1. Collecting Basic Information
Initiate by procuring the target's complete name. To delve further, you can employ Google Dorks to uncover additional information. Follow these procedures:
- Search the target's full name using double inverted commas on Google, for example: "Full Name."
- Access https://www.idcrawl.com/target-full-name to assemble basic details about the target.
- Or if you have an image of the target person, try https://pimeyes.com/en and/or https://facecheck.id/
2. Gaining Usernames, Email Addresses, and Phone Numbers
Upon amassing the target's basic information, deepen your investigation by procuring their username, email address, and phone number. Employ these procedures:
- For Usernames: https://github.com/megadose/holehe
- For Phone Numbers: https://github.com/AzizKpln/Moriarty-Project
- For Email: https://github.com/mxrch/GHunt
3. Advanced Information Gathering
For more intricate tasks involving data collection such as IP addresses, web URLs, and breached email accounts, utilise the versatile tool: https://github.com/smicallef/spiderfoot
* Additionally, if you require locating places, utilise reverse image search through Yandex, Google, and Bing.
OSINT Tools for Obtaining Personal Information
- TheVikingsofDW
- Posts: 283
- Joined: Thu Feb 01, 2024 5:54 pm
- Location: Budapest
OSINT Tools for Obtaining Personal Information
Code: Select all
___ _____ __
| _ )/ __\ \ / /
| _ \ (__ \ \/\/ /
|___/\___| \_/\_/
----- TheVikingsOfDW -----
A Proud Staff Member Of BCW