{"id":10818,"date":"2020-06-24T17:01:09","date_gmt":"2020-06-24T11:31:09","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=10818"},"modified":"2020-06-24T17:01:09","modified_gmt":"2020-06-24T11:31:09","slug":"urlcrazy","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/","title":{"rendered":"URLCrazy : OSINT Tool To Generate And Test Domain"},"content":{"rendered":"\n<p><strong>URLCrazy<\/strong> is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing, and corporate espionage.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Use Cases<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Detect typo squatters profiting from typos on your domain name<\/li><li>Protect your brand by registering popular typos<\/li><li>Identify typo domain names that will receive traffic intended for another domain<\/li><li>Conduct phishing attacks during a penetration test<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Features<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Generates 15 types of domain variants<\/li><li>Knows over 8000 common misspellings<\/li><li>Supports bit flipping attacks<\/li><li>Multiple keyboard layouts (qwerty, azerty, qwertz, dvorak)<\/li><li>Checks if a domain variant is valid<\/li><li>Test if domain variants are in use<\/li><li>Estimate popularity of a domain variant<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Install from a package manager<\/strong><\/li><\/ul>\n\n\n\n<p>If you are using Kali Linux, Ubuntu or Debian use:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ sudo apt install urlcrazy<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Install latest release<\/strong><\/li><\/ul>\n\n\n\n<p>Visit <a href=\"https:\/\/github.com\/urbanadventurer\/urlcrazy\/releases\">https:\/\/github.com\/urbanadventurer\/urlcrazy\/releases<\/a><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Install current development version<\/strong><\/li><\/ul>\n\n\n\n<p>Be aware the latest development version may not be stable.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ git clone https:\/\/github.com\/urbanadventurer\/urlcrazy.git<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Install Ruby<\/strong><\/li><\/ul>\n\n\n\n<p>URLCrazy has been tested with Ruby versions 2.4 and 2.6.<\/p>\n\n\n\n<p>If you are using Ubuntu or Debian use:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ sudo apt install ruby<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Install Bundler<\/strong><\/li><\/ul>\n\n\n\n<p>Bundler provides dependecy management for Ruby projects<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ gem install bundler<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Install Dependencies<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ bundle install<\/strong><\/p>\n\n\n\n<p>Alternatively, if you don&#8217;t want to install bundler, the following command will install the gem dependencies.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ gem install json colorize async async-dns async-http<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/droidfiles\/\" target=\"_blank\" rel=\"noreferrer noopener\">DroidFiles : Get Files From Android Directories<\/a><\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Simple Usage<\/strong><\/li><\/ul>\n\n\n\n<p>With default options, URLCrazy will check over 2000 typo variants for google.com.<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ urlcrazy google.com<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/1.bp.blogspot.com\/-pit-R_w6vfk\/Xut68DEOewI\/AAAAAAAAGpQ\/OtVl7Tp3Gs89daSbW_c_TtDBiZepC5dHgCLcBGAsYHQ\/s1600\/Usage.gif\" alt=\"\"\/><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>With popularity estimate<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ urlcrazy -p domain.com<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Commandline Usage<\/strong><\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>Usage:<\/strong> .