└ /low_level/ Assembly • C • C++ • C# • Holy C • Rust
└ /high_level/ Java • Go • PHP • Python • SQL • Bash • JavaScript • PowerShell • ActionScript • Scratch • Ruby • Lua • P
The following media may only be utilized upon its ratification by President Quote when the end times are approaching Find a nuclear bunker ₦Ø₩ |
You can read this for more info about the topic |
|---|
This doxing guide has everything you need to know to dox someone. You along with knowledge need some IQ to create plans, collect some info to do a certain thing, and etc. This means 'p spammers can't dox. This page also doesn't go over shit nobody cares about.
Main article: OPSEC
Before you start taking revenge on the literal who discord pedophile and accidentally stumble into a honeypot and end up having Kolyma agents knocking on your door, do these to stay safe:
So - you found a tranny that makes futa cock vore cub rape porn online or something. Wat nou? A helpful procedure for newGODS is outlined below.
A doxtrail is the trail of evidence that you follow in order to find information while doxing. Documenting the doxtrail is essential to prove that your windox is actually the person you say it is. A doxtrail doesn't have to be intimately detailed, but it should be detailed enough that an average soyteen would be able to follow it and find the same results. An example of a doxtrail in which the target's name, address, phone number, and e-mail address were found:
When your target is made aware of the 'ox, it is very common for them and their 'cord xisters to call the 'ox a falsenvke as a form of damage control. Having a watertight 'oxxtrail will deboonk any of these attempts.
Before trying to dox someone you should check if someone else has already done the work for you. Try searching their name or checking dox websites like Doxbin and the 'farms.
Do note the 'ki has central collection of doxes available at Operation PRISM, thoughever it is not complete.
OSINT is using publicly available information to dox people. This is usually checking everything on someone's social media accounts to find any locations or any real life connections. CIA hires you to do these stuff. CIA does NOT spy on you. This is just a tinfoil hat Chudcel.
You should learn how to program, in a scripting language like Python, for writing simple scripts for automating tasks like searching for usernames.
Mind you some OSINT tools like name search websites and other tools that have public records do not exist in outside of the United States and Canada, The UK has strict regulations and most of their databases comes from 2017 and is not mostly up to date. Make sure to use the OSINT list down in the links section of this article.
Main article: Dark Web
Some onion sites host archives, medical records, data breaches, and more that wouldn't be available on the clearnet. In order to access these you must use a browser that allows you (Tor is the most common browser to use) and have a place to start. A link directory you can use is tor.taxi which is still one of the best. If you want to find some more links, use DarkNetLive or if you're desperate use Reddit. KEEP IN MIND DO NOT PASTE RANDOM LINKS THAT ARE NOT FROM A TRUSTED DIRECTORY AS IT MAY BE A HONEYPOT. The list will go on as you find more websites you can use. You can also use OSINT on the dark web, so here are some tools for you to use on your adventures.
Obviously many people post photos. If they show outside of their house (or even inside) you can most of the time pinpoint the exact location.
To do this look for anything that can be used for identifications like trees, bridges, etc. Then try putting it in Google images' search and see if anything shows up. If that part in the picture is pretty clear and a Google street view car passed by it, Google will show it to you. But sometimes you're doxing a third world nigger, that country some times doesn't have Google services or they are just living in the middle of nowhere and in that case it becomes harder. To now do it, you have to find the country (if they don't tell you, see what hours they are active and guess) of the nigger and more preferably also find what town, district or just what area they live in. After that you should map out what that area would look like from aerial view. Once you did that, go to Google Earth and try to find something. Once you think you have the location, make sure it's the right location and post it on wherever you want. (obviously you don't want to send 'za to a ww2 veteran with PTSD and financial struggles).
There are some tools that claim to be able to geolocate an image using AI. These are usually useless but may work for distinctive locations that have been photographed a lot; they will not help you find the location of a photo of some tranny's back yard.
GeoGOD-specific tools can be found in the links section of this page.
This method can be hard if you're not using Google images, so you need some training. You can play a lot of GeoGuessr which will give you the knowledge about certain countries, like what their trash cans look like, if the houses are like a soviet shithole etc. You need to pay them to play it doe. If you a poor ass nigga use OpenGuessr as it is free.
