")
confidence_class = str(confidence.get("classification") or "")
ports = [
str(port)
for port in host.get("ports") or []
if port is not None
]
protocols = [
str(entry.get("protocol") or "")
for entry in host.get("additional_protocols") or []
if isinstance(entry, dict)
]
sources = [
str(source)
for source in host.get("sources") or []
if source
]
rows.append(
{
"ip": ip,
"vendor": vendor,
"model": model,
"confidence_score": confidence_score,
"confidence_level": confidence_level,
"confidence_class": confidence_class,
"matched_by": matched_by,
"ports": safe_join(ports),
"protocols": safe_join(sorted(set(protocols))),
"sources": safe_join(sorted(set(sources))),
"credentials": "yes" if ip in success_ips else "no",
}
)
return rows
def build_summary(hosts: List[Dict[str, Any]]) -> Dict[str, Any]:
vendor_counter = Counter()
port_counter = Counter()
protocol_counter = Counter()
source_counter = Counter()
for host in hosts:
profile = host.get("profile_match") or {}
vendor = str(profile.get("vendor") or "Unknown")
vendor_counter[vendor] += 1
for port in host.get("ports") or []:
if port is not None:
port_counter[str(port)] += 1
for entry in host.get("additional_protocols") or []:
if isinstance(entry, dict):
name = str(entry.get("protocol") or "")
if name:
protocol_counter[name] += 1
for source in host.get("sources") or []:
if source:
source_counter[str(source)] += 1
return {
"host_count": len(hosts),
"vendors": vendor_counter,
"ports": port_counter,
"protocols": protocol_counter,
"sources": source_counter,
}
def render_markdown(
metadata: Dict[str, str],
summary: Dict[str, Any],
host_rows: List[Dict[str, str]],
confidence_rows: List[Dict[str, str]],
successes: List[Dict[str, Any]],
failures: List[Dict[str, Any]],
run_dir: str,
run_label: str,
) -> str:
lines: List[str] = []
lines.append("# CamSniff Report")
lines.append("")
now = datetime.now(timezone.utc).strftime("%Y-%m-%dT%H:%M:%SZ")
lines.append(f"Generated: {now}")
if run_label:
lines.append(f"Run: {run_label}")
if run_dir:
lines.append(f"Run directory: {run_dir}")
if metadata.get("mode"):
lines.append(f"Mode: {metadata.get('mode')}")
if metadata.get("network"):
lines.append(f"Network: {metadata.get('network')}")
if metadata.get("generated_at"):
lines.append(f"Discovery timestamp: {metadata.get('generated_at')}")
lines.append("")
lines.append("## Summary")
lines.append("")
lines.append(f"- Hosts: {summary['host_count']}")
lines.append(f"- Vendors: {len(summary['vendors'])}")
lines.append(f"- Protocols: {len(summary['protocols'])}")
lines.append(f"- Credential successes: {len(successes)}")
lines.append(f"- Credential failures: {len(failures)}")
if summary["ports"]:
lines.append("")
lines.append("## Top Ports")
lines.append("")
lines.append("| Port | Count |")
lines.append("| --- | --- |")
for port, count in summary["ports"].most_common(10):
lines.append(f"| {port} | {count} |")
if summary["protocols"]:
lines.append("")
lines.append("## Protocol Hits")
lines.append("")
lines.append("| Protocol | Count |")
lines.append("| --- | --- |")
for name, count in summary["protocols"].most_common(10):
lines.append(f"| {name} | {count} |")
if confidence_rows:
lines.append("")
lines.append("## Top Confidence")
lines.append("")
lines.append(
"| IP | Score | Level | Class | Reasons |"
)
lines.append(
"| --- | --- | --- | --- | --- |"
)
for row in confidence_rows:
lines.append(
f"| {row['ip']} | {row['score']} | {row['level']} | "
f"{row['classification']} | {row['reasons']} |"
)
if host_rows:
lines.append("")
lines.append("## Hosts")
lines.append("")
lines.append(
"| IP | Vendor | Model | Confidence | Class | Ports | Protocols | Credentials |"
)
lines.append(
"| --- | --- | --- | --- | --- | --- | --- | --- |"
)
for row in host_rows:
lines.append(
f"| {row['ip']} | {row['vendor']} | {row['model']} | "
f"{row['confidence_score']} {row['confidence_level']} | "
f"{row['confidence_class']} | {row['ports']} | "
f"{row['protocols']} | {row['credentials']} |"
)
if successes:
lines.append("")
lines.append("## Credential Successes")
lines.append("")
for entry in successes:
ip = entry.get("ip") or ""
method = entry.get("method") or ""
user = entry.get("credentials", {}).get("username") or ""
password = entry.get("credentials", {}).get("password") or ""
url = entry.get("url") or ""
lines.append(
f"- {ip} ({method}): `{user}` / `{password}` -> {url}"
)
return "\n".join(lines) + "\n"
def render_html(
metadata: Dict[str, str],
summary: Dict[str, Any],
host_rows: List[Dict[str, str]],
confidence_rows: List[Dict[str, str]],
successes: List[Dict[str, Any]],
failures: List[Dict[str, Any]],
run_dir: str,
run_label: str,
) -> str:
def esc(value: str) -> str:
return html.escape(value or "")
now = datetime.now(timezone.utc).strftime("%Y-%m-%dT%H:%M:%SZ")
head = """
<!doctype html>
<html lang="en">
<head>
<meta charset="utf-8" />
<title>CamSniff Report</title>
<style>
body { font-family: Arial, sans-serif; margin: 32px; color: #1f1f1f; }
h1 { margin-bottom: 0.2em; }
.meta { color: #555; font-size: 0.95em; }
table { border-collapse: collapse; margin: 12px 0 24px; width: 100%; }
th, td { border: 1px solid #ddd; padding: 8px; text-align: left; }
th { background: #f3f3f3; }
.chip { display: inline-block; padding: 2px 8px; border-radius: 12px; background: #eef2f7; }
.section { margin-top: 24px; }
code { background: #f6f6f6; padding: 2px 4px; border-radius: 4px; }
</style>
</head>
<body>
"""
meta_lines = [
f"<div class='meta'>Generated: {esc(now)}</div>"
]
if run_label:
meta_lines.append(
f"<div class='meta'>Run: {esc(run_label)}</div>"
)
if run_dir:
meta_lines.append(
f"<div class='meta'>Run directory: {esc(run_dir)}</div>"
)
if metadata.get("mode"):
meta_lines.append(
f"<div class='meta'>Mode: {esc(metadata['mode'])}</div>"
)
if metadata.get("network"):
meta_lines.append(
f"<div class='meta'>Network: {esc(metadata['network'])}</div>"
)
if metadata.get("generated_at"):
meta_lines.append(
f"<div class='meta'>Discovery timestamp: "
f"{esc(metadata['generated_at'])}</div>"
)
summary_html = f"""
<div class="section">
<h2>Summary</h2>
<div class="meta">Hosts: {summary['host_count']}</div>
<div class="meta">Vendors: {len(summary['vendors'])}</div>
<div class="meta">Protocols: {len(summary['protocols'])}</div>
<div class="meta">Credential successes: {len(successes)}</div>
<div class="meta">Credential failures: {len(failures)}</div>
</div>
"""
def table_from_counter(
title: str, counter: Counter
) -> str:
if not counter:
return ""
rows = "\n".join(
f"<tr><td>{esc(key)}</td><td>{count}</td></tr>"
for key, count in counter.most_common(10)
)
return f"""
<div class="section">
<h2>{esc(title)}</h2>
<table>
<thead><tr><th>Item</th><th>Count</th></tr></thead>
<tbody>{rows}</tbody>
</table>
</div>
"""
hosts_html = ""
if host_rows:
rows = "\n".join(
"<tr>"
f"<td>{esc(row['ip'])}</td>"
f"<td>{esc(row['vendor'])}</td>"
f"<td>{esc(row['model'])}</td>"
f"<td>{esc(row['confidence_score'])} {esc(row['confidence_level'])}</td>"
f"<td>{esc(row['confidence_class'])}</td>"
f"<td>{esc(row['ports'])}</td>"
f"<td>{esc(row['protocols'])}</td>"
f"<td><span class='chip'>{esc(row['credentials'])}</span></td>"
"</tr>"
for row in host_rows
)
hosts_html = f"""
<div class="section">
<h2>Hosts</h2>
<table>
<thead>
<tr>
<th>IP</th><th>Vendor</th><th>Model</th><th>Confidence</th>
<th>Class</th><th>Ports</th><th>Protocols</th><th>Credentials</th>
</tr>
</thead>
<tbody>
{rows}
</tbody>
</table>
</div>
"""
confidence_html = ""
if confidence_rows:
rows = "\n".join(
"<tr>"
f"<td>{esc(row['ip'])}</td>"
f"<td>{esc(row['score'])}</td>"
f"<td>{esc(row['level'])}</td>"
f"<td>{esc(row['classification'])}</td>"
f"<td>{esc(row['reasons'])}</td>"
"</tr>"
for row in confidence_rows
)
confidence_html = f"""
<div class="section">
<h2>Top Confidence</h2>
<table>
<thead>
<tr>
<th>IP</th><th>Score</th><th>Level</th>
<th>Class</th><th>Reasons</th>
</tr>
</thead>
<tbody>
{rows}
</tbody>
</table>
</div>
"""
cred_html = ""
if successes:
entries = []
for entry in successes:
ip = esc(str(entry.get("ip") or ""))
method = esc(str(entry.get("method") or ""))
user = esc(str(entry.get("credentials", {}).get("username") or ""))
password = esc(str(entry.get("credentials", {}).get("password") or ""))
url = esc(str(entry.get("url") or ""))
entries.append(
f"<li>{ip} ({method}): "
f"<code>{user}</code> / <code>{password}</code> "
f"-> {url}</li>"
)
cred_html = f"""
<div class="section">
<h2>Credential Successes</h2>
<ul>
{''.join(entries)}
</ul>
</div>
"""
tail = "</body></html>"
return (
head
+ "<h1>CamSniff Report</h1>"
+ "".join(meta_lines)
+ summary_html
+ table_from_counter("Top Ports", summary["ports"])
+ table_from_counter("Protocol Hits", summary["protocols"])
+ confidence_html
+ hosts_html
+ cred_html
+ tail
)
def main() -> int:
args = parse_args()
discovery_path = Path(args.discovery)
discovery = load_json(discovery_path) or {}
if not isinstance(discovery, dict):
discovery = {}
hosts = discovery.get("hosts") or []
if not isinstance(hosts, list):
hosts = []
creds_data = None
if args.credentials:
creds = load_json(Path(args.credentials))
if isinstance(creds, list):
creds_data = creds
successes, failures = summarize_credentials(creds_data)
success_ips = {
str(entry.get("ip") or "")
for entry in successes
if entry.get("ip")
}
metadata = get_metadata(discovery)
summary = build_summary(hosts)
host_rows = build_host_rows(hosts, success_ips)
confidence_rows: List[Dict[str, str]] = []
for host in hosts:
if not isinstance(host, dict):
continue
conf = host.get("confidence") or {}
if not isinstance(conf, dict):
continue
score = conf.get("score", 0)
try:
score_int = int(score)
except (TypeError, ValueError):
score_int = 0
reasons = conf.get("reasons") or []
if isinstance(reasons, list):
reasons_text = ", ".join(
str(item) for item in reasons if item
)
else:
reasons_text = str(reasons)
confidence_rows.append(
{
"ip": str(host.get("ip") or ""),
"score": str(score_int),
"level": str(conf.get("level") or ""),
"classification": str(conf.get("classification") or ""),
"reasons": reasons_text,
}
)
confidence_rows.sort(
key=lambda row: int(row.get("score") or 0), reverse=True
)
confidence_rows = confidence_rows[:10]
if args.format == "markdown":
output = render_markdown(
metadata,
summary,
host_rows,
confidence_rows,
successes,
failures,
args.run_dir,
args.run_label,
)
else:
output = render_html(
metadata,
summary,
host_rows,
confidence_rows,
successes,
failures,
args.run_dir,
args.run_label,
)
output_path = Path(args.output)
output_path.parent.mkdir(parents=True, exist_ok=True)
output_path.write_text(output, encoding="utf-8")
return 0
if __name__ == "__main__": # pragma: no cover
raise SystemExit(main())
|
README.md
|
README.md
|
.md
| 8,012
|
<p align="center">
<img width="650px" height="100px" src="Icon/Banner.png">
</p>
<p align = "center">
<img src = "https://img.shields.io/github/stars/Lucksi/Mr.Holmes">
<img src = "https://img.shields.io/github/forks/Lucksi/Mr.Holmes">
<img src = "https://img.shields.io/badge/Maintained%3F-yes-green.svg">
<img src = "https://img.shields.io/github/license/Lucksi/Mr.Holmes">
<img src = "https://img.shields.io/github/repo-size/Lucksi/Mr.Holmes">
<img src= "https://img.shields.io/github/languages/count/Lucksi/Mr.Holmes">
<img src = "https://visitor-badge.laobi.icu/badge?page_id=Lucksi.Mr.Holmes">
</p>
# :mag: Mr.Holmes
**Mr.Holmes is a information gathering tool (OSINT). The main purpose is to gain information about domains,username and phone numbers with the help of public source avaiable on the internet also it use the google dorks attack for specific researchers. It also use proxies for make your requests completley anonymous and a WhoIS Api for getting more information about a domain.**
<br>
# :heavy_exclamation_mark: DISCLAIMER
**This Tool is Not 100% Accurate so it can fail somtimes. Also this tool is made for educational and research purposes only, i do not assume any kind of responsibility for any imprope use of this tool.**
<br>
# SCREENSHOT

<br>
<p align = "center">
<img src = "Screenshot/Termux.png" height = "400px" width = "300px">
</p>
<br>
# :heavy_check_mark: INSTALLATION LINUX/MAC:
```bash
git clone https://github.com/Lucksi/Mr.Holmes
cd Mr.Holmes
sudo apt-get update
sudo chmod +x install.sh
sudo bash install.sh
```
<br>
# :heavy_check_mark: INSTALLATION LINUX/MAC (Venv Enviroment):
**if you encounter some errors in the python libraries installation use this method**
```bash
git clone https://github.com/Lucksi/Mr.Holmes
sudo apt-get update
cd Mr.Holmes
python3 -m venv .lib_venv
sudo chmod +x install.sh
sudo bash install.sh
source .lib_venv/bin/activate
pip3 install -r requirements.txt
python3 MrHolmes.py
```
<br>
# :heavy_check_mark: INSTALLATION WINDOWS (1°WAY)
**If you have git installed on your windows machine you can do the following commands:**
```cmd
git clone https://github.com/Lucksi/Mr.Holmes
cd Mr.Holmes
Install.cmd
```
<br>
# :heavy_check_mark: INSTALLATION WINDOWS (2° WAY):
**If you download the zip file of Mr.Holmes you should first unzip it and after that do the following commands:**
```cmd
ren Mr.Holmes-master Mr.Holmes
cd Mr.Holmes
Install.cmd
```
<br>
# :heavy_check_mark: INSTALLATION TERMUX:
```bash
pkg install proot
git clone https://github.com/Lucksi/Mr.Holmes
cd Mr.Holmes
proot -0 chmod +x install_Termux.sh
./install_Termux.sh
```
<br>
# USAGE LINUX/MAC:
cd Mr.Holmes
sudo python3 MrHolmes.py
OR:
cd Mr.Holmes
cd Launchers
Execute Launcher.sh
<br>
# USAGE LINUX/MAC(Venv Enviroment):
cd Mr.Holmes
source .lib_venv/bin/activate
python3 MrHolmes.py
<br>
# USAGE TERMUX/WINDOWS:
python3 MrHolmes.py
<br>
# USAGE WINDOWS:
python MrHolmes.py
OR
cd Launchers
Execute Win_Launcher.exe
<br>
# API KEY LINK:
https://whois.whoisxmlapi.com
<br>
# SETTINGS FOLDER:
Configuration/Configuration.ini
<br>
# :heavy_exclamation_mark: ATTENTION
**DATABASE NOT AVAIABLE ON TERMUX**
<br>
# :heavy_exclamation_mark: ATTENTION ON WINDOWS
**IF PYTHON AND PHP WONT INSTALL YOU HAVE TO DOWNLOAD THEM MANUALLY:**
<br>
# VERSIONS LIST:
https://lucksi.github.io/Mr.Holmes/Pages/versions.html
<br>
# :heavy_check_mark: GUI DARK/LIGHT MODE:
```bash
cd GUI
cd Theme
edit Mode.json
write:Light=(Light-Mode)
write:Dark=(Dark-Mode)
write:High-Contrast(High-Contrast-Mode)
```
<br>
# :heavy_check_mark: Mode.json CODE EXAMPLE:
```json
{
"Color": {
"Background": "Light"
}
}