\/urlcrazy [options] domain<br><strong>Options<\/strong><br>-k, &#8211;keyboard=LAYOUT Options are: qwerty, azerty, qwertz, dvorak (default: qwerty)<br>-p, &#8211;popularity Check domain popularity with Google<br>-r, &#8211;no-resolve Do not resolve DNS<br>-i, &#8211;show-invalid Show invalid domain names<br>-f, &#8211;format=TYPE Human readable or CSV (default: human readable)<br>-o, &#8211;output=FILE Output file<br>-n, &#8211;nocolor Disable colour<br>-h, &#8211;help This help<br>-v, &#8211;version Print version information. This version is 0.7<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Types of Domain Variations Supported<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Character Omission<\/strong><ul><li>These typos are created by leaving out a letter of the domain name, one letter at a time. For example, <a href=\"http:\/\/www.goole.com\">www.goole.com<\/a> and <a href=\"http:\/\/www.gogle.com\">www.gogle.com<\/a><\/li><\/ul><\/li><li><strong>Character Repeat<\/strong><ul><li>These typos are created by repeating a letter of the domain name. For example, <a href=\"http:\/\/www.ggoogle.com\">www.ggoogle.com<\/a> and <a href=\"http:\/\/www.gooogle.com\">www.gooogle.com<\/a><\/li><\/ul><\/li><li><strong>Adjacent Character Swap<\/strong><ul><li>These typos are created by swapping the order of adjacent letters in the domain name. For example, <a href=\"http:\/\/www.googel.com\">www.googel.com<\/a> and <a href=\"http:\/\/www.ogogle.com\">www.ogogle.com<\/a><\/li><\/ul><\/li><li><strong>Adjacent Character Replacement<\/strong><ul><li>These typos are created by replacing each letter of the domain name with letters to the immediate left and right on the keyboard. For example, <a href=\"http:\/\/www.googke.com\">www.googke.com<\/a> and <a href=\"http:\/\/www.goohle.com\">www.goohle.com<\/a><\/li><\/ul><\/li><li><strong>Double Character Replacement<\/strong><ul><li>These typos are created by replacing identical, consecutive letters of the domain name with letters to the immediate left and right on the keyboard. For example, <a href=\"http:\/\/www.gppgle.com\">www.gppgle.com<\/a> and <a href=\"http:\/\/www.giigle.com\">www.giigle.com<\/a><\/li><\/ul><\/li><li><strong>Adjacent Character Insertion<\/strong><ul><li>These typos are created by inserting letters to the immediate left and right on the keyboard of each letter. For example, <a href=\"http:\/\/www.googhle.com\">www.googhle.com<\/a> and <a href=\"http:\/\/www.goopgle.com\">www.goopgle.com<\/a><\/li><\/ul><\/li><li><strong>Missing Dot<\/strong><ul><li>These typos are created by omitting a dot from the domainname. For example, wwwgoogle.com and <a href=\"http:\/\/www.googlecom\">www.googlecom<\/a><\/li><\/ul><\/li><li><strong>Strip Dashes<\/strong><ul><li>These typos are created by omitting a dash from the domainname. For example, <a href=\"http:\/\/www.domain-name.com\">www.domain-name.com<\/a> becomes <a href=\"http:\/\/www.domainname.com\">www.domainname.com<\/a><\/li><\/ul><\/li><li><strong>Singular or Pluralise<\/strong><ul><li>These typos are created by making a singular domain plural and vice versa. For example, <a href=\"http:\/\/www.google.com\">www.google.com<\/a> becomes <a href=\"http:\/\/www.googles.com\">www.googles.com<\/a> and <a href=\"http:\/\/www.games.co.nz\">www.games.co.nz<\/a> becomes <a href=\"http:\/\/www.game.co.nz\">www.game.co.nz<\/a><\/li><\/ul><\/li><li><strong>Common Misspellings<\/strong><ul><li>Over 8000 common misspellings from Wikipedia. For example, <a href=\"http:\/\/www.youtube.com\">www.youtube.com<\/a> becomes <a href=\"http:\/\/www.youtub.com\">www.youtub.com<\/a> and <a href=\"http:\/\/www.abseil.com\">www.abseil.com<\/a> becomes <a href=\"http:\/\/www.absail.com\">www.absail.com<\/a><\/li><\/ul><\/li><li><strong>Vowel Swapping<\/strong><ul><li>Swap vowels within the domain name except for the first letter. For example, <a href=\"http:\/\/www.google.com\">www.google.com<\/a> becomes <a href=\"http:\/\/www.gaagle.com\">www.gaagle.com<\/a>.<\/li><\/ul><\/li><li><strong>Homophones<\/strong><ul><li>Over 450 sets of words that sound the same when spoken. For example, <a href=\"http:\/\/www.base.com\">www.base.com<\/a> becomes <a href=\"http:\/\/www.bass.com\">www.bass.com<\/a>.<\/li><\/ul><\/li><li><strong>Bit Flipping<\/strong><ul><li>Each letter in a domain name is an 8bit character. The character is substituted with the set of valid characters that can be made after a single bit flip. For example, facebook.com becomes bacebook.com, dacebook.com, faaebook.com,fabebook.com,facabook.com, etc.