wddadk/Offensive-OSINT-Tools
GitHub: wddadk/Offensive-OSINT-Tools
专为渗透测试和红队设计的开源情报(OSINT)工具索引,覆盖域名侦察、邮箱收集、用户名溯源等多类信息收集场景。
Stars: 1133 | Forks: 143
# Offensive-OSINT-Tools
本仓库包含可在 Pentest 或 Red Team 期间用于 OSINT 的工具和链接。目前已有大量包含诸多工具的 awesome lists,但 Offensive Security 专家通常不需要如此广泛的选择。这促成了此列表的创建。这些工具几乎涵盖了 Offensive Security 专家的所有需求,将帮助您高效地完成工作。
如果工具执行多种功能,例如收集子域名**和** URL,它将被列在两处。
## 📖 目录
- [搜索引擎](#-search-engines)
- [电子邮件地址](#-email-addresses)
- [源代码](#-source-code)
- [子域名](#-subdomains)
- [URL](#-urls)
- [暗网](#-dark-web)
- [情报](#-intelligence)
- [网络信息](#-network-info)
- [DNS 历史](#-dnshistory)
- [证书](#-certifications)
- [FTP 服务器](#-ftp-servers)
- [被动基础设施扫描器](#-passive-infrastructure-scanner)
- [Microsoft Exchange](#-microsoft-exchange)
- [Telegram](#-telegram)
- [Google Dorks](#-google-dorks)
- [昵称搜索](#-nickname-search)
- [电话号码](#-phone-number)
- [Wifi](#-wifi)
- [Cloud](#-cloud)
- [信息收集工具](#-information-gathering-tools)
- [有用链接](#-useful-links)
## [↑](#-table-of-contents) 贡献
**欢迎!** 如果您发现您最喜欢的攻击性工具不在列表中,您可以建议添加它。
## [↑](#-table-of-contents) 搜索引擎
用于调查域名/IP 地址的搜索引擎。
* [Censys](https://censys.io/)
* [Shodan](https://www.shodan.io/)
* [Greynoise.io](https://viz.greynoise.io/)
* [ZoomEye](https://www.zoomeye.org/)
* [Onyphe](https://www.onyphe.io/)
* [Fofa](https://fofa.info/)
* [Binaryedge](https://app.binaryedge.io/)
* [FullHunt](https://fullhunt.io/)
* [Netlas](https://app.netlas.io/)
* [Quake360](https://quake.360.net/quake/#/index)
* [Criminalip](https://www.criminalip.io/)
* [Synapsint](https://synapsint.com/)
* [Natlas](https://natlas.io/)
* [Leakix](https://leakix.net/)
* [Dorki.io](https://dorki.io/)
## [↑](#-table-of-contents) 电子邮件地址
帮助您收集电子邮件地址的工具。通常搜索需要公司的域名。
* [Prospeo.io](https://app.prospeo.io/domain-search)
* [Hunter.io](https://hunter.io/)
* [Snov.io](https://snov.io/)
* [Phonebook](https://phonebook.cz/)
* [findemail.io](https://findemail.io/)
* [Omail](https://omail.io/leads/download.html)
* [Skymem](https://www.skymem.info/)
* [Signalhire](https://www.signalhire.com/)
* [Rocketreach](https://rocketreach.co/)
* [Eyes](https://github.com/N0rz3/Eyes) - Email osint tool
* [Infoga](https://github.com/m4ll0k/Infoga)
* [Poastal](https://github.com/jakecreps/poastal) - Tool that provides valuable information on any email address
* [Email-format](https://www.email-format.com/) - Analyses the company's mail format.
* [h8mail](https://github.com/khast3x/h8mail) - Email OSINT & Password breach hunting tool
* [EmailFinder](https://github.com/Josue87/EmailFinder) - Search emails from a domain through search engines
* [theHarvester](https://github.com/laramies/theHarvester)
* [Anymailfinder](https://anymailfinder.com/) - Find Verified Emails
* [tomba.io](https://tomba.io/) - email finder
* [contactout.com](https://contactout.com/) - person finder
* [ronin-recon](https://github.com/ronin-rb/ronin-recon) - Recursive recon engine and framework that can enumerate subdomains, DNS records, port scan, grab TLS certs, spider websites, and collect email addresses.
## [↑](#-table-of-contents) 子域名
自动搜索子域名的工具。其中大多数需要 API 密钥才能正常工作。
### 工具
* [Bbot](https://github.com/blacklanternsecurity/bbot)
* [Subdominator](https://github.com/RevoltSecurities/Subdominator)
* [sub.Monitor](https://github.com/e1abrador/sub.Monitor) - Passive subdomain continous monitoring tool
* [Sudomy](https://github.com/screetsec/Sudomy)
* [Amass](https://github.com/OWASP/Amass)
* [theHarvester](https://github.com/laramies/theHarvester)
* [Spiderfoot](https://github.com/smicallef/spiderfoot)
* [subchase](https://github.com/tokiakasu/subchase) - Chase subdomains by parsing the results of Google and Yandex search results
* [GooFuzz](https://github.com/m3n0sd0n4ld/GooFuzz) - Enumerate directories, files, subdomains or parameters without leaving evidence on the target's serve
* [SubGPT](https://github.com/s0md3v/SubGPT) - SubGPT looks at subdomains you have already discovered for a domain and uses BingGPT to find more.