Geoguessr players have many resources for training in case you want to know what telegraph poles look like in the Mokhotlong region of Lesotho o algo.
You can also check out JoseMonkey on jewtube. He has a lot of videos on geoGODing people consensually.
Emails are extremely valuable during doxing. Access to the emails are a lot more valuable, it's like finding a massive diamond while mining. Emails are usually used when the person knows how to stay anonymous, and most other methods can't be used. Emails are used to gain access to other accounts that could have very sensitive information.
It is always a good idea to feed the email into https://epieos.com/ or ghunt as this can often reveal a google maps profile which can reveal their approximate location if they left reviews. Sometimes they use their real name for the profile too. Also, don't neglect the "Google plus archives" feature in epieos - some uncs did actually use that platform geg.
You should also try searching the first part of the email (before the @) on Soylock and Swolesome.vip as if it were a username (thoughever you can just search "thefirstpart*" and enable wildcards in swolesome to show both usernames and emails). Some sites will use the first part of the email as the username by default. Pinterest does this and will sometimes give you their real name.
One of the most underrated datamining methods is going through a user's commit history to find their email address. When you push a commit to sites like GitHub, your email is included in the commit due to the way Git fundamentally works o algo. Unless the target is an opsecGOD, this is basically a 100% guaranteed way to find emails.
To do this, go to any of their repositories and click on a commit hash, then add ".patch" to the URL. You should see their username and email at the very top of the page. If the email is a noreply address, then make sure to look at older commits and alternative sites like GitLab and Codeberg if they have an account there.
After getting into the email, you can access almost every other account using the platform's reset password feature. This will alert the target so make sure to immediately delete the message (make sure to remove it from the bin as well)
Databreaches not only contain passwords, they might also contain things like IPs and loads of other stuff like phone numbers. Almost all the time you need to buy the databreach file as a .zip that ends up being a retarded file format used in 1488 B.B.C. but you might be able to actually see it if you actually get in contact with the seller.
If you have a password, you might be able to log into the target's email account as most people retards use 1 password for everything.
The best website for free public databreaches is breach.vip, also swolesome.vip (a sharty frontend for breach.vip).
If you want to find databreach pastes, a forum you can use is leakbase.io, and another (most likely an FBI honeypot as it was seized multiple times so please try to avoid it) is BreachForums.st. Use haveibeenpwned.com to see if they're part of a data breach, however some pastes already existing might not be in the pwned database.
Try just putting their usernames into these URLs:
This will often give you their full name and sometimes their location. Seriously, you would be surprised how often this works, maybe around 30-40% of sharty 'oxxes are found using this method. Be sure to snopes it though if it's not a unique username as it could be some random nophono.
If they have direct payments with paypal set up on their ko-fi page, you can put in a fake username and email and click "tip". This may reveal their email or name on the next screen.
Get good at it. Your target might have great OPSEC but their auntie Margaret probably doesn't. If you have a name and general area, use the people search feature to search the target's surname and filter by the town (works better in small towns and for uncommon surnames), then datamine potential relatives (many will have public friends lists so you can map out relations). It is highly likely that there will be a photo of the target on their grandma's page somewhere o algo, which will make the 'ox more impactful as having a photo will scare the target more.
This is also useful for contacting all relatives after the 'ox is confirmed so you can send them all the degenerate activity the target has been involved with online.
Getting your target's Steam account can be a gemmy find. Sometimes you're lucky and immediately spot past usernames or their location in the profile details. If they have any videos uploaded on their Videos section, you can get their youtube channel. You can also go into profile comments or the Screenshots section for additional clues.
If nothing turns up there, paste the profile URL into SteamHistory.net. This tool reveals old usernames and profile pictures.
Some times you might have to use tactics related to that person's life to gain info. This usually works with older people as they almost always have had a crush on the school's cheerleader and they are willing to cheat on their wife of 7 years for her.
