The Ultimate Doxing Guide [TUDG]

From Soyjak Wiki, the free ensoyclopedia
(Redirected from Tor)
Jump to navigationJump to search
The Ultimate Doxing Guide is a LAST RESORT NUKE that will leave Ṇ̶́̏̂̈́̅ͅÓ̶͇̭̦̆̅ ̸̖̠̚S̶̟͑͛̀͘Ú̶̧͍̫͓̜͛̔͐̑R̵͕̲̬͕̿V̷̝̫̌̋̍Ì̵̥̉̽̕V̷̧̰̭͇̄O̴͕̦̪̠̦͘Ř̸̩̂͝Ş̵̺̠͙̈́͗̉
The following media may only be utilized upon its ratification by President Quote‎‎ when the end times are approaching
Find a nuclear bunker ₦Ø₩
This is actually... helpful?

You can read this for more info about the topic

Calling for SWATTING is ILLEGAL and WILL get you banned for rule 1.

This doxing guide has everything you need to know to dox someone. You along with knowledge need some IQ to create plans, collect some info to do a certain thing, and etc. This means 'p spammers can't dox. This page also doesn't go over shit nobody cares about.

Stay safe[edit | edit source]

Before you start taking revenge on the literal who discord pedophile and accidentally stumble into a honeypot and end up having Kolyma agents knocking on your door, do these to stay safe:

  • You WILL use Tor (download here) when doing these (ironically it was created by the US Navy but it's safe (hopefully))
  • You WILL read the darknet bible (Tor required)
  • You WILL wear a mask[Marge...]
  • Remember glowies aren't a joke
  • You WILL NOT go to sites you're not sure of
  • You WILL use a VPN
  • You WILL NOT use email to communicate with others on the dark web unless you are using PGP encryption. Only use peer-to-peer-messaging apps with a user privacy policy such as SimpleX Chat to communicate. By the way, anonymity and privacy are two different things. Privacy means that they know who you are, but they don't know what you're doing. Anonymity is when they don't know who you are, but they know what you're doing. You obviously want a mix of these two.

Suggested 'oxxing procedure[edit | edit source]

So - you found a tranny that makes futa cock vore cub rape porn online or something. Wat nou? A helpful procedure for newGODS is outlined below.

  1. CHIVE. CHIVE. CHIVE.
    • The importance of this step cannot be understated, but it is sadly often overlooked. Yeah, it's boring, we know. Don't be a SLF and turn it into a faildox cause you couldn't be bothered. 'chiving tools can be found in the links section.
    • Always assume there will be snitches monitoring - if a target is alerted before you can 'chive, all evidence could be lost
  2. Datamine - Gather usernames, accounts, images (including an eye-catching thumbnail for /raid/), search breach sites, phonebooks, etc... Refer to below sections for tools and methods.
  3. Work backwards - In order to confirm that you've found your target, start with the last piece of information you found and try to work your way back to the information you started with. If it checks out, proceed. If not, go back to (2.) and see if there are any other people your target might be.
  4. Windox? (full name, address, email, phone, relatives (including contact details), place of work)? If yes, go to (8.), else continue.
  5. Deploy to /raid/
    • Create a thread on /raid/ with an eye-catching thumbnail and title - if you think it will be a long operation with many targets, it is customary to give your thread a title prefixed with "Operation", e.g. Operation Soyclipse, Operation Total Vorefag Death
    • Provide as much information in the OP as possible (usernames, accounts, emails, etc.). Just a personal army gif and a xitter screenshot will guarantee a faildox
    • /raid/ is sadly a dnb so it is not useful for fastburn raids such as "raid this tranny vtuber's stream" or "send 'za to this literal who I just 'oxxed" - these do better on /soy/
  6. Collaborate - if your cause is deemed worthy, other /raid/ teens will help you with uncovering more info. Ignore and report derailers. It is a good idea to create a doxxtrail (see below) to show the chain of evidence. If you're lucky, an editGOD might make an 'ox video edit for you.
  7. Windox? - ok great, now you have all the info you need to move onto the next phase
  8. Deploy to /soy/
    • Pre-write your thread in notepad o algo
    • Your thread WILL be eye-catching in the 'log. Choose an image and title carefully (omit the actual thread title and use redtext and ALL CAPS at the top of the post body, it's better). Include screenshots with brimstone they posted (censor NSFW)
    • Your thread WILL give a short few-sentence summary of who they are and why they deserve 'oxxing. /soy/im respond better to inflammatory and enraging stuff so it doesn't hurt to exaggerate a bit as long as you aren't lying.
    • Your thread WILL include usernames, emails, account links, passwords, etc.
    • Your thread WILL include a link to the /raid/ thread. This allows /soy/im to check evidence and helps increase activity on /raid/
    • Your thread WILL include a nicely-formatted fulldox with the following (* = bare minimum for a windox)
      • * Full name (including deadname if applicable)
      • * Address(es)
      • Phone number(s)
      • Date of birth
      • Relatives - include contact details (phones, emails, etc.)
      • School / College / Workplace - include email to report misconduct
      • Tip line for local police (if relevant)
    • Your thread WILL include a call to action, e.g. 'OX. 'APE. 'ILL. or 'ZA AND 'MONS NOOOOWWWWWWWW
    • ENABLE IDs!!
    • This is the only correct way to respond to derailcord
      If derailcorders appear, DO NOT ENGAGE. Just filter by ID+. Even 'jakking a derailer contributes to derailment.
  9. Ruin xeir life - send them a brimmy 'za, send 'mons, scientologists, qurans, and so on. Contact relatives, place of work, etc. and include evidence. Spam 'ox on xeir socials and 'cords.
  10. Gather seetheralds - This is important. It is a good idea to have at least one subtle slowburn account inside their 'cord server (join before making the /soy/ thread) so you can collect gemmy screenshots of the meltdown to post on /soy/
  11. Immortalize - Make an article about the operation here on the 'ki if it's a gemerald. If it's SNCA just add to List of doxes. Also add any 'oxxeralds to the table for Operation PRISM.

