Pentest Book
Search…
Public info gathering

OSINT resources

1
https://osintframework.com/
2
https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
3
https://start.me/p/DPYPMz/the-ultimate-osint-collection
4
https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ
Copied!

OSINT websites

1
# Multipurpose
2
https://shodan.io/
3
https://app.netlas.io/
4
https://fofa.so/
5
https://fullhunt.io/
6
https://www.zoomeye.org/
7
https://leakix.net/
8
https://www.yougetsignal.com/
9
https://intelx.io/
10
https://pentest-tools.com/
11
https://gofindwhois.com/
12
https://gofindwho.com/
13
14
# Domain Recon
15
https://domainbigdata.com/
16
https://suip.biz/
17
https://viewdns.info/
18
http://bgp.he.net/
19
https://dnsdumpster.com/
20
https://www.whoxy.com/
21
http://ipv4info.com/
22
https://rapiddns.io/
23
https://myip.ms/
24
25
# Analytics
26
https://publicwww.com/
27
https://intelx.io/tools?tab=analytics
28
https://dnslytics.com/reverse-analytics
29
https://builtwith.com/
30
31
# Mailserver blacklists
32
http://multirbl.valli.org/
33
34
# Dark web exposure
35
https://immuniweb.com/radar/
36
37
# New acquisitions
38
https://crunchbase.com/
39
40
# Public APIs
41
https://www.postman.com/explore/
Copied!

General / AIO

1
# https://github.com/OWASP/Amass
2
# Get ASN
3
amass intel -org "whatever"
4
# Reverse whois
5
amass intel -active -asn NUMBER -whois -d domain.com
6
# SSL Cert Grabbing
7
amass enum -active -d example.com -cidr IF.YOU.GOT.THIS/24 -asn NUMBER
8
9
# https://github.com/smicallef/spiderfoot
10
spiderfoot -s domain.com
11
12
# https://github.com/j3ssie/Osmedeus
13
python3 osmedeus.py -t example.com
14
15
# https://github.com/thewhiteh4t/FinalRecon
16
python3 finalrecon.py --full https://example.com
17
18
# https://github.com/laramies/theHarvester
19
theHarvester -d domain.com -b all
20
21
# https://github.com/lanmaster53/recon-ng
22
recon-ng
Copied!

Whois/Registrant Tools

1
# https://github.com/jpf/domain-profiler
2
./profile target.com
3
4
# Standard whois tool
5
whois
6
7
# Whoxy api
8
# https://www.whoxy.com/
9
# Whoxy clients
10
# https://github.com/MilindPurswani/whoxyrm
11
# https://github.com/vysecurity/DomLink
Copied!

Dorks

Google

Tools

1
# Google Dorks Cli
2
# https://github.com/six2dez/degoogle_hunter
3
degoogle_hunter.sh company.com
4
5
# uDork
6
# https://github.com/m3n0sd0n4ld/uDork
7
./uDork.sh united.com -u all
8
./uDork.sh united.com -e all
Copied!

