A service that allows to receive email at a temporary address that self-destructed after a certain time elapses. It is also known by names like : tempmail, 10minutemail, throwaway email, fake-mail or trash-mail. Many forums, Wi-Fi owners, websites and blogs ask visitors to register before they can view content, post comments or download something. Temp-Mail - is most advanced throwaway email service that helps you avoid spam and stay safe.
A visual directory, source map, and explorer for OSINT sources and utilities. If you're not sure what you need or what to try, browse the categories until you find something that looks useful.
Github repo for the page: https://github.com/lockfale/OSINT-Framework
A simple service for looking up your IP address. IPv4 and V6. JSON supported. Can check if a given port at your IP is open with a connect-back. Can do GeoIP country and city lookups on your IP.
Designed for use with CLI utils like wget and cURL.
PoC site here: https://ifconfig.co/
Written in Golang. Should be proxyable.
It’s always better to do things right the first time! So why not start with a scheme that can take you all the way from your small suburban office to an underground global headquarters where you torture British spies while patting a white fluffy cat. Start it off right and you never have to make significant changes to it again.
An online application that lets you search for the e-mail addresses of people, even though their addresses may not be publically known.
Find the MAC address of nearly any wi-fi router in Google's wardriving database.
A discussion of reserved netblocks (i.e., RFC 1918 and others which are set aside for specific purposes and as such are not advised for public use).
A website that offers email addresses that are only good for ten (10) minutes at a time, though you can opt to extend their lifetime to 100 minutes if you keep refreshing it.
iblocklist.com makes available many lists of IP addresses in several formats that can be dropped into firewalls or applications to prevent connections attempts from those hosts. Among the lists are known spammers, spyware servers, open proxies, advertising services, governments, and anonymizing services. Useful for perimeter security.
4223 links, including 281 private