diff --git a/public/arf.json b/public/arf.json index 4cefe18f..68c53b93 100644 --- a/public/arf.json +++ b/public/arf.json @@ -18573,92 +18573,362 @@ { "name": "Vector (T)", "type": "url", - "url": "https://github.com/thesaderror/vector" + "url": "https://github.com/thesaderror/vector", + "description": "Python-based OSINT tool that gathers social media accounts, finds locations, contact information, and performs leak database searches with graph-based data visualization.", + "status": "down", + "pricing": "free", + "bestFor": "Username enumeration across social media platforms", + "input": "Username, email address, or IP address", + "output": "Consolidated account findings with graph visualization", + "opsec": "active", + "opsecNote": "Contacts platforms for account verification; generates detectable traffic", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": true }, { "name": "DataSploit (T)", "type": "url", - "url": "https://github.com/datasploit/datasploit/" + "url": "https://github.com/datasploit/datasploit/", + "description": "OSINT framework that performs reconnaissance on domains, emails, usernames, and phone numbers by aggregating data from multiple sources into consolidated intelligence reports.", + "status": "down", + "pricing": "free", + "bestFor": "Multi-target reconnaissance (domain/email/username/phone aggregation)", + "input": "Domain, email address, username, phone number, Bitcoin addresses", + "output": "HTML, JSON, and text reports aggregating findings", + "opsec": "active", + "opsecNote": "Performs active reconnaissance; relies on external API availability", + "localInstall": true, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": true }, { "name": "Omnibus (T)", "type": "url", - "url": "https://github.com/InQuest/omnibus" + "url": "https://github.com/InQuest/omnibus", + "description": "Interactive CLI OSINT tool for investigating artifacts (IPs, domains, emails, usernames, hashes, Bitcoin addresses) with over 25 integrated OSINT modules.", + "status": "live", + "pricing": "free", + "bestFor": "Comprehensive multi-source artifact investigation with modular extensibility", + "input": "IP addresses, domains, emails, usernames, file hashes, Bitcoin addresses", + "output": "JSON exports of aggregated results, session-based artifact management", + "opsec": "active", + "opsecNote": "Depends on integrated modules; primarily active queries", + "localInstall": true, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false }, { "name": "Photon (T)", "type": "url", - "url": "https://github.com/s0md3v/Photon" + "url": "https://github.com/s0md3v/Photon", + "description": "Fast Python web crawler designed for OSINT that extracts URLs, emails, social media accounts, files, API keys, JavaScript endpoints, and DNS records from websites.", + "status": "live", + "pricing": "free", + "bestFor": "Web reconnaissance and endpoint discovery", + "input": "Target URL(s) with optional wayback machine integration", + "output": "Organized folders with URLs, emails, social accounts, files, API keys, DNS records", + "opsec": "active", + "opsecNote": "Active web crawling generates significant traffic; highly detectable", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "ReconDog (T)", "type": "url", - "url": "https://github.com/s0md3v/ReconDog" + "url": "https://github.com/s0md3v/ReconDog", + "description": "Reconnaissance Swiss Army Knife that performs passive API-based reconnaissance on targets including DNS lookups, Censys queries, CMS detection, and subdomain enumeration.", + "status": "degraded", + "pricing": "free", + "bestFor": "Multi-function passive reconnaissance with modular capabilities", + "input": "Domain names, IP addresses", + "output": "Subdomain lists, CMS identification, technology stacks, honeypot detection results", + "opsec": "passive", + "opsecNote": "Queries Censys and Shodan; traffic appears as API lookups rather than direct reconnaissance", + "localInstall": true, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": true }, { "name": "IFTTT", "type": "url", - "url": "https://ifttt.com/" + "url": "https://ifttt.com/", + "description": "No-code automation platform connecting 900+ apps and services with trigger-action applets for automating workflows and data collection.", + "status": "live", + "pricing": "freemium", + "bestFor": "Automation and notification workflows for social media monitoring", + "input": "Multiple app integrations (triggers from services like Twitter/X, webhooks, RSS)", + "output": "Automated actions across connected apps (Slack, email, data