Additional Information

OSINT Framework

The OSINT Framework is a comprehensive collection of various tools, resources, and techniques that are useful for conducting open-source intelligence (OSINT) investigations. It provides a structured framework for OSINT practitioners to access a wide range of resources and streamline their research process.

The framework includes:

  1. Data Sources: It provides a categorized list of data sources, including social media platforms, search engines, public records, news websites, and more. These sources can be used to gather information and intelligence.

  2. Tools: The framework includes a curated list of OSINT tools and software that can assist in data collection, analysis, and visualization. These tools cover areas such as social media analysis, email tracing, image recognition, domain analysis, and much more.

  3. Techniques: It outlines various OSINT techniques and methodologies that can be employed to extract valuable information from online sources. These techniques include search operators, image reverse searching, metadata analysis, geolocation, and others.

  4. Frameworks: The OSINT Framework provides links to other useful OSINT frameworks, platforms, and projects that can enhance your investigations.

  5. Training Resources: It offers a selection of training materials, tutorials, online courses, and blogs to help individuals improve their OSINT skills and stay up-to-date with the latest developments in the field.

OSINT Techniques

OSINT Technique is a similar platform to OSINT Framework

OSINT Dojo

The OSINT Dojo website is a great resource for open source intelligence (OSINT) researchers. It provides a comprehensive collection of OSINT tools, techniques, and resources. The website is divided into the following sections:

  • General OSINT and Methodology: This section provides an overview of OSINT, including its definition, history, and methodology.

  • Article Publishing Platforms: This section lists a variety of article publishing platforms that can be used to share OSINT findings.

  • OSINT CTFs and Quizzes: This section lists a variety of OSINT capture the flag (CTF) competitions and quizzes that can be used to test and improve OSINT skills.

  • Video Streaming Platforms: This section lists a variety of video streaming platforms that can be used to learn about OSINT.

  • Other Ways to Use OSINT: This section discusses other ways to use OSINT, such as for social media marketing, business intelligence, and law enforcement.

  • OSINT Employment: This section lists a variety of job openings for OSINT researchers.

  • Archived or Deleted Content: This section lists a variety of resources for finding archived or deleted content.

  • Businesses: This section lists a variety of businesses that offer OSINT services.

  • Collection Tools: This section lists a variety of tools that can be used to collect OSINT data.

  • Cryptocurrency: This section lists a variety of resources for researching cryptocurrency.

  • Cryptography: This section lists a variety of resources for learning about cryptography.

  • Dark Web: This section lists a variety of resources for accessing the dark web.

  • Discord: This section lists a variety of Discord servers that are dedicated to OSINT.

  • Domains, Websites, and Networking: This section lists a variety of resources for researching domains, websites, and networking.

  • Email: This section lists a variety of resources for researching email.

  • Gab: This section lists a variety of resources for researching Gab.

  • Geolocation: This section lists a variety of resources for geolocating people and objects.

  • Gettr: This section lists a variety of resources for researching Gettr.

  • Github: This section lists a variety of resources for researching Github.

  • Government: This section lists a variety of resources for researching government data.

  • Images: This section lists a variety of resources for researching images.

  • Instagram: This section lists a variety of resources for researching Instagram.

  • IP: This section lists a variety of resources for researching IP addresses.

  • Languages: This section lists a variety of resources for researching languages.

  • LinkedIn: This section lists a variety of resources for researching LinkedIn profiles.

  • Mastodon: This section lists a variety of resources for researching Mastodon.

  • OPSEC: This section lists a variety of resources for learning about OPSEC.

  • Parler: This section lists a variety of resources for researching Parler.

  • Person Searches: This section lists a variety of resources for conducting person searches.

  • Phone: This section lists a variety of resources for researching phone numbers.

  • Pinterest: This section lists a variety of resources for researching Pinterest.

  • Pokémon GO: This section lists a variety of resources for researching Pokémon GO.

  • Programming and Automation: This section lists a variety of resources for programming and automating OSINT tasks.

  • Reddit: This section lists a variety of resources for researching Reddit.

  • Search Engines and Databases: This section lists a variety of search engines and databases that can be used for OSINT research.