The person you are doxing most likely has an absent father, and xis mom is also just way more stupid. By talking to her, you can convince her you're a friend from back in school or something and you want to send xim a gift for giving you hope or something or that you just wanna meet up with xim. Xis mother will most likely give you the address and you can send the 'za. You might also be able to offer her BWC and then kidnap and rape and torture her until she leaks the location of the gold she burried with her husband in 2003 then kill her and abuse the corpse. She might have a facebook account and if she does she usually has her whole address, phone number, full legal name, and basically everything about her in there.
If you decide to take legal action against someone, you will be given access to many many personal information by the government. This is the riskiest way to dox as they might also get access to your personal information. Usually jewtubers use this method when they get exposed, they file a copyright claim and leak the uploader's information online. The other party typically doesn't do the same because of the risk involved. Overall, this is the riskiest but an effective way of doxing if the target is famous.
Having the school and first name but not the last or not sure if the name is true, call Xiers School and say, Xier is your sibling o algo and that Xiers is sick and wants to go home. They will check if Xier is in the school's database or whatever they have and tell you if Xier is a student there if the name is true, and if you ask for the last name as confirmation, you're successful.
Spear phishing (sometimes spelled as one word) is a phishing attack that is targeted at one person. This can be a useful way to gain more information if all you have is the target's e-mail address. If you have their phone number, you can use that to perform vishing (voice phishing) or SMShing (phishing over text message).
Somehow this hasn't been listed yet despite being easily one of the most effective tools for 'oxxing, especially for furfags and other gooner artists. Niggas did not give a shit about OPSEC in 2009, you can use this to your advantage.
Older sites like furaffinity, deviantart, tumblr, etc. are often absolute gem mines.
This method is also keyed because it lets you explore heckin sovlful web 1.0 gemmies o algo
Archive.org is infamous for taking stuff off their archival services, usually due to it containing CSAM and other illegal material (which is a good thing) or due to the account owner requesting it to be taken down (not good for us). This is sometimes an indicator that this person may have been doxed in the past, so be sure to double check.
When you've found an account which should have been archived, but the Wayback Machine says that no archives exists, click the "search for all archived pages". Then you may be able to find archived posts that the account owner haven't requested deletion of, these may reveal useful information outside of the post itself as the archive can contain old aliases, profile pictures, location information and birthdays, especially on Xitter.
This is more effective against oldGOD personal sites. If you paste in the website root and click "URLs", it will show you every url saved from the site, with a searchbox. You can search for potentially interesting files, e.g. MS Office documents (possible personal info in the metadata), JPEGs (exif scrubbing only became common in the last ~10 yrs so maybe there are GPS tags in photos), source code (maybe leaked API keys o algo if they can't code).
When 'oxing furfags, you can often use e621 (furfag booru) to find old usernames. To do this, you can search for all posts under the artist's tag, which should look something like furfagpedo_(artist). Then go to their oldest posts in the gallery (it is sorted newest to oldest by default) and click on them. On the left hand side of the page, under the tags, you will see an information section that includes the image source. If you're lucky, it will be sourced from an old deleted account with a username that can be found in breaches, PayPal, etc. Just make sure you don't get a boner while browsing the website. (USER WAS BANNED FOR THIS POST)
A whois query is a way of finding the registered information of an internet domain or IP address, including it's registrar (the company the domain is registered by) and registrant (the owner of the domain).
A required part of registering a domain for a website or email is providing the registrant's name, contact info, and home address, which can sometimes show up in a whois query if the registrant has opted not to use a domain privacy service (thoughever basically everybaldi uses one now). Whois queries usually return the following information:
clientHold - The domain has been temporarily suspended, usually due to legal issues, non-payment, or will be deleted in the near future.serverRenewProhibited - The domain is perma 'nished and can never be renewed.pendingDelete - Domain will soon be deleted and purged from the record.If you're a keyed linuxARYAN, just run whois <DOMAIN NAME HERE> (remember to type just 'nophono.com', not 'https://nophono.com') in your terminal to get the whois info as it comes preinstalled on most distros.[it just does, ok?]