logging)", + "opsec": "passive", + "opsecNote": "Cloud-based service; logs all activities; only for passive automation", + "localInstall": false, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false }, { "name": "Slash", "type": "url", - "url": "https://github.com/redc86/slash" + "url": "https://github.com/redc86/slash", + "description": "Automated OSINT tool for username enumeration across 187+ social media platforms, forums, and pastebin searches with phone/email extraction.", + "status": "live", + "pricing": "free", + "bestFor": "Username enumeration and social media account discovery", + "input": "Username or email address", + "output": "Verified social media profiles, forum memberships, pastebin matches, extracted contact info", + "opsec": "active", + "opsecNote": "Searches 187+ platforms simultaneously; generates observable API queries", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Stringify", "type": "url", - "url": "https://www.stringify.com/" + "url": "https://www.stringify.com/", + "description": "IoT home automation and smart home workflow platform with automation capabilities.", + "status": "down", + "pricing": "free", + "bestFor": "Not applicable (defunct service)", + "input": "Smart home devices and connected services (pre-shutdown)", + "output": "Automation workflows and device control (pre-shutdown)", + "opsec": "passive", + "opsecNote": "Service has been fully deactivated; no longer operational", + "localInstall": false, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": true }, { "name": "OSRFramework (T)", "type": "url", - "url": "https://github.com/i3visio/osrframework" + "url": "https://github.com/i3visio/osrframework", + "description": "GNU AGPLv3+ OSINT framework with modular tools for username enumeration, email searching, domain checking, and DNS analysis across multiple platforms.", + "status": "live", + "pricing": "free", + "bestFor": "Comprehensive username and email enumeration with extensible architecture", + "input": "Usernames, email addresses, domains, phone numbers (platform-dependent)", + "output": "Consolidated results across platforms; GraphQL-compatible output; Maltego transforms", + "opsec": "active", + "opsecNote": "Queries generate API requests across target services", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false }, { "name": "Inquisitor (T)", "type": "url", - "url": "https://github.com/penafieljlm/inquisitor" + "url": "https://github.com/penafieljlm/inquisitor", + "description": "Organization-centric OSINT footprinting tool that automates asset discovery, ownership correlation, and relationship visualization.", + "status": "down", + "pricing": "free", + "bestFor": "Corporate/organizational asset discovery and correlation", + "input": "Known assets (domains, IPs, hosts), registrant ownership data", + "output": "Interactive relationship diagrams, classified asset correlation", + "opsec": "passive", + "opsecNote": "Queries public sources (Google, Shodan) passively", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": true }, { "name": "AutoOSINT (T)", "type": "url", - "url": "https://github.com/bharshbarger/AutOSINT" + "url": "https://github.com/bharshbarger/AutOSINT", + "description": "Python automation tool integrating multiple OSINT modules (whois, DNS, HIBP, Shodan, Pastebin) with docx report generation.", + "status": "down", + "pricing": "free", + "bestFor": "Automated domain/email reconnaissance with report generation", + "input": "Domain names, dorks, client names", + "output": "Word (docx) reports with aggregated OSINT results", + "opsec": "active", + "opsecNote": "API-dependent modules (Shodan, HIBP) require keys; public searches passive", + "localInstall": true, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": true }, { "name": "IntRec-Pack (T)", "type": "url", - "url": "https://github.com/NullArray/IntRec-Pack" + "url": "https://github.com/NullArray/IntRec-Pack", + "description": "Bash script bundle for automated download, installation, and deployment of 14 OSINT and recon tools.", + "status": "live", + "pricing": "free", + "bestFor": "Streamlined OSINT tool environment setup and deployment", + "input": "N/A (installer script)", + "output": "Installed tool suite with integrated dependencies", + "opsec": "passive", + "opsecNote": "Wrapper script; opsec depends on installed tools", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "OSINT-SPY (T)", "type": "url", - "url": "https://github.com/SharadKumar97/OSINT-SPY" + "url": "https://github.com/SharadKumar97/OSINT-SPY", + "description": "Python multi-target OSINT reconnaissance tool