Dorks

1
# Google dorks helper
2
https://dorks.faisalahmed.me/
3
4
# Code share sites
5
site:http://ideone.com | site:http://codebeautify.org | site:http://codeshare.io | site:http://codepen.io | site:http://repl.it | site:http://jsfiddle.net "company"
6
# GitLab/GitHub/Bitbucket
7
site:github.com | site:gitlab.com | site:bitbucket.org "company"
8
# Stackoverflow
9
site:stackoverflow.com "target.com"
10
# Project management sites
11
site:http://trello.com | site:*.atlassian.net "company"
12
# Pastebin-like sites
13
site:http://justpaste.it | site:http://pastebin.com "company"
14
# Config files
15
site:target.com ext:xml | ext:conf | ext:cnf | ext:reg | ext:inf | ext:rdp | ext:cfg | ext:txt | ext:ora | ext:env | ext:ini
16
# Database files
17
site:target.com ext:sql | ext:dbf | ext:mdb
18
# Backup files
19
site:target.com ext:bkf | ext:bkp | ext:bak | ext:old | ext:backup
20
# .git folder
21
inurl:"/.git" target.com -github
22
# Exposed documents
23
site:target.com ext:doc | ext:docx | ext:odt | ext:pdf | ext:rtf | ext:sxw | ext:psw | ext:ppt | ext:pptx | ext:pps | ext:csv
24
# Other files
25
site:target.com intitle:index.of | ext:log | ext:php intitle:phpinfo "published by the PHP Group" | inurl:shell | inurl:backdoor | inurl:wso | inurl:cmd | shadow | passwd | boot.ini | inurl:backdoor | inurl:readme | inurl:license | inurl:install | inurl:setup | inurl:config | inurl:"/phpinfo.php" | inurl:".htaccess" | ext:swf
26
# SQL errors
27
site:target.com intext:"sql syntax near" | intext:"syntax error has occurred" | intext:"incorrect syntax near" | intext:"unexpected end of SQL command" | intext:"Warning: mysql_connect()" | intext:"Warning: mysql_query()" | intext:"Warning: pg_connect()"
28
# PHP errors
29
site:target.com "PHP Parse error" | "PHP Warning" | "PHP Error"
30
# Login pages
31
site:target.com inurl:signup | inurl:register | intitle:Signup
32
# Open redirects
33
site:target.com inurl:redir | inurl:url | inurl:redirect | inurl:return | inurl:src=http | inurl:r=http
34
# Apache Struts RCE
35
site:target.com ext:action | ext:struts | ext:do
36
# Search in pastebin
37
site:pastebin.com target.com
38
# Linkedin employees
39
site:linkedin.com employees target.com
40
# Wordpress files
41
site:target.com inurl:wp-content | inurl:wp-includes
42
# Subdomains
43
site:*.target.com
44
# Sub-subdomains
45
site:*.*.target.com
46
#Find S3 Buckets
47
site:.s3.amazonaws.com | site:http://storage.googleapis.com | site:http://amazonaws.com "target"
48
# Traefik
49
intitle:traefik inurl:8080/dashboard "target"
50
# Jenkins
51
intitle:"Dashboard [Jenkins]"
52
53
# Other 3rd parties sites
54
https://www.google.com/search?q=site%3Agitter.im%20%7C%20site%3Apapaly.com%20%7C%20site%3Aproductforums.google.com%20%7C%20site%3Acoggle.it%20%7C%20site%3Areplt.it%20%7C%20site%3Aycombinator.com%20%7C%20site%3Alibraries.io%20%7C%20site%3Anpm.runkit.com%20%7C%20site%3Anpmjs.com%20%7C%20site%3Ascribd.com%20%22united%22
55
# Backup files
56
https://www.google.com/search?q=site%3Aunited.com%20ext%3Abkf%20%7C%20ext%3Abkp%20%7C%20ext%3Abak%20%7C%20ext%3Aold%20%7C%20ext%3Abackup
57
# Login pages
58
https://www.google.com/search?q=site%3Aunited.com%20inurl%3Asignup%20%7C%20inurl%3Aregister%20%7C%20intitle%3ASignup
59
# Config files
60
https://www.google.com/search?q=site%3Aunited.com%20ext%3Axml%20%7C%20ext%3Aconf%20%7C%20ext%3Acnf%20%7C%20ext%3Areg%20%7C%20ext%3Ainf%20%7C%20ext%3Ardp%20%7C%20ext%3Acfg%20%7C%20ext%3Atxt%20%7C%20ext%3Aora%20%7C%20ext%3Aenv%20%7C%20ext%3Aini
61
# .git folder
62
https://www.google.com/search?q=inurl%3A%5C%22%2F.git%5C%22%20united.com%20-github
