General/Common
π Network
Archives/Preservation
Website Analysis
Domains
- WhoXY
 - Whois History
 - urlscan.io
 - Robtex
 - Security Trails
 - crt.sh
 - CompleteDNS History
 - DNS Trails
 - Geo Data Tool
 - subdomainfinder.c99.nl
 - dnsdumpster
 - MX Lookup Toolbox
 - ViewDNS.info
 - WhoIsHostingThis
 - Whoisology
 
Threat
π Cryptography
π· Images
πΏ Alternate Search
βπ©βπ» Code & Reverse Engineering
Search
π Virus and Malware Research
Sandboxes
π§ Utilities
Chronology
Images
General
π£ Usernames
πΌ Reverse Image Search
π¬ Social Media
- craigslist
 - Social Media Analysis Toolkit
 - LiveLeak
 - Phantom Buster
 - RocketReach
 - Awesome Lists
 - Export Comments
 - Social Searcher
 - Digital Privacy
 - OSoMeNet Search
 - Free People Search Tool
 
Twitter/X
- Twitter/X Search
 - #onemilliontweetmap
 - β Treeverse
 - Tweeter ID
 - backtweets
 - Tinfoleak
 - Twitter Search Tool
 - Deleted Tweet Finder
 - Twitonomy
 - BirdHunt
 - Social Bearing
 - memory.lol
 - Wayback Tweets
 - Download Twitter Data
 - Twitter Video Downloader
 
- graph.tips
 - Who Posted What?
 - Lookup ID
 - Facebook People Search
 - Facebook Graph Searcher
 - Facebook Matrix
 - Facebook Recover Lookup
 - SocialData API
 - FollowerWonk
 - SOWsearch
 
YouTube
- Find Instagram User Id
 - Exportgram
 - Instahunt
 - Toutatis Instagram Python
 - IMGinn.io
 - SolG Instagram
 - Inflact IG Profile Analyzer
 - Instalooter
 - Instaloader
 - Osintgram
 
- Redditery
 - reddtip
 - Reddit Shell
 - Reeddit
 - Wisdom of Reddit
 - Subreddits
 - Redective
 - Reddit User Analyser
 - Vizit
 - Reddit Stream
 - Reddit Search
 - Reddit List
 - Reddit Hacks
 - Reddit Comment Search
 - Reddit Archive
 - rdddeck
 - Mostly Harmless
 - F5BOT
 - Suggest me a subreddit
 - Universal Reddit Scraper (URS)
 - socid_extractor
 
Snapchat
Tiktok
- CrossLinked
 - LinkedInt
 - InSpy LinkedIn
 - RecruitEm
 - LinkedProspect LinkedIn Boolean Search
 - Linkedin Search Tool
 - IntelligenceX Linkedin
 
