THE OSINT VAULT

A complete platform for digital investigators, analysts, and researchers.

Start investigating with OSINT tools

OSINT Tools & Investigation Workflows

A curated intelligence platform featuring proprietary tools built within The OSINT Vault alongside carefully selected investigative resources.

Featured OSINT Tools

Google Dork Generator (Proprietary) Proprietary

Generate structured OSINT search queries using a purpose-built investigation tool designed for reconnaissance, discovery, and pivoting.

Open Dork Generator

Multi-Search Launcher (Proprietary) Proprietary

Launch coordinated multi-platform investigations using a custom-built pivoting engine that executes queries across multiple endpoints instantly.

Launch Investigation

Bookmarklet Library (Proprietary) Proprietary

A curated and custom-built collection of browser-native investigative bookmarklets for metadata extraction, in-page analysis, and rapid reconnaissance.

Open Bookmarklets

Intelligence Report Composer (Proprietary) Proprietary

Create structured intelligence reports using a workflow designed specifically for investigators and analysts.

Compose Report

OSINT Vault Note Organizer (Proprietary) Proprietary

Organize raw investigative notes into structured intelligence outputs using a clean, purpose-built analysis workspace.

Open Note Organizer

Infrastructure Discovery

Tools for mapping networks, tracing domains, and identifying the systems behind online activity. Clear, reliable, and built for precise discovery.

crt.sh

Free

Certificate Transparency log search. Find all subdomains by looking up TLS certificates. Great for mapping web infrastructure.

URL: crt.sh
How to use
  1. Go to crt.sh
  2. Enter domain name (e.g., example.com)
  3. Add % before domain for wildcard search (%example.com)
  4. Review all discovered subdomains and certificates

Certificate Transparency APIs

Free

Programmatic access to CT logs. Use SSLMate's certspotter API or Google's CT API to automate subdomain discovery.

RIPEstat

Free

RIPE NCC's data service. Look up IP addresses, ASNs, prefixes, and abuse contacts. Essential for network attribution.

Hurricane Electric BGP Toolkit

Free

BGP routing data and ASN relationships. See who peers with who, upstream providers, and network topology.

URL: bgp.he.net

Internet Archive Wayback Machine

Free

Historical snapshots of websites. See what a site looked like years ago. Recover deleted content, find old contact info, track changes.

Search.0t.rocks

Free

Multi-engine OSINT search tool for running queries across multiple platforms and discovering indexed data variations.

Shodan

Freemium
Infra Active API Free + Paid

Search engine for Internet-connected devices. Find exposed services, open ports, vulnerable systems. Free tier has limited searches.

Note: Essential for finding what's actually exposed, not what should be exposed.

URL: shodan.io

Robots.txt & Sitemap.xml

Free

Add /robots.txt or /sitemap.xml to any domain. Reveals hidden directories, admin panels, API endpoints that site owners don't want crawled.

Example: example.com/robots.txt or example.com/sitemap.xml

SecurityTrails

Freemium

Historical DNS records and subdomain discovery. Track domain changes over time. Free tier provides limited lookups per month.

DomainTools WHOIS

Freemium

Historical and current WHOIS registration data for domains. Supports infrastructure attribution and domain pivoting with extensive historical records.

Best Used For: Domain ownership research and infrastructure pivot analysis.

DNSDumpster

Free

DNS reconnaissance and domain infrastructure mapping. Identifies subdomains, DNS records, and related hosts tied to a domain. Generates visual network diagrams. No registration required.

Best Used For: Subdomain discovery and DNS infrastructure analysis.

ViewDNS

Free

Reverse DNS lookup, reverse WHOIS, and DNS history. Multiple DNS intelligence tools in one interface.

Censys

Freemium

Internet-wide scanning data. Certificate searches, device fingerprinting, and exposure mapping. More structured than Shodan for research.

AbuseIPDB

Free

Crowdsourced IP reputation database used to identify malicious IP addresses. Aggregates abuse reports and assigns confidence scores. Community-driven threat intelligence with API access.

Best Used For: Validating suspicious IPs and identifying malicious infrastructure.

IPinfo

Freemium

IP geolocation, ASN details, and company information. Clean API for programmatic lookups. Free tier available.

URL: ipinfo.io

GreyNoise

Freemium

Identifies internet background noise vs targeted attacks. Determines if IP scanning is mass scanning or targeted activity.

AlienVault OTX

Free

Open threat intelligence platform. Community-contributed indicators of compromise, malicious IPs, and threat data.

Pulsedive

Free

Threat intelligence search engine. Query IPs, domains, and URLs for threat indicators. Clean interface with API access.

VirusTotal

Free

Analyzes files, hashes, domains, and IPs using multiple antivirus engines and threat intelligence feeds. Aggregates detection data and behavioral analysis from 70+ security vendors.

Best Used For: Malware analysis, IOC validation, and infrastructure reputation checks.

BuiltWith

Freemium

Website technology profiler. Identifies frameworks, analytics, hosting providers, and tech stack. Free basic lookups, paid for historical data.

LeakIX

Free

Search engine for exposed databases, API keys, and configuration files. Scans the internet for data leaks and misconfigurations.

URL: leakix.net

BinaryEdge

Freemium

Internet scanner and data platform. Maps exposed services, vulnerabilities, and hosts. API access for automated queries.

Onyphe

Freemium

Cyber defense search engine. Collects data on exposed assets, threat intelligence, and internet infrastructure. Free tier available.

URL: onyphe.io

GrayHat Warfare

Free

Search engine for publicly exposed AWS S3 buckets. Find misconfigured cloud storage containing sensitive files and data.

Fofa

Freemium

Chinese internet asset search engine similar to Shodan/Censys. Scans global internet for exposed services, devices, and vulnerabilities. Strong coverage of Asian infrastructure with advanced query syntax.

Netlas

Freemium

Internet intelligence platform with attack surface discovery. Searches DNS, WHOIS, SSL certificates, and exposed services. Includes historical data and API access. Alternative to Shodan with different data sources.

URL: netlas.io

PublicWWW

Freemium

Source code search engine. Search for specific HTML, JavaScript, or CSS patterns across millions of websites. Find sites using same tracking codes, widgets, or templates. Useful for attribution and infrastructure mapping.

URLScan.io

Freemium

Website scanner and sandbox. Submit URLs to see live screenshots, DOM content, network requests, and technology fingerprints. Search historical scans by domain, IP, or content. API available.

URL: urlscan.io

Hunter.how

Freemium

Chinese internet search engine for exposed services and infrastructure. Query syntax similar to Shodan. Strong global coverage with different indexing approach. Good for cross-referencing Shodan/Censys results.