supporting email, domain, IP, organization, and blockchain analysis with SSL/TLS testing.", + "status": "down", + "pricing": "free", + "bestFor": "Multi-vector reconnaissance (domains, IPs, emails, blockchain)", + "input": "Email addresses, domains, IP addresses, organizations, bitcoin addresses", + "output": "Whois data, SSL/TLS cipher information, IoT device details, malware reports", + "opsec": "active", + "opsecNote": "Includes passive (WHOIS) and active (SSL/TLS) scanning; VirusTotal submission is active", + "localInstall": true, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": true }, { "name": "Microsoft Flow", "type": "url", - "url": "https://flow.microsoft.com/en-us/" + "url": "https://flow.microsoft.com/en-us/", + "description": "Microsoft cloud workflow automation platform enabling complex multi-step processes with 1000+ pre-built connectors for integrating OSINT workflows.", + "status": "live", + "pricing": "freemium", + "bestFor": "Orchestrating OSINT workflows across multiple platforms/APIs", + "input": "Multiple connector inputs (email, web APIs, databases, spreadsheets)", + "output": "Automated workflow results, notifications, report exports", + "opsec": "passive", + "opsecNote": "Cloud-hosted Microsoft service; log all activities", + "localInstall": false, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false }, { "name": "PhoneInfoga (T)", "type": "url", - "url": "https://github.com/sundowndev/PhoneInfoga" + "url": "https://github.com/sundowndev/PhoneInfoga", + "description": "Go-based phone number reconnaissance framework validating numbers and aggregating metadata from phone directories, search engines, and reputation databases.", + "status": "live", + "pricing": "free", + "bestFor": "Phone number validation and intelligence gathering", + "input": "Phone numbers", + "output": "Country, carrier, line type, reputation status, associated information", + "opsec": "passive", + "opsecNote": "Queries public sources passively; no real-time tracking", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false }, { "name": "IntelligenceX", "type": "url", - "url": "https://intelx.io/" + "url": "https://intelx.io/", + "description": "Web-based intelligence search platform aggregating pastes, leaks, darknet content, stealer logs, and public records across Tor, I2P, and surface web.", + "status": "live", + "pricing": "freemium", + "bestFor": "Leaked data, breach database, and darknet intelligence searching", + "input": "Email addresses, domains, IP addresses, hash values", + "output": "Matching intelligence from pastes, leaks, darknet indexes, domain registrations", + "opsec": "passive", + "opsecNote": "Web-based; queries cached intelligence passively", + "localInstall": false, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false }, { "name": "Scrummage (T)", "type": "url", - "url": "https://github.com/matamorphosis/Scrummage" + "url": "https://github.com/matamorphosis/Scrummage", + "description": "Python/Flask OSINT aggregator centralizing search plugins for blockchain, domains, breaches, darkweb, threat intelligence, IP geolocation, and social media.", + "status": "live", + "pricing": "free", + "bestFor": "Multi-source OSINT aggregation via unified web interface", + "input": "Search queries across plugin-specific data types", + "output": "Aggregated results from blockchain, HIBP, Shodan, DuckDuckGo, Twitter, YouTube", + "opsec": "active", + "opsecNote": "Depends on underlying search plugins; includes passive and active queries", + "localInstall": true, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Analyst Research Tools", "type": "url", - "url": "https://analystresearchtools.com" + "url": "https://analystresearchtools.com", + "description": "Comprehensive web-based OSINT platform with 40+ integrated tools for people search, social media analysis, username enumeration, and archive searching.", + "status": "live", + "pricing": "free", + "bestFor": "Multi-category OSINT: people search, social media, archives, email discovery", + "input": "Names, emails, usernames, phone numbers, license plates, VINs", + "output": "PII data, social profiles (40+ platforms), email formats, archive snapshots", + "opsec": "passive", + "opsecNote": "Aggregates public sources passively; no active scanning", + "localInstall": false, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false } ] }, @@ -18669,7 +18939,22 @@ { "name": "MIDINS TITAN", "type": "url", - "url": "https://github.com/Med0-n/Midins_Titan-Osint_Tool" + "url": "https://github.com/Med0-n/Midins_Titan-Osint_Tool", + "description": "Unable to