The Ultimate Doxing Guide is a LAST RESORT NUKE that will leave Ṇ̶́̏̂̈́̅ͅÓ̶͇̭̦̆̅ ̸̖̠̚S̶̟͑͛̀͘Ú̶̧͍̫͓̜͛̔͐̑R̵͕̲̬͕̿V̷̝̫̌̋̍Ì̵̥̉̽̕V̷̧̰̭͇̄O̴͕̦̪̠̦͘Ř̸̩̂͝Ş̵̺̠͙̈́͗̉ The following media may only be utilized upon its ratification by President Quote when the end times are approaching Find a nuclear bunker ₦Ø₩
Calling for SWATTING is ILLEGAL and WILL get you banned for rule 1.
This doxing guide has everything you need to know to dox someone. You along with knowledge need some IQ to create plans, collect some info to do a certain thing, and etc. This means 'p spammers can't dox. This page also doesn't go over shit nobody cares about.
Before you start taking revenge on the literal who discord pedophile and accidentally stumble into a honeypot and end up having Kolyma agents knocking on your door, do these to stay safe:
Use Tor (download here) when doing these (ironically it was created by the US Navy but it's safe (hopefully))
Don't use email to communicate with others on the dark web unless you are using PGP encryption. Only use peer-to-peer-messaging apps with a user privacy policy such as SimpleX Chat to communicate. By the way, anonymity and privacy are two different things. Privacy means that they know who you are, but they don't know what you're doing. Anonymity is when they don't know who you are, but they know what you're doing. You obviously want a mix of these two.
The importance of this step cannot be understated, but it is sadly often overlooked. Yeah, it's boring, we know. Don't be a SLF and turn it into a faildox cause you couldn't be bothered. 'chiving tools can be found in the links section.
Always assume there will be snitches monitoring - if a target is alerted before you can 'chive, all evidence could be lost
Datamine - Gather usernames, accounts, images (including an eye-catching thumbnail for /raid/), search breach sites, phonebooks, etc... Refer to below sections for tools and methods.
Windox? (full name, address, email, phone, relatives (including contact details), place of work)? If yes, go to (7.), else continue.
Deploy to /raid/
Create a thread on /raid/ with an eye-catching thumbnail and title - if you think it will be a long operation with many targets, it is customary to give your thread a title prefixed with "Operation", e.g. Operation Soyclipse, Operation Total Vorefag Death
Provide as much information in the OP as possible (usernames, accounts, emails, etc.). Just a personal army gif and a xitter screenshot will guarantee a faildox
/raid/ is sadly a dnb so it is not useful for fastburn raids such as "raid this tranny vtuber's stream" or "send 'za to this literal who I just 'oxxed" - these do better on /soy/
Collaborate - if your cause is deemed worthy, other /raid/ teens will help you with uncovering more info. Ignore and report derailers. It is a good idea to create a doxxtrail to show the chain of evidence. If you're lucky, an editGOD might make an 'ox video edit for you.
Windox? - ok great, now you have all the info you need to move onto the next phase
Deploy to /soy/
Pre-write your thread in notepad o algo
Your thread WILL be eye-catching in the 'log. Choose an image and title carefully (omit the actual thread title and use redtext and ALL CAPS at the top of the post body, it's better). Include screenshots with brimstone they posted (censor NSFW)
Your thread WILL give a short few-sentence summary of who they are and why they deserve 'oxxing. /soy/im respond better to inflammatory and enraging stuff so it doesn't hurt to exaggerate a bit as long as you aren't lying.
Your thread WILL include usernames, emails, account links, passwords, etc.
Your thread WILL include a link to the /raid/ thread. This allows /soy/im to check evidence and helps increase activity on /raid/
Your thread WILL include a nicely-formatted fulldox with the following (* = bare minimum for a windox)
Relatives - include contact details (phones, emails, etc.)
School / College / Workplace - include email to report misconduct
Tip line for local police (if relevant)
Your thread WILL include a call to action, e.g. 'OX. 'APE. 'ILL. or 'ZA AND 'MONS NOOOOWWWWWWWW
ENABLE IDs!!
This is the only correct way to respond to derailcordIf derailcorders appear, DO NOT ENGAGE. Just filter by ID+. Even 'jakking a derailer contributes to derailment.
Gather seetheralds - This is important. It is a good idea to have at least one subtle slowburn account inside their 'cord server (join before making the /soy/ thread) so you can collect gemmy screenshots of the meltdown to post on /soy/
Immortalize - Make an article about the operation here on the 'ki if it's a gemerald. If it's SNCA just add to List of doxes
Before trying to dox someone you should check if someone else has already done the work for you. Try searching their name or checking dox websites like Doxbin.
Do note the 'ki has central collection of doxes available at Operation PRISM.
OSINT is using publicly available information to dox people. This is usually checking everything on someone's social media accounts to find any locations or any real life connections. CIA hires you to do these stuff.CIA does NOT spy on you. This is just a tinfoil hat Chudcel.
You should learn how to program, in a scripting language like Python, for writing simple scripts for automating tasks like searching for usernames.