63
# Database files
64
https://www.google.com/search?q=site%3Aunited.com%20ext%3Asql%20%7C%20ext%3Adbf%20%7C%20ext%3Amdb
65
# Open redirects
66
https://www.google.com/search?q=site%3Aunited.com%20inurl%3Aredir%20%7C%20inurl%3Aurl%20%7C%20inurl%3Aredirect%20%7C%20inurl%3Areturn%20%7C%20inurl%3Asrc%3Dhttp%20%7C%20inurl%3Ar%3Dhttp
67
# Code share sites
68
https://www.google.com/search?q=site%3Asharecode.io%20%7C%20site%3Acontrolc.com%20%7C%20site%3Acodepad.co%20%7Csite%3Aideone.com%20%7C%20site%3Acodebeautify.org%20%7C%20site%3Ajsdelivr.com%20%7C%20site%3Acodeshare.io%20%7C%20site%3Acodepen.io%20%7C%20site%3Arepl.it%20%7C%20site%3Ajsfiddle.net%20%22united%22
69
# Pastebin-like sites
70
https://www.google.com/search?q=site%3Ajustpaste.it%20%7C%20site%3Aheypasteit.com%20%7C%20site%3Apastebin.com%20%22united%22
71
# Linkedin employees
72
https://www.google.com/search?q=site%3Alinkedin.com%20employees%20united.com
73
# Project management sites
74
https://www.google.com/search?q=site%3Atrello.com%20%7C%20site%3A*.atlassian.net%20%22united%22
75
# Other files
76
https://www.google.com/search?q=site%3Aunited.com%20intitle%3Aindex.of%20%7C%20ext%3Alog%20%7C%20ext%3Aphp%20intitle%3Aphpinfo%20%5C%22published%20by%20the%20PHP%20Group%5C%22%20%7C%20inurl%3Ashell%20%7C%20inurl%3Abackdoor%20%7C%20inurl%3Awso%20%7C%20inurl%3Acmd%20%7C%20shadow%20%7C%20passwd%20%7C%20boot.ini%20%7C%20inurl%3Abackdoor%20%7C%20inurl%3Areadme%20%7C%20inurl%3Alicense%20%7C%20inurl%3Ainstall%20%7C%20inurl%3Asetup%20%7C%20inurl%3Aconfig%20%7C%20inurl%3A%5C%22%2Fphpinfo.php%5C%22%20%7C%20inurl%3A%5C%22.htaccess%5C%22%20%7C%20ext%3Aswf
77
# Sub-subdomains
78
https://www.google.com/search?q=site%3A*.*.united.com
79
# Jenkins
80
https://www.google.com/search?q=intitle%3A%5C%22Dashboard%20%5BJenkins%5D%5C%22%20%22united%22
81
# Traefik
82
https://www.google.com/search?q=intitle%3Atraefik%20inurl%3A8080%2Fdashboard%20%22united%22
83
# Cloud buckets S3/GCP
84
https://www.google.com/search?q=site%3A.s3.amazonaws.com%20%7C%20site%3Astorage.googleapis.com%20%7C%20site%3Aamazonaws.com%20%22united%22
85
# SQL errors
86
https://www.google.com/search?q=site%3Aunited.com%20intext%3A%5C%22sql%20syntax%20near%5C%22%20%7C%20intext%3A%5C%22syntax%20error%20has%20occurred%5C%22%20%7C%20intext%3A%5C%22incorrect%20syntax%20near%5C%22%20%7C%20intext%3A%5C%22unexpected%20end%20of%20SQL%20command%5C%22%20%7C%20intext%3A%5C%22Warning%3A%20mysql_connect()%5C%22%20%7C%20intext%3A%5C%22Warning%3A%20mysql_query()%5C%22%20%7C%20intext%3A%5C%22Warning%3A%20pg_connect()%5C%22
87
# Exposed documents
88
https://www.google.com/search?q=site%3Aunited.com%20ext%3Adoc%20%7C%20ext%3Adocx%20%7C%20ext%3Aodt%20%7C%20ext%3Apdf%20%7C%20ext%3Artf%20%7C%20ext%3Asxw%20%7C%20ext%3Apsw%20%7C%20ext%3Appt%20%7C%20ext%3Apptx%20%7C%20ext%3Apps%20%7C%20ext%3Acsv
89
# Wordpress files
90
https://www.google.com/search?q=site%3Aunited.com%20inurl%3Awp-content%20%7C%20inurl%3Awp-includes
91
# Apache Struts RCE
92
https://www.google.com/search?q=site%3Aunited.com%20ext%3Aaction%20%7C%20ext%3Astruts%20%7C%20ext%3Ado
93
# GitLab/GitHub/Bitbucket
94
https://www.google.com/search?q=site%3Agithub.com%20%7C%20site%3Agitlab.com%20%7C%20site%3Abitbucket.org%20%22united%22
95
# Subdomains
96
https://www.google.com/search?q=site%3A*.united.com
97
# Stackoverflow
98
https://www.google.com/search?q=site%3Astackoverflow.com%20%22united.com%22
99
# PHP errors
100
https://www.google.com/search?q=site%3Aunited.com%20%5C%22PHP%20Parse%20error%5C%22%20%7C%20%5C%22PHP%20Warning%5C%22%20%7C%20%5C%22PHP%20Error%5C%22
Copied!

