Satellite map Wayback – ArcGIS Living Atlas
The satellite time machine: Satellite and map time machine from Esri that lets you explore historical imagery and geographic changes across decades. https://livingatlas.arcgis.com/wayback
The satellite time machine: Satellite and map time machine from Esri that lets you explore historical imagery and geographic changes across decades. https://livingatlas.arcgis.com/wayback
Search groups on Telegram. https://waybien.com/en/search
An OSINT tool that decodes Telegram spoiler messages hidden as pseudo-braille in screenshots—allowing investigators to recover redacted text without relying on the original sender. https://spoiler.soxoj.com/
OSINT tool that harvests metadata from public documents (PDF, DOC, XLS, PPT, etc.) found on target websites via Google searches. Extracts usernames, email addresses, server paths, and internal naming conventions—ideal for pre-engagement reconnaissance and password spray list generation. https://github.com/laramies/metagoofil
Telegram bot that reveals the approximate account creation date of any Telegram user—useful for verifying account age, spotting potential sockpuppets, or assessing profile legitimacy during OSINT investigations. https://t.me/creationdatebot
An all-in-one Shodan & ZoomEye supported tool to search, browse, preview and dump data leakage across 20+ services. Pulls real exposure straight from the sources instead of guessing. Drop it into your workflow and watch it surface leaks you won’t find anywhere else. https://github.com/GainSec/LeakScope
A Telegram OSINT bot that retrieves public TikTok profile details—including country, language, and activity timeline—using just a username. Ideal for verifying accounts, tracking digital footprints, or investigating suspicious profiles. https://t.me/TikTrackBot
A free OSINT service that alerts users if their email or personal data appears in infostealer logs—malware-collected credentials and browser artifacts often dumped on underground forums or ransomware leak sites. https://haveibeenransom.com/
A practical, hardware-free OSINT/pen-testing tool that turns a Kali NetHunter phone into a USB HID keyboard emulator to brute-force Android lockscreen PINs—no ADB, rooting, or special hardware required. Supports optimized PIN lists, masks, and cooldown handling for real-world devices. https://github.com/urbanadventurer/Android-PIN-Bruteforce
Command-line OSINT tool that checks username availability across social, developer, creator, gaming, and community platforms—including GitHub, Twitter/X, Reddit, Instagram, and more—in a single query. https://github.com/kaifcodec/user-scanner