Projects STRLCPY Cipherops Commits fc7753c3
🤬
  • ■ ■ ■ ■ ■ ■
    README.md
     1 +---
     2 +cover: >-
     3 + https://images.unsplash.com/photo-1606857521015-7f9fcf423740?crop=entropy&cs=srgb&fm=jpg&ixid=M3wxOTcwMjR8MHwxfHNlYXJjaHw5fHxjb21wYW55fGVufDB8fHx8MTY5MDg3MjgzNXww&ixlib=rb-4.0.3&q=85
     4 +coverY: -147
     5 +---
     6 + 
    1 7  # 😎 Cipherops
    2 8   
    3 9  <div align="left">
    skipped 39 lines
  • ■ ■ ■ ■ ■ ■
    embarking-on-your-hacking-journey-a-guide-for-beginners.md
     1 +---
     2 +cover: >-
     3 + https://images.unsplash.com/photo-1536825211030-094de935f680?crop=entropy&cs=srgb&fm=jpg&ixid=M3wxOTcwMjR8MHwxfHNlYXJjaHwzfHxqb3VybmV5fGVufDB8fHx8MTY5MDg3Mjg4MHww&ixlib=rb-4.0.3&q=85
     4 +coverY: -37
     5 +---
     6 + 
    1 7  # 🤩 Embarking on Your Hacking Journey: A Guide for Beginners
    2 8   
    3 9  **Join us on this captivating journey and become part of a vibrant community passionate about ethical hacking**<mark style="color:green;">**.**</mark> Together, let's explore the fascinating world of cybersecurity, unlock new possibilities, and elevate our skills to greater heights. Embrace the thrill of hacking, share knowledge, and connect with like-minded individuals who share your passion. Join us now and embark on this beautiful journey together!
    skipped 5 lines
  • ■ ■ ■ ■ ■ ■
    osint.md
     1 +---
     2 +cover: >-
     3 + https://images.unsplash.com/photo-1535210197479-59bc559c431d?crop=entropy&cs=srgb&fm=jpg&ixid=M3wxOTcwMjR8MHwxfHNlYXJjaHw4fHxmaW5kaW5nfGVufDB8fHx8MTY5MDg3Mjc4M3ww&ixlib=rb-4.0.3&q=85
     4 +coverY: 110
     5 +---
     6 + 
    1 7  # 👣 OSINT
    2 8   
    3 9  ```markdown
    skipped 69 lines
    73 79  $ proxychains bash ./FGDS.sh <DOMAIN>
    74 80  ```
    75 81   
    76  -###
    77  - 
    78 82  ### Google
    79  - 
    80  -####
    81 83   
    82 84  #### Google Dorks
    83 85   
    skipped 12 lines
    96 98  filetype:txt
    97 99  ```
    98 100   
    99  - 
    100  - 
    101 101  **Example**
    102 102   
    103 103  ```
    104 104  site:<DOMAIN> ext:php
    105 105  ```
    106  - 
    107  - 
    108 106   
    109 107  **Leaks**
    110 108   
    skipped 4 lines
    115 113  site:http://pastebin.com "<DOMAIN>"
    116 114  ```
    117 115   
    118  - 
    119  - 
    120 116  **Example**
    121 117   
    122 118  ```
    123 119  site:http://jsfiddle.net | site:http://codebeautify.org | site:http://codepen.io | site:http://pastebin.com "<DOMAIN>"
    124 120  site:http://jsfiddle.net | site:http://codebeautify.org | site:http://codepen.io | site:http://pastebin.com "<DOMAIN>" "demo" "test" "api"
    125 121  ```
    126  - 
    127  - 
    128 122   
    129 123  **Open Redirects**
    130 124   
    skipped 12 lines
    143 137  site:http://drive.google.com "<DOMAIN>"
    144 138  ```
    145 139   
    146  -####
    147  - 
    148 140  #### Abusing Google ID
    149 141   
    150  -> [https://medium.com/week-in-osint/getting-a-grasp-on-googleids-77a8ab707e43](https://medium.com/week-in-osint/getting-a-grasp-on-googleids-77a8ab707e43)
    151  - 
    152  - 
     142 +> [https://medium.com/week-in-osint/getting-a-grasp-on-googleids-77a8ab707e4](https://medium.com/week-in-osint/getting-a-grasp-on-googleids-77a8ab707e43)
    153 143   
    154 144  **Setup**
    155 145   
    skipped 3 lines
    159 149  4. Set the right pane to request
    160 150  5. Check all batchexecute packets
    161 151   
    162  - 
    163  - 
    164 152  **Example**
    165 153   
    166 154  > [https://contacts.google.com/\_/ContactsUi/data/batchexecute?rpcids=OSOtuf\&f.sid=-916332265175998083\&bl=boq\_contactsuiserver\_20200707.13\_p0\&hl=en\&soc-app=527\&soc-platform=1\&soc-device=1&\_reqid=765234\&rt=c](https://contacts.google.com/\_/ContactsUi/data/batchexecute?rpcids=OSOtuf\&f.sid=-916332265175998083\&bl=boq\_contactsuiserver\_20200707.13\_p0\&hl=en\&soc-app=527\&soc-platform=1\&soc-device=1&\_reqid=765234\&rt=c)