```
<br>
# :heavy_check_mark: GUI/USERNAME/PASSWORD:
```bash
cd GUI
cd Credentials
edit Login.json
write:Status=Active/Deactive
edit Users.json
write:Username=Your Username
write:Password=Your Password
```
<br>
# :heavy_check_mark: Login.json CODE EXAMPLE:
```json
{
"Database": {
"Status": "Active"
}
}
```
<br>
# :heavy_check_mark: Users.json CODE EXAMPLE
```json
{
"Users":[
{
"Username": "Your Username",
"Password": "Your Password"
}
]
}
```
<br>
# :heavy_check_mark: LANGUAGE SETTINGS:
```bash
cd GUI
cd Language
edit Language.json
```
<br>
# :heavy_check_mark: Language.json CODE EXAMPLE:
```json
{
"Language": {
"Preference": "English"
}
}
```
<br>
# DEFAULT USERNAME AND PASSWORD:
Username:Admin
Password:Qwerty123
<br>
# AVAIABLE LANGUAGES:
Italiano 🇮🇹
English 🏴
Français 🇫🇷
<br>
# ACTUAL VERSION:
## T.G.D-1.0.4
<br>
# INTERACTIVE MAP HAS BEEN MADE WITH:
**Leaflet: https://leafletjs.com**
<br>
# USERNAME ENTITIES:
**The Icons on Folder: /GUI/Icon/Entities/Site_Icon have been taken from: https://www.iconfinder.com/ all credit goes to their respective creators**
<br>
# ENCODING:
**With this version it is Possible to Encode your reports**
<br>
# DECODING:
**With this version it is Possible to Decode your reports**
<br>
# HYPOTHESIS
**This new version Permits to generate some "Hypothesis" on the subject in base of their numbers on varios social media including possible hobbies/interests (It may not be a 100% attendible)**
<br>
# EMAIL-LOOKUP:
**With this new version is possible to check if an email is connected to some specific socials/services without letting the target know it.**
<br>
# GRAPHS:
**With this new version has been added the possibility to create Graphs in order to create a schema for information scheduling.**
<br>
# EXAMPLE:

<br>
# MAPS:
**With this new version has been added the possibility to create Interactive Maps.**
<br>
# EXAMPLE:

<br>
# DORKS:
**With this new version it is possible to search Video/Sound/Images via Dorks (1) and to effectuate specific research adding date ex '1998/01/1' or date range ex '1998/01/01-2020/12/31' (2).**
<br>
# EXAMPLE (1):

<br>
# EXAMPLE (2):

<br>
# PDF:
**With this new version has been added the possibility to converte your Graphs in PDF.**
<br>
# EXAMPLE:
<p align = "center">
<img src="Screenshot/Dark_Pdf.png" height ="400px" width = "400px" border = "5px" style="border-color:white;">
</p>
<br>
# AVAILBLE PDF-THEMES:
Light 🌕
Dark 🌗
High-Contrast 🌗
<br>
# FILE-TRANSFER:
**With this version it is Possible to Transfer your reports directly to Your Phone Via Qr-Code**
<br>
# FILE-TRANSFER PAGE:
<p align = "center">
<img src="Screenshot/File-Transfer.jpg" height ="500px" width = "300px" border = "5px" style="border-color:white;">
</p>
<br>
# :last_quarter_moon: DARK MODE:

<br>
<p align = "center">
<img src="Screenshot/Dark.jpg" height ="500px" width = "300px" border = "5px" style="border-color:white;">
</p>
<br>
# :full_moon: LIGHT MODE:

<br>
<p align = "center">
<img src="Screenshot/Light.jpg" height ="500px" width = "300px" border = "5px" style="border-color:gray;">
</p>
<br>
# :last_quarter_moon: HIGH-CONTRAST MODE:

<br>
<p align = "center">
<img src="Screenshot/High-Contrast.jpg" height ="490px" width = "300px" border = "5px" style="border-color:white;">
</p>
<hr>
<br>
## <p align = center> STARGAZERS OVER TIME
[](https://starchart.cc/Lucksi/Mr.Holmes)
<br>
## <p align= center>MADE WITH :heart: BY LUCKSI IN :it:</p>
## <p align = center> ORIGINAL CREATOR: <a href = "https://github.com/Lucksi">LUCA GAROFALO (Lucksi)</a></p>
## <p align = center>LICENSE: GPL-3.0 License <br>COPYRIGHT: (C) 2021-2025 Lucksi
|
SECURITY.md
|
SECURITY.md
|
.md
| 92
|
# SECURITY:
## FOR ANY BUG OR PROBLEM RELETED TO MR.HOLMES WRITE ME ON: [email protected]
|
Project.yml
|
Project.yml
|
.yml
| 513
|
# YAML EXPLANATION FILE #
Name: Mr.Holmes
Languages: Python,Shell-script,Javascript,Php,Css,Powershell,Batch,C++,Java
Python-Version: Python 3
Original Creator: Luca Garofalo (Lucksi)
Author: Luca Garofalo (Lucksi)
Copyright: (C) 2021-2024 Lucksi <[email protected]>
Copyright-Years: 2021,2022,2023,2024
Project-site: https://lucksi.github.io/Mr.Holmes
Download: git clone https://github.com/Lucksi/Mr.Holmes
Platforms: Linux/MacOS/Termux/Windows
Version: T.G.D-1.0.4
License: GNU General Public License v3.0
|
Removed_Sites.md
|
Removed_Sites.md
|
.md
| 1,017
|
# REMOVED SITES
<br>
## YOUTUBE: https://www.youtube.com
gives always positive response even if the user doesn't exist
<br>
## TELEGRAM: https://telegram.org
gives always positive response even if the user doesn't exist
<br>
## Sparkpeople: https://www.sparkpeople.com
this site has been close
<br>
## STRIPCHAT: https://stripchat.com
gives always connection error
<br>
## REDDIT: https://reddit.com
gives always positive response even if the user doesn't exist
<br>
## NEW-REDDIT: https://new.reddit.com
gives always positive response even if the user doesn't exist
## LEETCODE: https://leetcode.com/
gives always positive response even if the user doesn't exist
<br>
## RAIDFORUMS: https://raidforums.com
gives always positive response even if the user doesn't exist
<br>
## SPOTIFY: https://open.spotify.com
gives always positive response even if the user doesn't exist
<br>
## THESE WEBSITES ARE NOT AVAIBLE FOR NOW AND MAY COME BACK IN THE FUTURES
|
MrHolmes.py
|
MrHolmes.py
|
.py
| 1,688
|
#!/usr/bin/python3
# ORIGINAL CREATOR: Luca Garofalo (Lucksi)
# AUTHOR: Luca Garofalo (Lucksi)
# Copyright (C) 2021-2023 Lucksi <[email protected]>
# License: GNU General Public License v3.0
import os
from Core.Support import Menu
from Core.Support import Font
from Core.Support import Language
filename = Language.Translation.Get_Language()
filename
class Main:
@staticmethod
def Controll_Display():
Interface_file = "Display/Display.txt"
if os.path.isfile(Interface_file):
d = open(Interface_file,"r",newline=None)
conf = d.read().strip("\n")
d.close()
if conf == "Desktop":
pass
elif conf == "Mobile":
pass
else:
print(Font.Color.RED + "[!]" + Font.Color.WHITE + Language.Translation.Translate_Language(filename, "Default", "DisplayError", "None"))
exit()
else:
print(Font.Color.RED + "[!]" + Font.Color.WHITE + Language.Translation.Translate_Language(filename, "Default", "NoDisplay", "None") .format(Interface_file))
return conf
def Menu(Mode):
Menu.Main.main(Mode)
if __name__ == "__main__":
Mode = Main.Controll_Display()
Mode
try:
Main.Menu(Mode)
except KeyboardInterrupt:
print(Font.Color.RED + "\n\n[!]" + Font.Color.WHITE + Language.Translation.Translate_Language(filename, "Default", "KeyC", "None"))
exit()
except ModuleNotFoundError as Error:
print(Font.Color.RED + "\n\n[!]" + Font.Color.WHITE + Language.Translation.Translate_Language(filename, "Default", "Internal", "None").format(str(Error)))
exit()
|
requirements.txt
|
requirements.txt
|
.txt
| 103
|
PyQRCode==1.2.1
phonenumbers==8.12.25
requests>=2.31.0
pdfkit==1.0.0
beautifulsoup4==4.9.3
stem>=1.4.0
|
RELEASES.md
|
RELEASES.md
|
.md
| 3,261
|
# :heavy_check_mark: VERSION: 1.0.2
**FUTURE VERSIONS WILL BE RELEASED SOON**
## IMPLEMENTS:
- **SOCIAL NETWORK OSINT**
- **PHONE-NUMBER-LOOKUP**
- **PROXY-REQUESTS**
- **DOMAIN AND IP GEOLOCATION**
<br>
# :heavy_check_mark: VERSION: 1.0.3
## IMPLEMENTS:
- **ADDED NEW WEBSITES**
- **ADDED JSON STRUCTURE FOR WEBSITE-LISTS**
<br>
# :heavy_check_mark: VERSION: 1.0.4
## IMPLEMENTS:
- **ADDED NEW WEBSITES**
- **ADDED ROBOTS.TXT DOWNLOAD**
- **NEW CONFIGURATION FILE**
- **ADDED NEW PHONE LOOKUP_WEBSITES**
- **ADDED MESSAGE ERROR TYPE FOR REQUESTS**
- **ADDED TERMUX INSTALLER**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1
## IMPLEMENTS:
- **ADDED NEW WEBSITES**
- **ADDED NSFW WEBSITES**
- **ADDED DATING WEBSITES**
- **ADDED A PROXY-LIST**
- **GENERAL IMPROVMENTS**
- **CHANGING MAIN-BANNER**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V2(ALFA)
## IMPLEMENTS:
- **ADDED NEW WEBSITES**
- **ADDED WEB-SCRAPING(ONLY FOR CERTAIN WEBSITES)**
- **PROXIED WEB-SCRAPING**
- **ADDED CHARACTER EXCEPTION FOR USERNAME**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V2
## IMPLEMENTS:
- **ADDED NEW WEBSITES**
- **ADDED DOMAIN/WEBSITE REPUTATION-CHECKER**
- **ADDED THE OPTION TO CHANGE YOUR PROXY_LIST**
- **ADDED RESPONSE URL ERROR TYPE FOR REQUESTS**
- **BUG FIXING**
- **DIFFERENT COLOURS FOR EVERY TYPE OF HTTP ERROR**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V3
## IMPLEMENTS:
- **ADDED NEW WEBSITES**
- **ADDED USERNAME_SESSION LOGS**
- **ADDED DATABASE(NOT WORK ON TERMUX)**
- **ADDED GUI DASHBOARD(NOT WORK ON TERMUX)**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V4
## IMPLEMENTS:
- **ADDED COORDINATES**
- **ADDED INTERACTIVE MAP**
- **ADDED LOGIN**
- **ADDED NEW-THEME**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V5
## IMPLEMENTS:
- **ADDED PORT SCANNER**
- **ADDED WINDOWS-INSTALLER**
- **ADDED FRENCH LANGUAGE**
- **ADDED A DEFAULT LANGUAGE CONTROLLER**
- **CHANGE PROGRAMM STRUCTURE**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V6
## IMPLEMENTS:
- **ADDED LAUNCHERS**
- **ADDED GUI ON WINDOWS**
- **FIXED GUI COMPATIBILITY WITH FIREFOX**
<br>
# :heavy_check_mark: VERSION: NUKE1.0.1-V7
## IMPLEMENTS:
- **ADDED FRENCH AND ITALIAN LANGUAGE**
- **ADDED INSTAGRAM POST GEOLOCATION**
- **ADDED NEW WEBSITES**
<br>
# :heavy_check_mark: VERSION: MORIARTY-1.0.1
## IMPLEMENTS:
- **ADDED NEW ENTITIES**
- **MAP CREATION**
- **ADDED VIDEO SUPPORT**
- **ADDED NEW WEBSITES**
<br>
# :heavy_check_mark: VERSION: MORIARTY-1.0.2
## IMPLEMENTS:
- **ADDED GRAPH CREATION**
- **ADDED GRAPH ENCODING**
- **ADDED NEW WEBSITES**
<br>
# :heavy_check_mark: VERSION: T.G.D-1.0.1
## IMPLEMENTS:
- **ADDED REPORT ENCODING**
- **ADDED HYPHOTESIS GENERATOR**
- **ADDED DORKS GENERATOR**
<br>
# :heavy_check_mark: VERSION: T.G.D-1.0.2
## IMPLEMENTS:
- **ADDED FILE TRANSFER**
- **ADDED TAGGED USERS**
- **ADDED TAGGED HASHTAGS**
- **ADDED TAGGED LINKS**
- **ADDED PDF CONVERTER**
- **ADDED REPORT DECODER**
- **ADDED PEOPLE OSINT**
- **UPDATE INSTALLERS**
<br>
# :heavy_check_mark: VERSION: T.G.D-1.0.3
## IMPLEMENTS:
- **ADDED HOBBY HYPOTHESIS(TRAVELLING)**
- **ADDED NEW WEBSITES**
- **UPDATE GUI**
- **ADDED AUTO BROWSER LANGUAGE DETECTION**
- **ADDED DIRECT SCRAPING**
- **ADDED DOMAIN SEARCH ON SOCIAL MEDIA**
- **UPDATE DORKS GENERATOR**
|
UNTILED.txt
|
Configuration/UNTILED.txt
|
.txt
| 2
| |
Sites.md
|
Site_lists/Sites.md
|
.md
| 7,107
|
# SITE LIST :mag: :
## (1) INSTAGRAM: https://instagram.com
## (2) GIT-HUB: https://github.com
## (3) FACEBOOK: https://facebook.com
## (4) TWITTER: https://twitter.com
## (5) POKEMON-SHODOWN: https://pokemonshowdown.com
## (6) SPEEDRUN: https://www.speedrun.com
## (7) VIMEO: https://vimeo.com
## (8) PSNPROFILES: https://psnprofiles.com
## (9) INTERPALS: https://interpals.net
## (10) DAILYMOTION: https://dailymotion.com
## (11) 7CUPS: https://7cups.com
## (12) PYPY: https://pypi.org
## (13) GOOGLE-PLAY-STORE: https://play.google.com
## (14) BUYMEACOFFEE: https://buymeacoffee.com
## (15) PATREON: https://patreon.com
## (16) FLIPBOARD: https://flipboard.com
## (17) TWITCH: https://m.twitch.tv
## (18) TWITCHTRAKER: https://twitchtracker.com
## (19) LINKTREE: https://linktr.ee/
## (20) ASKFM: https://ask.fm
## (21) LOLPROFILES: https://lolprofile.net
## (22) ABOUTME: https://about.me
## (23) 9GAG: https://9gag.com
## (24) SOURCEFORGE: https://sourceforge.net
## (25) TUMBLR: https://tumblr.com
## (26) IMGUR: https://imgur.com
## (27) VKONTATKTE: https://vk.com
## (28) DEVIANTART: https://deviantart.com
## (29) YOUPIC: https://youpic.com
## (30) GFYCAT: https://gfycat.com
## (31) FLICKR: https://flickr.com
## (32) ORACLE: https://community.oracle.com
## (33) MYANIMELIST: https://myanimelist.net/
## (34) SOUNDCLOUD: https://soundcloud.com
## (35) HACKTHEBOX: https://forum.hackthebox.eu
## (36) FORTNITETRACKER: https://fortnitetracker.com
## (37) TRYHACKME: https://tryhackme.com
## (38) FLIPBOARD: https://flipboard.com
## (39) WHATPAD: https://www.wattpad.com
## (40) HEYLINK.ME: https://heylink.me
## (41) TELLONYM: https://tellonym.me
## (42) MYSPACE: https://myspace.com
## (43) PINTEREST: https://pinterest.com
## (44) DISQUS: https://disqus.com
## (45) STEAMCOMMUNITY: https://steamcommunity.com
## (46) BITCOINFORUM: https://bitcoinforum.com
## (47) BITBUCKET: https://bitbucket.org
## (48) CLUBHOUSE: https://joinclubhouse.com
## (49) BANDCAMP: https://www.bandcamp.com
## (50) BOOKCROSSING: https://www.bookcrossing.com
## (51) CHESS: https://www.chess.com
## (52) FANDOM: https://www.fandom.com
## (53) FREESOUND: https://freesound.org
## (54) PUBG: https://pubg.op.gg
## (55) EUW: "https://euw.op.gg
## (56) QUORA: https://www.quora.com
## (57) WIKIPEDIA: https://wikipedia.org
## (58) ALLMYLINKS: https://allmylinks.com
## (59) MEDIUM: https://medium.com
## (60) SKILLSHARE: https://www.skillshare.com
## (61) PR0GRAMM: https://pr0gramm.com
## (62) BINARYSEARCH: https://binarysearch.com
## (63) MIXCLOUD: https://mixcloud.com
## (64) ARCHIVE: https://archive.org
## (65) BLOGGER: https://blogspot.com
## (66) AUDIOJUNGLE: https://audiojungle.net
## (67) DOCKERHUB: https://hub.docker.com
## (68) AMINOAPPS: https://aminoapps.com
## (69) SUBLIMEFORUMS: https://forum.sublimetext.com
## (70) MINECRAFT: https://www.minecraft.net
## (71) SPLITS.IO: https://splits.io
## (72) KIK: https://kik.me
## (73) GITLAB: "https://gitlab.com
## (74) SIGNAL: https://community.signalusers.org
## (75) WIX: https://wix.com
## (76) UNSPLASH: https://unsplash.com
## (77) FACCIABUCO: https://facciabuco.com
## (78) BEHANCE: https://behance.net
## (79) HACKADAY: https://hackaday.io
## (80) ELLO: https://ello.co
## (81) JIMDO: https://jimdosite.com
## (82) KEYBASE: https://keybase.io
## (83) SLACK: https://slack.com
## (84) CAMFROG: "https://camfrog.com
## (85) YOUNOW: https://younow.com
## (86) SHITPOSTBOT5000: https://www.shitpostbot.com
## (87) SMULE: https://smule.com
## (88) OURDJTALK: https://ourdjtalk.com
## (89) NICOMMUNITYFORUM: https://www.native-instruments.com
## (90) BUZZFEED: https://buzzfeed.com
## (91) HOUSE-MIXES: https://www.house-mixes.com
## (92) OSU!: https://osu.ppy.sh
## (93) DRIBBLE: https://dribbble.com
## (94) TIKTOK: https://tiktok.com
## (95) THEHANDBOOK: https://www.thehandbook.com
## (96) LOOKBOOK: https://lookbook.nu
## (97) CODEACADEMY: https://www.codecademy.com
## (98) DEVCOMMUNITY: https://dev.to
## (99) CODEWARS: https://www.codewars.com
## (100) DRUPAL: https://www.drupal.org
## (101) SEAPORT: https://forum.pixelfederation.com
## (102) DIGGYSADVENTURE: https://forum.pixelfederation.com
## (103) TRAINSTATION: https://forum.pixelfederation.com
## (104) TRAINDTATION2: https://forum.pixelfederation.com
## (105) PORTCITY: https://forum.pixelfederation.com
## (106) VENMO: https://venmo.com
## (107) THEMEFOREST: https://themeforest.net
## (108) CBTNUGGETS: https://www.cbtnuggets.com
## (109) PERISCOPE: https://www.pscp.tv
## (110) LIVESTREAM: https://livestream.com
## (111) KO-FI: https://ko-fi.com
## (112) LINKGENIE: https://linkgenie.co
## (113) VSCO: https://vsco.co
## (114) PASTEBIN: https://pastebin.com
## (115) RUBYGEMS: https://rubygems.org
## (116) ASCIINEMA: https://asciinema.org
## (117) MILKSHAKE: https://milkshake.app
## (118) MYMONAT: https://mymonat.com
## (119) WORDPRESS: https://{}.wordpress.com
## (120) GITEE: https://gitee.com
## (121) SCRATCH: https://scratch.mit.edu
## (122) NPM: https://www.npmjs.com
## (123) MSTDN: https://mstdn.io
## (124) HUBPAGES: https://hubpages.com
## (125) GAMESPOT: https://www.gamespot.com
## (126) OPENSOURCE: https://opensource.com
## (127) OPENSTREETMAP: https://www.openstreetmap.org
## (128) SLIDESHARE: https://slideshare.net
## (129) RATEYOURMUSIC: https://rateyourmusic.com
## (130) NOTABUH: https://notabug.org
## (131) MOIKRUG: https://career.habr.com
## (132) NEWGROUNDS: https://newgrounds.com
## (133) ROBLOX: https://www.roblox.com
## (134) LISTAL: https://www.listal.com
## (135) HACKERONE: https://hackerone.com
## (136) BUGCROWD: https://bugcrowd.com
## (137) QUOTEV: https://www.quotev.com
## (138) JOINROLL: https://joinroll.com
## (139) VBOX7: https://www.vbox7.com
## (140) BITCHUTE: https://www.bitchute.com
## (141) OPENSEA: https://opensea.io
## (142) HEYLINK: https://heylink.me
## (143) NGL: https://ngl.link
<br>