URL: hunter.how

New to OSINT? Start here

These three tools cover the most common investigation starting points:

Username & Identity Search

When you have a username, email, or handle and need to understand its footprint. These tools help you connect details efficiently and with accuracy.

UserSearch.io

Freemium
2000+ Platforms 3 Free Searches/Day

Searches across 2000+ platforms simultaneously. Includes social networks, forums, dating sites, and gaming communities. Designed for broad username reconnaissance.

Core Functions

  • Queries 2000+ platforms in a single search
  • Identifies social profiles, dating accounts, forum activity
  • Tracks gaming usernames and community handles
  • Export results for further analysis
  • Detects username variations and alternate spellings

WhatsMyName Web

Free
Username Search Free
600+ Sites No Registration

Open-source username enumeration tool that checks hundreds of platforms for account presence tied to a single username. Web-based with no registration required. Enter a username, receive structured results showing platform presence.

Best Used For: Username reconnaissance and account discovery across platforms.

Core Functions

  • Verifies username presence on 600+ websites
  • No account creation needed
  • Real-time results as queries complete
  • Direct profile links provided
  • Open-source verification methods

Namechk

Free

Check username availability across social networks and domain names. Includes less common platforms.

How to use
  • Search major social media platforms
  • Check domain name availability
  • Find less common platform profiles
  • See availability at a glance with color coding
  • No rate limits or registration

Instant Username Search

Free

Lightning-fast username checking. Focuses on major platforms but updates frequently.

How to use
  • Get instant results for popular platforms
  • Clean, simple interface
  • Focus on actively maintained sites
  • Mobile-friendly design
  • Direct profile links for matches

Webmii

Free
Search People Free

People search engine that locates publicly available information connected to an individual's online presence.

Note: Good for quick identity pivots when you need a fast starting point.

URL: webmii.com

PimEyes

Freemium

AI-powered facial recognition search engine. Upload a face photo and find where that face appears across the public internet. Identifies social media profiles, news articles, and websites containing matching faces.

Pipl

People search engine aggregating data from public records, social profiles, and online activity. Returns comprehensive identity profiles including contact info, social media, and professional history. Enterprise/API-based pricing.

URL: pipl.com

Email Intelligence

Straightforward checks to verify whether an email is valid, active, or linked to any concerning activity. Clean results without unnecessary steps.

Epieos

Free

Email OSINT tool. Links email addresses to Google accounts, profile pictures, Google Maps reviews, and YouTube channels.

URL: epieos.com

Hunter.io

Freemium
People Search API Free + Paid

Find professional email addresses by company name. Verify email deliverability. Free tier allows limited monthly searches.

Note: Fast for building target lists when you need valid corporate contacts at scale.

URL: hunter.io

TrueCaller

Freemium

Reverse phone lookup. Identify spam callers, see caller ID info, and find who owns a phone number.

PhoneInfoga (CLI)

Free

Advanced phone number information gathering. Identifies country, carrier, line type, and scans for online footprints.

emailrep.io

Free

Email reputation lookup. Checks if an email address is associated with data breaches, disposable services, or suspicious activity.

Revealer

Freemium

Email-based intelligence lookups to identify associated accounts and metadata. Assists in uncovering digital identity links and account correlations.

Best Used For: Email pivoting and digital identity correlation.

Have I Been Pwned

Free

Check if an email or phone number appears in known data breaches. Maintained by Troy Hunt. API available for automated queries.

MXToolbox

Free

Email server diagnostics. SPF, DMARC, MX record lookups, blacklist checks, and DNS validation for email infrastructure.

RocketReach

Freemium

Contact intelligence platform. Find email addresses, phone numbers, and social profiles for professionals. Ideal for investigative research and contact discovery.

Spydialer

Free

Reverse phone, VOIP, address, name, and email lookup. Includes voicemail preview without calling the device. High accuracy for basic consumer-level OSINT.

How to use
  1. Enter a name, phone number, address, or email
  2. Run lookup
  3. For numbers, click "Voicemail" to hear the carrier greeting without calling

Ignorant

Free

Python-based CLI tool. Queries a phone number across multiple online services. Includes sources such as Instagram and Snapchat. Best used for quick command-line checks and automation.

IntelTechniques Phone Tools

Free

Web-based OSINT lookup tools. Phone number section allows simultaneous searches across many services. Results displayed in separate tabs per service. Also available through OSINT virtual machines built using Michael Bazzell's OSINT Techniques books. Best used for broad, multi-source phone number investigations.

NumVerify

Freemium

Online phone number verification service. Provides basic metadata and validation information. Best used for initial number validation and formatting checks.

Snusbase

Breach data search engine. Search by email, username, IP, name, or password hash to find leaked credentials from data breaches. Returns associated accounts and exposure details across billions of records.

Dehashed

Freemium

Breach data search platform. Search billions of leaked records by email, username, IP, name, phone, VIN, or address. Returns plaintext passwords when available. Used by security researchers and investigators.

SpyCloud

Enterprise breach detection platform. Monitors dark web for compromised credentials and PII. Provides actionable alerts for exposed employee/customer data. Used by security teams and investigators.

GHunt

Free

OSINT tool for investigating Google accounts. Extract name, profile photo, Google Maps reviews, YouTube channels, Google Calendar events, and more from a Gmail address. Powerful for mapping Google ecosystem activity.

Installation
pip install ghunt ghunt login ghunt email target@gmail.com

Threat Intelligence & Compromise Checkers

Threat intelligence and compromise checks focused on exposed credentials, malware indicators, and infrastructure risk signals.

Hudson Rock Free Cybercrime Intelligence Toolset

Free

A free threat intelligence toolset from Hudson Rock that can check whether a specific domain, username, or email address was compromised by Infostealer malware.

Category: Threat Intelligence & Compromise Checkers
Date Featured: 2026-03-03
Tool Page: View documentation
Documentation

Summary: Infrastructure intelligence search to verify compromised identifiers and exposure signals linked to Infostealer activity.

What it checks: Domain, username, email, and malware compromise indicators.

Usage notes: Use the Hudson Rock interface to query identifiers and review exposure context, related infrastructure, and compromise indicators.

Public Records & FOIA

Public record repositories and FOIA resources for historical files, declassified investigations, and government documentation.

FBI Vault

Free

The FBI Vault is the FBI’s online FOIA reading room, providing public access to thousands of FBI records, investigations, and historical documents.

Command Line OSINT Tools

Sherlock

Free
Username Search Free
400+ Networks Fast Scans

Command-line tool for username enumeration across 400+ social networks. Automated search with structured output. Commonly used for identity mapping.

Note: Best first step for username recon before manual verification.