Free web tools also exist for checking the owner of a domain, such as who.is and whoisfreaks.com. Whoisfreaks notably offers a historical whois lookup tool, to check if any gemmy information has been changed or redacted. (Requires an account but just use a burner doey)
You can check the registrar, webhost, and email provider using this all-in-one tool.
NameMC is a website that lists previous usernames and skins of Minecraft accounts, since Minecraft is a game that literally everyone has played at some point in their life, it's a great method for finding old usernames to later look up in breach databases or to look up other accounts using that same name using the Wayback Machine. Since most targets like to keep their accounts that they played on as kids instead of making new ones.
Since many of the sharty's targets are public figures who make money from some form of self employment (e.g. goonslop producers, game devs, streamers, etc.), they will often have a company registered under their name to collect shekels. Most US states (maybe all) and many other countries (such as the UK) require an address for the company to be registered at, and it must be made public. If you have the target's real name and a rough location (state, country) this makes it easy to search the relevant business registry for their name - you will hopefully find an entry that has documents listing their address. Most will just use their home address to register the company as the alternative requires parting with some shekels to pay for a company registration service.
A lot of the targets are kinda retarded and name their company with their username, so if you don't have their full name, try searching the registry for their screen name. Two major onlygoys whores were 'oxxed using this method during Operation No Nut November.
Most country/state registries are free to browse but some will be paywalled (e.g. Texas and the Netherlands), thoughever it is typically only a couple bucks to look something up.
The effectiveness of this method varies greatly by state and country as they have different requirements for the level of detail required to view a voter record. For example, Florida only requires a full name and date of birth (this is how the undertroon groomer Shayy a.k.a. Peter Anderson Voss was 'oxxed). However, obsessed Illinois requires a full name, DoB, zip code, street name, and house number, making it effectively useless as you need a fulldox to even view the record. If you get access to a voter record, it will give you their addy (thoughever it may not be up to date as many people don't update it when they move). The UK has this information free to view for any britGOD at their local library, or you can view online for a fee.
VoteRef has the voting records for most US states in an easily searchable database.
It is possible to reverse image search somebaldi's selfie to find reposts or facial matches. Since google lens got nerfed, there is no good free option for this anymore. Lenso.ai and Pimeyes have a limited free search function, but the urls of matches are paywalled.
There is a possible workaround thoughever - lenso lets you download a watermarked low-res preview of matching images. You can then feed this into google lens and sometimes find the source link. As for Pimeyes, you can search for the url and a keyword in google images to try and find the original. (e.g. site:nophono.com <name of the victim, or something like that yeah>)
When running a username through Soylock (or similar), you will often find a lot of SNCA accounts that don't reveal much. The following list gives some accounts that you should prioritize checking as they often give gemmy info. It is roughly listed in descending order of gemminess. Thoughever, you should check all results if you have time as this list is not exhaustive.
Knowing how to blend in with degenerates is a very valuable skill, as you can often get more info from targets and their associates if they trust you. You should know how to design your profile to look like one of them - first determine what type of people they are (trannies, furfags, pedos, femgoys, etc. - there is a lot of overlap between these groups but there are subtle differences) and adjust your profile accordingly. If in doubt, an anime profile pic blends in pretty much anywhere, but make sure you know the character you use because somebaldi might ask you about it.
Unfortunately, it is quite hard to explain how to be an effective larpGOD as it is mostly a skill you get through observation and some degree of improv ability. It is easier if you were groomed and/or EPI'd at an early age, like most 'teens were.
First, here are some things you SHOULD NOT DO:
Here are some ideas for your profile pic:
For the name, you have many options. Some ideas are given below:
For the bio, you can just write some random quirk chungus shit like "Pineapples ^w^" or whatever. Or ideally give some actual details like interests, age, etc. remember you are essentially creating a character here. Troons and furfags often give their age like "Level 16 in life". When infiltrating an actual pedocord, you can give your age like "21 🔄" - this is how a 12 y/o grooming victim would give their age, as the arrows imply to swap the digits.
Haiiii :3
This is how u type like a furfag ^-^ *nuzzles*
U should also have a TXT file made up of links of cute widdle fops (fox) gifs and furfag reaction images (right click on the image and then press "Copy image address") to post (〃ω〃)
Remember to be extra silly bc furfags are all freakin goobs *boops* :3
U can also repeat the last letter of words like thissss ^w^
Adjust the quirk level to the other users, not all furfags and troons talk like this, but most do.