# NSFW SITES :underage: :
## (1) YOUPORN: https://youporn.com
## (2) PORNHUB: https://pornhub.com
## (3) TINDER: https://tinder.com
## (4) CHATURBATE: https://chaturbate.com
## (5) XHAMSTER: https://xhamster.com
## (6) XVIDEOS: https://xvideos.com
## (7) BONGACAMS: https://pt.bongacams.com
## (8) LIVEJASMIN: https://livestream.com
<br>
# PHONE-NUMBER LOOKUP-SITES :iphone: :
# ITALY :it: :
## (1) PAGINEGIALLE: https://www.paginebianche.it
## (2) PAGINEBIANCHE: https://www.paginebianche.it
<br>
# USA :us: :
## (1) 411: https://www.411.com
## (2) WHITEPAGES: https://www.whitepages.com
## (3) 8080: https://800notes.com
<br>
# GERMANY :de: :
## (1) 11880: https://www.11880.com
## (2) TELEFONABC: https://www.telefonabc.at
## (3) GOYELLOW: https://www.goyellow.de
<br>
# FRANCE :fr: :
## (1) PAGESJAUNES: https://www.pagesjaunes.fr
<br>
# ROMANIA :romania: :
## (1) NUMBERVILLE: https://numberville.com
## (2) CARTETELEFONAE: https://www.carte-telefoane.info
<br>
# SWITZERLAND :switzerland: :
## (1) LOCAL : https://www.local.ch
<br>
# UNIVERSAL LOOKUP-SITES :
## (1) FREELOOKUP: https://free-lookup.net
## (2) WHOSENUMBER: https://whosenumber.info
<br>
# USERNAME SITES: 151
# PHONE-NUMBER SITES: 14
# TOTAL: 165 SITES
|
Lists.json
|
Site_lists/E-Mail/Lists.json
|
.json
| 283
|
[
{
"HaveiBeenPowned":{
"name": "HaveiBeenPowned",
"url": "https://api.haveibeenpwned.com/unifiedsearch/{}"
},
"IntelligenceX":{
"name": "IntelligenceX",
"url": "https://intelx.io/?s={}"
}
}
]
|
Google_dorks.txt
|
Site_lists/E-Mail/Google_dorks.txt
|
.txt
| 2,804
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=inurl:%22{}%22
| https://www.google.com/search?q=intext:%22{}%22
| https://www.google.com/search?q=intext:(%22{}%22)filetype:txt
| https://www.google.com/search?q=intext:(%22{}%22)filetype:csv
| https://www.google.com/search?q=intext:(%22{}%22)filetype:pdf
| https://www.google.com/search?q=intext:(%22{}%22)filetype:doc
| https://www.google.com/search?q=intext:(%22{}%22)filetype:docx
| https://www.google.com/search?q=intext:(%22{}%22)filetype:log
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xls
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xlsx
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:xlsx
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:txt
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:csv
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:pdf
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:doc
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:docx
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:log
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xls
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xlsx
| https://www.google.com/search?q=inurl:%22{}%22
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/E-Mail/Yandex_dorks.txt
|
.txt
| 2,198
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text={}mime:txt
| https://yandex.com/search/?text={}mime:pdf
| https://yandex.com/search/?text={}mime:csv
| https://yandex.com/search/?text={}mime:doc
| https://yandex.com/search/?text={}mime:docx
| https://yandex.com/search/?text={}mime:log
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:txt
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:pdf
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:csv
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:doc
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:docx
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&&mime:log
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:xls
| https://yandex.com/search/?text={}&&(!Password|!password|!PASSWORD)&& mime:xlsx
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=title:{}
| https://yandex.com/search/?text=title:{}&&mime:txt
| https://yandex.com/search/?text=title:{}&&mime:pdf
| https://yandex.com/search/?text=title:{}&&mime:csv
| https://yandex.com/search/?text=title:{}&&mime:doc
| https://yandex.com/search/?text=title:{}&&mime:docx
| https://yandex.com/search/?text=title:{}&&mime:xls
| https://yandex.com/search/?text=title:{}&&mime:xlsx
| https://yandex.com/search/?text=title:{}&&mime:log
| https://yandex.com/search/?text=inurl:{}
----------------------------------------------------------------------------------------------------------------------
|
Yandex_Fingerprints.txt
|
Site_lists/Phone/Yandex_Fingerprints.txt
|
.txt
| 540
|
[FINGER-PRINTS-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=site:instagram.com+"{}"
| https://yandex.com/search/?text=site:twitter.com+"{}"
| https://yandex.com/search/?text=site:facebook.com+"{}"
| https://yandex.com/search/?text=site:vk.com+"{}"
| https://yandex.com/search/?text=site:linkedin.com+"{}"
----------------------------------------------------------------------------------------------------------------------
|
Fingerprints.txt
|
Site_lists/Phone/Fingerprints.txt
|
.txt
| 645
|
[FINGER-PRINTS-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=site:www.instagram.com+intext:%22%22{}%22%22
| https://www.google.com/search?q=site:www.twitter.com+intext:%22%22{}%22%22
| https://www.google.com/search?q=site:www.facebook.com+intext:%22%22{}%22%22
| https://www.google.com/search?q=site:www.vk.com+intext:%22%22{}%22%22
| https://www.google.com/search?q=site:www.linkedin.com+intext:%22%22{}%22%22
----------------------------------------------------------------------------------------------------------------------
|
Google_dorks.txt
|
Site_lists/Phone/Google_dorks.txt
|
.txt
| 1,700
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=inurl:%22{}%22
| https://www.google.com/search?q=intext:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)filetype:txt
| https://www.google.com/search?q=intext:(%22{}%22)filetype:csv
| https://www.google.com/search?q=intext:(%22{}%22)filetype:pdf
| https://www.google.com/search?q=intext:(%22{}%22)filetype:doc
| https://www.google.com/search?q=intext:(%22{}%22)filetype:docx
| https://www.google.com/search?q=intext:(%22{}%22)filetype:log
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xls
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xlsx
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intitle:(%22{}%22)
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:txt
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:csv
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:pdf
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:doc
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:docx
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:log
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xls
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xlsx
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/Phone/Yandex_dorks.txt
|
.txt
| 1,494
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text={}
| https://yandex.com/search/?text=({})mime:txt
| https://yandex.com/search/?text=({})mime:pdf
| https://yandex.com/search/?text=({})mime:csv
| https://yandex.com/search/?text=({})mime:doc
| https://yandex.com/search/?text=({})mime:log
| https://yandex.com/search/?text=({})mime:docx
| https://yandex.com/search/?text=({})mime:xls
| https://yandex.com/search/?text=({})mime:xlsx
| https://yandex.com/search/?text=({})mime:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=title:{}
| https://yandex.com/search/?text=title:({})mime:txt
| https://yandex.com/search/?text=title:({})mime:pdf
| https://yandex.com/search/?text=title:({})mime:csv
| https://yandex.com/search/?text=title:({})mime:doc
| https://yandex.com/search/?text=title:({})mime:docx
| https://yandex.com/search/?text=title:({})mime:log
| https://yandex.com/search/?text=title:({})mime:xls
| https://yandex.com/search/?text=title:({})mime:xlsx
| https://yandex.com/search/?text=title:({})mime:odt
----------------------------------------------------------------------------------------------------------------------
|
ITA_phone.json
|
Site_lists/Phone/Lookup/ITA_phone.json
|
.json
| 1,924
|
[
{
"PagineBianche":{
"Error": "Message",
"text": "Spiacenti. Nessun risultato trovato per ",
"name": "PagineBianche",
"main": "PagineBianche.it",
"url": "https://www.paginebianche.it/cerca-da-numero?qs={}",
"url2": "https://www.paginebianche.it/cerca-da-numero?qs={}",
"Scrapable": "False",
"Tag": ["Italy"]
},
"PaginGialle":{
"Error": "Message",
"text": "Spiacenti, non siamo riusciti a trovare",
"name": "PagineGialle",
"main": "PagineGialle.it",
"url": "https://www.paginegialle.it/ricerca/telefono-{}",
"url2": "https://www.paginegialle.it/ricerca/telefono-{}",
"Scrapable": "False",
"Tag": ["Italy"]
},
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
}
}
]
|
FRA_phone.json
|
Site_lists/Phone/Lookup/FRA_phone.json
|
.json
| 1,577
|
[
{
"PagesJaunes":{
"Error": "Message",
"text": "Oups… nous n’avons pas encore de réponse à cette recherche !",
"name": "PagesJaunes",
"main": "pagesjaunes.fr",
"url": "https://www.pagesjaunes.fr/annuaireinverse/recherche?quoiqui={}",
"url2": "https://www.pagesjaunes.fr/annuaireinverse/recherche?quoiqui={}",
"Scrapable": "False",
"Tag": ["French"]
},
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
}
}
]
|
Undefined.json
|
Site_lists/Phone/Lookup/Undefined.json
|
.json
| 1,092
|
[
{
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
}
}
]
|
DEU_phone.json
|
Site_lists/Phone/Lookup/DEU_phone.json
|
.json
| 2,252
|
[
{
"11880":{
"Error": "Message",
"text": "Einfach nochmal probieren!",
"name" : "11880",
"main" : "11880.com",
"url" : "https://www.11880.com/suche/{}/deutschland",
"url2" : "https://www.11880.com/suche/{}/deutschland",
"Scrapable": "False",
"Tag": ["Deutschland"]
},
"TelefonABC":{
"Error": "Status-Code",
"name" : "TelefonABC",
"main" : "telefonabc.at",
"url" : "https://www.telefonabc.at/result.aspx?what={}",
"url2" : "https://www.telefonabc.at/result.aspx?what={}",
"Scrapable": "False",
"Tag": ["Deutschland"]
},
"GoYellow":{
"Error": "Message",
"text" : "Zu Ihrer Suche haben wir leider nichts gefunden.",
"name" : "GoYellow",
"main" : "goyellow.de",
"url" : "https://www.goyellow.de/suche/{}/-",
"url2" : "https://www.goyellow.de/suche/{}/-",
"Scrapable": "False",
"Tag": ["Deutschland"]
},
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
}
}
]
|
SWIS_phone.json
|
Site_lists/Phone/Lookup/SWIS_phone.json
|
.json
| 1,495
|
[
{
"Local.ch":{
"Error": "Message",
"text": "Sorry, we couldn't find any results for in switzerland",
"name": "Local.ch",
"main": "local.ch",
"url": "https://www.local.ch/en/q/switzerland/{}",
"url2": "https://www.local.ch/en/q/switzerland/{}",
"Scrapable": "False",
"Tag": ["Switzerland"]
},
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
}
}
]
|
ROU_phone.json
|
Site_lists/Phone/Lookup/ROU_phone.json
|
.json
| 1,559
|
[
{
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"CarteTelefonae":{
"Error": "Message",
"text": "Niciun rezultat!",
"name": "CarteTelefonae",
"main": "carte-telefoane.info",
"url": "https://www.carte-telefoane.info/cauta.php?nume=&x=47&y=21&judet=&telefon={}",
"url2": "https://www.carte-telefoane.info/cauta.php?nume=&x=47&y=21&judet=&telefon={}",
"Scrapable": "False",
"Tag": ["Romania"]
}
}
]
|
USA_phone.json
|
Site_lists/Phone/Lookup/USA_phone.json
|
.json
| 2,027
|
[
{
"411":{
"Error": "Status-Code",
"name": "411",
"main": "411.com",
"url": "https://www.411.com/phone/{}",
"url2": "https://www.411.com/phone/{}",
"Scrapable": "False",
"Tag": ["USA"]
},
"WhitePages":{
"Error": "Status-Code",
"name": "WhitePages",
"main": "whitepages.com",
"url": "https://www.whitepages.com/phone/{}",
"url2": "https://www.whitepages.com/phone/{}",
"Scrapable": "False",
"Tag": ["USA"]
},
"FreeLookup":{
"Error": "Status-Code",
"name": "FreeLookup",
"main": "free-lookup.net",
"url": "https://free-lookup.net/{}",
"url2": "https://free-lookup.net/{}",
"Scrapable": "False",
"Tag": ["USA"]
},
"8080":{
"Error": "Status-Code",
"name": "8080",
"main": "800notes.com",
"url": "https://800notes.com/Phone.aspx/{}",
"url2": "https://800notes.com/Phone.aspx/{}",
"Scrapable": "False",
"Tag": ["USA"]
},
"WhoseNumber":{
"Error": "Message",
"text": "No comments for this phone number",
"name": "WhoseNumber",
"main": "whosenumber.info",
"url": "https://whosenumber.info/{}",
"url2": "https://whosenumber.info/{}",
"Scrapable": "False",
"Tag": ["Generic"]
},
"SpamCalls":{
"Error": "Message",
"text": "User reports for the phone number are not (no longer) available.",