Some onion sites host archives, medical records, data breaches, and more that wouldn't be available on the clearnet. In order to access these you must use a browser that allows you (Tor is the most common browser to use) and have a place to start. A link directory you can use is tor.taxi which is still one of the best. If you want to find some more links, use DarkNetLive or if you're desperate use Reddit. KEEP IN MIND DO NOT PASTE RANDOM LINKS THAT ARE NOT FROM A TRUSTED DIRECTORY AS IT MAY BE A HONEYPOT. The list will go on as you find more websites you can use. You can also use OSINT on the dark web, so here are some tools for you to use on your adventures.
Obviously many people post photos. If they show outside of their house (or even inside) you can most of the time pinpoint the exact location.
To do this look for anything that can be used for identifications like trees, bridges, etc. Then try putting it in Google images' search and see if anything shows up. If that part in the picture is pretty clear and a Google street view car passed by it, Google will show it to you. But sometimes you're doxing a third world nigger, that country some times doesn't have Google services or they are just living in the middle of nowhere and in that case it becomes harder. To now do it, you have to find the country (if they don't tell you, see what hours they are active and guess) of the nigger and more preferably also find what town, district or just what area they live in. After that you should map out what that area would look like from aerial view. Once you did that, go to Google Earth and try to find something. Once you think you have the location, make sure it's the right location and post it on wherever you want. (obviously you don't want to send 'za to a ww2 veteran with PTSD and financial struggles).
There are some tools that claim to be able to geolocate an image using AI. These are absolutely fucking useless and you should not waste your time.
GeoGOD-specific tools can be found in the links section of this page.
This method can be hard if you're not using Google images, so you need some training. You can play a lot of GeoGuessr which will give you the knowledge about certain countries, like what their trash cans look like, if the houses are like a soviet shithole etc. You need to pay them to play it doe. If you a poor ass nigga use OpenGuessr as it is free.
Geoguessr players have many resources for training in case you want to know what telegraph poles look like in the Mokhotlong region of Lesotho o algo.
Emails are extremely valuable during doxing. Access to the emails are a lot more valuable, it's like finding a massive diamond while mining. Emails are usually used when the person knows how to stay anonymous, and most other methods can't be used. Emails are used to gain access to other accounts that could have very sensitive information.
After getting into the email, you can access almost every other account using the platform's reset password feature. This will alert the target so make sure to immediately delete the message (make sure to remove it from the bin as well)
Databreaches not only contain passwords, they might also contain things like IPs and loads of other stuff like phone numbers. Almost all the time you need to buy the databreach file as a .zip that ends up being a retarded file format used in 1488 B.B.C. but you might be able to actually see it if you actually get in contact with the seller.
If you have a password, you might be able to log into the target's email account as most peopleretards use 1 password for everything.
The best website for free public databreaches is breach.vip, also swolesome.vip (a sharty frontend for breach.vip).
If you want to find databreach pastes, a forum you can use is leakbase.io, and another (most likely an FBI honeypot as it was seized multiple times so please try to avoid it) is BreachForums.st. Use haveibeenpwned.com to see if they're part of a data breach, however some pastes already existing might not be in the pwned database.
Get good at it. Your target might have great OPSEC but their auntie Margaret probably doesn't. If you have a name and general area, use the people search feature to search the target's surname and filter by the town (works better in small towns and for uncommon surnames), then datamine potential relatives (many will have public friends lists so you can map out relations). It is highly likely that there will be a photo of the target on their grandma's page somewhere o algo, which will make the 'ox more impactful as having a photo will scare the target more.
This is also useful for contacting all relatives after the 'ox is confirmed so you can send them all the degenerate activity the target has been involved with online.
The hacker known as Sharty (me) doxing you with the 46 second gooning vid you posted on xitter
Some times you might have to use tactics related to that person's life to gain info. This usually works with older people as they almost always have had a crush on the school's cheerleader and they are willing to cheat on their wife of 7 years for her.
If you decide to take legal action against someone, you will be given access to many many personal information by the government. This is the riskiest way to dox as they might also get access to your personal information. Usually jewtubers use this method when they get exposed, they file a copyright claim and leak the uploader's information online. The other party typically doesn't do the same because of the risk involved. Overall, this is the riskiest but an effective way of doxing if the target is famous.
Having the school and first name but not the last or not sure if the name is true, call Xiers School and say, Xier is your sibling o algo and that Xiers is sick and wants to go home. They will check if Xier is in the school's database or whatever they have and tell you if Xier is a student there if the name is true, and if you ask for the last name as confirmation, you're successful.
These methods aren't just all. You most of the time will need some other methods to be able to use those main methods. These just vary on the person and there isn't a method to use for everyone but they still work well. You can always ask the Sharty for help. Remember Sharty is always your personal army.
https://t.me/kyanitepw - Paid telegram breach search bot. Can pay in rubles or robux. Use with caution as one 'teen got banned for being in one of their 'cords or something
Street-level imagery providers: Google StreetView, Apple Maps (much better coverage in Germany than google), https://www.mapillary.com/ (crowdsourced, often 3rd world quality but can be useful for filling in StreetView gaps)