<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>OSINT on nix4cyber</title><link>/cheatsheets/osint/</link><description>Recent content in OSINT on nix4cyber</description><generator>Hugo</generator><language>en</language><copyright>Copyright (c) 2025 nix4cyber</copyright><atom:link href="/cheatsheets/osint/index.xml" rel="self" type="application/rss+xml"/><item><title>Google Dorks</title><link>/cheatsheets/osint/google-dorks/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/osint/google-dorks/</guid><description>&lt;p>&lt;a href="https://google.com">Google&lt;/a> hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security holes in the configuration and computer code that websites are using.
Dorks also works on &lt;a href="https://startpage.com">Startpage&lt;/a> or &lt;a href="https://duckduckgo.com">Duckduckgo&lt;/a>.&lt;/p></description></item><item><title>Information Gathering</title><link>/cheatsheets/osint/information-gathering/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/osint/information-gathering/</guid><description>&lt;p>&lt;strong>Information Gathering&lt;/strong>, often referred to as &lt;strong>Open Source Intelligence (OSINT)&lt;/strong> in the context of ethical hacking, is the systematic collection and analysis of publicly available data about a target, providing the foundational knowledge necessary to identify potential vulnerabilities and craft targeted security assessments.&lt;/p></description></item><item><title>Sock Puppets</title><link>/cheatsheets/osint/sock-puppets/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/osint/sock-puppets/</guid><description>&lt;p>Sock puppets are fake identities use to gather information from a target.
The sock puppet should have no link between your personal information and the fakes ones. (No ip address, mail, follow, etc..)&lt;/p></description></item><item><title>Tips</title><link>/cheatsheets/osint/tips/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/osint/tips/</guid><description>&lt;h2 id="visualisation">Visualisation&lt;/h2>
&lt;p>Use &lt;a href="https://app.osintracker.com/">OSINTracker&lt;/a> to visualise your findings.
It allows you to create a graph of your findings, which can help you see connections and relationships between different pieces of information.&lt;/p>
&lt;h2 id="forgotten-passwords">Forgotten passwords&lt;/h2>
&lt;p>To find email addresses and phone numbers associated with an account, you can click on &amp;ldquo;Forgot password?&amp;rdquo; on the login page of a website. Be careful, though, this creates notifications and can be detected by the target, and often gives your information away.&lt;/p></description></item><item><title>Twitter/X OSINT</title><link>/cheatsheets/osint/twitter/x-osint/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>/cheatsheets/osint/twitter/x-osint/</guid><description>&lt;h2 id="banner-last-update-time">Banner last update time&lt;/h2>
&lt;p>The banner URL includes a Unix timestamp indicating when the banner was last
updated.&lt;/p>
&lt;p>For example:
&lt;code>https://pbs.twimg.com/profile_banners/1564326938851921921/1750897704/600x200&lt;/code>&lt;/p>
&lt;p>In this case, &lt;code>1750897704&lt;/code> is the timestamp. You can convert it using
&lt;a href="https://www.unixtimestamp.com/">unixtimestamp.com&lt;/a> or any other Unix time converter.&lt;/p></description></item></channel></rss>