How to use

Environment: Mac Terminal / Linux Terminal / Windows CMD

git clone https://github.com/sherlock-project/sherlock.git cd sherlock pip install -r requirements.txt python sherlock username_here
Technical Note: Scans 400+ networks automatically. Average execution time: 60-120 seconds. Use the Copy button for quick command entry.

PhoneInfoga

Free

Advanced phone number information gathering tool. Scans international phone numbers to identify carrier, location, and online presence.

How to use

Environment: Mac Terminal / Linux Terminal / Windows PowerShell

go install github.com/sundowndev/phoneinfoga/v2@latest phoneinfoga scan -n "+15551234567" phoneinfoga serve

theHarvester

Free
Infra Passive Free

Gather emails, subdomains, IPs, and URLs from public sources. Uses search engines, PGP servers, and Shodan.

Note: Run this early for domain recon before touching the target directly.

How to use

Environment: Kali Linux / Ubuntu Terminal / Mac Terminal

git clone https://github.com/laramies/theHarvester cd theHarvester pip install -r requirements.txt python theHarvester.py -d example.com -b all

Maigret

Free

Collect dossier on a person by username. Checks 3000+ sites, extracts personal info from profiles.

How to use

Environment: Python environment (Mac / Linux / Windows)

pip install maigret maigret john_doe maigret john_doe --pdf

Holehe

Free

Check if an email is used on different sites like Twitter, Instagram, Imgur without notifying the user.

How to use

Environment: Python environment (Mac / Linux / Windows)

pip install holehe holehe johndoe@gmail.com holehe johndoe@gmail.com --only-used

Subfinder

Free
Infra Passive Free

Subdomain discovery tool. Passive reconnaissance using certificate transparency, DNS, and search engines. Fast and reliable.

Note: Fastest passive subdomain enum, use this before active scanning.

How to use

Environment: Mac Terminal / Linux Terminal (Go required)

go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest subfinder -d example.com subfinder -d example.com -o output.txt

Amass

Free
Infra Active Free

In-depth DNS enumeration and network mapping. Active and passive subdomain discovery. Maintained by OWASP.

Note: More thorough than Subfinder but slower, use when you need deep enumeration.

How to use

Environment: Mac Terminal / Linux Terminal (Go required)

go install -v github.com/owasp-amass/amass/v4/...@master amass enum -d example.com amass enum -d example.com -o results.txt

Photon

Free
Active Search Free

Fast web crawler designed for OSINT. Extracts URLs, emails, social media accounts, and files from websites.

Note: Fast crawler for extracting all discoverable content from a target site.

How to use

Environment: Python environment (Mac / Linux / Windows)

git clone https://github.com/s0md3v/Photon.git cd Photon pip install -r requirements.txt python photon.py -u https://example.com

ExifTool

Free

Read, write, and edit metadata in images, videos, PDFs. Extract GPS coordinates, camera info, timestamps, author names.

Installation & Usage:

Environment: Ubuntu / Kali Linux / Mac Terminal

sudo apt install exiftool exiftool filename.jpg exiftool -gps:all image.jpg

Refloow Geo Forensics

Free

Open-source geospatial investigation tool that extracts metadata from images and maps GPS coordinates locally. Processes images in batch mode and reconstructs movement timelines without cloud dependency.

Best Used For: EXIF extraction, geolocation clustering, and timeline reconstruction from images.

hashID

Free

Identify hash types. Determines what algorithm generated a hash string. Essential for password cracking and forensics.

Installation & Usage:

Environment: Python environment (Mac / Linux / Windows)

pip install hashid hashid examplehash hashid -m examplehash

Censys CLI

Freemium

Command-line interface for Censys internet scanning data. Query certificates, hosts, and services from the terminal.

Installation & Usage:

Environment: Python environment (Mac / Linux / Windows)

pip install censys censys config censys search "services.service_name: HTTP" censys view 8.8.8.8

Recon-ng

Free

Full-featured web reconnaissance framework. Modular design with 80+ modules for passive recon: domains, contacts, credentials, hosts, ports. Database-backed with workspaces for organized investigations.

Installation & Usage:

Environment: Kali Linux / Ubuntu / Mac Terminal

git clone https://github.com/lanmaster53/recon-ng.git cd recon-ng && pip install -r REQUIREMENTS ./recon-ng marketplace search modules load recon/domains-hosts/hackertarget

NexFil

Free

OSINT tool for finding profiles by username across 350+ platforms. Fast multi-threaded scanning with export options. Designed for quick identity reconnaissance and persona mapping.

Installation & Usage:

Environment: Python 3.8+ (Mac / Linux / Windows)

git clone https://github.com/thewhiteh4t/nexfil.git cd nexfil && pip install -r requirements.txt python nexfil.py -u username python nexfil.py -f usernames.txt

Terminal Basics for Beginners

What's a Terminal?

The terminal (also called command line, command prompt, or shell) is a text-based interface where you type commands to control your computer. It looks intimidating but it's just another way to interact with your machine.

Opening the Terminal:

  • Mac: Press Cmd + Space, type "Terminal", hit Enter
  • Windows: Press Windows key, type "cmd" or "PowerShell", hit Enter
  • Linux: Press Ctrl + Alt + T (usually)

Basic Commands Everyone Should Know:

Environment: Mac Terminal / Linux Terminal / Windows CMD

pwd ls cd foldername cd .. clear

Installing Prerequisites:

Most CLI OSINT tools need Python and Git installed first:

Environment: Mac Terminal / Linux Terminal / Windows CMD

python --version git --version

Kali Linux Pre-installed Tools

Kali Linux comes with these OSINT tools already installed. If you're using Kali, you can skip the installation steps.

  • theHarvester - Just type: theharvester
  • Maltego - Pre-installed GUI tool
  • Nmap - Network scanning
  • Recon-ng - Web reconnaissance framework
  • SpiderFoot - Automated OSINT collection. Phone number lookup functionality is available as a module within SpiderFoot. Free tier allows up to 100 API searches per month. Best used for automated enrichment within larger investigative workflows.

OSINT Virtual Machines and Distributions

Pre-configured Linux distributions and virtual machines built specifically for OSINT investigations, security research, and digital forensics.

TraceLabs OSINT VM

Free

OSINT-focused virtual machine maintained by TraceLabs for missing persons investigations and CTF events.

CSI Linux

Free

Cyber Security Investigator Linux distribution designed for digital forensics, OSINT, and incident response.

Tsurugi Linux

Free

DFIR and OSINT Linux distribution with comprehensive toolset for digital forensics and investigations.

Kali Linux

Free

Industry-standard penetration testing and security auditing distribution with extensive OSINT tools pre-installed.

