A curated list of amazing web-based tools related to cybersecurity, threat intelligence, and digital investigations.
This list helps you gathering information you need about your target through publicly available data. Know more about your organization’s internet exposure, and assess you applications and infrastructure security.
Most of the tools are completely free, and just few are partially free (i.e. for open source projects).
Enjoy them! :smiling_imp:
Table of Contents
↑ Credits
Goosint is a personal project that started out in May 2023 as initially for sharing amazing, free, and ready-to-use Open-source intelligence (OSINT) tools for cybersecurity specialists.
At the end of 2023, the plateform has expanded to cover other topics in the field of peoples’ safety in France, and Information Security in general.
In February 2025, I decided to migrate my website, goosint.com, with +300 resources curated for almost 2 years to github.com and make it more collaborative.
↑ Contributing
If you want to add other tools or have any suggestions to improve this project, you can contact me here.
PS. I still need to work on a proper contribution process in github. Please give me some time :cowboy_hat_face:.
↑ Attack Surface Management
Search engines and platforms for attack surface management, cybersecurity intelligence, and threat analysis.
- Shodan - Intelligence search engine.
- Cloudflare Radar - Internet data & security radar.
- Censys - Intelligence search engine.
- ZoomEye - Intelligence search engine.
- IntelligenceX - Intelligence search engine.
- FullHunt - Attack surface management.
- Onyphe - Cyber defense search engine.
- Greynoise - Asset and vulnerabilities search engine.
- SOCRadar - Threat intelligence platform for dark web.
- SecurityTrails - Attack surface intelligence API.
- CriminalIP - Intelligence search.
- Hunter - Hunter internet search.
- FOFA - Network assets search engine.
- Netlas - Attack surface discovery engine.
- Polyswarm - Malware intelligence engine by Swarm.
- HudsonRock - Free cybercrime intelligence tools.
- Favi Hash - Get the hash of a favicon to identify websites using it.
↑ Malware Analysis and Sandbox
Online sandboxes and security frameworks for analyzing malware, URLs, and files.
↑ Security Reputation and Malware Scanners
Malware analysis, reputation lookup, and threat investigation.
Analyzing website business legitimacy, link redirection, and fraud detection.
Checking email breaches, phishing domains, and email security analysis.
Retrieving and verifying emails, as well as mapping digital footprints.
- PhoneBook - Retrieve emails from a given domain by IntelligenceX.
- Epieos - Retrieve emails from a given domain.
- Hunter - Retrieve emails from a given domain or verify email.
- Dehashed - Retrieve passwords from a domain.
- Email Hippo - Email address verification tool.
- Snov - Quick email format finder.
- OSINT Industries - Map email and phone over 200 websites (paid).
- Predicta Search - Email & phone digital footprint (paid).
- Anymail Finder - Paid tool to find emails.
DNS record lookup, whois information, and DNS intelligence.
↑ Domain and DNS Security Scanner
Domain security analysis, email authentication, and DNS security checks.
IP address lookups, network scanning, and BGP information.
- BGP Tools - BGP info from ASN, prefix, or DNS.
- IPinfo - Trusted IP address data.
- KeyCDN - IP lookup.
- Lupovis - IP lookup.
- IP Tools - Basic IP and network tools from Hacker Target servers.
- IPvoid - Popular IP tools.
- Nmap Online - Nmap IP ports scan.
- Port Scanner - Online port scanner.
- Hping - Custom ping for security assessment.
- PeeringDB - Network, internet exchange, and facility database.
- Wigle - Wireless networks mapping.
↑ Image Intelligence
Reverse image search, face recognition, and image metadata analysis.
↑ Web Application Security Scanner
Scanning vulnerabilities, checking security headers, SSL certificates, and more.
- OpenVAS Online - Online vulnerability scanner.
- Faraday Personal - Vulnerability management platform.
- Webbkoll - Check what data-protecting measures a site has taken.
- EDPB Web Auditing - Check website compliance with GDPR for free.
- Hardenize - General reports (DNS, email, certificate, security conf.) against your public domain.
- SSLLabs - Website SSL certificate scanner by Qualys.
- SSL Scan - SSL/TLS scan.
- Report URI - CSP, CSR and certificates scanners.
- Security Header - HTTP response headers security scanner.
- WafWoof - WAF detection.
- Sucuri - Detecting payloads, WAF, blocklisting, and security patches.
- Pentester - Website security check (WAF, technologies, SSL/TLS, etc.).
- Pentest Tools - Multiple free scan & discovery tools.
- NetCraft - Website technologies and infrastructure scanner.
- BuiltWith - Assets technologies scanner.
- WhatWeb - Web assets recognizer.
- Wappalizer - Website technologies scanner.
- Web Check - All-in-one website OSINT tool.
- SpyOnWeb - Find related websites from IP or domain.
- DNSlytics - List domains sharing the same IP host.
- Hackertarget WP - WordPress security scan.
- Hackertarget Joomla - Joomla security scan.
- Hackertarget Drupal - Drupal security scan.
- SimilarWeb - Website approximate traffic and ranking.
- Web Archive - Internet archive machine.
- Visual Ping - Monitor changes on a website page.
Secure code review, static application security testing, and code quality improvement.
Certificate history search, MFA/2FA verification, and data analysis/encoding.
- Crt - Certificate history search engine.
- 2FA Directory - Check if MFA/2FA is supported.