"name": "SpamCalls",
"main": "spamcalls.net",
"url": "https://spamcalls.net/en/number/{}",
"url2": "https://spamcalls.net/en/number/{}",
"Scrapable": "False",
"Tag": ["Generic"]
}
}
]
|
site_list.json
|
Site_lists/Username/site_list.json
|
.json
| 56,424
|
[
{
"Instagram":{
"Error": "Status-Code",
"name": "Instagram",
"main": "instagram.com",
"user": "https://instagram.com/{}",
"user2": "https://www.picuki.com/profile/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://www.picuki.com/profile/{}",
"Tag": ["Social", "Photo", "Video", "Chatting"]
},
"Threads":{
"Error": "Message",
"text": "<title>Threads</title>",
"name": "Threads",
"main": "threads.net",
"user": "https://threads.net/@{}",
"user2": "https://threads.net/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social", "Photo", "Video", "Chatting"]
},
"GitHub":{
"Error": "Status-Code",
"name": "GitHub",
"main": "github.com",
"user": "https://github.com/{}",
"user2": "https://github.com/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://api.github.com/users/{}",
"Tag": ["Programming","OpenSource"]
},
"Holopin":{
"Error": "Message",
"text": "Not found",
"name": "Holopin",
"main": "holopin.io",
"user": "https://holopin.io/@{}",
"user2": "https://holopin.io/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Badge"]
},
"YouTube":{
"Error": "Status-Code",
"name": "YouTube",
"main": "youtube.com",
"user": "https://youtube.com/@{}",
"user2": "https://www.youtube.com/feeds/videos.xml?user={}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Video","Sharing","Youtube"]
},
"Facebook":{
"Error": "Message",
"text": "You must log in to continue.",
"name": "Facebook",
"main": "facebook.com",
"user": "https://facebook.com/{}",
"user2": "https://facebook.com/{}",
"exception": [".","_"],
"Scrapable": "False",
"Tag": ["Social","Chatting"]
},
"Disqus":{
"Error": "Status-Code",
"name": "Disqus",
"main": "disqus.com",
"user": "https://disqus.com/{}",
"user2": "https://disqus.com/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://disqus.com/api/3.0/users/details?user=username%3A{}&attach=userFlaggedUser&api_key=E8Uh5l5fHZ6gD8U3KycjAIAk46f68Zw7C6eW8WSjZvCLXebZ7p0r1yrYDrLilk2F",
"Tag": ["Chatting"]
},
"Pinterest":{
"Error": "Response-Url",
"response": "https://pinterest.com/",
"name": "Pinterest",
"main": "pinterest.com",
"user": "https://pinterest.com/{}",
"user2": "https://pinterest.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image","Social","Photo"]
},
"Passes":{
"Error": "Message",
"text": "{}},",
"name": "Passes",
"main": "passes.com",
"user": "https://passes.com/{}",
"user2": "https://passes.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image","Social","Photo"]
},
"Imgur":{
"Error": "Status-Code",
"name": "Imgur",
"main": "imgur.com",
"user": "https://imgur.com/user/{}",
"user2": "https://api.imgur.com/account/v1/accounts/{}?client_id=546c25a59c58ad7",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://api.imgur.com/account/v1/accounts/{}?client_id=546c25a59c58ad7",
"Tag": ["Image"]
},
"MySpace":{
"Error": "Status-Code",
"name": "MySpace",
"main": "myspace.com",
"user": "https://myspace.com/{}",
"user2": "https://myspace.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social","Chatting"]
},
"Tellonym":{
"Error": "Status-Code",
"name": "Tellonym",
"main": "tellonym.me",
"user": "https://tellonym.me/{}",
"user2": "https://tellonym.me/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://tellonym.me/{}",
"Tag": ["Questions","Chatting"]
},
"Twitch":{
"Error": "Status-Code",
"name": "Twitch",
"main": "twitch.tv",
"user": "https://twitch.tv/{}",
"user2": "https://m.twitch.tv/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Streaming","Gaming","Chatting"]
},
"Wattpad":{
"Error": "Status-Code",
"name": "Wattpad",
"main": "wattpad.com",
"user": "https://www.wattpad.com/user/{}",
"user2": "https://www.wattpad.com/user/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://www.wattpad.com/api/v3/users/{}/",
"Tag": ["Writing","Stories"]
},
"FortniteTracker":{
"Error": "Status-Code",
"name": "FortniteTracker",
"main": "fortnitetracker.com",
"user": "https://fortnitetracker.com/profile/all/{}",
"user2": "https://fortnitetracker.com/profile/all/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming","Fortnite"]
},
"HackTheBox":{
"Error": "Status-Code",
"name": "HackTheBox",
"main": "hackthebox.eu",
"user": "https://forum.hackthebox.eu/profile/{}",
"user2": "https://forum.hackthebox.eu/profile/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Hacking"]
},
"MyAnimeList":{
"Error": "Status-Code",
"name": "MyAnimeList",
"main": "myanimelist.net",
"user": "https://myanimelist.net/profile/{}",
"user2": "https://myanimelist.net/profile/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Anime"]
},
"Oracle":{
"Error": "Status-Code",
"name": "Oracle",
"main": "community.oracle.com",
"user": "https://community.oracle.com/people/{}",
"user2": "https://community.oracle.com/people/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Forum-Programming"]
},
"SoundCloud":{
"Error": "Status-Code",
"name": "SoundCloud",
"main": "soundcloud.com",
"user": "https://soundcloud.com/{}",
"user2": "https://soundcloud.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Music"]
},
"Vimeo":{
"Error": "Message",
"text":"Sorry, we couldn’t find that page",
"name": "Vimeo",
"main": "vimeo.com",
"user": "https://vimeo.com/{}",
"user2": "https://vimeo.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Video"]
},
"Youpic":{
"Error": "Status-Code",
"name": "Youpic",
"main": "youpic.com",
"user": "https://youpic.com/photographer/{}/",
"user2": "https://youpic.com/photographer/{}/",
"exception": ["/"," "],
"Scrapable": "False",
"Tag": ["Image","Photo"]
},
"Gfycat":{
"Error": "Status-Code",
"name": "Gfycat",
"main": "gfycat.com",
"user": "https://gfycat.com/@{}",
"user2": "https://gfycat.com/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gyf"]
},
"Flickr":{
"Error": "Status-Code",
"name": "Flickr",
"main": "flickr.com",
"user": "https://www.flickr.com/photos/{}",
"user2": "https://www.flickr.com/photos/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image","Photo"]
},
"DeviantArt":{
"Error": "Status-Code",
"name": "DeviantArt",
"main": "deviantart.com",
"user": "https://www.deviantart.com/{}",
"user2": "https://www.deviantart.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Art","Photo"]
},
"VKontakte":{
"Error": "Status-Code",
"name": "VKontakte",
"main" : "vk.com",
"user" : "https://vk.com/{}",
"user2" : "https://vk.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social","Chatting"]
},
"9GAG":{
"Error": "Status-Code",
"name": "9GAG",
"main": "9gag.com",
"user": "https://9gag.com/u/{}",
"user2": "https://9gag.com/u/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Meme"]
},
"Daylimotion":{
"Error": "Status-Code",
"name": "Dailymotion",
"main": "dailymotion.com",
"user": "https://www.dailymotion.com/{}",
"user2": "https://www.dailymotion.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Video"]
},
"Tumblr":{
"Error": "Status-Code",
"name": "Tumblr",
"main": "tumblr.com",
"user": "https://{}.tumblr.com/",
"user2": "https://{}.tumblr.com/",
"exception": [" ","."],
"Scrapable": "False",
"Tag": ["Blog","Social"]
},
"SourceForge":{
"Error": "Status-Code",
"name": "SourceForge",
"main": "sourceforge.net/",
"user": "https://sourceforge.net/u/{}",
"user2": "https://sourceforge.net/u/{}",
"exception": " ",
"Scrapable": "False",
"Tag": ["Programming"]
},
"PyPi":{
"Error": "Status-Code",
"name": "PyPi",
"main": "pypi.org",
"user": "https://pypi.org/user/{}",
"user2": "https://pypi.org/user/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Programming", "OpenSource", "Python"]
},
"GooglePlay":{
"Error": "Status-Code",
"name": "GooglePlay",
"main": "play.google.com/store",
"user": "https://play.google.com/store/apps/developer?id={}",
"user2": "https://play.google.com/store/apps/developer?id={}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Store", "Gaming", "Programming"]
},
"About.Me":{
"Error": "Status-Code",
"name": "About.Me",
"main": "about.me",
"user": "https://about.me/{}",
"user2": "https://about.me/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Blog"]
},
"PokemonShowdown":{
"Error": "Status-Code",
"name": "Pokemon Showdown",
"main": "pokemonshowdown.com",
"user": "https://pokemonshowdown.com/users/{}",
"user2": "https://pokemonshowdown.com/users/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming","Pokemon"]
},
"LolProfiles":{
"Error": "Message",
"text": "We could not find any results, please try again later or check your input.",
"name": "LolProfiles",
"main": "lolprofile.net",
"user": "https://lolprofile.net/search/world/{}",
"user2": "https://lolprofile.net/search/world/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming","LoL"]
},
"Twitter":{
"Error": "Message",
"text": "not found",
"name": "Twitter",
"main": "twitter.com",
"user": "https://mobile.twitter.com/{}",
"user2": "https://nitter.net/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://nitter.net/{}",
"Tag": ["Social","Chatting"]
},
"PsnProfiles":{
"Error": "Message",
"text": "Update User",
"name": "PsnProfiles",
"main": "psnprofiles.com",
"user": "https://psnprofiles.com/{}",
"user2": "https://psnprofiles.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming","PlayStation"]
},
"7Cups":{
"Error": "Status-Code",
"name": "7Cups",
"main": "7cups.com",
"user": "https://www.7cups.com/@{}",
"user2": "https://www.7cups.com/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image"]
},
"AskFM":{
"Error": "Message",
"text": "Well, apparently not anymore.",
"name": "AskFM",
"main": "ask.fm",
"user": "https://ask.fm/{}",
"user2": "https://ask.fm/{}",
"exception": [" ","."],
"Scrapable": "False",
"Tag": ["Questions"]
},
"TwitchTracker":{
"Error": "Status-Code",
"name": "TwitchTracker",
"main": "twitchtracker.com",
"user": "https://twitchtracker.com/{}",
"user2": "https://twitchtracker.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Streaming","Gaming","Chatting"]
},
"LinkTree":{
"Error": "Status-Code",
"name": "LinkTree",
"main": "linktr.ee",
"user": "https://linktr.ee/{}",
"user2": "https://linktr.ee/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url" : "https://linktr.ee/{}",
"Tag": ["Link"]
},
"Patreon":{
"Error": "Status-Code",
"name": "Patreon",
"main": "patreon.com",
"user": "https://patreon.com/{}",
"user2": "https://patreon.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Donations"]
},
"Flipboard":{
"Error": "Status-Code",
"name": "Flipboard",
"main": "flipboard.com",
"user": "https://flipboard.com/@{}",
"user2": "https://flipboard.com/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image","Blog","Article"]
},
"BuyMeACoffee":{
"Error": "Status-Code",
"name": "BuyMeACoffee",
"main": "buymeacoffee.com",
"user": "https://www.buymeacoffee.com/{}",
"user2": "https://www.buymeacoffee.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Donations"]
},
"Interpals":{
"Error": "Message",
"text": "The requested user does not exist or is inactive",
"name": "Interpals",
"main": "interpals.net",
"user": "https://www.interpals.net/{}",
"user2": "https://www.interpals.net/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social"]
},
"TryHackMe":{
"Error": "Response-Url",
"response": "https://tryhackme.com/r/not-found",
"name": "TryHackMe",
"main": "tryhackme.com",
"user": "https://tryhackme.com/p/{}",
"user2": "https://tryhackme.com/p/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Hacking"]
},
"SteamCommunity":{
"Error": "Message",
"text": "The specified profile could not be found.",
"name": "SteamCommunity",
"main": "steamcommunity.com",
"user": "https://steamcommunity.com/id/{}",
"user2": "https://steamcommunity.com/id/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming, Steam"]
},
"BitcoinForum":{
"Error": "Message",
"text": "The user whose profile you are trying to view does not exist.",
"name": "BitcoinForum",
"main": "bitcoinforum.com",
"user": "https://bitcoinforum.com/profile/{}",
"user2": "https://bitcoinforum.com/profile/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["BitCoin-Forum", "BitCoin"]
},
"BitBucket":{
"Error": "Status-Code",
"name": "BitBucket",
"main": "bitbucket.org",
"user": "https://bitbucket.org/{}/",
"user2": "https://bitbucket.org/{}/",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Programming","OpenSource"]
},
"ClubHouse":{
"Error": "Status-Code",
"name": "ClubHouse",
"main": "joinclubhouse.com",
"user": "https://joinclubhouse.com/@{}",
"user2": "https://joinclubhouse.com/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social"]
},
"Bandcamp":{
"Error": "Status-Code",
"name": "Bandcamp",
"main": "bandcamp.com",
"user": "https://www.bandcamp.com/{}",
"user2": "https://www.bandcamp.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image"]
},
"Bookcrossing":{
"Error": "Status-Code",
"name": "Bookcrossing",
"main": "bookcrossing.com",
"user": "https://www.bookcrossing.com/mybookshelf/{}/",
"user2": "https://www.bookcrossing.com/mybookshelf/{}/",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Books"]
},
"Chess.com":{
"Error": "Message",
"text": "not found",
"name": "Chess.com",
"main": "chess.com",
"user": "https://www.chess.com/member/{}",
"user2": "https://api.chess.com/pub/player/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://api.chess.com/pub/player/{}",
"Tag": ["Chess","Chess.com"]
},
"Fandom":{
"Error": "Status-Code",
"name": "Fandom",
"main": "fandom.com",
"user": "https://www.fandom.com/u/{}",
"user2": "https://www.fandom.com/u/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social","Forum"]
},
"Freesound":{
"Error": "Status-Code",
"name": "Freesound",
"main": "freesound.org",
"user": "https://freesound.org/people/{}",
"user2": "https://freesound.org/people/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Music"]
},
"Pubg":{
"Error": "Message",
"text": "The player is not registered at OP.GG. Please check your spelling and search again.",
"name": "Pubg",
"main": "pubg.op.gg",
"user": "https://pubg.op.gg/user/{}",
"user2": "https://pubg.op.gg/user/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming"]
},
"Euw":{
"Error": "Message",
"text": "This summoner is not registered at OP.GG. Please check spelling.",
"name": "Euw",
"main": "euw.op.gg",
