Human // Collection and Pretext

OSINT Quick Reference

OSINT Quick Reference is presented here as an operator-facing field brief. It focuses on why the topic matters during real offensive work, where it changes decision-making, and which public references are worth keeping close while validating or reporting it.

field briefoperator referencecurated public sources

Why this topic matters

OSINT Quick Reference matters because it changes how an operator frames the problem, chooses validation steps and decides what evidence is strong enough to keep. In real work, weak handling of this topic leads to wasted time, noisy testing and softer findings.

This brief treats osint quick reference as a reusable field reference. The focus is on attack surface, decision points, practical workflow and the public material that is worth keeping nearby when you need to execute, verify or explain the subject under pressure.

Core coverage

The points below capture the main workflows, concepts, tools and operator decisions associated with osint quick reference.

  • OSINT quick reference

Commands and snippets

OSINT

#Google OSINT:

term AND term site:asdf.de

„Term“ site:asdg.de

*Term site:asdg.de

site:asdf.de filetype:pdf

Site:asdf.de intext:password

https://www.exploit-db.com/google-hacking-database

#Image OSINT:
https://tineye.com/search
http://exif.regex.info/exif.cgi

#E-Mail OSINT:
https://hunter.io/search/
https://phonebook.cz
https://tools.emailhippo.com

https://github.com/khast3x/h8mail
https://github.com/laramies/theHarvester


# Password OSINT
https://intelx.io
https://haveibeenpwned.com

https://dehashed.com/
https://weleakinfo.to/login
https://leakcheck.net
https://snusbase.com




#Username OSINT
https://namechk.com
https://whatsmyname.app

https://github.com/WebBreacher/WhatsMyName


#People OSINT
https://www.whitepages.com
https://webmii.com
https://peekyou.com
https://www.411.com
https://www.spokeo.com
https://pipl.com/product/pipl-search
https://peoplemon.com


#Phone OSINT
https://www.truecaller.com
https://calleridtest.com
https://www.infobel.com/de/world
https://github.com/sundowndev/phoneinfoga
https://www.phonesearch.us/home.php



#SOCMINT
https://github.com/sherlock-project/sherlock
https://github.com/MrNonoss/Profil3r-docker



-TWITTER
https://twitter.com/search-advanced
https://socialbearing.com
https://www.twitonomy.com
https://mentionmapp.com
https://tweetbeaver.com
http://spoonbill.io
https://tinfoleak.com
https://tweetdeck.twitter.com

https://github.com/twintproject/twint


-Facebook
https://sowdust.github.io/fb-search/
https://intelx.io/tools?tab=facebook

-Instagram
https://codeofaninja.com/tools/find-instagram-user-id/
https://www.instadp.com
https://imginn.com

https://github.com/Datalux/Osintgram
https://github.com/sc1341/InstagramOSINT


-Snapchat
https://map.snapchat.com

-Reddit
https://www.reddit.com

-LindedIN/Xing
https://www.linkedin.com/
https://www.xing.com/home

-TikTok
https://www.tiktok.com


#WEB OSINT
https://builtwith.com/
https://centralops.net/co/
https://dnslytics.com/reverse-ip
https://spyonweb.com/
https://www.virustotal.com/
https://visualping.io
http://backlinkwatch.com/index.php
https://viewdns.info
https://www.robtex.com
https://pentest-tools.com/information-gathering/find-subdomains-of-domain#
https://spyse.com
https://crt.sh
https://www.shodan.io
https://web.archive.org
https://www.whois.com 
https://www.wappalyzer.com
https://github.com/weppos/whois
https://github.com/projectdiscovery/subfinder



#Business OSINT
https://www.aihitdata.com
https://opencorporates.com
https://www.maltego.com/transform-hub/bureau-van-dijk-orbis/



#WLAN OSINT
https://wigle.net

#OSINT Automation
https://github.com/s0md3v/Photon
https://www.kali.org/tools/recon-ng/
https://www.spiderfoot.net

Curated public references