GitHub
β IMs
Telegram
π§Ύ Public Records
Geographic Specific Searches
β Air Traffic
π’ Sea/Land
πΊοΈ Nmap
π¦ Wireshark
| -sL | List scan, goes through the target list ONLY doing DNS resolution | |
| -sn | Ping-only scan; show which hosts are up (formerly -sP) | |
| -sT | TCP Connect scan (default non-root scan) | |
| -sS | TCP SYN "stealth" scan* (default if priv, otherwise -sT; req. root if forced) | |
| * easily detected nowadays | ||
| -sU -p 111,222,333 | UDP scan on specific ports | |
| -Pn | Skip discovery, assume all open (will be SLOW) | nmap -Pn -F 192.168.1.1 | 
| nmap 192.168.1.1 | Target single IP | 
| nmap hostname.tld | Target hostname | 
| nmap 192.168.1.25-50 | Target range | 
| nmap 192.168.1.1.0/24 | Target subnet | 
| -iL ip-list.txt | Import list of IPs as targets | 
| By default, nmap scans the first 1000 ports. | |
| -p 22 | Target single port | 
| -p 22-80 | Target range of ports | 
| -p 22,80,443 | Target specific ports | 
| -F | Scans the first 100 only ("fast") | 
| -p- | Scans all 65535 ports (not "fast") | 
| -T0 - -T5 | Specifies a timing template, default 3. | 
| (0 = paranoid [ASBURDLY SLOW], 1 = sneaky [REAL SLOW!], 2 = polite [SLOW], 3 = default/normal, 4 = aggressive [A FAVORITE], 5 = insane) | 
| -A | Enable OS detection, version detection, script scanning, and traceroute (-O -sV -sC --traceroute) | 
| -sV | Version detection (--version-intensity (0-9, def: 7) adjusts aggressiveness) | 
| -sC | Performs script scan with default set of scripts. Likely intrusive! | 
| --script filename|category|directory | Runs a specific script | 
| ssl-enum-ciphers | This script repeatedly initiates SSLv3/TLS connections, each time trying a new cipher or compressor while recording whether a host accepts or rejects it. The end result is a list of all the ciphersuites and compressors that a server accepts. | 
| -oN filename.txt | Output normal | 
| -oX filename.xml | Output XML | 
| -oG filename.gnmap | Output for grepable | 
| -oA basename | Output all at once (normal, XML, greppable) | 
Display Filters Capture Filters
| eq / == | Equal | ip.dest == 192.168.1.1 | 
| ne / != | Not equal | ip.addr != 192.168.1.1 | 
| * use this instead! -> | !(ip.addr == 192.168.1.1) | |
| gt / > | Greater than | frame.len > 10 | 
| lt / < | Less than | frame.len < 10 | 
| ge / >= | Greater than or equal | frame.len >= 10 | 
| le / <= | Less than or equal | frame.len <= 10 | 
| and / && | Match both | 
| or / || | Match either | 
| xor / ^^ | One of the two, not both | 
| not / ! | Not equal to | 
| [ n ] / [ ... ] | Substring; filter specific word or text | 
| {foo, bar, baz} | Membership; includes one of these | 
| ip.addr == 10.10.50.1 | Filter by IP (src and dst) | 
| ip.dst == 10.10.50.1 | Filter by Destination IP | 
| ip.src == 10.10.50.1 | Filter by Source IP | 
| !(ip.addr == 10.10.50.1) | Filter Out by IP | 
| ip.addr >= 10.10.50.1 and ip.addr <=10.10.50.100 | Filter by IP Range | 
| ip.addr == 10.10.50.1 and ip.addr == 10.10.50.100 | Filter by Multiple IPs | 
| ip.addr == 10.10.50.1/24 | Filter by Subnet | 
| tcp.port == 25 | Filter by Port | 
| tcp.dstport == 25 | Filter by Destination Port | 
| protocol == 25 | Filter by Destination Port | 
| ip.host=="hostname" | Hostname filter | 
| http.host == "hostname" | Filter by URL | 
| http.request.method in {"HEAD" "GET"} | Show HEAD and GET http requests | 
| frame.time >= "June 02, 2019 00:00:00" | Filter by Timestamp | 
| tcp.flags.syn == 1 and tcp.flags.ack == 0 | Show only SYN packets | 
| wlan.fc.type_subtype==0x08 | Show only beacon frames | 
| eth.dst==de:ad:be:ee:ee:ff | MAC filter | 
| eth.dst!=ff:ff:ff:ff:ff:ff | Filter out broadcast | 
| (eth.dst[0] & 1) | Filter by multicast | 
| tcp.flag.reset==1 | RST flag filter | 
| tcp.time_delta > .250 | Displays packets with delta time > 250ms in their stream context | 
| frame contains potato | Displays packets containing string 'potato' | 
| tcp.analysis.flags && !tcp.analysis.window_update | Retransmissions, duplicate acks, zero windows, and more; for debugging performance issues | 
| dns | http | ftp | ssh | icp | Search by protocol name (examples given) | 
| frame contains "(attachment|tar|exe|zip|pdf)" | Find files by type | 
| tcp contains facebook | Filter traffic by keyword | 
| !(arp or icmp or stp) | Filters out stuff you might not care about |