~/tools
investigation-workflowInfrastructure · Identity · Breach · Metadata
target>
Enter a target: email address, domain name, IP address, or username. The investigation will enumerate infrastructure, correlate identity signals, check breach exposure, and surface metadata vectors.
Supported targets:
email — infrastructure (DNS/WHOIS/IP/cert) + identity pivot + breach exposure
domain — DNS enumeration + IP geo/ASN + subdomain discovery via certificate logs
IP address — geolocation, ASN, PTR/rDNS, CIDR
username — identity footprint pivot across platforms