BlackArch Linux

Free

Arch Linux-based distribution for penetration testers and security researchers with over 2800 tools.

Osintux

Free

Linux distribution specifically designed for OSINT investigations and open source intelligence gathering.

BackBox

Free

Ubuntu-based Linux distribution designed for penetration testing and security assessment.

osintBOX

Free

Containerized OSINT environment with pre-configured tools for investigations.

ArchStrike

Free

Arch Linux-based distribution for security professionals with curated penetration testing tools.

Offen OSINT

Free

OSINT-focused distribution with automated tool installation and configuration.

Huron OSINT

Free

OSINT distribution designed for investigators with pre-configured investigative tools.

Septor Linux

Free

Debian-based distribution focused on privacy and anonymity with Tor integration.

Pentoo Linux

Free

Gentoo-based security-focused LiveCD distribution for penetration testing.

URL: pentoo.ch

Falcon Arch Linux

Free

Arch Linux-based distribution optimized for security testing and OSINT.

Fedora Security Lab

Free

Fedora spin providing a safe test environment for security auditing and forensics.

Social Footprint Mapping

If a person exists online, these tools help surface the activity and patterns they leave behind. Structured, consistent, and easy to interpret.

Social Searcher

Freemium

Real-time social media search. Monitor mentions across Twitter, Facebook, Instagram, YouTube, Reddit, and more.

IntelX (Intelligence X)

Freemium

Search engine for data leaks, breaches, and the darknet. Paid subscription for unlimited searches and exports.

URL: intelx.io

Followerwonk

Freemium

Twitter analytics and search. Find people by bio keywords, compare followers, analyze activity patterns.

Twint

Free

Advanced Twitter scraping tool. Bypass API limits, scrape tweets, followers, following, likes without authentication.

SocialNet by ShadowDragon

Professional

API-driven OSINT platform. Accessible via the Horizon web portal. Integrates with tools such as Maltego and i2. Best suited for structured social network analysis and API-based correlation.

Social Blade

Free

Track statistics and analytics for YouTube, Twitch, Instagram, Twitter creators. View subscriber counts, follower growth history, estimated earnings, channel rankings. Useful for verifying influencer claims and tracking account growth patterns.

AI-Powered OSINT Tools

Next-generation investigation tools enhanced by artificial intelligence. Automate research, enrich data, and accelerate analysis with machine learning capabilities.

Ubikron

Freemium

AI-powered research platform that enhances OSINT investigations. Track, annotate, and enrich research through intelligent automation, searchable archives, and private server deployment.

Key Features & Pricing

Features: AI-Driven Insights, Tag & Annotate Clippings, Preloaded Prompts, Secure Private Architecture, Auto-Capture Web Journeys, Searchable Archives

Free Plan: 1 user, 2 concurrent projects

Independent Plan: $9k/year for 5 users, 30 concurrent projects

Lampyre

Freemium

Professional OSINT and data analysis platform. Automated data collection from 100+ sources including social media, company registries, breach databases. Link analysis visualization with graph-based entity mapping. Used by LE and corporate investigators.

URL: lampyre.io
Key Features

Features: Graph-based link analysis, automated data enrichment, 100+ data sources, social network mapping, company research, phone/email lookup, IP intelligence

Free tier: Limited queries per month

Best for: Complex investigations requiring relationship mapping

SpiderFoot HX

Freemium

Cloud-based automated OSINT reconnaissance platform. Correlates data from 200+ modules: domains, IPs, emails, names, phone numbers. Generates investigation graphs and exportable reports. Self-hosted open-source version also available.

Key Features

Features: 200+ data modules, automated reconnaissance, investigation graphs, scheduled scans, API access, exportable reports

Open Source: github.com/smicallef/spiderfoot

Best for: Automated footprint mapping and continuous monitoring

Noimosiny

Freemium

AI-powered predictive intelligence platform designed for behavioral modeling and analytical forecasting. Leverages machine learning to identify patterns across datasets and generate probabilistic insights.

Best Used For: Behavioral forecasting, risk modeling, and predictive investigative analysis.

PredictaSearch

Freemium

Enhances investigative search capabilities using AI-driven contextual understanding. Refines queries to uncover hidden relationships, semantic links, and pattern-based correlations beyond traditional keyword search.

Best Used For: Advanced semantic search and uncovering non-obvious data relationships.

ThinkPol

Freemium

AI-driven Reddit intelligence tool that analyzes user behavior, post history, sentiment, and subreddit network mapping. Processes billions of posts to identify behavioral patterns and community affiliations.

Best Used For: Reddit profile investigations, sentiment analysis, and subreddit ecosystem mapping.

Public Records & Registry Search

Direct access to government databases, court records, and official registries. No middleman data brokers. These are primary sources.

OSINT Vault Note Organizer Built by The OSINT Vault · Nicole Hurey

Proprietary

Client-side investigation notebook for structuring raw notes into entities, timelines, sources, and conflict alerts. Deterministic processing with no external dependencies.

Built within The OSINT Vault

PACER (Federal Court Records)

Direct access to U.S. federal court documents, case filings, and dockets. Official government system. $0.10 per page, free up to $30 per quarter.

JudyRecords

Free

Access to millions of U.S. court records, including civil, criminal, and federal filings. Aggregates court data from multiple jurisdictions into a searchable interface.

Best Used For: Searching U.S. court cases, litigation history, and legal records.

CourtListener

Free

Access to federal and state court opinions, oral arguments, and PACER data. Widely used for legal research and judicial analysis. Maintained by Free Law Project.

Best Used For: Case law research, judicial opinion tracking, and federal court monitoring.

Court-Scraper

Free

Python-based tool that automates extraction of structured data from court websites. Supports analysts performing large-scale judicial record collection.

Best Used For: Bulk scraping and structured extraction of court records.

State Court Databases

Free

Most U.S. states maintain free searchable databases for criminal and civil cases. Search by name, case number, or party. Each state operates its own system.

Access: Search "[State Name] court records" or "[State Name] case search" to locate the official database.

National Sex Offender Registry

Free

Official U.S. government registry. Search registered sex offenders across all states. Includes photos, addresses, and conviction details.

URL: nsopw.gov

County Property Records

Free

Most counties provide free online access to property ownership records, tax assessments, and sale history. Direct access to assessor databases.

Access: Search "[County Name] property records" or "[County Name] assessor" to find the official database.

OpenCorporates

Free

World's largest open database of companies. Search 200+ million companies across jurisdictions. Track officers, filings, ownership.

Public Accountability

Free

The Center for Public Accountability provides investigative research into corporate and institutional influence. Offers transparency data useful in financial and influence investigations.