GitHub

Tools

1
#https://github.com/obheda12/GitDorker
2
python3 GitDorker.py -tf ~/Tools/.github_tokens -q united.com -p -ri -d Dorks/medium_dorks.txt
Copied!

Dorks

1
".mlab.com password"
2
"access_key"
3
"access_token"
4
"amazonaws"
5
"api.googlemaps AIza"
6
"api_key"
7
"api_secret"
8
"apidocs"
9
"apikey"
10
"apiSecret"
11
"app_key"
12
"app_secret"
13
"appkey"
14
"appkeysecret"
15
"application_key"
16
"appsecret"
17
"appspot"
18
"auth"
19
"auth_token"
20
"authorizationToken"
21
"aws_access"
22
"aws_access_key_id"
23
"aws_key"
24
"aws_secret"
25
"aws_token"
26
"AWSSecretKey"
27
"bashrc password"
28
"bucket_password"
29
"client_secret"
30
"cloudfront"
31
"codecov_token"
32
"config"
33
"conn.login"
34
"connectionstring"
35
"consumer_key"
36
"credentials"
37
"database_password"
38
"db_password"
39
"db_username"
40
"dbpasswd"
41
"dbpassword"
42
"dbuser"
43
"dot-files"
44
"dotfiles"
45
"encryption_key"
46
"fabricApiSecret"
47
"fb_secret"
48
"firebase"
49
"ftp"
50
"gh_token"
51
"github_key"
52
"github_token"
53
"gitlab"
54
"gmail_password"
55
"gmail_username"
56
"herokuapp"
57
"internal"
58
"irc_pass"
59
"JEKYLL_GITHUB_TOKEN"
60
"key"
61
"keyPassword"
62
"ldap_password"
63
"ldap_username"
64
"login"
65
"mailchimp"
66
"mailgun"
67
"master_key"
68
"mydotfiles"
69
"mysql"
70
"node_env"
71
"npmrc _auth"
72
"oauth_token"
73
"pass"
74
"passwd"
75
"password"
76
"passwords"
77
"pem private"
78
"preprod"
79
"private_key"
80
"prod"
81
"pwd"
82
"pwds"
83
"rds.amazonaws.com password"
84
"redis_password"
85
"root_password"
86
"secret"
87
"secret.password"
88
"secret_access_key"
89
"secret_key"
90
"secret_token"
91
"secrets"
92
"secure"
93
"security_credentials"
94
"send.keys"
95
"send_keys"
96
"sendkeys"
97
"SF_USERNAME salesforce"
98
"sf_username"
99
"site.com" FIREBASE_API_JSON=
100
"site.com" vim_settings.xml
101
"slack_api"
102
"slack_token"
103
"sql_password"
104
"ssh"
105
"ssh2_auth_password"
106
"sshpass"
107
"staging"
108
"stg"
109
"storePassword"
110
"stripe"
111
"swagger"
112
"testuser"
113
"token"
114
"x-api-key"
115
"xoxb "
116
"xoxp"
117
[WFClient] Password= extension:ica
118
access_key
119
bucket_password
120
dbpassword
121
dbuser
122
extension:avastlic "support.avast.com"
123
extension:bat
124
extension:cfg
125
extension:env
126
extension:exs
127
extension:ini
128
extension:json api.forecast.io
129
extension:json googleusercontent client_secret
130
extension:json mongolab.com
131
extension:pem
132
extension:pem private
133
extension:ppk
134
extension:ppk private
135
extension:properties
136
extension:sh
137
extension:sls
138
extension:sql
139
extension:sql mysql dump
140
extension:sql mysql dump password
141
extension:yaml mongolab.com
142
extension:zsh
143
filename:.bash_history
144
filename:.bash_history DOMAIN-NAME
145
filename:.bash_profile aws
146
filename:.bashrc mailchimp
147
filename:.bashrc password
148
filename:.cshrc
149
filename:.dockercfg auth
150
filename:.env DB_USERNAME NOT homestead
151
filename:.env MAIL_HOST=smtp.gmail.com
152
filename:.esmtprc password
153
filename:.ftpconfig
154
filename:.git-credentials
155
filename:.history
156