"user": "https://euw.op.gg/summoner/userName={}",
"user2": "https://euw.op.gg/summoner/userName={}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Gaming"]
},
"Quora":{
"Error": "Status-Code",
"name": "Quora",
"main": "quora.com",
"user": "https://www.quora.com/profile/{}",
"user2": "https://www.quora.com/profile/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Questions"]
},
"Wikipedia":{
"Error": "Status-Code",
"name": "Wikipedia",
"main": "wikipedia.org",
"user": "https://wikipedia.org/wiki/User:{}",
"user2": "https://wikipedia.org/wiki/User:{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Informations"]
},
"Gravatar":{
"Error": "Status-Code",
"name": "Gravatar",
"main": "gravater.com",
"user": "https://gravatar.com/{}",
"user2": "https://gravatar.com/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://gravatar.com/{}.json",
"Tag": ["Avatar","Social"]
},
"AllMyLinks":{
"Error": "Status-Code",
"name": "AllMyLinks",
"main": "allmylinks.com",
"user": "https://allmylinks.com/{}",
"user2": "https://allmylinks.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Links"]
},
"Medium": {
"Error": "Message",
"text": "PAGE NOT FOUND",
"name": "Medium",
"main": "medium.com",
"user": "https://medium.com/@{}",
"user2": "https://medium.com/@{}",
"exception": [" ",".","_"],
"Scrapable": "False",
"Tag": ["Blog"]
},
"SkillShare":{
"Error": "Status-Code",
"name": "SkillShare",
"main": "skillshare.com",
"user": "https://www.skillshare.com/user/{}",
"user2": "https://www.skillshare.com/user/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Image"]
},
"Pr0gramm":{
"Error": "Status-Code",
"text": "{error: notFound, code: 404, msg: Not Found}",
"name": "Pr0gramm",
"main": "pr0gramm.com",
"user": "https://pr0gramm.com/user/{}",
"user2": "https://pr0gramm.com/api/profile/info?name={}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://pr0gramm.com/api/profile/info?name={}",
"Tag": ["Programming"]
},
"BinarySearch":{
"Error": "Message",
"text": "{}",
"name": "BinarySearch",
"main": "binarysearch.com",
"user": "https://binarysearch.com/@/{}",
"user2": "https://binarysearch.com/api/users/{}/profile",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://binarysearch.com/api/users/{}/profile",
"Tag": ["Social"]
},
"MixCloud":{
"Error": "Status-Code",
"name": "MixCloud",
"main": "mixcloud.com",
"user": "https://mixcloud.com/{}/",
"user2": "https://api.mixcloud.com/{}/",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://api.mixcloud.com/{}/",
"Tag": ["Music"]
},
"Archive.org":{
"Error": "Message",
"text": "cannot find account",
"name": "Archive.org",
"main": "archive.org",
"user": "https://archive.org/details/@{}",
"user2": "https://archive.org/details/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Archieve"]
},
"Blogger":{
"Error": "Status-Code",
"name": "Blogger",
"main": "blogspot.com",
"user": "https://{}.blogspot.com",
"user2": "https://{}.blogspot.com",
"exception": [" ",".","/"],
"Scrapable": "False",
"Tag": ["Blog"]
},
"AudioJungle":{
"Error": "Status-Code",
"name": "AudioJungle",
"main": "audiojungle.net",
"user": "https://audiojungle.net/user/{}",
"user2": "https://audiojungle.net/user/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Music"]
},
"DockerHub":{
"Error": "Message",
"text": "User not found",
"name": "DockerHub",
"main": "hub.docker.com",
"user": "https://hub.docker.com/u/{}/",
"user2": "https://hub.docker.com/v2/users/{}/",
"exception": [" ",".","/","_"],
"Scrapable": "True",
"Scrapable_url": "https://hub.docker.com/v2/users/{}/",
"Tag": ["Programming","Docker"]
},
"AminoApps":{
"Error": "Status-Code",
"name": "AminoApps",
"main": "aminoapps.com/",
"user": "https://aminoapps.com/u/{}",
"user2": "https://aminoapps.com/u/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social"]
},
"SublimeForum":{
"Error": "Status-Code",
"name": "SublimeForum",
"main": "sublimetext.com",
"user": "https://forum.sublimetext.com/u/{}",
"user2": "https://forum.sublimetext.com/u/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Forum","Sublimetext"]
},
"Kik":{
"Error": "Message",
"text": "The page you requested was not found.",
"name": "Kik",
"main": "kik.me",
"user": "https://kik.me/{}",
"user2": "https://ws2.kik.com/user/{}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://ws2.kik.com/user/{}",
"Tag": ["Social"]
},
"Signal-Community":{
"Error": "Status-Code",
"text": "Oops! That page doesn’t exist or is private.",
"name": "Signal-Community",
"main": "community.signalusers.org",
"user": "https://community.signalusers.org/u/{}",
"user2": "https://community.signalusers.org/u/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Social", "Chatting"]
},
"GitLab":{
"Error": "Message",
"text": "[]",
"name": "GitLab",
"main": "gitlab.com",
"user": "https://gitlab.com/{}",
"user2": "https://gitlab.com/api/v4/users?username={}",
"exception": [" "],
"Scrapable": "True",
"Scrapable_url": "https://gitlab.com/api/v4/users?username={}",
"Tag":["Programming","OpenSource"]
},
"Wix":{
"Error": "Status-Code",
"name": "Wix",
"main": "wix.com",
"user": "https://{}.wix.com",
"user2": "https://{}.wix.com",
"exception": [" ",".","/"],
"Scrapable": "False",
"Tag": ["Website"]
},
"UnSplash":{
"Error": "Status-Code",
"name": "UnSplash",
"main": "unsplash.com",
"user": "https://unsplash.com/@{}",
"user2": "https://unsplash.com/@{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Image"]
},
"FacciaBuco":{
"Error":"Status-Code",
"name": "FacciaBuco",
"main": "facciabuco.com",
"user": "https://www.facciabuco.com/vaccheca/{}",
"user2": "https://www.facciabuco.com/vaccheca/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"Behance":{
"Error": "Status-Code",
"name": "Behance",
"main": "behance.net",
"user": "https://www.behance.net/{}",
"user2": "https://www.behance.net/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Portfolio"]
},
"Hackaday":{
"Error": "Status-Code",
"name": "Hackaday",
"main": "hackaday.io",
"user": "https://hackaday.io/{}",
"user2": "https://hackaday.io/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming, Hacking"]
},
"Ello":{
"Error": "Status-Code",
"name": "Ello",
"main": "ello.co",
"user": "https://ello.co/{}",
"user2": "https://ello.co/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Market"]
},
"Jimdo":{
"Error": "Status-Code",
"name": "Jimdo",
"main": "jimdosite.com",
"user": "https://{}.jimdosite.com",
"user2": "https://{}.jimdosite.com",
"exception": [" ",".","/"],
"Scrapable": "False",
"Tag": ["Website"]
},
"Keybase":{
"Error": "Status-Code",
"name": "Keybase",
"main": "keybase.io",
"user": "https://keybase.io/{}",
"user2": "https://keybase.io/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Key"]
},
"Slack":{
"Error": "Status-Code",
"name": "Slack",
"main": "slack.com",
"user": "https://{}.slack.com",
"user2": "https://{}.slack.com",
"exception": [" ",".","/"],
"Scrapable": "False",
"Tag": ["Team"]
},
"Camfrog":{
"Error": "Message",
"text": "There is no user with this nickname.",
"name": "Camfrog",
"main": "camfrog.com",
"user": "https://profiles.camfrog.com/en/{}",
"user2": "https://profiles.camfrog.com/en/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Video"]
},
"YouNow":{
"Error": "Message",
"text": "No users found",
"name": "YouNow",
"main": "younow.com",
"user": "https://younow.com/{}",
"user2": "https://api.younow.com/php/api/broadcast/info/user={}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Streaming"]
},
"ShitpostBot5000":{
"Error": "Status-Code",
"name": "ShitpostBot5000",
"main": "shitpostbot.com",
"user": "https://www.shitpostbot.com/user/{}",
"user2": "https://www.shitpostbot.com/user/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Meme"]
},
"Smule":{
"Error": "Message",
"text": "Smule | Page Not Found (404)",
"name": "Smule",
"main": "smule.com",
"user": "https://www.smule.com/{}",
"user2": "https://www.smule.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Sing","Music"]
},
"OurDjTalk":{
"Error": "Message",
"text": "The requested page could not be found.",
"name": "OurDjTalk",
"main": "ourdjtalk.com",
"user": "https://ourdjtalk.com/djs/{}",
"user2": "https://ourdjtalk.com/djs/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Music"]
},
"NICommunityForum":{
"Error": "Message",
"text": "PAGE NOT FOUND",
"name": "NICommunityForum",
"main": "native-instruments.com",
"user": "https://www.native-instruments.com/profile/{}",
"user2": "https://www.native-instruments.com/profile/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"BuzzFeed":{
"Error": "Status-Code",
"name": "BuzzFeed",
"main": "buzzfeed.com",
"user": "https://buzzfeed.com/{}",
"user2": "https://buzzfeed.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Feed"]
},
"House-Mixes":{
"Error": "Message",
"text": "Profile Not Found",
"name": "House-Mixes",
"main": "house-mixes.com",
"user": "https://www.house-mixes.com/profile/{}",
"user2": "https://www.house-mixes.com/profile/{}",
"exception": [" ","/",".","_","-"],
"Scrapable": "False",
"Tag": ["Music"]
},
"Osu!":{
"Error": "Status-Code",
"name": "Osu!",
"main": "osu.ppy.sh",
"user": "https://osu.ppy.sh/users/{}",
"user2": "https://osu.ppy.sh/users/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Gaming","OSU"]
},
"Dribble":{
"Error": "Message",
"text": "Whoops, that page is gone.",
"name": "Dribble",
"main": "dribbble.com",
"user": "https://dribbble.com/{}",
"user2": "https://dribbble.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Portfolio"]
},
"TikTok":{
"Error": "Status-Code",
"name": "TikTok",
"main": "tiktok.com",
"user": "https://www.tiktok.com/@{}",
"user2": "https://urlebird.com/user/{}/",
"exception": [" ","/"],
"Scrapable": "True",
"Scrapable_url": "https://urlebird.com/user/{}/",
"Tag": ["Social","Video","TikTok"]
},
"TheHandbook":{
"Error": "Status-Code",
"name": "TheHandbook",
"main": "thehandbook.com",
"user": "https://www.thehandbook.com/influencer/{}",
"user2": "https://www.thehandbook.com/influencer/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"Lookbook.nu":{
"Error": "Message",
"text": "0 People",
"name": "Lookbook.nu",
"main": "Lookbook.nu",
"user": "https://lookbook.nu/search/users?q={}",
"user2": "https://lookbook.nu/search/users?q={}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Fashion","Modelling"]
},
"CodeAccademy":{
"Error": "Message",
"text": "Profile Not Found | Codecademy",
"name": "CodeAccademy",
"main": "codecademy.com",
"user": "https://www.codecademy.com/profiles/{}",
"user2": "https://www.codecademy.com/profiles/{}",
"exception": [" ","/","_","."],
"Scrapable": "False",
"Tag": ["Programming"]
},
"DevCommunity":{
"Error": "Status-Code",
"name": "DevCommunity",
"main": "dev.to",
"user": "https://dev.to/{}",
"user2": "https://dev.to/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"CodeWars":{
"Error": "Status-Code",
"name": "CodeWars",
"main": "codewars.com",
"user": "https://www.codewars.com/users/{}",
"user2": "https://www.codewars.com/users/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming","Challange"]
},
"Drupal":{
"Error": "Status-Code",
"name": "Drupal",
"main": "drupal.org",
"user": "https://www.drupal.org/u/{}",
"user2": "https://www.drupal.org/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Website"]
},
"Seaport":{
"Error": "Status-Code",
"name": "Seaport",
"main": "forum.pixelfederation.com",
"user": "https://forum.pixelfederation.com/seaport/u/{}",
"user2": "https://forum.pixelfederation.com/seaport/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"DiggysAdventure":{
"Error": "Status-Code",
"name": "DiggysAdventure",
"main": "forum.pixelfederation.com",
"user": "https://forum.pixelfederation.com/diggysadventure/u/{}",
"user2": "https://forum.pixelfederation.com/diggysadventure/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"Trainstation":{
"Error": "Status-Code",
"name": "Trainstation",
"main": "forum.pixelfederation.com",
"user": "https://forum.pixelfederation.com/trainstation/u/{}",
"user2": "https://forum.pixelfederation.com/trainstation/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"Trainstation2":{
"Error": "Status-Code",
"name": "Trainstation2",
"main": "forum.pixelfederation.com",
"user": "https://forum.pixelfederation.com/trainstation2/u/{}",
"user2": "https://forum.pixelfederation.com/trainstation2/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"Emporea":{
"Error": "Status-Code",
"name": "Emporea",
"main": "forum.pixelfederation.com",
"user": "https://forum.pixelfederation.com/emporea/u/{}",
"user2": "https://forum.pixelfederation.com/emporea/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"PortCity":{
"Error": "Status-Code",
"name": "PortCity",
"main": "forum.pixelfederation.com",
"user": "https://forum.pixelfederation.com/portcity/u/{}",
"user2": "https://forum.pixelfederation.com/portcity/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum"]
},
"Venmo":{
"Error": "Status-Code",
"text": "Venmo | Page Not Found",
"name": "Venmo",
"main": "venmo.com",
"user": "https://venmo.com/{}",
"user2": "https://venmo.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Payment"]
},
"ThemeForest":{
"Error": "Message",
"text": "404 - Nothing to see here",
"name": "ThemeForest",
"main": "themeforest.net",
"user": "https://themeforest.net/user/{}",
"user2": "https://themeforest.net/user/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Gaming, ThemeForest"]
},
"CbtNuggets":{
"Error": "Status-Code",
"name": "CbtNuggets",
"main": "cbtnuggets.com",
"user": "https://www.cbtnuggets.com/trainers/{}",
"user2": "https://www.cbtnuggets.com/trainers/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming","Training"]
},
"Periscope":{
"Error": "Message",
"text": "Sorry, this page doesn’t exist!",
"name": "Periscope",
"main": "pscp.tv",
"user": "https://www.pscp.tv/{}",
"user2": "https://www.pscp.tv/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"CouchSurfing":{
"Error": "Message",
"text": "404: not found",
"name": "CouchSurfing",
"main": "couchsurfing.com",
"user": "https://www.couchsurfing.com/people/{}",
"user2": "https://www.couchsurfing.com/people/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Coaching","Meeting","Social"]
},
"Minecraft":{
"Error": "Status-Code",
"name": "Minecraft",
"main": "api.mojang.com",
"user": "https://api.mojang.com/users/profiles/minecraft/{}",
"user2": "https://api.mojang.com/users/profiles/minecraft/{}",
