General/Common
π Network
Archives/Preservation
Website Analysis
Domains
- WhoXY
- Whois History
- urlscan.io
- Robtex
- Security Trails
- crt.sh
- CompleteDNS History
- DNS Trails
- Geo Data Tool
- subdomainfinder.c99.nl
- dnsdumpster
- MX Lookup Toolbox
- ViewDNS.info
- WhoIsHostingThis
- Whoisology
Threat
π Cryptography
π· Images
πΏ Alternate Search
βπ©βπ» Code & Reverse Engineering
Search
π Virus and Malware Research
Sandboxes
π§ Utilities
Chronology
Images
General
π£ Usernames
πΌ Reverse Image Search
π¬ Social Media
- craigslist
- Social Media Analysis Toolkit
- LiveLeak
- Phantom Buster
- RocketReach
- Awesome Lists
- Export Comments
- Social Searcher
- Digital Privacy
- OSoMeNet Search
- Free People Search Tool
Twitter/X
- Twitter/X Search
- #onemilliontweetmap
- β Treeverse
- Tweeter ID
- backtweets
- Tinfoleak
- Twitter Search Tool
- Deleted Tweet Finder
- Twitonomy
- BirdHunt
- Social Bearing
- memory.lol
- Wayback Tweets
- Download Twitter Data
- Twitter Video Downloader
- graph.tips
- Who Posted What?
- Lookup ID
- Facebook People Search
- Facebook Graph Searcher
- Facebook Matrix
- Facebook Recover Lookup
- SocialData API
- FollowerWonk
- SOWsearch
YouTube
- Find Instagram User Id
- Exportgram
- Instahunt
- Toutatis Instagram Python
- IMGinn.io
- SolG Instagram
- Inflact IG Profile Analyzer
- Instalooter
- Instaloader
- Osintgram
- Redditery
- reddtip
- Reddit Shell
- Reeddit
- Wisdom of Reddit
- Subreddits
- Redective
- Reddit User Analyser
- Vizit
- Reddit Stream
- Reddit Search
- Reddit List
- Reddit Hacks
- Reddit Comment Search
- Reddit Archive
- rdddeck
- Mostly Harmless
- F5BOT
- Suggest me a subreddit
- Universal Reddit Scraper (URS)
- socid_extractor
Snapchat
Tiktok
- CrossLinked
- LinkedInt
- InSpy LinkedIn
- RecruitEm
- LinkedProspect LinkedIn Boolean Search
- Linkedin Search Tool
- IntelligenceX Linkedin
GitHub
β IMs
Telegram
π§Ύ Public Records
Geographic Specific Searches
β Air Traffic
π’ Sea/Land
πΊοΈ Nmap
π¦ Wireshark
-sL | List scan, goes through the target list ONLY doing DNS resolution | |
-sn | Ping-only scan; show which hosts are up (formerly -sP ) | |
-sT | TCP Connect scan (default non-root scan) | |
-sS | TCP SYN "stealth" scan* (default if priv, otherwise -sT ; req. root if forced) | |
* easily detected nowadays | ||
-sU -p 111,222,333 | UDP scan on specific ports | |
-Pn | Skip discovery, assume all open (will be SLOW) | nmap -Pn -F 192.168.1.1 |
nmap 192.168.1.1 | Target single IP |
nmap hostname.tld | Target hostname |
nmap 192.168.1.25-50 | Target range |
nmap 192.168.1.1.0/24 | Target subnet |
-iL ip-list.txt | Import list of IPs as targets |
By default, nmap scans the first 1000 ports. | |
-p 22 | Target single port |
-p 22-80 | Target range of ports |
-p 22,80,443 | Target specific ports |
-F | Scans the first 100 only ("fast") |
-p- | Scans all 65535 ports (not "fast") |
-T0 - -T5 | Specifies a timing template, default 3. |
(0 = paranoid [ASBURDLY SLOW], 1 = sneaky [REAL SLOW!], 2 = polite [SLOW], 3 = default/normal, 4 = aggressive [A FAVORITE], 5 = insane) |
-A | Enable OS detection, version detection, script scanning, and traceroute (-O -sV -sC --traceroute ) |
-sV | Version detection (--version-intensity (0-9, def: 7) adjusts aggressiveness) |
-sC | Performs script scan with default set of scripts. Likely intrusive! |
--script filename|category|directory | Runs a specific script |
ssl-enum-ciphers | This script repeatedly initiates SSLv3/TLS connections, each time trying a new cipher or compressor while recording whether a host accepts or rejects it. The end result is a list of all the ciphersuites and compressors that a server accepts. |
-oN filename.txt | Output normal |
-oX filename.xml | Output XML |
-oG filename.gnmap | Output for grepable |
-oA basename | Output all at once (normal, XML, greppable) |
Display Filters Capture Filters
eq / == | Equal | ip.dest == 192.168.1.1 |
ne / != | Not equal | ip.addr != 192.168.1.1 |
* use this instead! -> | !(ip.addr == 192.168.1.1) | |
gt / > | Greater than | frame.len > 10 |
lt / < | Less than | frame.len < 10 |
ge / >= | Greater than or equal | frame.len >= 10 |
le / <= | Less than or equal | frame.len <= 10 |
and / && | Match both |
or / || | Match either |
xor / ^^ | One of the two, not both |
not / ! | Not equal to |
[ n ] / [ ... ] | Substring; filter specific word or text |
{foo, bar, baz} | Membership; includes one of these |
ip.addr == 10.10.50.1 | Filter by IP (src and dst) |
ip.dst == 10.10.50.1 | Filter by Destination IP |
ip.src == 10.10.50.1 | Filter by Source IP |
!(ip.addr == 10.10.50.1) | Filter Out by IP |
ip.addr >= 10.10.50.1 and ip.addr <=10.10.50.100 | Filter by IP Range |
ip.addr == 10.10.50.1 and ip.addr == 10.10.50.100 | Filter by Multiple IPs |
ip.addr == 10.10.50.1/24 | Filter by Subnet |
tcp.port == 25 | Filter by Port |
tcp.dstport == 25 | Filter by Destination Port |
protocol == 25 | Filter by Destination Port |
ip.host=="hostname" | Hostname filter |
http.host == "hostname" | Filter by URL |
http.request.method in {"HEAD" "GET"} | Show HEAD and GET http requests |
frame.time >= "June 02, 2019 00:00:00" | Filter by Timestamp |
tcp.flags.syn == 1 and tcp.flags.ack == 0 | Show only SYN packets |
wlan.fc.type_subtype==0x08 | Show only beacon frames |
eth.dst==de:ad:be:ee:ee:ff | MAC filter |
eth.dst!=ff:ff:ff:ff:ff:ff | Filter out broadcast |
(eth.dst[0] & 1) | Filter by multicast |
tcp.flag.reset==1 | RST flag filter |
tcp.time_delta > .250 | Displays packets with delta time > 250ms in their stream context |
frame contains potato | Displays packets containing string 'potato' |
tcp.analysis.flags && !tcp.analysis.window_update | Retransmissions, duplicate acks, zero windows, and more; for debugging performance issues |
dns | http | ftp | ssh | icp | Search by protocol name (examples given) |
frame contains "(attachment|tar|exe|zip|pdf)" | Find files by type |
tcp contains facebook | Filter traffic by keyword |
!(arp or icmp or stp) | Filters out stuff you might not care about |