<\/li><\/ul><\/li><li><strong>Homoglyphs<\/strong><ul><li>One or more characters that look similar to another character but are different are called homogylphs. An example is that the lower case l looks similar to the numeral one, e.g. l vs 1. For example, google.com becomes goog1e.com.<\/li><\/ul><\/li><li><strong>Wrong Top Level Domain<\/strong><ul><li>For example, <a href=\"http:\/\/www.trademe.co.nz\">www.trademe.co.nz<\/a> becomes <a href=\"http:\/\/www.trademe.co.nz\">www.trademe.co.nz<\/a> and <a href=\"http:\/\/www.google.com\">www.google.com<\/a> becomes <a href=\"http:\/\/www.google.org\">www.google.org<\/a> Uses the 19 most common top level domains.<\/li><\/ul><\/li><li><strong>Wrong Second Level Domain<\/strong><ul><li>Uses an alternate, valid second level domain for the top level domain. For example, <a href=\"http:\/\/www.trademe.co.nz\">www.trademe.co.nz<\/a> becomes <a href=\"http:\/\/www.trademe.ac.nz\">www.trademe.ac.nz<\/a> and <a href=\"http:\/\/www.trademe.iwi.nz\">www.trademe.iwi.nz<\/a><\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Supported Keyboard Layouts<\/strong><\/p>\n\n\n\n<p>Keyboard layouts supported are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>QWERTY<\/li><li>AZERTY<\/li><li>QWERTZ<\/li><li>DVORAK<\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Is the domain valid?<\/strong><\/p>\n\n\n\n<p>URLCrazy has a database of valid top level and second level domains. This information has been compiled from Wikipedia and domain registrars. We know whether a domain is valid by checking if it matches top level and second level domains. For example, <a href=\"http:\/\/www.trademe.co.bz\">www.trademe.co.bz<\/a> is a valid domain in Belize which allows any second level domain registrations but <a href=\"http:\/\/www.trademe.xo.nz\">www.trademe.xo.nz<\/a> isn&#8217;t because xo.nz isn&#8217;t an allowed second level domain in New Zealand.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Popularity Estimate<\/strong><\/p>\n\n\n\n<p>URLCrazy pioneered the technique of estimating the relative popularity of a typo from search engine results data. By measuring how many times a typo appears in webpages, we can estimate how popular that typo will be made when users type in a URL.<\/p>\n\n\n\n<p>The inherent limitation of this technique, is that a typo for one domain, can be a legitimate domain in its own right. For example, googles.com is a typo of google.com but it also a legitimate domain.<\/p>\n\n\n\n<p>For example, consider the following typos for google.com.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><thead><tr><th>Count.<\/th><th>Typo<\/th><\/tr><\/thead><tbody><tr><td>25424<\/td><td>gogle.com<\/td><\/tr><tr><td>24031<\/td><td>googel.com<\/td><\/tr><tr><td>22490<\/td><td>gooogle.com<\/td><\/tr><tr><td>19172<\/td><td>googles.com<\/td><\/tr><tr><td>19148<\/td><td>goole.com<\/td><\/tr><tr><td>18855<\/td><td>googl.com<\/td><\/tr><tr><td>17842<\/td><td>ggoogle.com<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Known Issues<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Macos File Descriptor Limit<\/strong><\/li><\/ul>\n\n\n\n<p>If DNS resolution fails under Macos it could be due to the small default file descriptor limit.<\/p>\n\n\n\n<p>To display the current file descriptor limit use:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ ulimit -a<\/strong><\/p>\n\n\n\n<p>To increase the file descriptor limit use:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>$ ulimit -n 10000<\/strong><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>URLCrazy Appearances<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Kali Linux<\/strong><ul><li>URLCrazy was a default tool in BackTrack 5, and later Kali Linux. <a href=\"https:\/\/tools.kali.org\/information-gathering\/urlcrazy\">https:\/\/tools.kali.org\/information-gathering\/urlcrazy<\/a><\/li><\/ul><\/li><li><strong>The Browser Hacker&#8217;s Handbook<\/strong><ul><li>Authored by Wade Alcorn, Christian Frichot, and Michele Orru.<\/li><li>URLCrazy is included in Chapter 2 of this seminal work on the topic.<\/li><\/ul><\/li><\/ul>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>PTES Technical Guidelines<\/strong><\/p>\n\n\n\n<p>Penetration Testing Execution Standard (PTES) is a standard designed to provide a common language and scope for performing penetration testing (i.e. Security evaluations). URLCrazy is included in the Tools Required section.