Using furfag emoticons is a good idea. here is a table of some common ones:
| Emotion / Usage | Emoticons |
|---|---|
| Happy / Friendly / Soft | :3, =3, ^w^, ^_^, UwU, owo, OwO, >w<, ^-^, •w•, (^▽^), (≧◡≦) |
| Playful / Mischievous | ;3, >w>, <w<, :>, :<, x3, ^~^, (¬‿¬), ( ̄ω ̄) |
| Curious / Surprised | owo, OwO, Owo?, o_o, O_O, 0w0, (・o・), (⊙ω⊙) |
| Shy / Embarrassed / Blushing | //w//, >///<, ^///^, (⁄ ⁄•⁄ω⁄•⁄ ⁄), (⁄ ⁄>⁄ ▽ ⁄<⁄ ⁄), (〃ω〃) |
| Sad / Hurt / Whiny | ;w;, ;_;, QwQ, TwT, T_T, u_u, (;ω;), (╥ω╥) |
| Angry / Grumpy | >:[, >:(, òwó, ಠ_ಠ, ( ̄^ ̄), (≖︿≖) |
| Confident / Smug / Teasing | :w, Uw<, >w<, ( ̄︶ ̄), (¬‿¬), (≖ω≖) |
| Excited / Hyper | !w!, OwO!!, ^W^, (ノ◕ヮ◕)ノ*:・゚✧, ≧w≦ |
| Sleepy / Cozy | -ω-, =_=, uωu, (-ω-) zzZ, ( ̄ρ ̄)..zzZZ |
| Affectionate / Comforting | *boops*, *hugs*, *paws at you*, ^w^♡, UwU♡, (つω`。), (づ。◕‿‿◕。)づ |
Once you have integrated, you can start subtly datamining for more information. Here are some things you can do:
Sometimes, you will have an 'ox that is likely correct but lacking the final snopes. Here are some methods you can potentially use to confirm it.
Arguably the simplest method, you can just post the 'ox (or part of it) to their 'cord or a social of theirs and gauge their reaction. IMPORTANT: you must post it in a way that would result in no reaction or confusion if it's a faildox, but would prompt them to delete, ban you, and/or sperg out if it is a windox. So don't just spam the entire fulldox, as they would delete these messages even if the 'ox is wrong. Here are some subtle ideas:
If your target has previously shared photos taken inside xis/xer home, you can compare those images with interior photos available on real estate sites like Zillow, Realtor, or Redfin to identify potential matches. Always verify that the photos are recent, as your target may have moved, and any addresses obtained from sources like Whitepages could be outdated.
You can send various things to them and monitor for any kind of reaction when it arrives. These methods are most effective with livestreamers as you can view the live reaction, thoughever, many targets would post their reaction to der 'cord due to an autistic need to share every detail about their lives.
These methods aren't just all. You most of the time will need some other methods to be able to use those main methods. These just vary on the person and there isn't a method to use for everyone but they still work well. You can always ask the Sharty for help. Remember Sharty is always your personal army.
Your friendly Indian 'oxxing guide, 1337_p4j337, has kindly made some video tutorials on 'oxxing for nusois.
Linux distro used in these two videos if anyphono wants to know: endeavourOS w/ KDE (on a vm)
Some of these come from a /raid/ post that was called the same thing. Newer archive. You WILL help to expand it.
Main article: Archiving
Main article: Minor inconvenience
Main article: Major inconvenience
└ /imageboards/ nusoi • Vichan • Yotsuba • OpenYotsuba
└ /operating_systems/ Windows • Linux • Android • TempleOS • BSD
└ /misc/ Babybot • McChallenge • CAPTCHA • Systemd • MS Paint • JS Paint • Photoshop • Flash • IRC • Ad blocking • Dark Web • Free-software license • 4get • Game development
└ ChatGPT • Gemini • Grok • Vibe coding • Generative AI • Stable Diffusion