OSINT Cheatsheet — Open Source Intelligence Gathering

Quick reference for commands and tools used in open source intelligence gathering.


1. Domain information

ToolCommandDescription
whoiswhois example.comShows registrant, dates, and name servers
nslookupnslookup example.comBasic DNS query
digdig example.com ANYDetailed DNS query
digdig +short MX example.comQuery MX records

2. Emails, hosts, and social media

ToolCommandDescription
theHarvestertheHarvester -d example.com -b google,bingSearches for emails, subdomains, hosts
amassamass enum -d example.comSubdomain enumeration
crt.shhttps://crt.sh/?q=example.comSSL certificates associated with the domain
hunter.io (web)Public emails associated with domains

3. File metadata

ToolCommandDescription
exiftoolexiftool file.jpgExtracts metadata from images, PDFs, etc.
Webhttps://www.metadata2go.com/Quick analysis without a terminal
stringsstrings document.docxExtracts hidden text or plain metadata

4. Visualization with Maltego CE

ActionDescription
Create entityDomain, email, IP, etc.
TransformationsUse free ones (e.g., Shodan or DNS)
Export graphRight-click Export as image

5. Username search across social media

ToolCommandDescription
Sherlockpython3 sherlock username123Searches for profiles with that alias across dozens of networks
Webhttps://namecheckup.com/Checks alias availability

6. Useful online tools

SiteUse
shodan.ioExposed IPs, open ports, IoT devices
hunter.ioEmails by domain
builtwith.comTechnology used by a website
Google DorksAdvanced Google search techniques

7. Ethics and legality

GuidelineReason
Do not interact with real targets without permissionMay be considered illegal or invasive
Do not perform fuzzing or active attacksThis class covers passive reconnaissance only
Always indicate source and limitationsTo avoid incorrect conclusions

Navigation:OSINT | Home