- CyberChef - Analyzing and encoding data.
↑ Cybersecurity Alerts and Advisories
Official alerts and advisories from global cybersecurity teams and organizations.
↑ Vulnerability Databases
Prioritizing and analyzing vulnerabilities, CVE databases and CVSS calculator.
↑ Threat Intelligence and Leaked Data
Resources for threat intelligence, leaks, and databases of compromised data for security researchers.
- LeakIX - Assets leaks and security incident monitoring.
- Nuclear Leaks - Largest free website leak database collection.
- Abuse.ch - Community-driven threat intelligence (6 databases).
- Ransomware.live - Monitor ransomware groups’ activity.
- Any Run CTI - Threat intelligence platform by Any Run.
- BinaryEdge Threat Intelligence Platform - Threat intelligence platform.
- ThreatBook CTI - Threat intelligence platform.
- Pulsedive - Threat intelligence platform.
- Alienvault OTX - Community-powered open threat exchange platform.
- OpenCTI - CTI structuring platform by French ANSSI.
- Carbon Black - VMware CB real-time threat research data.
- Palo Alto ATOMs - Actionable threat objects and mitigations.
- RiskIQ - Internet intelligence by Microsoft.
- Filesec - Latest attackers’ file extensions.
- LOLBIN - Attackers’ binaries used outside their intended purpose.
- GTFOBins - Binaries to bypass misconfigured systems.
- LOLC2 - Collection of C2 frameworks to evade detections.
- NTLM - Database of +8.7 billion password hashes.
- VXIntelligence - Find compromised passwords from vulnerable C2 servers.
- 0day.today - Marketplace for 0-day exploits.
- Malware Bazaar - Malware sharing platform for infosec professionals.
- Feodo Tracker - Browse botnet command & control infrastructure.
- Snusbase (paid) - Search engine for leaked databases, allowing users to find compromised credentials.
- DeHashed (paid) - Advanced breach search engine to find leaked personal and corporate data.
- RocketReach (paid) - Contact and company intelligence platform for finding professional emails and phone numbers.
- CTF Search - Search CTF (Capture The Flag) writeups.
- Altenens - Forum where people share data leaks.
Tools for aggregating news, managing links, and automating threat intelligence workflows.
- FreshRSS - Self-hosted RSS feed aggregator (requires setup).
- Google News - News aggregator from Google.
- Feedly - RSS feed aggregator.
- IFTTT - Automation platform to connect apps and devices through custom workflows.
- Raindrop.io - Bookmark manager for organizing and syncing links across devices.
↑ Investigation Visualiser
Tools for tracking investigations, organizing notes, and visualizing data.
- OSINTracker - Track your investigations online.
- Obsidian - Create notes and visualize them in graphs.
- Draw.io - Make diagrams and flow charts online.
Tools for auditing, hardening, and reporting on Active Directory (AD), Microsoft 365 security, GWP security.
- Purple Knight - Active Directory Security Audit by Semperis (requires setup).
- PingCastle - Active Directory Security at 80% by Vincent Le Toux (requires setup).
- BloodHound - AD and AAD Complex Attack Path Audit (requires setup).
- Harden AD - AD and M365 Infrastructure Hardening (requires setup).
- CRT - CrowdStrike Reporting Tool for Azure AD / O365.
- AADInternals - Extract openly available tenant information.
- Adalanche - Open-Source Active Directory ACL Visualizer (requires setup).
- ScubaGear - Assess the state of your M365 tenant against CISA’s baselines (requires setup).
- ScubaGoggles - Assess the state of your Google Workspace tenant against CISA’s baselines (requires setup).
↑ Endpoint Security Testing
Tools to assess your defense and test your security mechanisms.
↑ Cyber Rating and Company Security Exposure Assessments
Tools to evaluate the security posture of your network and partners.
- ShadowServer - Daily reports for your network and security exposure.
- Coalition - Cyber score for your company.
- Bitsight - Free customized security ratings report.
- SecurityScorecard - Security score of your partners (14-day trial).
Tools for managing and ensuring compliance with international cybersecurity standards and company requirements.
- CISO Assistant - Cybersecurity program & compliance management platform by a French company.
- Gapps - Cybersecurity compliance management platform (requires setup).
- Demin - Management tool for information security management system (requires setup).
- Tenacy.io - Cybersecurity program management platform by a French company (paid).
- Simple Risk - Cybersecurity program management platform (paid).
Advanced engines for searching code, data, and public information across various platforms.
Tools and platforms for general Open Source Intelligence (OSINT) gathering and investigations.
- Kasm Web - Browser-based desktop for your investigations.
- Whonix - A definitely maximum anonymity and security VM.
- Gray Hat Warfare - Buckets and shorteners finder.
- Black Bird - Map accounts by username.
- Grabify - Track clicks on your URL.
- OpenCorporates - Largest database to search professionals and entities.
- AIHIT DATA - Business and companies OSINT.
- Name Checkup - Check if a username is in use/available.
- OSINT VM - Specialized OSINT virtual machine by Trace Labs.
- VMWare VM - Free workstation player by VMWare.
- Trace Labs - A non-profit organization to help find missing people.
- OnChain Industries - Search a wallet, username, or email.
↑ License
This work is licensed under CC BY-NC-SA 4.0. In other words, share generously but provide attribution to the authors (e.g, credit: goosint.com).
Sincerely, Khalil B.