The Doxtrail[edit | edit source]

A doxtrail is the trail of evidence that you follow in order to find information while doxing. Documenting the doxtrail is essential to prove that your windox is actually the person you say it is. A doxtrail doesn't have to be intimately detailed, but it should be detailed enough that an average soyteen would be able to follow it and find the same results. An example of a doxtrail in which the target's name, address, phone number, and e-mail address were found:

A particularly detailled 'oxxtrail image. This level of detail is not always necessary but is useful for high-profile targets and/or complicated trails.
  • Searched their username on Swolesome.vip and found a breach that leaked their e-mail address.
  • Looked for other breaches including that e-mail address and discovered their other accounts
  • Other accounts revealed their name and approximate location (state, city, county, etc.)
  • Searched Addresses.com for their name in that location, found their address and phone number

When your target is made aware of the 'ox, it is very common for them and their 'cord xisters to call the 'ox a falsenvke as a form of damage control. Having a watertight 'oxxtrail will deboonk any of these attempts.

Methods[edit | edit source]

The owner of freedatabreachdatabasescmaixsfskcxfiaBBCsladm.onion looks like this
How to dox Things to use for doxing

Check for existing doxes[edit | edit source]

Before trying to dox someone you should check if someone else has already done the work for you. Try searching their name or checking dox websites like Doxbin.

Do note the 'ki has central collection of doxes available at Operation PRISM.

OSINT[edit | edit source]

OSINT is using publicly available information to dox people. This is usually checking everything on someone's social media accounts to find any locations or any real life connections. CIA hires you to do these stuff. CIA does NOT spy on you. This is just a tinfoil hat Chudcel.

You should learn how to program, in a scripting language like Python, for writing simple scripts for automating tasks like searching for usernames.

Onion Sites/Dark Web[edit | edit source]

Some onion sites host archives, medical records, data breaches, and more that wouldn't be available on the clearnet. In order to access these you must use a browser that allows you (Tor is the most common browser to use) and have a place to start. A link directory you can use is tor.taxi which is still one of the best. If you want to find some more links, use DarkNetLive or if you're desperate use Reddit. KEEP IN MIND DO NOT PASTE RANDOM LINKS THAT ARE NOT FROM A TRUSTED DIRECTORY AS IT MAY BE A HONEYPOT. The list will go on as you find more websites you can use. You can also use OSINT on the dark web, so here are some tools for you to use on your adventures.

GeoGODing[edit | edit source]

Obviously many people post photos. If they show outside of their house (or even inside) you can most of the time pinpoint the exact location.

To do this look for anything that can be used for identifications like trees, bridges, etc. Then try putting it in Google images' search and see if anything shows up. If that part in the picture is pretty clear and a Google street view car passed by it, Google will show it to you. But sometimes you're doxing a third world nigger, that country some times doesn't have Google services or they are just living in the middle of nowhere and in that case it becomes harder. To now do it, you have to find the country (if they don't tell you, see what hours they are active and guess) of the nigger and more preferably also find what town, district or just what area they live in. After that you should map out what that area would look like from aerial view. Once you did that, go to Google Earth and try to find something. Once you think you have the location, make sure it's the right location and post it on wherever you want. (obviously you don't want to send 'za to a ww2 veteran with PTSD and financial struggles).

There are some tools that claim to be able to geolocate an image using AI. These are absolutely fucking useless and you should not waste your time.

GeoGOD-specific tools can be found in the links section of this page.

