osint
OSINT Skill
Quick Workflow
Progress:
- [ ] Identify target type (username/image/domain)
- [ ] Extract metadata (exiftool for images)
- [ ] Cross-reference across platforms
- [ ] Check archives/caches
- [ ] Document findings
Quick Commands
# Image metadata
exiftool image.jpg
exiftool -gpslatitude -gpslongitude image.jpg
# Username search
sherlock username
# DNS lookup
dig target.com ANY
whois target.com
Reference Files
| Topic | Reference |
|---|---|
| Image Analysis & Geolocation | reference/image.md |
| Domain & IP OSINT | reference/domain.md |
| Social Media & Username | reference/social.md |
Useful Online Tools
| Tool | Purpose | URL |
|---|---|---|
| Shodan | IoT/device search | shodan.io |
| Censys | Internet scan data | censys.io |
| VirusTotal | File/URL analysis | virustotal.com |
| CyberChef | Data transformation | gchq.github.io/CyberChef |
| IntelX | Search engine | intelx.io |
| Maltego | Graph analysis | maltego.com |
CTF Quick Patterns
# Find location from photo
exiftool -gpslatitude -gpslongitude image.jpg
# If no GPS: reverse image search, identify landmarks
# Find person from username
sherlock username
# Check: GitHub, Twitter, Instagram, Reddit
# Find deleted content
# Wayback Machine, Google cache, Archive.today
More from kiwamizamurai/cctf
web-security
Exploits web application vulnerabilities. Use when working with SQL injection, XSS, SSRF, SSTI, command injection, path traversal, authentication bypass, deserialization, or any web-based CTF challenge.
30mobile-security
Reverses and exploits mobile applications. Use when working with Android APK files, iOS IPA files, mobile app reversing, Frida hooking, or app security analysis challenges.
28pyjail
Escapes Python sandbox restrictions. Use when working with restricted Python eval/exec environments, sandbox escapes, filtered input challenges, or Python jail challenges.
9networking
Analyzes network traffic and exploits protocols. Use when working with PCAP files, Wireshark captures, packet analysis, protocol exploitation, traffic forensics, or data exfiltration detection.
7crypto-analysis
Breaks cryptographic systems and decrypts ciphertext. Use when working with RSA, AES, XOR, classical ciphers, hash functions, or when challenge involves encryption, decryption, keys, or mathematical crypto attacks.
7binary-analysis
Analyzes binary files for vulnerabilities and develops exploits. Use when working with ELF/PE executables, pwn challenges, buffer overflow, heap exploitation, ROP chains, format string bugs, or shellcode development.
7