* [alterx](https://github.com/projectdiscovery/alterx) - Fast and customizable subdomain wordlist generator using DSL.
* [Photon](https://github.com/s0md3v/Photon) - Incredibly fast crawler designed for OSINT.
* [ronin-recon](https://github.com/ronin-rb/ronin-recon#readme) - Recursive recon engine and framework that can enumerate subdomains, DNS records, port scan, grab TLS certs, spider websites, and collect email addresses.
* [subdomain-enum](https://github.com/chaitanyakrishna/subdomain-enum) - securitytrails api
*此处仅列出搜索未被上述工具自动化的站点/工具。*
* [TI.defender.microsoft](https://ti.defender.microsoft.com/)
* [dash.pugrecon.celes.in](https://dash.pugrecon.celes.in/)
* [Securitytrails](https://securitytrails.com/)
* [Shrewdeye](https://shrewdeye.app/)
* [Phonebook](https://phonebook.cz/)
* [Nmmapper](https://nmmapper.com/)
* [subdomainfinder.c99.](https://subdomainfinder.c99.nl/) - A subdomain finder is a tool used to find the subdomains of a given domain.
* [SubDomainRadar.io](https://subdomainradar.io) - Discover hidden subdomains with unparalleled accuracy and speed
## [↑](#-table-of-contents) URL
被动收集和分析 URL 的工具
* [Gau](https://github.com/lc/gau)
* [Xurlfind3r](https://github.com/hueristiq/xurlfind3r)
* [Unja](https://github.com/ninjhacks/unja)
* [Urlfinder](https://github.com/projectdiscovery/urlfinder)
* [urlhunter](https://github.com/utkusen/urlhunter) - a recon tool that allows searching on URLs that are exposed via shortener services
* [Waymore](https://github.com/xnl-h4ck3r/waymore)
* [Spiderfoot](https://github.com/smicallef/spiderfoot)
* [theHarvester](https://github.com/laramies/theHarvester)
* [GooFuzz](https://github.com/m3n0sd0n4ld/GooFuzz) - Enumerate directories, files, subdomains or parameters without leaving evidence on the target's serve
* [Rextracter.streamlit](https://rextracter.streamlit.app/) - Gathers links and analyses content
* [Uscrapper](https://github.com/z0m31en7/Uscrapper) - Tool that allows users to extract various personal information from a website.
* [ronin-recon](https://github.com/ronin-rb/ronin-recon#readme) - Recursive recon engine and framework that can enumerate subdomains, DNS records, port scan, grab TLS certs, spider websites, and collect email addresses.
* [Ominis-Osint](https://github.com/AnonCatalyst/Ominis-Osint) - The tool extracts relevant information such as titles, URLs, and potential mentions of the query in the results.
## [↑](#-table-of-contents) 源代码
用于在代码中查找提及的工具。可用于搜索公司/公司提及以查找密码/机密/机密信息。
* [Publicwww](https://publicwww.com/)
* [Nerdydata](https://www.nerdydata.com/)
* [Searchcode](https://searchcode.com/)
* [Grep.app](https://grep.app/)
## [↑](#-table-of-contents) 暗网
一个未知的领域,作者对此太笨了。将逐步扩展。
* [Ahmia](https://ahmia.fi/)
## [↑](#-table-of-contents) 情报
Threat Intelligence 工具,包含广泛的公司信息、子域名、DNS 信息、URL 等等。
* [TI.defender.microsoft](https://ti.defender.microsoft.com/)
* [Securitytrails](https://securitytrails.com/)
* [Pulsedive](https://pulsedive.com/)
* [ThreatBook](https://threatbook.io/)
* [Alienvault](https://otx.alienvault.com/)
* [Hudson Rock - Cybercrime Intelligence Tools](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools)
* [LeakRadar](https://leakradar.io)
## [↑](#-table-of-contents) 网络信息
IP/域名网络分析工具。
* [Bgp.he](https://bgp.he.net/)
* [whoistory](http://whoistory.com/)
* [Asnlookup](https://asnlookup.com/)
* [centralops](http://centralops.net/)
* [Bgp.tools](https://bgp.tools/)
* [Myip](https://myip.ms/)
* [IpInfo](https://ipinfo.io/) | [Cmd 版本](https://github.com/ipinfo/cli)
* [Whoisxmlapi](https://main.whoisxmlapi.com/)
## [↑](#-table-of-contents) DNS 历史
查看域名 DNS 历史记录的工具。
* [Bigdomaindata](https://bigdomaindata.com)
* [Dnshistory](https://dnshistory.org/)
* [Viewdns](https://viewdns.info/)
* [TI.defender.microsoft](https://ti.defender.microsoft.com/)
* [Securitytrails](https://securitytrails.com/)