Best Used For: Corporate transparency research and institutional investigation.

State Corporate Registries

Free

Each U.S. state maintains official business entity databases. Search LLC registrations, corporation filings, and registered agent information.

Access: Search "[State Name] Secretary of State business search" to find the official corporate registry.

OSINT Industries

Freemium

Public data aggregation platform. Search phone numbers, emails, usernames across multiple open-source intelligence databases.

OpenSanctions

Free

Global sanctions database. Search politically exposed persons (PEPs), criminal watchlists, and anti-money laundering data from official sources worldwide.

Skopenow

Professional

Professional-grade OSINT and risk-analysis platform used by investigators to aggregate public data across multiple sources. Subscription-based investigative tool.

File & Metadata Analysis

Tools for uncovering the information stored inside documents, images, and other files. Organized, dependable extraction for investigative clarity.

ExifTool (Web)

Free

Read, write, and edit metadata in images, videos, PDFs. Extract GPS coordinates, camera info, timestamps, author names.

Why this matters: Metadata reveals when/where a photo was taken, what device created it, and sometimes who took it. Essential for verifying photo authenticity in alibis and fraud detection.

FOCA (Fingerprinting Organizations with Collected Archives)

Free

Crawl websites and extract metadata from Office documents, PDFs. Finds usernames, software versions, network paths.

Metadata2Go

Free

Online metadata viewer. Upload images, documents, or videos to extract hidden data. No installation required. Works in browser.

Deep Data & Hidden Footprint

Tools for discovering infrastructure details, technology stacks, and digital footprints not visible on the surface.

ZoomInfo

Business Only

B2B contact database. Company hierarchies, decision makers, direct dials. Enterprise pricing, expensive but comprehensive.

Hunter.io API

Freemium

Email finder and verification API. Domain search returns all public email addresses. Email pattern detection and deliverability checks.

API Endpoint Example:
curl "https://api.hunter.io/v2/domain-search?domain=example.com&api_key=YOUR_KEY"

ODIN.io

Business Only
Infra Corporate

A powerful asset discovery and intelligence engine designed for scanning and cataloging internet assets across a wide range of sources.

Note: Strong for asset discovery and mapping external exposure at scale.

URL: odin.io

SherlockEye

Premium
OSINT AI Search Paid

An AI-powered OSINT search engine delivering rapid intelligence across open sources, supporting investigations, threat analysis, and corporate security.

Note: Best when you want broad OSINT coverage quickly before deeper pivots.

Vehicle-AI

Freemium
AI Image Free + Paid

Identify any vehicle using AI. Upload an image and the system will instantly recognize the make, model, year, and additional vehicle attributes. Offers both free and paid tiers.

Note: Useful when you have only an image and need make/model context fast.

GitHub Global Code Search

Free
Code Search Free

Search globally across all of GitHub or restrict queries to specific repositories or organizations to discover code, indicators, configurations, or exposed elements.

Note: Great for finding exposed strings, configs, and reuse across repos.

Corporate Records & Research Funding

NIH RePORTER

Free

Search US government research funding. Find grants, principal investigators, institutions, publications, patents from NIH-funded research.

CORDIS (EU Research)

Free

European Commission research database. Find EU-funded projects, participants, publications, results from Framework Programmes.

ProQuest Dissertations & Theses

Access Varies

Largest collection of dissertations and theses. Free previews, full access through libraries. Find academic research by author or topic.

Municipal & County Records

Free

Search local government databases for property records, court filings, business licenses, permits. Every county has different online systems.

How to find: Google "[County Name] property records" or "[County Name] court records" to find official databases.

Code Repository Investigation

GitHub Advanced Search

Free

Search code, commits, issues, repos with advanced filters. Find API keys, credentials, personal info accidentally committed. Filter by date, language, user.

Power searches:
  • Find exposed API keys: filename:.env OPENAI_API_KEY
  • Search user's code: user:username password
  • Find specific file types: extension:py import requests

Archive Intelligence

Tools for accessing historical versions of web content, tracking changes, and recovering deleted information.

Archive.today

Free

Create permanent snapshots of web pages. Search for archived versions of deleted content. Captures complete pages including dynamic elements.

Memento Time Travel

Free

Search across multiple web archives simultaneously. Aggregates results from Internet Archive, Archive.today, and other archival services.

Wayback CDX API

Free

Programmatic access to the Internet Archive's Wayback Machine index. Query all archived snapshots for any URL. Returns timestamps, status codes, MIME types. Essential for automated archive research and tracking historical changes at scale.

API Usage

Example Query:

curl "https://web.archive.org/cdx/search/cdx?url=example.com/*&output=json&limit=100"

Parameters: url, from, to, limit, output (json/text), filter, collapse

Browser Fingerprinting & Device Intelligence

Tools for analyzing browser characteristics, device information, and digital fingerprints left during online activity.

CreepJS

Free

Advanced browser fingerprinting detector. Analyzes canvas, WebGL, audio, fonts, and other fingerprint vectors. Open-source testing tool.

AmIUnique

Free

Check how unique your browser fingerprint is. Analyzes plugins, screen resolution, timezone, fonts, and other identifying characteristics.

DeviceInfo.me

Free

Displays detailed device and browser information. Shows what data websites can collect about your system and network.

Corporate Intelligence & SEC Filings

Direct access to official corporate registries, SEC filings, and business entity databases.

EDGAR SEC Filings

Free

U.S. Securities and Exchange Commission database. Access all public company filings, financial statements, and regulatory documents.

CrowdTangle

Restricted

Meta's social media analytics platform. Track public content performance across Facebook, Instagram, Reddit. Requires application and approval.

ICIJ Offshore Leaks Database

Free

International Consortium of Investigative Journalists database. Search Panama Papers, Paradise Papers, and other offshore leak investigations. Track shell companies and hidden wealth.

Vehicle & Property Lookup

VINCheck

Free

Free VIN lookup from NICB. Check if vehicle was reported stolen or has salvage title.

NHTSA VIN Decoder

Free

Official U.S. government VIN decoder. Identifies vehicle specifications, manufacturer details, and recall information. Direct access to NHTSA database.

Zillow Property Records

Free

Aggregates public property records from county assessors. Shows ownership history, sale prices, and tax assessments. Free access to most data.

URL: zillow.com

Video & Image Analysis

Google Reverse Image Search

Free

Find where images appear online. Track down original sources, find higher resolution versions, identify people and places.

TinEye

Free

Reverse image search with oldest and newest sorting. Find image modifications, track usage, locate sources.

URL: tineye.com

Yandex Image Search

Free

Russian search engine with excellent face recognition. Often finds results Google misses, especially for Eastern European content.