verify; URL unresponsive. Possible connection refusal or offline status.", + "status": "down", + "pricing": "unknown", + "bestFor": "Unable to determine", + "input": "Unknown", + "output": "Unknown", + "opsec": "unknown", + "opsecNote": "Cannot determine without access", + "localInstall": false, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": true } ] }, @@ -18680,7 +18965,22 @@ { "name": "Low Hanging Fruit (T)", "type": "url", - "url": "https://github.com/blindfuzzy/LHF" + "url": "https://github.com/blindfuzzy/LHF", + "description": "Modular Python penetration testing reconnaissance tool automating Nmap, Arachni, load balancer detection, and domain scanning.", + "status": "down", + "pricing": "free", + "bestFor": "Automated recon scanning during penetration tests", + "input": "Single IP address or domain", + "output": "Organized folder with Nmap, Arachni, and domain scan results", + "opsec": "active", + "opsecNote": "Network scanning (Nmap) is active reconnaissance; highly detectable", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": true } ] }, @@ -18691,47 +18991,182 @@ { "name": "VMware Workstation Player (T)", "type": "url", - "url": "https://www.vmware.com/products/player/playerpro-evaluation.html" + "url": "https://www.vmware.com/products/player/playerpro-evaluation.html", + "description": "Free lightweight desktop virtualization application for running multiple operating systems on a single computer without rebooting.", + "status": "live", + "pricing": "free", + "bestFor": "Desktop virtualization for personal/educational use", + "input": "ISO/VM files", + "output": "Virtualized operating environment", + "opsec": "passive", + "opsecNote": "No inherent privacy enhancement; privacy depends on guest OS configuration", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "VirtualBox (T)", "type": "url", - "url": "https://www.virtualbox.org/" + "url": "https://www.virtualbox.org/", + "description": "Open-source, general-purpose full virtualization software supporting x86_64 hardware across laptops, desktops, servers, and embedded systems.", + "status": "live", + "pricing": "free", + "bestFor": "Desktop and server virtualization; OSINT lab environments", + "input": "ISO files, VM disk images (VDI, VMDK, VHD)", + "output": "Virtualized OS environment", + "opsec": "passive", + "opsecNote": "No inherent privacy features; privacy depends on guest OS and network configuration", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Buscador OS (T)", "type": "url", - "url": "https://inteltechniques.com/buscador/index.html" + "url": "https://inteltechniques.com/buscador/index.html", + "description": "Specialized OSINT-focused Linux virtual machine pre-configured with dozens of OSINT tools for online investigations.", + "status": "live", + "pricing": "free", + "bestFor": "OSINT investigations; pre-configured OSINT toolkit", + "input": "N/A (VM distribution)", + "output": "Debian-based OSINT environment with pre-installed tools", + "opsec": "passive", + "opsecNote": "Designed for OSINT; privacy features not built-in but configurable through Tor", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Kali Linux OS (T)", "type": "url", - "url": "https://www.kali.org/" + "url": "https://www.kali.org/", + "description": "Open-source Debian-based distribution with 600+ pre-installed security tools for penetration testing, security research, and reverse engineering.", + "status": "live", + "pricing": "free", + "bestFor": "Penetration testing; security research; red team operations; OSINT research", + "input": "N/A (OS distribution)", + "output": "Debian-based Linux environment with security tools", + "opsec": "passive", + "opsecNote": "Designed for active security testing; opsec depends on network configuration", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "ParrotSec OS (T)", "type": "url", - "url": "https://www.parrotsec.org/" + "url": "https://www.parrotsec.org/", + "description": "Efficient, lightweight security-focused Linux distribution with strong privacy and anonymity features for penetration testing and privacy-conscious computing.", + "status": "live", + "pricing": "free", + "bestFor": "Penetration testing; red team; privacy-conscious computing; cybersecurity research", + "input": "N/A (OS distribution)", + "output": "Debian-based Linux environment with security tools", + "opsec": "active", + "opsecNote": "Strong privacy/anonymity features built-in; rolling security updates", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Microsoft Edge Development OS VMs (T)", "type": "url", - "url": "https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/" + "url": "https://developer.microsoft.com/en-us/microsoft-edge/tools/vms/", + "description": "Free virtual machines provided by Microsoft for testing Edge browser and web standards across different Windows versions.", + "status": "down", + "pricing": "free", + "bestFor": "Web development; Edge browser compatibility testing", + "input": "N/A (VM images)", + "output": "Windows OS environment", + "opsec": "passive", + "opsecNote": "Development VMs include standard Microsoft telemetry", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": true }, { "name": "Subgraph OS (T)", "type": "url", - "url": "https://subgraph.com/index.en.html" + "url": "https://subgraph.com/index.en.html", + "description": "Adversary-resistant alpha-stage operating system featuring hardened kernel, application sandboxing, built-in Tor integration, and memory-safe Golang applications.", + "status": "live", + "pricing": "free", + "bestFor": "High-security threat model; adversary resistance; encrypted communications", + "input": "N/A (OS distribution)", + "output": "Hardened Linux environment with Tor integration", + "opsec": "active", + "opsecNote": "Default Tor routing; kernel hardening (grsecurity, PaX); AppArmor profiles; Oz sandboxing", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Tails Live OS (T)", "type": "url", - "url": "https://tails.boum.org/" + "url": "https://tails.boum.org/", + "description": "Portable Debian-based operating system designed for anonymous communication and privacy protection, running entirely from USB with no traces left after shutdown.", + "status": "live", + "pricing": "free", + "bestFor": "High-anonymity OSINT; Tor-based anonymous communication for journalists and activists", + "input": "N/A (OS distribution)", + "output": "Debian-based Tor-routed anonymous environment", + "opsec": "active", + "opsecNote": "All traffic routed through Tor; HTTPS Everywhere; encrypted messaging; no traces on shutdown", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Whonix (T)", "type": "url", - "url": "https://www.whonix.org/wiki/Main_Page" + "url": "https://www.whonix.org/wiki/Main_Page", + "description": "Anonymous operating system using two virtual machines (Gateway/Workstation) enforcing network isolation, making DNS leaks impossible.", + "status": "live", + "pricing": "free", + "bestFor": "Maximum anonymity; Tor-only networking; malware containment; IP leak prevention", + "input": "N/A (VM distribution)", + "output": "Two-VM Tor-only anonymous environment", + "opsec": "active", + "opsecNote": "All traffic through Tor via Gateway VM; Workstation isolated from network; prevents DNS/IP leaks", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false } ] }, @@ -18742,22 +19177,82 @@ { "name": "CeWL (T)", "type": "url", - "url": "https://github.com/digininja/CeWL" + "url": "https://github.com/digininja/CeWL", + "description": "Ruby-based web spider that generates custom wordlists by crawling target websites to specified depth and extracting unique words for password cracking.", + "status": "live", + "pricing": "free", + "bestFor": "Custom wordlist generation; password cracking preparation; web reconnaissance", + "input": "Website URLs, depth parameters, authentication credentials (optional), proxy settings (optional)", + "output": "Custom wordlists (text files), extracted emails, metadata", + "opsec": "active", + "opsecNote": "Creates active web traffic and logs; crawling is detectable; recommend proxy/VPN usage", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Cupp (T)", "type": "url", - "url": "https://github.com/Mebus/cupp" + "url": "https://github.com/Mebus/cupp", + "description": "Python utility that generates targeted password wordlists by profiling personal information to create customized password candidates for security testing.", + "status": "live", + "pricing": "free", + "bestFor": "Password list generation, targeted dictionary attacks, penetration testing", + "input": "Interactive user profiling (personal information), existing wordlists for enhancement", + "output": "Customized password wordlists, enhanced dictionaries with variations", + "opsec": "active", + "opsecNote": "Generates passwords for testing; must be run locally on tester's machine", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "OWASP D4N155 (T)", "type": "url", - "url": "https://github.com/OWASP/D4N155" + "url": "https://github.com/OWASP/D4N155", + "description": "Intelligent OSINT-based wordlist generator that analyzes website content and metadata to create