filename:.htpasswd
157
filename:.netrc password
158
filename:.npmrc _auth
159
filename:.pgpass
160
filename:.remote-sync.json
161
filename:.s3cfg
162
filename:.sh_history
163
filename:.tugboat NOT _tugboat
164
filename:_netrc password
165
filename:apikey
166
filename:bash
167
filename:bash_history
168
filename:bash_profile
169
filename:bashrc
170
filename:beanstalkd.yml
171
filename:CCCam.cfg
172
filename:composer.json
173
filename:config
174
filename:config irc_pass
175
filename:config.json auths
176
filename:config.php dbpasswd
177
filename:configuration.php JConfig password
178
filename:connections
179
filename:connections.xml
180
filename:constants
181
filename:credentials
182
filename:credentials aws_access_key_id
183
filename:cshrc
184
filename:database
185
filename:dbeaver-data-sources.xml
186
filename:deployment-config.json
187
filename:dhcpd.conf
188
filename:dockercfg
189
filename:environment
190
filename:express.conf
191
filename:express.conf path:.openshift
192
filename:filezilla.xml
193
filename:filezilla.xml Pass
194
filename:git-credentials
195
filename:gitconfig
196
filename:global
197
filename:history
198
filename:htpasswd
199
filename:hub oauth_token
200
filename:id_dsa
201
filename:id_rsa
202
filename:id_rsa or filename:id_dsa
203
filename:idea14.key
204
filename:known_hosts
205
filename:logins.json
206
filename:makefile
207
filename:master.key path:config
208
filename:netrc
209
filename:npmrc
210
filename:pass
211
filename:passwd path:etc
212
filename:pgpass
213
filename:prod.exs
214
filename:prod.exs NOT prod.secret.exs
215
filename:prod.secret.exs
216
filename:proftpdpasswd
217
filename:recentservers.xml
218
filename:recentservers.xml Pass
219
filename:robomongo.json
220
filename:s3cfg
221
filename:secrets.yml password
222
filename:server.cfg
223
filename:server.cfg rcon password
224
filename:settings
225
filename:settings.py SECRET_KEY
226
filename:sftp-config.json
227
filename:sftp-config.json password
228
filename:sftp.json path:.vscode
229
filename:shadow
230
filename:shadow path:etc
231
filename:spec
232
filename:sshd_config
233
filename:token
234
filename:tugboat
235
filename:ventrilo_srv.ini
236
filename:WebServers.xml
237
filename:wp-config
238
filename:wp-config.php
239
filename:zhrc
240
HEROKU_API_KEY language:json
241
HEROKU_API_KEY language:shell
242
HOMEBREW_GITHUB_API_TOKEN language:shell
243
jsforce extension:js conn.login
244
language:yaml -filename:travis
245
msg nickserv identify filename:config
246
org:Target "AWS_ACCESS_KEY_ID"
247
org:Target "list_aws_accounts"
248
org:Target "aws_access_key"
249
org:Target "aws_secret_key"
250
org:Target "bucket_name"
251
org:Target "S3_ACCESS_KEY_ID"
252
org:Target "S3_BUCKET"
253
org:Target "S3_ENDPOINT"
254
org:Target "S3_SECRET_ACCESS_KEY"
255
password
256
path:sites databases password
257
private -language:java
258
PT_TOKEN language:bash
259
redis_password
260
root_password
261
secret_access_key
262
SECRET_KEY_BASE=
263
shodan_api_key language:python
264
WORDPRESS_DB_PASSWORD=
265
xoxp OR xoxb OR xoxa
266
s3.yml
267
.exs
268
beanstalkd.yml
269
deploy.rake
270
.sls
Copied!

