ZeroTrace OSINT
Cross-tool pivots
The pivot graph that turns one finding into the input for the next tool — without copy-paste, without leaving the application.
A pivot is the act of taking a finding produced by one tool and feeding it as input to another tool. Pivots are the connective tissue that distinguishes a toolkit from a folder of utilities.
In ZeroTrace OSINT every value the toolkit knows about — IP addresses, domains, URLs, emails, usernames, hashes, phone numbers — is pivotable. Click it. The pivot menu opens. Pick the next tool. The value lands in the next tool's input field, pre-filled.
The pivot menu
Click any pivotable value in the toolkit and you see a chip with a small dropdown. The dropdown lists every other tool that takes that value type as input.
| Value type | Pivot targets |
|---|---|
| IP address | WHOIS, reverse DNS, IP geolocation, ASN lookup, IP reputation, exposed services |
| Domain | WHOIS, DNS records, DNS history, certificate transparency, subdomain enumeration, Wayback archive, security.txt, robots/sitemap, website analysis, TLS inspector |
| URL | Redirect analyzer, URL parser, Wayback archive, website analysis, HTTP methods tester |
| Email analyzer, password breach lookup, email permutator | |
| Hash | Hash type detector |
| Phone | Phone lookup |
| Username | Username sweep (thirty-plus platforms) |
| MAC address | OUI / vendor lookup |
| CIDR | CIDR calculator, IP range expander |
| JWT token | JWT decoder |
| Base64 string | Base64 decoder |
How pivots work in practice
Walk through a typical infrastructure investigation:
- You start with a domain —
example.com. - Run WHOIS lookup — registrar, age, nameservers, abuse contact.
- Click the nameserver IP — pivot to ASN lookup — discovers it is hosted by a small VPS provider.
- Click the same IP — pivot to reverse DNS — finds 14 other domains on the same IP.
- For each of those domains, pivot to WHOIS — see if any share registrant fields.
- Click any registrant email — pivot to password breach lookup — see if the email appears in breaches.
- Pivot to username permutator with the email's local part — generate handle candidates.
- Pivot to username sweep — check those handles across thirty-plus platforms.
That is eight tools in seven pivots, no copy-paste, every step pinned to the same profile with full provenance.
Pivots inside profile detail
Inside a profile, every captured value is pivotable. Click an IP entity in the Targets column and the pivot menu opens with all the IP-tool targets. The new run attaches to the same profile automatically.
This is the fastest way to deepen a profile: open the profile, click the value you want to enrich, pick a tool, run it. Repeat.
Auto-compose
Some tools compose results from other tools automatically. Examples:
- Person investigation runs username sweep, email analyzer, and breach lookup in parallel for whatever inputs you provide.
- Subdomain discovery seeds itself with results from the certificate-transparency tool, then verifies each subdomain with DNS.
- TLS inspector auto-fetches sibling hostnames from certificate-transparency logs for the leaf certificate.
- Image-metadata auto-composes a reverse-image-search builder when a photo has identifiable EXIF tags.
Auto-compose happens in the background. You see the composed results inside the same tool's output. No manual pivots required.
If a tool you use often does not auto-compose with the obvious next-step tool, file feedback. Auto-compose is the principle that drives the toolkit's design — anywhere it does not exist is a gap we want to know about.
Pivots and the command palette
The command palette (Ctrl+K) is a kind of zero-input pivot — you do not need a value to start. Type the first letters of any tool name and the palette finds it. Open it. Paste your value. Run.
Use the palette for the first tool of an investigation. Use pivots for every tool after that.
When to pivot vs. when to use the palette
| Situation | Use |
|---|---|
| Starting from scratch on a target | Command palette (Ctrl+K) |
| You have a value and want to enrich it | Pivot menu on the value |
| You want a tool that takes no value (e.g. proxy scraper) | Command palette |
| You want to re-check a recent input | Recent runs (Ctrl+H) on the tool page |
| You are following a finding inside a profile | Click the entity, pivot from the Targets column |
Bookmark-able pivot routes
Every pivot is a deep link. The URL of any tool page accepts a pre-fill parameter. If you want to share an exact tool-with-input link with a teammate (or open it from a saved bookmark), the URL works as expected.