InVID/WeVerify

Free

Browser extension for video verification. Fragment videos, reverse image search frames, analyze metadata. Essential for journalists.

YouTube DataViewer

Free

Extract upload time, thumbnail images from YouTube videos for verification and reverse image searching.

SunCalc

Free

Sun position calculator for photo/video geolocation. Analyze shadows in images to estimate time of day, verify claimed locations, or narrow down photo dates. Essential for chronolocation and verifying when images were taken.

FotoForensics

Free

Digital image forensics tool. Error Level Analysis (ELA) to detect photo manipulation. Identifies edited regions, cloning, splicing. Also extracts hidden EXIF metadata. Essential for verifying image authenticity.

Business Intelligence Tools

Maltego Community Edition

Free

Visual link analysis for OSINT investigations. Map relationships between people, companies, domains, IPs. Free version has limited transforms.

Crunchbase

Freemium

Startup and company information. Funding rounds, investors, key people, competitors. Free basic search, paid for exports.

LinkedIn Sales Navigator

Business Only

Advanced LinkedIn search and filtering. Boolean searches, company insights, org charts. Business subscription required.

Cached & Archived Content

Archive.is (archive.today)

Free

Create permanent snapshots of web pages. Search for archived versions of deleted content. Unlike Wayback Machine, captures complete pages.

URL: archive.is

CachedView

Free

Search multiple cache sources at once. Checks Google Cache, Wayback Machine, Archive.is from one interface.

Google Cache

Free

View Google's cached version of any page. Add "cache:" before URL or click dropdown next to search result.

Example: cache:example.com in Google search

Google Dorking Techniques

Google Dorking is the practice of using advanced search operators to extract precise, publicly available information from the internet. Investigators, journalists, researchers, and security analysts use it to find what others miss. It's powerful — and surprisingly open.

How to Use Google Dorking

Free

Google Dorking uses advanced operators in Google Search to narrow results based on file type, page content, title, URL structure, and more. Used correctly, it can surface hidden data, public records, login portals, forgotten documents, and exposed endpoints.

filetype:

Operator

Limits results to specific file types like PDF, DOC, XLS, TXT, SQL, and more.

filetype:pdf cybersecurity

inurl:

Operator

Finds pages with specific keywords in the URL structure.

inurl:login site:example.com

intext:

Operator

Searches for keywords within page content/body text.

intext:"password reset"

intitle:

Operator

Matches specific keywords in page titles.

intitle:"index of" backup

link:

Operator

Shows pages that link to a specific URL.

link:example.com

site:

Operator

Limits search to a specific domain or extension (.edu, .gov, etc.).

site:.edu "login"

cache:

Operator

Shows Google's cached version of a page.

cache:example.com

related:

Operator

Finds websites similar to the specified URL.

related:example.com

info:

Operator

Displays information about a specific URL.

info:example.com

define:

Operator

Returns definitions from various sources.

define:cybersecurity

allintitle:

Operator

All specified words must appear in the page title.

allintitle:cybersecurity tips

allinurl:

Operator

All specified words must appear in the URL.

allinurl:admin login

Practical Dorks for OSINT & Research

Educational Sites (.edu)

Free

Target educational institutions for publicly exposed contact info and directories.

site:.edu "phone number"
site:.edu student "phone number"

Login Portals

Free

Find login pages and admin portals on specific domains.

inurl:edu "login"
intitle:"login" site:example.com

vBulletin Forums

Free

Locate vBulletin-powered forums on educational, government, and military domains.

"powered by vbulletin" site:.edu
"powered by vbulletin" site:.gov
"powered by vbulletin" site:.mil

Forum Registrations

Free

Find forum registration pages on institutional domains.

inurl:.edu "register forum"
inurl:.gov "register forum"

Dorking for Facebook Data

Finding Facebook Users

Free

Google can help surface public Facebook profiles using key identifiers like usernames, emails, or name + location.

site:facebook.com "[username]"
site:facebook.com "[email]"
site:facebook.com "[John Doe]" "New York"

Graph Search–Style Queries

Free

Facebook's old Graph Search is gone, but some URL patterns still work for public search.

facebook.com/search/str/[query]/keywords
facebook.com/search/str/John%20Doe/keywords

Dorking for Phone Numbers

Free

Pair phone numbers with context phrases to surface exposed contact data on Facebook.

site:facebook.com "[123-456-7890]"
site:facebook.com "contact me"

Applications of Google Dorking

Free

Key use cases for Google Dorking in professional contexts:

  • Cybersecurity testing: Locate exposed backups, misconfigured directories, hidden endpoints
  • OSINT & investigations: Pull public records, deleted pages, leaks, uncached data
  • Journalism & research: Surface archived info, forgotten content, open databases
  • Web development: Check indexing issues, mislinked content, external references

Browser Extensions for OSINT

Essential browser extensions that enhance your investigation workflow. Quick access to OSINT tools, data extraction, and automated reconnaissance directly from your browser.

Wappalyzer

Free

Identifies technologies used on websites - CMS, frameworks, analytics tools, server software, CDN, payment processors. Essential for profiling target infrastructure.

How to use:
  1. Install from Chrome Web Store or Firefox Add-ons
  2. Visit any website
  3. Click the Wappalyzer icon to see detected technologies
  4. View detailed breakdowns by category (CMS, analytics, hosting, etc.)

BuiltWith Technology Profiler

Free

Reveals website technology stack including widgets, analytics, hosting, CMS, advertising networks. More comprehensive than Wappalyzer for some categories.

EXIF Viewer

Free

View image metadata directly in your browser. Right-click any image to see EXIF data including camera model, GPS coordinates, timestamps, and software used.

RevEye Reverse Image Search

Free

Right-click any image to instantly search it on Google, Yandex, TinEye, Bing, and Baidu. Save time by accessing multiple reverse image search engines from one menu.

Search by Image

Free

Reverse image search across 30+ search engines with one click. Supports Google, Bing, Yandex, TinEye, plus region-specific engines. More comprehensive than RevEye.

User-Agent Switcher

Free

Spoof your browser's user agent to appear as different browsers, devices, or bots. Useful for accessing mobile-only content or bypassing basic detection.

Wayback Machine Extension

Free

Quickly access archived versions of any webpage. See historical snapshots, track changes over time, and recover deleted content from Internet Archive.

Sputnik OSINT Extension

Free

Highlight and analyze text on any webpage. Extract emails, IP addresses, phone numbers, cryptocurrency addresses. Includes instant lookups and pivot tools.

OSINT Combine

Free

Context menu with 150+ OSINT tools. Highlight text (usernames, emails, IPs, domains) and right-click to instantly search across multiple platforms.

