KaifCodec User-Scanner

Command-line OSINT tool that checks username availability across social, developer, creator, gaming, and community platforms—including GitHub, Twitter/X, Reddit, Instagram, and more—in a single query. https://github.com/kaifcodec/user-scanner

GitDB

A GitHub discovery and analytics platform that helps developers and security researchers find active, production-ready open-source projects—tracking stars, maintainer activity, and growth signals across languages and topics. https://gitdb.net/

DocuFinderJS

A lightweight JavaScript bookmarklet for External Attack Surface Monitoring (EASM) that automates OSINT to uncover publicly exposed documents (PDFs, spreadsheets, configs) across a target domain—ideal for pentesters, bug bounty hunters, and defenders. https://github.com/ndr-repo/DocuFinderJS

Tomba Domain Search

Extracts professional email addresses directly from any company domain or website—ideal for OSINT, threat intel, sales prospecting, or investigative research. https://tomba.io/domain-search

CredenShow

A deep web breach search engine that lets you check if your email or credentials have been exposed in data leaks—showing full cleartext passwords, supporting real-time monitoring, and offering enterprise APIs for proactive account takeover defense. https://credenshow.ru/home

Search4Faces

A reverse face search engine that leverages neural networks to find individuals across Russian and global social platforms—including VK, OK.ru, TikTok, and Clubhouse—using only a photo. https://search4faces.com/

Surfface

An AI-powered reverse face search and OSINT platform that helps verify identities, reconnect with people, or investigate digital footprints—using only publicly available data and non-biometric facial analysis. https://surfface.com/

Cerulean

A powerful satellite-powered platform by SkyTruth that detects and tracks ocean pollution, including oil spills and bilge dumping, using AI and remote sensing. https://cerulean.skytruth.org/

How SOC Teams Stop Hackers With a Single API Call

Let’s talk about security. Everyone’s obsessed with complex zero-day exploits and APTs. But in the real world, the most damaging breaches often come from the dumbest, most obvious holes you can imagine. We found one. It was a doozy. The Scenario: A Ticking Time Bomb Our client? A sharp web agency that manages a portal…