"exception": [" ","/"],
"Scrapable": "True",
"Scrapable_url": "https://api.mojang.com/users/profiles/minecraft/{}",
"Tag": ["Gaming","Minecraft"]
},
"Ko-Fi":{
"Error": "Response-Url",
"response": "https://ko-fi.com/art?=redirect",
"name": "Ko-Fi",
"main": "ko-fi.com",
"user": "https://ko-fi.com/{}",
"user2": "https://ko-fi.com/{}",
"exception": [" ","/","."],
"Scrapable": "False",
"Tag": ["Donations"]
},
"LinkGenie":{
"Error": "Status-Code",
"name": "LinkGenie",
"main": "linkgenie.co",
"user": "https://linkgenie.co/{}",
"user2": "https://linkgenie.co/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Link"]
},
"Vsco":{
"Error": "Status-Code",
"name": "Vsco",
"main": "vsco.co",
"user": "https://vsco.co/{}/gallery",
"user2": "https://vsco.co/{}/gallery",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Image","Photo"]
},
"Pastebin":{
"Error": "Status-Code",
"name": "Pastebin",
"main": "pastebin.com",
"user": "https://pastebin.com/u/{}",
"user2": "https://pastebin.com/u/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming"]
},
"RubyGems":{
"Error": "Status-Code",
"name": "RubyGems",
"main": "rubygems.org",
"user": "https://rubygems.org/profiles/{}",
"user2": "https://rubygems.org/profiles/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming","Ruby"]
},
"Asciinema":{
"Error": "Status-Code",
"name": "Asciinema",
"main": "asciinema.org",
"user": "https://asciinema.org/~{}",
"user2": "https://asciinema.org/~{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Video, Clip-Sharing"]
},
"Milkshake":{
"Error": "Status-Code",
"name": "Milkshake",
"main": "milkshake.app",
"user": "https://msha.ke/{}",
"user2": "https://msha.ke/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Website"]
},
"MyMonat":{
"Error": "Status-Code",
"name": "MyMonat",
"main": "mymonat.com",
"user": "https://{}.mymonat.com/",
"user2": "https://{}.mymonat.com/",
"exception": [" ","/",".","_"],
"Scrapable": "False",
"Tag": ["Health"]
},
"WordPress":{
"Error": "Message",
"text": "doesn't exist",
"name": "WordPress",
"main": "wordpress.com",
"user": "https://{}.wordpress.com",
"user2": "https://{}.wordpress.com",
"exception": [" ","/","_","."],
"Scrapable": "False",
"Tag": ["Website"]
},
"Gitee":{
"Error": "Status-Code",
"name": "Gitee",
"main": "gitee.com",
"user": "https://gitee.com/{}",
"user2": "https://gitee.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming","OpenSource"]
},
"Scratch":{
"Error": "Status-Code",
"name": "Scratch",
"main": "scratch.mit.edu",
"user": "https://scratch.mit.edu/users/{}",
"user2": "https://scratch.mit.edu/users/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming"]
},
"Npm":{
"Error": "Status-Code",
"name": "Npm",
"main": "npmjs.com",
"user": "https://www.npmjs.com/~{}",
"user2": "https://www.npmjs.com/~{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming","Npm"]
},
"Mastodon":{
"Error": "Status-Code",
"name": "Mastodon",
"main": "mastodon.social",
"user": "https://mastodon.social/@{}",
"user2": "https://mastodon.social/@{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"Splits.io":{
"Error": "Status-Code",
"name": "Splits.io",
"main": "splits.io",
"user": "https://splits.io/users/{}",
"user2": "https://splits.io/users/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Gaming"]
},
"Speedrun":{
"Error": "Status-Code",
"name": "Speedrun",
"main": "speedrun.com",
"user": "https://www.speedrun.com/user/{}",
"user2": "https://www.speedrun.com/user/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Speedrun"]
},
"GameSpot":{
"Error": "Status-Code",
"name": "GameSpot",
"main": "gamespot.com",
"user": "https://www.gamespot.com/profile/{}",
"user2": "https://www.gamespot.com/profile/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Gaming"]
},
"HubPages":{
"Error": "Status-Code",
"name": "HubPages",
"main": "hubpages.com",
"user": "https://hubpages.com/@{}",
"user2": "https://hubpages.com/@{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Blog"]
},
"Opensource":{
"Error": "Status-Code",
"name": "Opensource",
"main": "opensource.com",
"user": "https://opensource.com/users/{}",
"user2": "https://opensource.com/users/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["OpenSource"]
},
"OpenStreetMap":{
"Error": "Status-Code",
"name": "OpenStreetMap",
"main": "openstreetmap.org",
"user": "https://www.openstreetmap.org/user/{}",
"user2": "https://www.openstreetmap.org/user/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Map"]
},
"SlideShare":{
"Error": "Status-Code",
"name": "SlideShare",
"main": "slideshare.net",
"user": "https://slideshare.net/{}",
"user2": "https://slideshare.net/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["File-Sharing"]
},
"RateYourMusic":{
"Error": "Status-Code",
"name": "RateYourMusic",
"main": "https://rateyourmusic.com",
"user": "https://rateyourmusic.com/~{}",
"user2": "https://rateyourmusic.com/~{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Music"]
},
"NotABug.org":{
"Error": "Status-Code",
"name": "NotABug.org",
"main":"notabug.org",
"user": "https://notabug.org/{}",
"user2": "https://notabug.org/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Programming"]
},
"Moikrug":{
"Error": "Message",
"text": "Ошибка 404",
"name": "Moikrug",
"main": "career.habr.com",
"user": "https://career.habr.com/{}",
"user2": "https://career.habr.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"NewGrounds":{
"Error": "Status-Code",
"name": "NewGrounds",
"main": "newgrounds.com",
"user": "https://{}.newgrounds.com",
"user2": "https://{}.newgrounds.com",
"exception": [" ",".","_"],
"Scrapable": "False",
"Tag": ["Social"]
},
"Roblox":{
"Error": "Response-Url",
"response": "https://www.roblox.com/request-error?code=404",
"name": "Roblox",
"main": "roblox.com",
"user": "https://www.roblox.com/user.aspx?username={}",
"user2": "https://www.roblox.com/user.aspx?username={}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Gaming, Roblox"]
},
"Listal":{
"Error": "Response-Url",
"response": "https://www.listal.com",
"name": "Listal.com",
"main": "listal.com",
"user": "https://{}.listal.com",
"user2": "https://{}.listal.com",
"exception": [" ",".","_"],
"Scrapable": "False",
"Tag": ["Image"]
},
"HackerOne":{
"Error": "Status-Code",
"name": "HackerOne",
"main": "hackerone.com",
"user": "https://hackerone.com/{}",
"user2": "https://hackerone.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Hacking"]
},
"BugCrowd":{
"Error": "Status-Code",
"name": "BugCrowd",
"main": "bugcrowd.com",
"user": "https://bugcrowd.com/{}",
"user2": "https://bugcrowd.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["BugBounty","Hacking"]
},
"Quotev":{
"Error": "Status-Code",
"name": "Quotev",
"main": "quotev.com",
"user": "https://www.quotev.com/{}",
"user2": "https://www.quotev.com/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"JoinRoll":{
"Error": "Message",
"text": "We could not find your account.",
"name": "JoinRoll",
"main": "joinroll.com",
"user": "https://app.joinroll.com/{}",
"user2": "https://gw.api.prod.joinroll.com/creators/unknown/public?username={}",
"exception": [" ","/"],
"Scrapable": "True",
"Scrapable_url": "https://gw.api.prod.joinroll.com/creators/unknown/public?username={}",
"Tag": ["Gallery"]
},
"Vbox7":{
"Error": "Message",
"text": "Грешка 404",
"name": "Vbox7",
"main": "vbox7.com",
"user": "https://www.vbox7.com/user:{}",
"user2": "https://www.vbox7.com/user:{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"Bitchute":{
"Error": "Message",
"text": "404 - Page not found",
"name": "Bitchute",
"main": "bitchute.com",
"user": "https://www.bitchute.com/channel/{}/",
"user2": "https://www.bitchute.com/channel/{}/",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social"]
},
"OpenSea":{
"Error": "Status-Code",
"name": "OpenSea",
"main": "opensea.io",
"user": "https://opensea.io/{}",
"user2": "https://opensea.io/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Crypto"]
},
"HeyLink.me":{
"Error": "Status-Code",
"name": "HeyLink.me",
"main": "heylink.me",
"user": "https://heylink.me/{}/",
"user2": "https://heylink.me/{}/",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Link"]
},
"Ngl.link":{
"Error": "Message",
"text": "Could not find user",
"name": "Ngl.link",
"main": "ngl.link",
"user": "https://ngl.link/{}",
"user2": "https://ngl.link/{}",
"exception": [" ","/"],
"Scrapable": "True",
"Scrapable_url": "https://ngl.link/{}",
"Tag": ["Questions"]
},
"Quizsilo":{
"Error":"Response-Url",
"response": "https://quizsilo.com/",
"name": "Quizsilo",
"main": "quizsilo.com/",
"user": "https://quizsilo.com/profile/{}",
"user2": "https://quizsilo.com/profile/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Questions, Forum"]
},
"ColorLovers":{
"Error":"Status-Code",
"name":"ColourLovers",
"main":"https://www.colourlovers.com",
"user":"https://www.colourlovers.com/lover/{}",
"user2":"https://www.colourlovers.com/lover/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Forum","Colors"]
},
"21Buttons":{
"Error":"Status-Code",
"name": "21Buttons",
"main": "https://www.21buttons.com",
"user": "https://www.21buttons.com/buttoner/{}",
"user2": "https://www.21buttons.com/buttoner/{}",
"exception": [" ","/"],
"Scrapable": "False",
"Tag": ["Social","Dressing", "Fashion", "Shopping"]
}
}
]
|
NSFW_site_list.json
|
Site_lists/Username/NSFW_site_list.json
|
.json
| 3,801
|
[
{
"Xhamster":{
"Error": "Status-Code",
"text": "User not found",
"name": "XHamester",
"main": "https://xhamster.com",
"user": "https://xhamster.com/users/{}",
"user2": "https://xhamster.com/users/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Porn"]
},
"Sharesome":{
"Error": "Response-Url",
"response": "https://sharesome.com/404/",
"name": "Sharesome",
"main": "sharesome.com",
"user": "https://sharesome.com/{}",
"user2": "https://sharesome.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Porn"]
},
"PornHub":{
"Error": "Status-Code",
"name": "PornHub",
"main": "https://pornhub.com",
"user": "https://pornhub.com/users/{}",
"user2": "https://pornhub.com/users/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Porn"]
},
"YouPorn":{
"Error": "Status-Code",
"name": "YouPorn",
"main": "https://youporn.com",
"user": "https://youporn.com/uservids/{}",
"user2": "https://youporn.com/uservids/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Porn"]
},
"XVideos":{
"Error": "Status-Code",
"name": "XVideos",
"main": "https://xvideos.com/",
"user": "https://xvideos.com/profiles/{}",
"user2": "https://xvideos.com/profiles/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Porn-Video"]
},
"ChaturBate":{
"Error": "Status-Code",
"name": "ChaturBate",
"main": "https://chaturbate.com",
"user": "https://chaturbate.com/{}",
"user2": "https://chaturbate.com/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Porn-Chat"]
},
"BongaCams":{
"Error": "Status-Code",
"name": "BongaCams",
"main": "https://pt.bongacams.com",
"user": "https://pt.bongacams.com/profile/{}",
"user2": "https://pt.bongacams.com/profile/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Chatcam"]
},
"Tinder":{
"Error": "Message",
"text": "Looking for someone?",
"name": "Tinder",
"main": "tinder.com",
"user": "https://tinder.com/@{}",
"user2": "https://tinder.com/@{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Appointment", "Chat", "Social"]
},
"LiveJasmin":{
"Error": "Response-Url",
"response": "https://www.livejasmin.com/en/girls/",
"name": "LiveJasmin(Girls)",
"main": "livejasmin.com",
"user": "https://www.livejasmin.com/en/girls/{}",
"user2": "https://www.livejasmin.com/en/girls/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Live-Porn"]
},
"LiveJasmin2":{
"Error": "Response-Url",
"response": "https://www.livejasmin.com/en/boys/",
"name": "LiveJasmin(BOYS)",
"main": "livejasmin.com",
"user": "https://www.livejasmin.com/en/boys/{}",
"user2": "https://www.livejasmin.com/en/boys/{}",
"exception": [" "],
"Scrapable": "False",
"Tag": ["Live-Porn"]
}
}
]
|
Google_dorks.txt
|
Site_lists/Username/Google_dorks.txt
|
.txt
| 7,587
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=inurl:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)filetype:txt
| https://www.google.com/search?q=intext:(%22{}%22)filetype:csv
| https://www.google.com/search?q=intext:(%22{}%22)filetype:pdf
| https://www.google.com/search?q=intext:(%22{}%22)filetype:doc
| https://www.google.com/search?q=intext:(%22{}%22)filetype:docx
| https://www.google.com/search?q=intext:(%22{}%22)filetype:log
| https://www.google.com/search?q=intext:(%22{}%22)filetype:json
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xml
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xls
| https://www.google.com/search?q=intext:(%22{}%22)filetype:xlsx
| https://www.google.com/search?q=intext:(%22{}%22)filetype:odt
| https://www.google.com/search?q=intext:(%22{}%22)filetype:html
| https://www.google.com/search?q=intext:(%22{}%22)filetype:php
| https://www.google.com/search?q=intext:(%22{}%22)filetype:asp
----------------------------------------------------------------------------------------------------------------------
[IMAGE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:png&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:jpg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:jpeg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:gif&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:raw&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:ico&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:bmp&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:svg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)filetype:webp&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
----------------------------------------------------------------------------------------------------------------------
[VIDEO/AUDIO-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.youtube.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.tiktok.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.facebook.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.twitter.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.twitch.tv+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.instagram.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
----------------------------------------------------------------------------------------------------------------------
