1. General Image Forensics

https://29a.ch/photo-forensics/#forensic-magnifier

A comprehensive image forensics tool offering a variety of features.

It allows users to scrutinize and analyze digital images, making it valuable for detecting alterations or hidden details within images.

2. Database Checker

https://dehashed.com

Dehashed is a database checker that may require a subscription for full functionality.

It assists in searching and analyzing databases, potentially revealing information about compromised or leaked data.

3. Leakedcheck_bot on Telegram

https://www.t.me/Leakedcheck_bot

Using this Telegram bot, users can input license plates, emails, passwords, or phone numbers to retrieve public information about individuals.

It serves as a quick and accessible tool for obtaining information related to the provided data.

4. Breached Email Checker

https://exposed.lol

This tool checks if an email has been compromised in a data breach.

Additionally, it can accept and analyze passwords in clear text, providing users with insights into potential security risks associated with their email accounts.

5. Google Hacking Database

https://www.exploit-db.com/google-hacking-database

A repository of publicly available information obtained through Google dorks. It hosts a comprehensive list of search queries (dorks) that can be used to uncover specific data on the internet.

6. Censys

https://search.censys.io/

Censys is a search engine designed for locating devices and networks on the internet.

It enables users to search for specific criteria, such as device type, location, and operating system, providing valuable information for security assessments and vulnerability identification.

7. Facebook Comment Picker

https://commentpicker.com/find-facebook-id.php

This tool is useful for researching Facebook profiles by extracting information from Facebook comments.

It assists in finding Facebook IDs, aiding in the identification and analysis of user profiles on the social media platform.