## [](#-table-of-contents) 证书
* [Crt.sh](https://crt.sh/)
* [Web-check](https://github.com/Lissy93/web-check) + [Web 版本](https://web-check.as93.net/)
## [↑](#-table-of-contents) FTP 服务器
允许搜索和下载位于公共 FTP 服务器上的文件的工具。
* [Searchftps](https://www.searchftps.net/)
## [↑](#-table-of-contents) 被动基础设施扫描器
自动化被动 IP 地址/子网扫描的工具。
* [Smap](https://github.com/s0md3v/Smap)
* [Nmap-censys](https://github.com/censys/nmap-censys)
## [↑](#-table-of-contents) Microsoft Exchange
帮助对 Microsoft Exchange 进行被动/半被动分析的工具。
* [ExchangeFinder](https://github.com/mhaskar/ExchangeFinder) | #SemiOSINT
## [↑](#-table-of-contents) Telegram
用于调查 Telegram 聊天的工具。
* [Telepathy](https://github.com/jordanwildon/Telepathy)
## [↑](#-table-of-contents) Google Dorks
用于 Google Dorks 的工具。
* [Pagodo](https://github.com/opsdisk/pagodo)
* [Google hacking database](https://www.exploit-db.com/google-hacking-database)
* [Recruitin](https://recruitin.net/) - Compiles Google dorks to search on LinkedIn, Dribbble, GitHub, Xing, StackOverflow, Twitter
* [Search](https://github.com/pbkompasz/search) - Custom queries in Google
## [↑](#-table-of-contents) 昵称搜索
昵称搜索工具。
* [maigret](https://github.com/soxoj/maigret)
* [Sherlock](https://github.com/sherlock-project/sherlock)
* [Social analyzer](https://github.com/qeeqbox/social-analyzer)
* [nexfil](https://github.com/thewhiteh4t/nexfil)
* [whatsmyname](https://github.com/webbreacher/whatsmyname)
* [snoop](https://github.com/snooppr/snoop)
* [userrecon](https://github.com/wishihab/userrecon)
* [NicknameFinder](https://github.com/restanse/NicknameFinder)
* [gideon](https://github.com/YouVBeenHacked/gideon)
* [Arina-OSINT](https://github.com/AlexC-ux/Arina-OSINT)
* [netizenship](https://github.com/rahulrajpl/netizenship)
* [Search4](https://github.com/0xknown/Search4)
* [socialscan](https://github.com/iojw/socialscan)
* [Sherlock](https://github.com/mesuutt/sherlock)
* [recon-ng](https://github.com/lanmaster53/recon-ng/)
* [SocialPath](https://github.com/woj-ciech/SocialPath)
* [Castrick](https://castrickclues.com/)
## [↑](#-table-of-contents) 电话号码
有时会发生需要分析员工电话号码以获取更多信息的情况。
* [BuscaPaginasBlancas](https://github.com/GeiserX/BuscaPaginasBlancas) - Python tool for automated lookups on Spanish white pages (PaginasBlancas.es) to find phone numbers and addresses
* [PhoneInfoga](https://github.com/sundowndev/PhoneInfoga) + [Web Demo](https://demo.phoneinfoga.crvx.fr/)
* [GhostTrack](https://github.com/HunxByts/GhostTrack)
* [Osint.industries](https://osint.industries/)
* [Emobiletracker](https://www.emobiletracker.com/)
* [Castrick](https://castrickclues.com/)
* [Predicta Search](https://www.predictasearch.com/)
## [↑](#-table-of-contents) Wifi
* [3Wifi](https://3wifi.stascorp.com/) - free base of access points
## [↑](#-table-of-contents) Cloud
用于从 cloud 搜索、收集信息的工具。
* [Cloud_sherlock](https://github.com/Group-IB/cloud_sherlock)
## [↑](#-table-of-contents) 信息收集工具
* [Gasmask](https://github.com/twelvesec/gasmask)
* [Th3pector](https://github.com/Moham3dRiahi/Th3inspector)
* [Cylect.io](https://cylect.io/)
## [↑](-table-of-contents) 有用链接
指南、方法论和任何有用信息的链接。
* [WhereToGo](https://github.com/valeriyshevchenko90/WhereToGo) - list of popular services that might be used in organizations. By having an account of the user - you can try to find entry points to the organization data. #semiosint
* [Cloud OSINT](https://github.com/7WaySecurity/cloud_osint) - Repository with information related to Cloud Osint
* [Information Disclosure Write-Ups And PoCs](https://github.com/soxoj/information-disclosure-writeups-and-pocs)
## 待办
* 添加手机号码分析工具(归为一类)
* 制作思维导图
## 警告
包含的某些站点可能需要注册或付费 ($$$) 才能提供更多数据,但您应该能够免费获得至少一部分可用信息。
*灵感来源于 https://github.com/jivoi/awesome-osint*
标签:Awesome List, ESC4, GitHub, Google Hacking, OSINT, 子域名挖掘, 实时处理, 密码管理, 应用安全, 情报分析, 日志审计, 暗网, 痕迹追踪, 社工库, 网络安全, 网络诊断, 逆向工具, 邮箱侦查, 隐私保护