[EMAIL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:json
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:xml
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:xlsx
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)filetype:odt
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:json
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:xml
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:xlsx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)filetype:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:txt
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:csv
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:pdf
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:doc
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:docx
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:log
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:json
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xml
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xls
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:xlsx
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:odt
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:html
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:php
| https://www.google.com/search?q=intitle:(%22{}%22)filetype:asp
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/Username/Yandex_dorks.txt
|
.txt
| 5,637
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text={}
| https://yandex.com/search/?text=({})mime:txt
| https://yandex.com/search/?text=({})mime:pdf
| https://yandex.com/search/?text=({})mime:csv
| https://yandex.com/search/?text=({})mime:doc
| https://yandex.com/search/?text=({})mime:docx
| https://yandex.com/search/?text=({})mime:log
| https://yandex.com/search/?text=({})mime:json
| https://yandex.com/search/?text=({})mime:xml
| https://yandex.com/search/?text=({})mime:xls
| https://yandex.com/search/?text=({})mime:xlsx
| https://yandex.com/search/?text=({})mime:odt
| https://yandex.com/search/?text=({})mime:html
| https://yandex.com/search/?text=({})mime:php
| https://yandex.com/search/?text=({})mime:asp
----------------------------------------------------------------------------------------------------------------------
[IMAGE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/images/search?from=tabbar&text={}
| https://yandex.com/images/search?from=tabbar&text={}&itype=jpg
| https://yandex.com/images/search?from=tabbar&text={}&itype=png
| https://yandex.com/images/search?from=tabbar&text={}&itype=gifan
----------------------------------------------------------------------------------------------------------------------
[VIDEO/AUDIO-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/video/search?from=tabbar&text={}
| https://yandex.com/video/search?from=tabbar&text=site:youtube.com+{}
| https://yandex.com/video/search?from=tabbar&text=site:tiktok.com+{}
| https://yandex.com/video/search?from=tabbar&text=site:facebook.com+{}
| https://yandex.com/video/search?from=tabbar&text=site:twitter.com+{}
| https://yandex.com/video/search?from=tabbar&text=site:twitch.tv+{}
| https://yandex.com/video/search?from=tabbar&text=site:instagram.com+{}
----------------------------------------------------------------------------------------------------------------------
[EMAIL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:txt
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:pdf
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:csv
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:doc
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:docx
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:log
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:json
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:xml
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:xls
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:xlsx
| https://yandex.com/search/?text={}%2B(!Email|!email|!E-mail|!e-mail)mime:odt
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:txt
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:pdf
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:csv
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:doc
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:docx
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:log
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:json
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:xml
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:xls
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:xlsx
| https://yandex.com/search/?text={}%2B(!Password|!password|!PASSWORD)mime:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=title:{}
| https://yandex.com/search/?text=title:({})mime:txt
| https://yandex.com/search/?text=title:({})mime:pdf
| https://yandex.com/search/?text=title:({})mime:csv
| https://yandex.com/search/?text=title:({})mime:doc
| https://yandex.com/search/?text=title:({})mime:docx
| https://yandex.com/search/?text=title:({})mime:log
| https://yandex.com/search/?text=title:({})mime:json
| https://yandex.com/search/?text=title:({})mime:xml
| https://yandex.com/search/?text=title:({})mime:xls
| https://yandex.com/search/?text=title:({})mime:xlsx
| https://yandex.com/search/?text=title:({})mime:odt
| https://yandex.com/search/?text=title:({})mime:html
| https://yandex.com/search/?text=title:({})mime:php
| https://yandex.com/search/?text=title:({})mime:asp
----------------------------------------------------------------------------------------------------------------------
|
Google_dorks.txt
|
Site_lists/Dorks/Google_dorks.txt
|
.txt
| 7,595
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:txt
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:csv
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:pdf
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:doc
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:docx
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:log
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:json
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xml
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xls
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xlsx
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:odt
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:html
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:php
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:asp
----------------------------------------------------------------------------------------------------------------------
[IMAGE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:png&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:jpg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:jpeg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:gif&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:raw&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:ico&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:bmp&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:svg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:webp&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
----------------------------------------------------------------------------------------------------------------------
[VIDEO/AUDIO-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.youtube.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.tiktok.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.facebook.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.twitter.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.twitch.tv+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.instagram.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
----------------------------------------------------------------------------------------------------------------------
[EMAIL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:json
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:xml
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:xlsx
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:odt
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:json
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:xml
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:xlsx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:txt
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:csv
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:pdf
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:doc
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:docx
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:log
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:json
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xml
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xls
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xlsx
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:odt
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:html
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:php
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:asp
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/Dorks/Yandex_dorks.txt
|
.txt
| 5,793
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=("{}")
| https://yandex.com/search/?text=("{}")mime:txt
| https://yandex.com/search/?text=("{}")mime:pdf
| https://yandex.com/search/?text=("{}")mime:csv
| https://yandex.com/search/?text=("{}")mime:doc
| https://yandex.com/search/?text=("{}")mime:docx
| https://yandex.com/search/?text=("{}")mime:log
| https://yandex.com/search/?text=("{}")mime:json
| https://yandex.com/search/?text=("{}")mime:xml
| https://yandex.com/search/?text=("{}")mime:xls
| https://yandex.com/search/?text=("{}")mime:xlsx
| https://yandex.com/search/?text=("{}")mime:odt
| https://yandex.com/search/?text=("{}")mime:html
| https://yandex.com/search/?text=("{}")mime:php
| https://yandex.com/search/?text=("{}")mime:asp
----------------------------------------------------------------------------------------------------------------------
[IMAGE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/images/search?from=tabbar&text=("{}")
| https://yandex.com/images/search?from=tabbar&text=("{}")&itype=jpg
| https://yandex.com/images/search?from=tabbar&text=("{}")&itype=png
| https://yandex.com/images/search?from=tabbar&text=("{}")&itype=gifan
----------------------------------------------------------------------------------------------------------------------
[VIDEO/AUDIO-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/video/search?from=tabbar&text=("{}")
| https://yandex.com/video/search?from=tabbar&text=site:youtube.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:tiktok.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:facebook.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:twitter.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:twitch.tv+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:instagram.com+("{}")
----------------------------------------------------------------------------------------------------------------------
[EMAIL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:txt
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:pdf
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:csv
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:doc
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:docx
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:log
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:json
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:xml
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:xls
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:xlsx
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:odt
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:txt
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:pdf
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:csv
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:doc
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:docx
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:log
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:json
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:xml
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:xls
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:xlsx
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=title:("{}")
| https://yandex.com/search/?text=title:("{}")mime:txt
| https://yandex.com/search/?text=title:("{}")mime:pdf
| https://yandex.com/search/?text=title:("{}")mime:csv
| https://yandex.com/search/?text=title:("{}")mime:doc
| https://yandex.com/search/?text=title:("{}")mime:docx
| https://yandex.com/search/?text=title:("{}")mime:log
| https://yandex.com/search/?text=title:("{}")mime:json
| https://yandex.com/search/?text=title:("{}")mime:xml
| https://yandex.com/search/?text=title:("{}")mime:xls
| https://yandex.com/search/?text=title:("{}")mime:xlsx
| https://yandex.com/search/?text=title:("{}")mime:odt
| https://yandex.com/search/?text=title:("{}")mime:html
| https://yandex.com/search/?text=title:("{}")mime:php
| https://yandex.com/search/?text=title:("{}")mime:asp
----------------------------------------------------------------------------------------------------------------------
|
Yandex_Fingerprints.txt
|
Site_lists/Dorks/Phone/Yandex_Fingerprints.txt
|
.txt
| 560
|
[FINGER-PRINTS-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=site:instagram.com+(""{}"")
| https://yandex.com/search/?text=site:twitter.com+(""{}"")
| https://yandex.com/search/?text=site:facebook.com+(""{}"")
| https://yandex.com/search/?text=site:vk.com+(""{}"")
| https://yandex.com/search/?text=site:linkedin.com+(""{}"")
----------------------------------------------------------------------------------------------------------------------
|
Fingerprints.txt
|
Site_lists/Dorks/Phone/Fingerprints.txt
|
.txt
| 625
|
[FINGER-PRINTS-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=site:www.instagram.com+intext:(%22{}%22)
| https://www.google.com/search?q=site:www.twitter.com+intext:(%22{}%22)
| https://www.google.com/search?q=site:www.facebook.com+intext:(%22{}%22)
| https://www.google.com/search?q=site:www.vk.com+intext:(%22{}%22)
| https://www.google.com/search?q=site:www.linkedin.com+intext:(%22{}%22)