Training[edit | edit source]

This method can be hard if you're not using Google images, so you need some training. You can play a lot of GeoGuessr which will give you the knowledge about certain countries, like what their trash cans look like, if the houses are like a soviet shithole etc. You need to pay them to play it doe. If you a poor ass nigga use OpenGuessr as it is free.

Geoguessr players have many resources for training in case you want to know what telegraph poles look like in the Mokhotlong region of Lesotho o algo.

Emails[edit | edit source]

Emails are extremely valuable during doxing. Access to the emails are a lot more valuable, it's like finding a massive diamond while mining. Emails are usually used when the person knows how to stay anonymous, and most other methods can't be used. Emails are used to gain access to other accounts that could have very sensitive information.

Password resetting[edit | edit source]

After getting into the email, you can access almost every other account using the platform's reset password feature. This will alert the target so make sure to immediately delete the message (make sure to remove it from the bin as well)

Databreaches[edit | edit source]

Databreaches not only contain passwords, they might also contain things like IPs and loads of other stuff like phone numbers. Almost all the time you need to buy the databreach file as a .zip that ends up being a retarded file format used in 1488 B.B.C. but you might be able to actually see it if you actually get in contact with the seller.

If you have a password, you might be able to log into the target's email account as most people retards use 1 password for everything.

The best website for free public databreaches is breach.vip, also swolesome.vip (a sharty frontend for breach.vip).

If you want to find databreach pastes, a forum you can use is leakbase.io, and another (most likely an FBI honeypot as it was seized multiple times so please try to avoid it) is BreachForums.st. Use haveibeenpwned.com to see if they're part of a data breach, however some pastes already existing might not be in the pwned database.

Facebook stalking[edit | edit source]

Get good at it. Your target might have great OPSEC but their auntie Margaret probably doesn't. If you have a name and general area, use the people search feature to search the target's surname and filter by the town (works better in small towns and for uncommon surnames), then datamine potential relatives (many will have public friends lists so you can map out relations). It is highly likely that there will be a photo of the target on their grandma's page somewhere o algo, which will make the 'ox more impactful as having a photo will scare the target more.

This is also useful for contacting all relatives after the 'ox is confirmed so you can send them all the degenerate activity the target has been involved with online.

"Friend"[edit | edit source]

The hacker known as Sharty (me) doxing you with the 46 second gooning vid you posted on xitter

Some times you might have to use tactics related to that person's life to gain info. This usually works with older people as they almost always have had a crush on the school's cheerleader and they are willing to cheat on their wife of 7 years for her.

Talking with xis mother[edit | edit source]

The person you are doxing most likely has an absent father, and xis mom is also just way more stupid. By talking to her, you can convince her you're a friend from back in school or something and you want to send xim a gift for giving you hope or something or that you just wanna meet up with xim. Xis mother will most likely give you the address and you can send the 'za. You might also be able to offer her BWC and then kidnap and rape and torture her until she leaks the location of the gold she burried with her husband in 2003 then kill her and abuse the corpse. She might have a facebook account and if she does she usually has her whole address, phone number, full legal name, and basically everything about her in there.

Legal action[edit | edit source]

If you decide to take legal action against someone, you will be given access to many many personal information by the government. This is the riskiest way to dox as they might also get access to your personal information. Usually jewtubers use this method when they get exposed, they file a copyright claim and leak the uploader's information online. The other party typically doesn't do the same because of the risk involved. Overall, this is the riskiest but an effective way of doxing if the target is famous.

Talking to xiers school[edit | edit source]

Having the school and first name but not the last or not sure if the name is true, call Xiers School and say, Xier is your sibling o algo and that Xiers is sick and wants to go home. They will check if Xier is in the school's database or whatever they have and tell you if Xier is a student there if the name is true, and if you ask for the last name as confirmation, you're successful.

Help with doxing[edit | edit source]

These methods aren't just all. You most of the time will need some other methods to be able to use those main methods. These just vary on the person and there isn't a method to use for everyone but they still work well. You can always ask the Sharty for help. Remember Sharty is always your personal army.

Links[edit | edit source]

Some of these come from a /raid/ post that was called the same thing. Newer archive. You WILL help to expand it.

Meta-lists and guides[edit | edit source]

'chiving - Please do this[edit | edit source]

Breach searching[edit | edit source]

Username/email datamining[edit | edit source]

People search[edit | edit source]

GeoGODing[edit | edit source]

H4xx1ng[edit | edit source]

Post-dox[edit | edit source]

Other[edit | edit source]

The Ultimate Doxing Guide is part of a series on
Trolling and Raids
Visit the Soyfare portal for more.

Do we even know, who is this Snarky Snappy person or website?

Operations [-+]
Targets [-+]
Techniques [-+]
Types of raids [-+]
Trolling groups [-+]

AnonymousCIAGNAAKKKKiwi FarmsNSSrDramasoyjak.party