Introduction

Greetings, dear readers! We continue to test Telegram bots that can effectively help us with the task of finding target data in open sources, or simply put, in OSINT. In this article, we will look at more worthy candidates to become permanent search tools without leaving the well-known messenger.

Disclaimer: All data provided in this article is taken from open sources. It does not call for action and is provided for informational purposes only, and for studying the mechanisms of the technologies used.

Useful OSINT tools in Telegram (always working links)

OVERLOAD ROBOT

OVERLOAD — a semi-automatic suite of tools for Information Security, Social Engineering, Data Leaks, and OSINT activities.

Working with the bot

The bot is quite versatile and will suit information security experts, OSINT specialists, as well as SMM specialists and analysts. Within the 'SH' articles, we review OSINT tools, so this review will be from the perspective of a search tool. We recommend studying our previous material — Reconnaissance with Telegram bots — OSINT in Telegram. In it, we detailed the functionality of useful OSINT bots.

For free use, only 10 requests are available, and the types of requests themselves represent a large list.

Let's start with everyone's favorite search by phone number, as a number can almost always yield a larger volume of data on a target user.

As we can see, the bot did a good job. Of course, the output doesn't include the usual social media presence, but it does have an email address, which is also very important in OSINT investigations.

Let's not stray too far and immediately start a search by email, which is also a common task in investigations.

The bot generously shared the target user's full name and, as in the previous output, their date of birth.

Now let's try to find information based on the Telegram account registered to this number.

Information was displayed containing a list of public groups the user is a member of. This is certainly not the phone number we would have liked to see if this were a search exclusively by Telegram account, but knowing the target user's interests and hobbies is also important in investigations.

One of the key features of the bot is the versatile menu for each request, as in the example below with a Telegram account.

ov6

Perhaps the key and main search object is the user's username. Here, the bot will provide a detailed search report in an html file format, which describes in detail the information that can be found from the account without registration. To search by username, the bot uses the well-known tool Maigret.

As you can see at the beginning of the report, there is a brief on the most interesting search findings, from which you can immediately try to latch onto some information.

In the field of open-source intelligence, one of the important tasks is scanning an internet resource for vulnerabilities, especially when talking about OSINT in the context of initial information gathering for vulnerability testing. In this regard, the bot is impressively generous, providing such a wide choice of actions for a website.

From the point of view of getting the most results, we would of course choose option 17, but it is only available with paid requests, so we will choose option 9.

Since the bot uses Nmap for scanning, it asks to send the required flags for the scan, but it immediately sends a list of 'allowed' flags and instructions for them. We entered the -sV and -sT flags right away, because for vulnerability testing it's important to know the service versions on open ports to select an exploit.

The result was not long in coming, and we immediately received a text file with the content we needed.

No unnecessary information, everything is concise and clear. From this, you can already start selecting exploits.

Brief conclusion on working with the bot

Overall, the bot is extremely promising. It can perform a great many tasks in both information security and OSINT. The free functionality is far from being as meager as that of similar bots; you can and want to work with it. As a solution for permanent use among other OSINT bots, this one will definitely find a place in your collection!

Searching for a user's groups

Search user groups — the bot shows which groups a Telegram user has written in.

Working with the bot

The bot doesn't have extensive functionality, but it performs its single task well. Therefore, here's a brief overview using a Telegram user as an example.

Overall, the bot handles its task directly, but it would be nice to see links to messages in the future, like in fun-stat-bot, the use of which we discussed in our material: Analysis of Telegram accounts. Nevertheless, the bot is completely free, and you can safely and limitlessly use it in your arsenal!

Conclusion

In this article, we tried to tell you in as much detail as possible about interesting and useful bots on Telegram that will certainly expand your collection! Thanks to the OVERLOAD bot, our understanding of bots on Telegram has become even broader, as it acts as a full-fledged pentesting tool that fits into a single application and does not require Root privileges, but also quite fairly requires money for its functionality.

More useful articles on the topic:

- Bots and services for data reconnaissance on VKontakte
- Automating Telegram account search by number. Simple people search via Telegram
- Search by email and nickname
- OSINT: Reconnaissance in EUROPE

Useful OSINT tools in Telegram (always working links)