Shodan

Dorks

1
port:"9200" elastic
2
product:"docker"
3
product:"kubernetes"
4
hostname:"target.com"
5
host:"10.10.10.10"
6
# Spring boot servers, look for /env or /heapdump
7
org:YOUR_TAGET http.favicon.hash:116323821
Copied!

ASN/CIDR Tools

1
# https://github.com/nitefood/asn
2
asn -n 8.8.8.8
3
4
# https://github.com/j3ssie/metabigor
5
echo "company" | metabigor net --org
6
echo "ASN1111" | metabigor net --asn
7
8
# https://github.com/yassineaboukir/Asnlookup
9
python asnlookup.py -m -o <Organization>
10
11
# https://github.com/harleo/asnip
12
asnip -t domain.com -p
13
14
# https://github.com/projectdiscovery/mapcidr
15
echo 10.10.10.0/24 | mapcidr
16
17
# https://github.com/eslam3kl/3klector
18
python 3klector.py -t company
19
20
# https://github.com/SpiderLabs/HostHunter
21
python3 hosthunter.py targets.txt
22
23
# Website (with API)
24
https://asnlookup.com/
Copied!

Credentials leaks

1
# pwndb
2
# https://github.com/davidtavarez/pwndb
3
python3 pwndb.py --target [email protected]
4
5
# Websites
6
https://hunter.io/
7
https://link-base.org/index.php
8
http://xjypo5vzgmo7jca6b322dnqbsdnp3amd24ybx26x5nxbusccjkm4pwid.onion/
9
http://pwndb2am4tzkvold.onion
10
https://weleakinfo.to/
11
https://www.dehashed.com/search?query=
12
https://haveibeenpwned.com
13
https://breachchecker.com
14
https://vigilante.pw/
15
https://leak.sx/
16
https://intelx.io
17
https://breachdirectory.org/
18
19
breachdirectory.org + (hashes.com || md5decrypt.net || crackstation.net)# Nice combination
20
21
# Check hashes with this tool
22
https://github.com/jackrendor/jhf
Copied!

Email tools

1
# https://github.com/SimplySecurity/SimplyEmail
2
./SimplyEmail.py
3
4
pip3 install mailspoof
5
sudo mailspoof -d domain.com
6
7
# Test email spoof
8
https://emkei.cz/
9
10
# https://github.com/sham00n/buster
11
12
13
# https://github.com/m4ll0k/Infoga
14
python infoga.py
15
16
# https://github.com/martinvigo/email2phonenumber
17
python email2phonenumber.py scrape -e [email protected]
18
19
# https://github.com/jkakavas/creepy/
20
21
# https://github.com/Josue87/EmailFinder
22
emailfinder -d domain.com
23
24
# https://github.com/laramies/theHarvester
25
python3 theHarvester.py -d domain.com -b "linkedin"
Copied!

GIT tools

1
# https://github.com/obheda12/GitDorker
2
python3 GitDorker.py -tf TOKENSFILE -q tesla.com -d dorks/DORKFILE -o target
3
4
# https://github.com/dxa4481/truffleHog
5
trufflehog https://github.com/Plazmaz/leaky-repo
6
trufflehog --regex --entropy=False https://github.com/Plazmaz/leaky-repo
7
8
# https://github.com/eth0izzle/shhgit
9
shhgit --search-query AWS_ACCESS_KEY_ID=AKIA
10
11
# https://github.com/d1vious/git-wild-hunt
12
python git-wild-hunt.py -s "extension:json filename:creds language:JSON"
13
14
# https://shhgit.darkport.co.uk/
15
16
# GitLab (API token required)
17
# https://github.com/codeEmitter/token-hunter
18
./token-hunter.py -g 123456
Copied!

Metadata

1
# https://github.com/Josue87/MetaFinder
2
metafinder -d "domain.com" -l 10 -go -bi -ba -o united
Copied!

Social Media

1
# Twitter
2
# https://github.com/twintproject/twint
3
twint -u username
4
5
# Google account
6
# https://github.com/mxrch/ghunt
7
python hunt.py [email protected]
8
9
# Instagram
10
# https://github.com/th3unkn0n/osi.ig
11
python3 main.py -u username
12
13
# Public GDrive docs
14
https://www.dedigger.com/#gsc.tab=0
15
16
# Websites
17
emailrep.io # Accounts registered by email
18
tinfoleak.com # Twitter
19
mostwantedhf.info # Skype
20
searchmy.bio # Instagram
21
search.carrot2.org # Results grouped by topic
22
boardreader.com # forums
23
searchcode.com # search by code in repositories
24
swisscows.com # semantic search engine
25
publicwww.com # search by source page code
26
psbdmp.ws # search in pastebin
27
kribrum.io # social-media search engine
28
whatsmyname.app
Copied!