<\/p>\n\n\n\n<p><a href=\"http:\/\/www.pentest-standard.org\/index.php\/PTES_Technical_Guidelines\">http:\/\/www.pentest-standard.org\/index.php\/PTES_Technical_Guidelines<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>Network Security Toolkit<\/strong><\/p>\n\n\n\n<p>Network Security Toolkit is a bootable Linux distribution designed to provide easy access to best-of-breed Open Source Network Security Applications. <a href=\"https:\/\/www.networksecuritytoolkit.org\/\">https:\/\/www.networksecuritytoolkit.org\/<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>See Also<\/strong><\/p>\n\n\n\n<p>URLCrazy was first published in 2009, and for many years was the most advanced opensource tool for studying typosquatting. Since then multiple other tools have been developed by the infosec community.<\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>DNSTwist<\/strong><\/p>\n\n\n\n<p>DNSTwist is developed by Marcin Ulikowski and first published in 2015. DNSTwist had a significant feature overlap with URLCrazy at the time, and introduced many new features.<\/p>\n\n\n\n<p>Language: Python<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/elceef\/dnstwist\">https:\/\/github.com\/elceef\/dnstwist<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>URLInsane<\/strong><\/p>\n\n\n\n<p>URLInsane was developed by Rangertaha in 2018 and claims to match the features of URLCrazy and DNSTwist.<\/p>\n\n\n\n<p>Language: Go<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/cybint\/urlinsane\">https:\/\/github.com\/cybint\/urlinsane<\/a><\/p>\n\n\n\n<p class=\"has-background has-text-align-center has-light-green-cyan-background-color\"><strong>DomainFuzz<\/strong><\/p>\n\n\n\n<p>DomainFuzz was developed by monkeym4sterin 2017. Language: Node.JS<\/p>\n\n\n\n<p><a href=\"https:\/\/github.com\/monkeym4ster\/DomainFuzz\">https:\/\/github.com\/monkeym4ster\/DomainFuzz<\/a><\/p>\n\n\n\n<div class=\"wp-block-buttons aligncenter is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/urbanadventurer\/urlcrazy\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing, and corporate espionage. Use Cases Detect typo squatters profiting from typos on your domain name Protect your brand by registering popular typos Identify typo domain names that will receive traffic intended for another [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16366,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","fifu_image_alt":"URLCrazy : OSINT Tool To Generate And Test Domain","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[],"class_list":["post-10818","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>URLCrazy : OSINT Tool To Generate And Test Domain<\/title>\n<meta name=\"description\" content=\"URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"URLCrazy : OSINT Tool To Generate And Test Domain\" \/>\n<meta property=\"og:description\" content=\"URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-24T11:31:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"URLCrazy : OSINT Tool To Generate And Test Domain\",\"datePublished\":\"2020-06-24T11:31:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\"},\"wordCount\":1272,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\",\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\",\"name\":\"URLCrazy : OSINT Tool To Generate And Test Domain\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\",\"datePublished\":\"2020-06-24T11:31:09+00:00\",\"description\":\"URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"URLCrazy : OSINT Tool To Generate And Test Domain","description":"URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/","og_locale":"en_US","og_type":"article","og_title":"URLCrazy : OSINT Tool To Generate And Test Domain","og_description":"URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing","og_url":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2020-06-24T11:31:09+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"URLCrazy : OSINT Tool To Generate And Test