• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Hacking OSINT Techniques to Acquire Personal Information

sisu

Initiate
User
Joined
Oct 22, 2024
Messages
49
Reputation
0
Reaction score
84
Points
18
Credits
74
‎9 Months of Service‎
98%
OSINT Update!

Telegram bots are way advanced and easy to use now. Now, You dont even need any knowledge about codes and github. Desclaimer: This is not a sponsored content.
These bots possibily get paid. For now, they are free to use and have unlimited credit.
I found telegram bots that is able to perform deep searches for everything about a person you can find online. Now everyone can be detective or a potential hardcore stalker.
What info can youuse as search query?:

  1. Phone
  2. Email
  3. Username
  4. Password
  5. Telegrm id
  6. VK link
  7. OK.ru profile link
  8. Discord id
  9. Image
  10. Location
  11. Contact
  12. IP address
  13. Domain
  14. Link
  15. Vehicle number plates (Russian)
  16. IMSI
  17. IMEI
  18. BTS
  19. MAC
  20. MMSI
  21. ICAO
  22. BSSID
Telegram bot links:
  1. This link is hidden for visitors. Please Log in or register now.
  2. This link is hidden for visitors. Please Log in or register now.
  3. This link is hidden for visitors. Please Log in or register now.
  4. This link is hidden for visitors. Please Log in or register now.
  5. This link is hidden for visitors. Please Log in or register now.
    (paid)
Introduction (Previous Post)
In this tutorial, we will explore the art of Open Source Intelligence (OSINT) and how it can be employed to collect personal information about a target, all without requiring any programming skills. We will outline simple steps and provide links to tools that can aid in the process.


Step 1: Gathering Basic Information
Begin by obtaining the target's full name. To delve deeper, you can use Google Dorks to unearth additional details. Follow these steps:

- Search the target's full name using double inverted commas on Google, like this: "Target Full Name."
OR
- Access
This link is hidden for visitors. Please Log in or register now.
to compile basic information about the target.
OR
- If you have an image of the target person then you should try
This link is hidden for visitors. Please Log in or register now.
or
This link is hidden for visitors. Please Log in or register now.
(Its paid now)

Step 2: Obtaining Usernames, Email Addresses, and Phone Numbers
Once you have collected the target's basic information, you can further investigate by retrieving their username, email address, and phone number. Follow these steps for each:

X - For usernames, refer to
This link is hidden for visitors. Please Log in or register now.

Y - For email addresses, utilize
This link is hidden for visitors. Please Log in or register now.

Z - To obtain phone numbers, explore
This link is hidden for visitors. Please Log in or register now.


Step 3: Advanced Information Gathering
For more complex data collection tasks involving IP addresses, web URLs, and breached email accounts, consider using the versatile tool, [SpiderFoot](
This link is hidden for visitors. Please Log in or register now.
).

Step 4: Find places using reverse image search through Google, Yandex (Best) and Bing.
 
Back
Top