----------------------------------------------------------------------------------------------------------------------
|
Google_dorks.txt
|
Site_lists/Dorks/Phone/Google_dorks.txt
|
.txt
| 1,716
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=inurl:%22{}%22
| https://www.google.com/search?q=intext:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:txt
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:csv
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:pdf
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:doc
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:docx
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:log
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xls
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xlsx
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intitle:(%22{}%22)
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:txt
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:csv
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:pdf
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:doc
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:docx
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:log
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xls
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xlsx
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/Dorks/Phone/Yandex_dorks.txt
|
.txt
| 1,538
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=("{}")
| https://yandex.com/search/?text=("{}")mime:txt
| https://yandex.com/search/?text=("{}")mime:pdf
| https://yandex.com/search/?text=("{}")mime:csv
| https://yandex.com/search/?text=("{}")mime:doc
| https://yandex.com/search/?text=("{}")mime:log
| https://yandex.com/search/?text=("{}")mime:docx
| https://yandex.com/search/?text=("{}")mime:xls
| https://yandex.com/search/?text=("{}")mime:xlsx
| https://yandex.com/search/?text=("{}")mime:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=title:("{}")
| https://yandex.com/search/?text=title:("{}")mime:txt
| https://yandex.com/search/?text=title:("{}")mime:pdf
| https://yandex.com/search/?text=title:("{}")mime:csv
| https://yandex.com/search/?text=title:("{}")mime:doc
| https://yandex.com/search/?text=title:("{}")mime:docx
| https://yandex.com/search/?text=title:("{}")mime:log
| https://yandex.com/search/?text=title:("{}")mime:xls
| https://yandex.com/search/?text=title:("{}")mime:xlsx
| https://yandex.com/search/?text=title:("{}")mime:odt
----------------------------------------------------------------------------------------------------------------------
|
Google_dorks.txt
|
Site_lists/Dorks/Usernames/Google_dorks.txt
|
.txt
| 7,646
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=inurl:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:txt
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:csv
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:pdf
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:doc
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:docx
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:log
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:json
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xml
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xls
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:xlsx
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:odt
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:html
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:php
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:asp
----------------------------------------------------------------------------------------------------------------------
[IMAGE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:png&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:jpg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:jpeg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:gif&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:raw&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:ico&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:bmp&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:svg&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
| https://www.google.com/search?q=intext:(%22{}%22)+filetype:webp&hl=&tbm=isch&source=hp&biw=&bih=&sclient=img
----------------------------------------------------------------------------------------------------------------------
[VIDEO/AUDIO-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.youtube.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.tiktok.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.facebook.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.twitter.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.twitch.tv+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
| https://www.google.com/search?q=site:www.instagram.com+intext:(%22{}%22)&hl=&tbm=vid&ei=sclient=gws-wiz-video
----------------------------------------------------------------------------------------------------------------------
[EMAIL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:json
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:xml
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:xlsx
| https://www.google.com/search?q=intext:%22{}%22(Email+OR+E-mail+OR+email+OR+e-mail)+filetype:odt
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:txt
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:csv
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:pdf
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:doc
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:docx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:log
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:json
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:xml
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:xls
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:xlsx
| https://www.google.com/search?q=intext:%22{}%22(Password+OR+password+OR+PASSWORD)+filetype:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:txt
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:csv
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:pdf
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:doc
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:docx
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:log
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:json
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xml
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xls
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:xlsx
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:odt
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:html
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:php
| https://www.google.com/search?q=intitle:(%22{}%22)+filetype:asp
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/Dorks/Usernames/Yandex_dorks.txt
|
.txt
| 5,793
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=("{}")
| https://yandex.com/search/?text=("{}")mime:txt
| https://yandex.com/search/?text=("{}")mime:pdf
| https://yandex.com/search/?text=("{}")mime:csv
| https://yandex.com/search/?text=("{}")mime:doc
| https://yandex.com/search/?text=("{}")mime:docx
| https://yandex.com/search/?text=("{}")mime:log
| https://yandex.com/search/?text=("{}")mime:json
| https://yandex.com/search/?text=("{}")mime:xml
| https://yandex.com/search/?text=("{}")mime:xls
| https://yandex.com/search/?text=("{}")mime:xlsx
| https://yandex.com/search/?text=("{}")mime:odt
| https://yandex.com/search/?text=("{}")mime:html
| https://yandex.com/search/?text=("{}")mime:php
| https://yandex.com/search/?text=("{}")mime:asp
----------------------------------------------------------------------------------------------------------------------
[IMAGE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/images/search?from=tabbar&text=("{}")
| https://yandex.com/images/search?from=tabbar&text=("{}")&itype=jpg
| https://yandex.com/images/search?from=tabbar&text=("{}")&itype=png
| https://yandex.com/images/search?from=tabbar&text=("{}")&itype=gifan
----------------------------------------------------------------------------------------------------------------------
[VIDEO/AUDIO-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/video/search?from=tabbar&text=("{}")
| https://yandex.com/video/search?from=tabbar&text=site:youtube.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:tiktok.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:facebook.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:twitter.com+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:twitch.tv+("{}")
| https://yandex.com/video/search?from=tabbar&text=site:instagram.com+("{}")
----------------------------------------------------------------------------------------------------------------------
[EMAIL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:txt
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:pdf
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:csv
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:doc
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:docx
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:log
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:json
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:xml
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:xls
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:xlsx
| https://yandex.com/search/?text="{}"%2B(!Email|!email|!E-mail|!e-mail)mime:odt
----------------------------------------------------------------------------------------------------------------------
[PASSWORD-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:txt
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:pdf
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:csv
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:doc
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:docx
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:log
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:json
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:xml
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:xls
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:xlsx
| https://yandex.com/search/?text="{}"%2B(!Password|!password|!PASSWORD)mime:odt
----------------------------------------------------------------------------------------------------------------------
[INTITLE-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=title:("{}")
| https://yandex.com/search/?text=title:("{}")mime:txt
| https://yandex.com/search/?text=title:("{}")mime:pdf
| https://yandex.com/search/?text=title:("{}")mime:csv
| https://yandex.com/search/?text=title:("{}")mime:doc
| https://yandex.com/search/?text=title:("{}")mime:docx
| https://yandex.com/search/?text=title:("{}")mime:log
| https://yandex.com/search/?text=title:("{}")mime:json
| https://yandex.com/search/?text=title:("{}")mime:xml
| https://yandex.com/search/?text=title:("{}")mime:xls
| https://yandex.com/search/?text=title:("{}")mime:xlsx
| https://yandex.com/search/?text=title:("{}")mime:odt
| https://yandex.com/search/?text=title:("{}")mime:html
| https://yandex.com/search/?text=title:("{}")mime:php
| https://yandex.com/search/?text=title:("{}")mime:asp
----------------------------------------------------------------------------------------------------------------------
|
Google_dorks.txt
|
Site_lists/Dorks/Websites/Google_dorks.txt
|
.txt
| 1,539
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://www.google.com/search?q=site:(www.%22{}%22)
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:txt
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:pdf
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:log
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:doc
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:docx
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:sqlite
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:yaml
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:json
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:xls
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:xlsx
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:csv
| https://www.google.com/search?q=site:(www.%22{}%22)%29+filetype:md
| https://www.google.com/search?q=site:(www.%22{}%22)%29+intext:admin+OR+Admin
| https://www.google.com/search?q=site:(www.%22{}%22%29+intext:emails+OR+Emails+OR+EMAILS
| https://www.google.com/search?q=site:(www.%22{}%22)%29+intitle:admin+OR+Admin
| https://www.google.com/search?q=intext:(www.%22{}%22+OR+%22{}%22)
| https://www.google.com/search?q=inurl:(www.%22{}%22+OR+%22{}%22)
----------------------------------------------------------------------------------------------------------------------
|
Yandex_dorks.txt
|
Site_lists/Dorks/Websites/Yandex_dorks.txt
|
.txt
| 960
|
[GENERAL-DORKS]:
----------------------------------------------------------------------------------------------------------------------
| https://yandex.com/search/?text=site:("{}")
| https://yandex.com/search/?text=site:("{}")+mime:txt
| https://yandex.com/search/?text=site:("{}")+mime:pdf
| https://yandex.com/search/?text=site:("{}")+mime:log
| https://yandex.com/search/?text=site:("{}")+mime:doc
| https://yandex.com/search/?text=site:("{}")+mime:docx
| https://yandex.com/search/?text=site:("{}")+mime:sqlite
| https://yandex.com/search/?text=site:("{}")+mime:yaml
| https://yandex.com/search/?text=site:("{}")+mime:json
| https://yandex.com/search/?text=site:("{}")+mime:xls
| https://yandex.com/search/?text=site:("{}")+mime:xlsx
| https://yandex.com/search/?text=site:("{}")+mime:csv
| https://yandex.com/search/?text=inurl:("{}")
----------------------------------------------------------------------------------------------------------------------
|
Lookup.json
|
Site_lists/Websites/Lookup.json
|
.json
| 446
|
[
{
"Watchlist":{
"Error": "Message",
"text": "Keine Ergebnisse gefunden.",
"name": "Watchlist",
"main": "watchlist-internet.at",
"url": "https://www.watchlist-internet.at/search/?id=153&tx_kesearch_pi1%5Bsword%5D={}",
"url2": "https://www.watchlist-internet.at/search/?id=153&tx_kesearch_pi1%5Bsword%5D={}",
"Scrapable": "False"
}
}
]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.