    167 155   
    168 156  6. Watch out for a string like the following one
    169  - 
    170  - 
    171 157   
    172 158  **Example**
    173 159   
    skipped 7 lines
    181 167   
    182 168  > [https://www.google.com/maps/contrib/](https://www.google.com/maps/contrib/)
    183 169   
    184  -###
    185  - 
    186 170  ### h8mail
    187 171   
    188 172  > [https://github.com/khast3x/h8mail](https://github.com/khast3x/h8mail)
    skipped 1 lines
    190 174  ```
    191 175  $ h8mail -t <EMAIL>
    192 176  ```
    193  - 
    194  -###
    195 177   
    196 178  ### Photon
    197 179   
    skipped 3 lines
    201 183  $ python3 photon.py -u https://<DOMAIN> -l 3 -t 100 --wayback
    202 184  ```
    203 185   
    204  -###
    205  - 
    206 186  ### Recon-ng
    207 187   
    208  -####
    209  - 
    210 188  #### Basic Commands
    211 189   
    212 190  ```
    skipped 20 lines
    233 211   
    234 212  `Ctrl+c` unloads a module.
    235 213   
    236  -###
    237  - 
    238 214  ### Social Analyzer
    239 215   
    240 216  > [https://github.com/qeeqbox/social-analyzer](https://github.com/qeeqbox/social-analyzer)
    skipped 10 lines
    251 227  $ theHarvester -d <DOMAIN> -l 500 -b google -f myresults.html
    252 228  ```
    253 229   
    254  -###
     230 +#### Online tools <a href="#online-tools" id="online-tools"></a>
     231 + 
     232 +* [Whatsmyname](https://whatsmyname.app/) – This is my favourite one. It is pretty fast and shows only websites where the username is taken, which excludes a lot of visual noise.
     233 +* [Instantusername](https://instantusername.com/#/) – A pretty good username checker, but like all of them, still provides false results on some social networks. For example, on Tinder it might show that the username is taken, when, in fact, it is not. Checks more than 100 networks.
     234 +* [Checkusernames](http://checkusernames.com/) – Another online username checker, but might have false results as well. For example, it might show that the username is not available, but when following the link you get to the 404 page (eg. Imgur, Flickr). Checks 160 social networks.
     235 +* [Socialcatfish](https://socialcatfish.com/) – This one checks across many resources, but it takes too long to generate a report, and in the end it requires payment to unlock the report.
     236 +* [Search.illicit.services](https://search.illicit.services/) – Search engine for PII and leaked credentials from data brokers and breaches. Finds data leaks associated with usernames, if there are any.
     237 +* [Social Searcher](https://www.social-searcher.com/) – Searches for username mentions on social networks.
     238 + 
     239 +#### Github Osint tools <a href="#github" id="github"></a>
     240 + 
     241 +* [Maigret](https://github.com/soxoj/maigret) – A pretty advanced username checker which collects a dossier on a person by username from thousands of sites. Creates HTML reports and has a telegram bot.
     242 +* [Blackbird](https://github.com/p1ngul1n0/blackbird) – Another OSINT tool to search for accounts by username in social networks.
     243 +* [Social Analyzer](https://github.com/qeeqbox/social-analyzer) – A tool for analysing and finding a person's profile in 1000 social media \ websites with a vast number of features. Can be accessed in CLI and has a Web App.
     244 +* [Sherlock](https://github.com/sherlock-project/sherlock) – Hunts down social media accounts by username across social networks.
     245 +* [Enola](https://github.com/TheYahya/enola) – A modern CLI tool written with Golang. Based on Sherlock, but returns more false positives.
    255 246   
Please wait...
Page is in error, reload to recover