IntelTechniques Search Tool

Free

Created by Michael Bazzell. Collection of custom search engines for Facebook, Twitter, Instagram, LinkedIn, and more. Includes advanced query builders.

Note: Downloadable HTML tool that can be used locally or as browser bookmark.

IP Address and Domain Information

Free

Displays detailed information about websites - IP address, location, hosting provider, domain registrar, DNS records. One-click access to WHOIS data.

Mitaka

Free

Search IOCs (indicators of compromise) directly from selected text. Supports IP addresses, domains, URLs, hashes, CVEs, Bitcoin addresses across 70+ engines.

Link Gopher

Free

Extract all links from a webpage into organized lists. Filter by domain, file type, or pattern. Export to CSV or clipboard for further analysis.

Instant Data Scraper

Free

Automatically detect and extract data from web pages into structured tables. Scrape listings, profiles, search results without coding. Export to CSV or Excel.

DuckDuckGo Privacy Essentials

Free

Block trackers, force HTTPS connections, see website privacy ratings. Useful for understanding what data websites collect during investigations.

DownThemAll!

Free

Mass download manager. Download all images, videos, or files from a page with filters. Essential for archiving evidence or collecting media from targets.

Video DownloadHelper

Free

Download videos from websites including YouTube, Facebook, Twitter, Vimeo. Capture video evidence that might be deleted later. Supports 1000+ sites.

SingleFile

Free

Save complete web pages as single HTML files including CSS, images, fonts. Perfect for preserving evidence - everything is embedded, no external dependencies.

FireShot

Free

Capture full-page screenshots even on long scrolling pages. Save as PDF, PNG, or JPEG. Annotate screenshots before saving. Essential for documenting investigations.

Shodan

Premium

Official Shodan browser extension. Shows IoT devices, open ports, vulnerabilities, and historical data for any IP you visit. Requires paid Shodan account for full features.

Email Extractor

Free

Extract all email addresses from any webpage instantly. Export to CSV or copy to clipboard. Useful for contact discovery and lead generation.

Bulk URL Opener

Free

Open multiple URLs at once from a list. Paste dozens of links and open them in separate tabs. Speeds up investigation workflows significantly.

Copy All Urls

Free

Copy URLs of all open tabs to clipboard with one click. Export tab lists for documentation or sharing with team members. Various format options.

ClearURLs

Free

Automatically remove tracking elements from URLs. Clean links before sharing or archiving. Prevents tracking parameters from revealing your investigation.

Cookie-Editor

Free

View, edit, create, and delete cookies. Essential for session analysis, understanding tracking mechanisms, and testing authentication flows.

GeoSpy

Premium

GeoSpy is an advanced AI-powered geolocation platform designed for enterprise and law enforcement use. It delivers meter-level accuracy using state-of-the-art computer vision, even with low-context images.

URL: geospy.ai

OSINT Tips & Insider Techniques

DNS History & Passive DNS

Current DNS records only show where a domain points NOW. Passive DNS databases record historical changes. Use SecurityTrails or DNSDumpster to see:

  • Old IP addresses the domain used to point to
  • Other domains hosted on the same IP historically
  • Changes in hosting infrastructure over time
  • Potential shell companies or related domains

Why it works: People often move domains but leave traces. Historical DNS can reveal connections they thought were hidden.

Telegram OSINT

Telegram doesn't require phone numbers to search users. Key techniques:

  • Username search without @ symbol (direct chat links)
  • Group membership scraping via public group lists
  • Channel analysis for post patterns and engagement
  • Bot interactions reveal user IDs and activity

Tools: Use @username_to_id_bot to get numeric user IDs. Check recent message timestamps to see when someone's active.

LinkedIn Sales Navigator Boolean Tricks

Advanced Boolean search operators most people don't know:

title:(VP OR Director) AND company:Microsoft NOT title:Assistant school:"Stanford University" AND company:(Google OR Meta) AND title:Engineer profile_language:en AND location:"San Francisco Bay Area" AND past_company:Apple

Pro tip: Use parentheses for complex queries. Combine current_company and past_company to map career paths.

TikTok Username Enumeration

TikTok usernames can be changed but the profile URL numeric ID stays permanent. Finding someone who changed their username:

  1. Use Google dorking: site:tiktok.com "@oldusername"
  2. Check cached pages for the numeric ID in URL
  3. Navigate to tiktok.com/@username to get user ID from page source
  4. Profile ID never changes even when username does

Wireless Network Geolocation (WiGLE)

WiGLE database maps WiFi networks and their physical locations worldwide. If you have:

  • A WiFi network name (SSID)
  • A MAC address from WiFi scan
  • Bluetooth device addresses

You can find approximate physical location. Useful when investigating where photos were taken based on visible WiFi networks.

URL: wigle.net

Cached Page Analysis

Don't just look at cached pages. COMPARE them:

  • Use diff tools to see exactly what changed between snapshots
  • Deleted text often reveals what someone wants hidden
  • Compare Wayback Machine dates to significant events (lawsuits, scandals)
  • Check robots.txt history to see what they're blocking now vs before

Tool: CachedView pulls from multiple cache sources simultaneously.

Image Reverse Search Chaining

Don't just reverse search once. Chain your searches:

  1. Start with Google Reverse Image Search
  2. Take the OLDEST result and search that on Yandex
  3. Find different version? Search THAT on TinEye
  4. Download highest resolution found, search on Bing Visual
  5. Each engine has different databases and algorithms

Why it works: Original images propagate across the internet. Each search engine indexes different corners of the web.

Sock Puppet Account Best Practices

Creating believable fake accounts for investigation requires discipline:

  • Never mix: Use dedicated browser profiles, separate VPN, unique email
  • Age the account: Create weeks before using, add gradual activity
  • Steal legitimacy: Use real person's public info (with permission) or composite identities
  • Match the platform: Instagram needs photos, LinkedIn needs work history
  • Engagement pattern: Like/comment on unrelated content to build algorithmic trust

Warning: Check your jurisdiction's laws on digital impersonation.