dynamic, context-aware wordlists for penetration testing.", + "status": "live", + "pricing": "free", + "bestFor": "Dynamic wordlist generation from target websites, intelligent password cracking", + "input": "URLs, IP addresses, file-based targets, raw text content; configurable crawling", + "output": "Intelligent wordlists based on content analysis; batch processing and reports", + "opsec": "active", + "opsecNote": "Active reconnaissance; involves crawling target websites; aggressive mode uses headless browser", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "W Generator", "type": "url", - "url": "https://app.wgen.io/" + "url": "https://app.wgen.io/", + "description": "Frontend-based wordlist generator for penetration testing that creates customized password dictionaries based on publicly available information using language-specific patterns.", + "status": "live", + "pricing": "free", + "bestFor": "Custom wordlist generation for password attacks, multi-language targeted wordlists", + "input": "Personal information (names, dates, usernames), custom pattern definitions; 60+ languages", + "output": "Generated wordlists with millions of word candidates; exportable patterns", + "opsec": "passive", + "opsecNote": "Browser-based frontend; runs entirely client-side; explicitly no data collection reported", + "localInstall": false, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false } ] }, @@ -18765,15 +19260,15 @@ "name": "Paterva / Maltego (T)", "type": "url", "url": "https://www.maltego.com/", - "description": "Visual link analysis tool for mapping relationships between people, companies, domains, and infrastructure.", + "description": "Enterprise-grade OSINT and cyber investigations platform that visualizes relationships between data entities across multiple sources for threat intelligence and incident response.", "status": "live", "pricing": "freemium", - "bestFor": "Link analysis, relationship mapping, entity correlation", - "input": "Domain, email, IP, name, phone number", - "output": "Entity relationship graph, linked records, transform results", + "bestFor": "Complex OSINT investigations, threat intelligence analysis, relationship mapping", + "input": "Multiple data types: profiles, domains, URLs, IPs, emails, phone numbers; 120+ data providers", + "output": "Visual relationship graphs, investigation reports, cross-correlations, real-time monitoring", "opsec": "active", - "opsecNote": "Transforms may query targets directly. Some data sources log lookups.", - "localInstall": true, + "opsecNote": "Primarily passive API queries; real-time monitoring component is more active", + "localInstall": false, "googleDork": false, "registration": true, "editUrl": false, @@ -18784,12 +19279,42 @@ { "name": "Overview", "type": "url", - "url": "https://www.overviewdocs.com/" + "url": "https://www.overviewdocs.com/", + "description": "Self-hosted document analysis and management platform for investigating large document collections through search, tagging, and plugin-based analysis with full data privacy.", + "status": "live", + "pricing": "free", + "bestFor": "Large-scale document analysis, investigative research, institutional document management", + "input": "Document uploads (supports large collections), project-based organization, multi-user", + "output": "Searchable document database, tagged collections, word clouds, entity filtering", + "opsec": "passive", + "opsecNote": "Self-hosted solution; complete data control; no external transmission required", + "localInstall": true, + "googleDork": false, + "registration": false, + "editUrl": false, + "api": false, + "invitationOnly": false, + "deprecated": false }, { "name": "Online Nikto scanner", "type": "url", - "url": "https://nikto.online/" + "url": "https://nikto.online/", + "description": "Web-based vulnerability scanner that identifies potential security misconfigurations, outdated software, and vulnerabilities in web servers without requiring local installation.", + "status": "live", + "pricing": "freemium", + "bestFor": "Web server vulnerability scanning, security assessment, SSL/TLS validation", + "input": "Website URLs or domain names; configurable scan types", + "output": "Vulnerability reports, CVE matching, server identification data, HTTP header analysis", + "opsec": "active", + "opsecNote": "Active vulnerability scanning; generates logs on target systems; creates measurable network activity", + "localInstall": false, + "googleDork": false, + "registration": true, + "editUrl": false, + "api": true, + "invitationOnly": false, + "deprecated": false } ] },