Domain","datePublished":"2020-06-24T11:31:09+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/"},"wordCount":1272,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/","url":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/","name":"URLCrazy : OSINT Tool To Generate And Test Domain","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","datePublished":"2020-06-24T11:31:09+00:00","description":"URLCrazy is an OSINT tool to generate and test domain typos or variations to detect or perform typo squatting, URL hijacking, phishing","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/urlcrazy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/urlcrazy\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","contentUrl":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-O-81-CoDaq4\/Xut7CXL38aI\/AAAAAAAAGpU\/0-fmlDZnVSQ-yUAu88KPB6LWP-MEzK2awCLcBGAsYHQ\/s1600\/Simple%2BUsage.gif","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":23526,"url":"https:\/\/kalilinuxtutorials.com\/opensquat\/","url_meta":{"origin":10818,"position":0},"title":"OpenSquat : Detection Of Phishing Domains And Domain Squatting.","author":"R K","date":"March 30, 2022","format":false,"excerpt":"OpenSquat is an opensource Intelligence (OSINT) security tool to identify\u00a0cyber squatting\u00a0threats to specific companies or domains, such as: Phishing campaignsDomain squattingTypo squattingBit squattingIDN homograph attacksDoppen ganger domainsOther brand\/domain related scams It does support some key features such as: Automatic newly registered domain updating (once a day)Levenshtein distance to calculate word\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEiL3qH7RvS3uuUo6zGXaZA2iC8Y3dOmYCuISjxGG56zhizp3XGw1e0Hn2Ocp1eHRMjBpMxjRAL5LkZBPPMacBPVkvXYMFFVQJwgO2N9wBSc_D4b_Xe6r3iv-G3jRjhmANcnF1FXKL2MlCVB309zpQLGa18YGRxcM9P2ymUptMI18iIgeGBP_rTmoPOU\/s728\/openSquat_logo%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":13545,"url":"https:\/\/kalilinuxtutorials.com\/typodetect\/","url_meta":{"origin":10818,"position":1},"title":"Typodetect : Detect The Active Mutations Of Domains","author":"R K","date":"June 23, 2021","format":false,"excerpt":"Typodetect is a tool gives blue teams, SOC's, researchers and companies the ability to detect the active mutations of their domains, thus preventing the use of these domains in fraudulent activities, such as phishing and smishing. For this, Typodetect allows the use of the latest available version of the TLDs\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":30266,"url":"https:\/\/kalilinuxtutorials.com\/protintelligence\/","url_meta":{"origin":10818,"position":2},"title":"ProtINTelligence: Python-based ProtonMail OSINT Analyzer","author":"Varshini","date":"September 14, 2023","format":false,"excerpt":"In the vast landscape of cyber tools, \"PROTINTELLIGENCE\" stands out as a specialized Python script designed for the OSINT and Cyber Community. This powerful tool, tailored for domain analysis, aims to unveil the intricate relationship between custom domains and Protonmail, a widely acknowledged encrypted email service. From detecting Protonmail usage\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhgnm1ROlikOnBVcqCzpPfq8-p0QZY1s2dtmtd2DAHwfPkN8Pi2Fi0T2x8ZWWoGHeNchTtlplthrHRa30wsv4lF-cm5NmcusIp3rCaK2QSQ68ReNY5BXjNzzf3U9_gR0plD_fpWKlN4j2Wk2d0x4wjec_CGdyByUz9XFZ9ve2UaX3Aa5LVrD6xbdenn-A\/s16000\/protint.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhgnm1ROlikOnBVcqCzpPfq8-p0QZY1s2dtmtd2DAHwfPkN8Pi2Fi0T2x8ZWWoGHeNchTtlplthrHRa30wsv4lF-cm5NmcusIp3rCaK2QSQ68ReNY5BXjNzzf3U9_gR0plD_fpWKlN4j2Wk2d0x4wjec_CGdyByUz9XFZ9ve2UaX3Aa5LVrD6xbdenn-A\/s16000\/protint.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhgnm1ROlikOnBVcqCzpPfq8-p0QZY1s2dtmtd2DAHwfPkN8Pi2Fi0T2x8ZWWoGHeNchTtlplthrHRa30wsv4lF-cm5NmcusIp3rCaK2QSQ68ReNY5BXjNzzf3U9_gR0plD_fpWKlN4j2Wk2d0x4wjec_CGdyByUz9XFZ9ve2UaX3Aa5LVrD6xbdenn-A\/s16000\/protint.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhgnm1ROlikOnBVcqCzpPfq8-p0QZY1s2dtmtd2DAHwfPkN8Pi2Fi0T2x8ZWWoGHeNchTtlplthrHRa30wsv4lF-cm5NmcusIp3rCaK2QSQ68ReNY5BXjNzzf3U9_gR0plD_fpWKlN4j2Wk2d0x4wjec_CGdyByUz9XFZ9ve2UaX3Aa5LVrD6xbdenn-A\/s16000\/protint.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhgnm1ROlikOnBVcqCzpPfq8-p0QZY1s2dtmtd2DAHwfPkN8Pi2Fi0T2x8ZWWoGHeNchTtlplthrHRa30wsv4lF-cm5NmcusIp3rCaK2QSQ68ReNY5BXjNzzf3U9_gR0plD_fpWKlN4j2Wk2d0x4wjec_CGdyByUz9XFZ9ve2UaX3Aa5LVrD6xbdenn-A\/s16000\/protint.