International References 4
IP, network intel & reputation 10
OSINT frameworks & collections 9
Leaks, breaches & exploits 9
Primarily for defensive/security research and incident response.
- Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers
- Have I Been Pwned: Check if your email has been compromised in a data breach
- ICIJ Offshore Leaks Database
- Leak - Lookup | Data Breach Search Engine
- LEAKED DATA
- Pastes Archive - Pastebin.com
- Web Link Integrity Scanner - Scamadviser
- Ransomlook
- Exploit
Government & standards 6
Web, DNS, SSL & email diagnostics 7
Fraud, scams & reporting 5
People & public records search 13
- Lookups
- Public Records Search - judyrecords
- Public Records | Search the Original Resource Worldwide
- Clustrmaps - Free People Search Engine
- Dating Sites | UserSearch
- Find People by Name | Free People Finder | ThatsThem
- Whitepages® - Official Site | Find People, Phone Numbers, Addresses & More
- USA Directory
- Email Finder: Free Email Search - No Signup Required | EXPERTE.com
- Email Finder| Snov.io
- Historical military records - Fold3
- Wedding Registry Search and Website Finder
- Car Make/Model Recognition API
Test data & generators 5
For test environments only; do not use generated identities or payment data for real-world activity.
WHOIS & domain registration 5
Company & entity search 7
Decoding, hashing & crypto utilities 3
Downloaders, converters & shorteners 3
Image & file forensics 6
Link tracking & IP loggers (use ethically) 3
Tools in this section can be used to collect IPs/telemetry via links; use only with explicit authorization and applicable policy/law.
Social Media and Forum searches 8