  • Skype: This section lists a variety of resources for researching Skype.

  • Snapchat: This section lists a variety of resources for researching Snapchat.

  • Sockpuppets: This section lists a variety of resources for researching sockpuppet accounts.

  • Telegram: This section lists a variety of resources for researching Telegram.

  • TikTok: This section lists a variety of resources for researching TikTok.

  • Transportation: This section lists a variety of resources for researching transportation.

  • Tumblr: This section lists a variety of resources for researching Tumblr.

  • Twitter: This section lists a variety of resources for researching Twitter.

  • Usernames: This section lists a variety of resources for researching usernames.

  • Virtualization: This section lists a variety of resources for researching virtualization.

  • Visualization: This section lists a variety of resources for visualizing OSINT data.

The OSINT Dojo website is a valuable resource for anyone who wants to learn more about OSINT. It is a comprehensive and up-to-date resource that covers a wide range of topics. If you are interested in OSINT, I highly recommend checking out the OSINT Dojo website.

Other OSINT Course

You can watch this YouTube Video created by The Cyber Mentor or this YouTube Video created by David Bombal to learn more about OSINT.

Other OSINT Tools

The Harvester

the harvester is a simple-to-use, yet powerful tool designed to be used during the reconnaissance stage of a red team assessment or penetration test. It performs open-source intelligence (OSINT) gathering to help determine a domain's external threat landscape. The tool gathers names, emails, IPs, subdomains, and URLs by using multiple public resources.

To learn about How to use Google Advanced Search Operators , You can watch this YouTube Video/Tutorial created by HackerSploit , this YouTube Video/Tutorial created by Learn To Hack and Code , this YouTube Video/Tutorial created by System Exploited , this YouTube Video/Tutorial created by NetworkingRoot .

OSINT-Witch

OSINT-Witch will do Google search automation to find emails, names, locations and past breaches information for you!

Social Mapper

Greenwolf Social Mapper is an OSINT tool that is specifically designed for social media reconnaissance and mapping. It helps in identifying and tracking individuals across different social media platforms using their usernames or profile information.

Clearbit

Now reinvented with Artificial Intelligence , Clearbit is the first AI Native Data Provider.

Enrich your records, reveal buying intent, and connect with your ideal customers.

Spiderfoot

SpiderFoot is an open source intelligence (OSINT) automation tool. It integrates with just about every data source available and utilises a range of methods for data analysis, making that data easy to navigate.

SpiderFoot has an embedded web-server for providing a clean and intuitive web-based interface but can also be used completely via the command-line. It's written in Python 3 and MIT-licensed.

That’s Them

‘That’s Them’ is a Paid OSINT tool.

"That's Them" is an online OSINT tool that allows you to search for people based on their name, phone number, email address, or physical address. It aggregates publicly available data from various sources and provides comprehensive reports on individuals, including personal information, contact details, social media profiles, professional history, and more.

Recon-ng

Recon-ng is a full-featured reconnaissance framework designed with the goal of providing a powerful environment to conduct open source web-based reconnaissance quickly and thoroughly.

Recon-ng has a look and feel similar to the Metasploit Framework, reducing the learning curve for leveraging the framework. However, it is quite different. Recon-ng is not intended to compete with existing frameworks, as it is designed exclusively for web-based open source reconnaissance. If you want to exploit, use the Metasploit Framework. If you want to social engineer, use the Social-Engineer Toolkit. If you want to conduct reconnaissance, use Recon-ng! See the Wiki to get started.

Recon-ng is a completely modular framework and makes it easy for even the newest of Python developers to contribute. See the Development Guide for more information on building and maintaining modules.

BuiltWith

Shodan

Search Engine for the Internet of Everything

Shodan is the world's first search engine for Internet-connected devices. Discover how Internet intelligence can help you make better decisions.

WebShag

OpenVas

ZoomEye

Spyse

Spyse is a search engine which can be used to identify internet assets and perform external reconnaissance easily. Results are delivered fast. Pentestlab has recently performed a review of the product and the results are presented in this article.

Metagoofi

IP8

Last updated