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhgnm1ROlikOnBVcqCzpPfq8-p0QZY1s2dtmtd2DAHwfPkN8Pi2Fi0T2x8ZWWoGHeNchTtlplthrHRa30wsv4lF-cm5NmcusIp3rCaK2QSQ68ReNY5BXjNzzf3U9_gR0plD_fpWKlN4j2Wk2d0x4wjec_CGdyByUz9XFZ9ve2UaX3Aa5LVrD6xbdenn-A\/s16000\/protint.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":36213,"url":"https:\/\/kalilinuxtutorials.com\/favicorn\/","url_meta":{"origin":10818,"position":3},"title":"FAVICORN : A Comprehensive Tool For Favicon-Based Website Searches","author":"Varshini","date":"February 7, 2025","format":false,"excerpt":"Favicorn is an innovative tool designed to search websites by their favicons, offering a unique approach to online exploration and cybersecurity research. By leveraging favicon data, Favicorn provides search result links across multiple platforms, making it a powerful resource for OSINT (Open Source Intelligence) investigations. How Favicorn Works Favicorn operates\u2026","rel":"","context":"In &quot;Cyber security&quot;","block_context":{"text":"Cyber security","link":"https:\/\/kalilinuxtutorials.com\/category\/cyber-security\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/FAVICORN-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/FAVICORN-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/FAVICORN-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/FAVICORN-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/FAVICORN-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/02\/FAVICORN-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":37672,"url":"https:\/\/kalilinuxtutorials.com\/osint-tools-find-emails-usernames-passwords\/","url_meta":{"origin":10818,"position":4},"title":"Top OSINT Tools to Find Emails, Usernames and Passwords","author":"0xSnow","date":"September 9, 2025","format":false,"excerpt":"Introduction In the world of cybersecurity, knowledge is power. One of the most powerful skillsets every ethical hacker, penetration tester, and OSINT researcher must master is the ability to discover digital footprints left behind by individuals and organizations. These footprints often include emails, usernames, leaked credentials, and even associated social\u2026","rel":"","context":"In &quot;OSINT&quot;","block_context":{"text":"OSINT","link":"https:\/\/kalilinuxtutorials.com\/category\/open-source-intelligence\/"},"img":{"alt_text":"OSINT-Tools-to-find-emails-passwords-and-hashes.png","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/OSINT-Tools-to-find-emails-passwords-and-hashes.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/OSINT-Tools-to-find-emails-passwords-and-hashes.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/OSINT-Tools-to-find-emails-passwords-and-hashes.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/OSINT-Tools-to-find-emails-passwords-and-hashes.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/OSINT-Tools-to-find-emails-passwords-and-hashes.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/09\/OSINT-Tools-to-find-emails-passwords-and-hashes.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":4654,"url":"https:\/\/kalilinuxtutorials.com\/pwnedornot-passwords-compromised-email\/","url_meta":{"origin":10818,"position":5},"title":"PwnedOrNot : OSINT Tool to Find Passwords for Compromised Email Addresses","author":"R K","date":"April 17, 2019","format":false,"excerpt":"PwnedOrNot is a OSINT tool to find passwords for compromised email addresses. pwnedOrNot uses haveibeenpwned v2 api to test email accounts and tries to find the password in Pastebin Dumps. Features haveibeenpwned offers a lot of information about the compromised email, some useful information is displayed by this script: Name\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/R_Y_QzVmERA\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10818","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=10818"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/10818\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16366"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=10818"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=10818"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=10818"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}