Browser Fingerprinting Detection

Even with VPN/Tor, your browser has a unique fingerprint. Test and reduce it:

  • Test sites: amiunique.org, deviceinfo.me, browserleaks.com
  • What they see: Canvas fingerprint, WebGL, fonts, screen resolution, timezone
  • Mitigation: Use Tor Browser (best), Firefox with resistFingerprinting, or Brave's fingerprint randomization
  • Avoid: Browser extensions (they increase uniqueness), rare screen resolutions, custom fonts

Finding Real IPs Behind Cloudflare

Cloudflare hides origin servers. Techniques to find the real IP:

  • Subdomain scanning: mail.example.com often not behind Cloudflare
  • Historical DNS: Check SecurityTrails for pre-Cloudflare IPs
  • SSL certificates: Certificate Transparency logs show IPs that served the cert
  • Email headers: Send email to site contact, check X-Originating-IP header
  • Censys/Shodan: Search for unique page content, find servers serving it

Google Dorking for Exposed Data

Advanced Google search operators to find leaked information:

site:pastebin.com "password" "@company.com" filetype:pdf "confidential" site:target.com intitle:"index of" "parent directory" "config.php" inurl:"/admin/login.php" site:*.edu site:linkedin.com "email" "@target.com" AND "mobile"

Explanation: Combine operators to narrow down exposed files, login pages, directory listings, and contact info.

Email Pattern Discovery

Companies use predictable email formats. Once you know one email, you can guess others:

  1. Find one employee email (from signature, LinkedIn, company site)
  2. Identify pattern: firstname.lastname@, first.last@, flast@, firstnamel@
  3. Use Hunter.io or RocketReach to verify pattern
  4. Apply pattern to other employees from LinkedIn
  5. Verify deliverability without sending: use email verification APIs

Bonus: Email permutation tools like EmailHippo generate all possible formats.

Geolocation from Photos Without GPS

Even with GPS data stripped, photos reveal location through visual clues:

  • Architecture: Building styles specific to regions
  • Signage: Language, fonts, regulatory signs (speed limits, parking)
  • Vegetation: Plant species narrow down climate zones
  • Infrastructure: Power lines, road markings, license plates
  • Shadows: Sun angle indicates latitude and time of day

Tools: GeoGuessr skills transfer here. Cross-reference with Google Street View.

Audio Forensics for Verification

Audio files contain hidden metadata and forensic traces:

  • Metadata: ExifTool works on audio files too (recorder type, timestamps)
  • Background noise: Ambient sounds reveal location (traffic, birds, language)
  • Spectrograms: Visualize audio, sometimes hidden images in sound (steganography)
  • Voice comparison: Use Praat software for waveform/pitch analysis

Free tool: Audacity (spectrogram view) and Sonic Visualiser

Phone Number Intelligence

Phone numbers reveal more than you'd think:

  • Area code: Original registration location (even if portable)
  • Carrier lookup: Identifies VOIP vs real mobile numbers
  • HLR lookup: Home Location Register shows if number is active
  • WhatsApp check: Number registered? See profile pic and status
  • SignalHire/RocketReach: Reverse lookup to find associated person

CLI tool: PhoneInfoga automates most of this.

WHOIS History & Domain Relationships

Current WHOIS data is often privacy-protected. Historical WHOIS reveals original owners:

  • DomainTools: Historical WHOIS lookups (paid but sometimes free preview)
  • WHOXY: Search by registrant email to find all related domains
  • Reverse WHOIS: Find all domains registered by same person/org
  • Registrar patterns: Related sites often use same registrar/name server

Pastebin & Leaked Data Monitoring

Sensitive data gets dumped to paste sites regularly:

  • Pastebin, Ghostbin, Rentry: Search for company names, domains, emails
  • PasteLert: Set alerts for keywords appearing in new pastes
  • Dehashed/LeakCheck: Aggregated breach data search
  • IntelX: Darknet paste sites and forums

Google dork: site:pastebin.com "@targetdomain.com"

URL Shortener Resolution

Shortened URLs hide the destination. Expand them safely:

  • Add + to end: bit.ly/abc123+ shows preview page
  • Unshorten services: unshorten.me, urlex.org, checkshorturl.com
  • cURL command: curl -sI shortened-url | grep -i location
  • Browser extensions: Unshorten.link auto-expands on hover

Security tip: Never click shortened URLs directly. Always check destination first.

Cryptocurrency Blockchain Analysis

Crypto transactions are public. Track wallet activity:

  • Blockchain explorers: Etherscan (Ethereum), Blockchain.com (Bitcoin)
  • Wallet clustering: Group addresses by common ownership patterns
  • Exchange identification: Large wallets often belong to known exchanges
  • Transaction graphs: Visualize flow of funds between addresses

Tools: OXT.me (Bitcoin), Chainalysis Reactor (pro), GraphSense

Academic & Research Intelligence

Find someone's research, publications, collaborations:

  • Google Scholar: Publication history, citation count, co-authors
  • ORCID: Unique researcher ID, links all publications
  • ResearchGate: Social network for academics, often includes full-text papers
  • Semantic Scholar: AI-powered research paper search
  • Sci-Hub: Access paywalled papers (gray area legally)

About This Platform

This is a curated hub of OSINT tools organized for accuracy and ease of use. Everything is structured cleanly so investigators can find what they need without noise or clutter. Clear layout. Reliable resources. A straightforward space designed for real investigative workflows.

Beginner OSINT Tools

Start with three foundational OSINT tools ideal for new investigators:

GitHub Code Search — Code exposure & repository pivots

Free

Code exposure & repository pivots.

SherlockEye — Broad OSINT search

Free

Broad OSINT search.

Webmii — People search pivoting

Free

People search pivoting.

URL: Webmii

Test My OSINT Skills

Free

Self-assessment quiz with 10 real OSINT investigation scenarios. Test your knowledge of tools and techniques. Automated scoring with completion certificate for perfect scores. Immediate feedback on your performance.

URL: Take Quiz

Test Your Coding Skills

Free

Command-line challenge quiz with 10 CLI questions. Test your knowledge of Sherlock, Nmap, grep, curl, ExifTool, and other OSINT command-line tools. Automated scoring with certificate for perfect scores.

OSINT Framework

Free

Visual mind-map of OSINT resources organized by category. Navigate through hundreds of tools by use case: username, email, domain, social networks, people search, and more. Interactive tree structure lets you explore categories and discover tools you didn't know existed.

ShadowDragon Free OSINT Tools

Free

Curates investigative tools across multiple intelligence disciplines. Acts as a discovery resource for analysts expanding their toolkit. Maintained by professional OSINT vendor.

Best Used For: Finding and exploring additional OSINT tools.

Frequently Asked Questions

What is The OSINT Vault?

A browser-based OSINT platform offering proprietary tools, workflows, and curated intelligence resources for investigators and analysts.

Are the tools free to use?

Yes — all core tools on The OSINT Vault are free and accessible directly in your browser.

Who created The OSINT Vault?

The platform was founded and operated by Nicole Hurey, an OSINT tool developer and investigative workflow designer.

What types of investigations can these tools support?

They support reconnaissance, digital footprinting, people search, metadata analysis, reporting, and structured intelligence gathering.