Introduction to OSINT
Open-source intelligence is a workflow, not a single tool. Investigators start with a question, collect identifiers, and pivot through public sources to build a defensible narrative. The most effective OSINT operations combine precision search, multi-platform pivoting, evidence capture, and disciplined reporting. The OSINT Vault provides workflow tools such as the OSINT Multi-Search Launcher, the Google Dork Generator, the OSINT Bookmarklet Library, and the Report Composer to structure those steps.
This guide lists 100 widely used OSINT tools, grouped by investigation type. Each entry includes a primary link to the official tool and a secondary link to a relevant pillar page that explains how investigators use the tool in real workflows. For deeper methodology, start with the OSINT Handbook.
To keep this guide actionable, each category includes tools that investigators routinely use in active cases. Some tools specialize in discovery, while others validate findings or preserve evidence. The goal is to show the full investigative chain rather than a single stage.
Email intelligence tools
Email investigations are foundational in OSINT. The tools below help investigators discover where an email appears, validate identity pivots, and cross-reference breach data with public profiles. For methodology, use the Email OSINT Guide.
- Hunter.io — Finds company-associated email patterns and domain contacts for targeted verification. Official site. Email OSINT Guide.
- Epieos — Provides email-based pivoting to social and account exposure signals. Official site. Email OSINT Guide.
- IntelX — Deep search platform for leaked data and public references tied to emails. Official site. Email OSINT Guide.
- Have I Been Pwned — Breach exposure check for validating compromised email history. Official site. Email OSINT Guide.
- DeHashed — Breach intelligence search for identifiers, passwords, and related pivots. Official site. Email OSINT Guide.
- EmailRep — Reputation and risk signals for suspicious email addresses. Official site. Email OSINT Guide.
- VoilaNorbert — Email discovery and verification for corporate investigations. Official site. Email OSINT Guide.
- Snov.io — Email discovery and enrichment for B2B investigations. Official site. Email OSINT Guide.
- RocketReach — Email and contact enrichment for corporate entities. Official site. Email OSINT Guide.
- Clearbit Connect — Email enrichment and company data lookup. Official site. Email OSINT Guide.
- MXToolbox — Email domain infrastructure checks and MX validation. Official site. Email OSINT Guide.
- Skymem — Public email search within indexed pages. Official site. Email OSINT Guide.
- Anymail Finder — Email discovery for organizations and individuals. Official site. Email OSINT Guide.
- MailTester — Email validation and deliverability check without messaging. Official site. Email OSINT Guide.
- FullContact — Identity enrichment based on email and social signals. Official site. Email OSINT Guide.
- LeakCheck — Breach search for emails and associated identifiers. Official site. Email OSINT Guide.
- BreachDirectory — Searchable breach database for email exposure. Official site. Email OSINT Guide.
- That’s Them — Public lookup tool for email-linked identity signals. Official site. Email OSINT Guide.
- PeopleDataLabs — Email enrichment for corporate investigations and profiling. Official site. Email OSINT Guide.
- Gravatar — Email-based avatar lookup for profile discovery. Official site. Email OSINT Guide.
Investigators should treat breach data as a lead, not a conclusion. Pair breach hits with public references, then document the validation chain in a structured report.
Username investigation tools
Username workflows focus on identity reuse and cross-platform validation. These tools help investigators discover where a handle appears and collect signals for verification. For methodology, use the Username OSINT Guide.
- Sherlock — Open-source username search across hundreds of platforms. Official site. Username OSINT Guide.
- Maigret — OSINT username investigation framework with broad platform coverage. Official site. Username OSINT Guide.
- WhatsMyName — Community-curated username platform list. Official site. Username OSINT Guide.
- Namechk — Checks username availability across major platforms. Official site. Username OSINT Guide.
- KnowEm — Username discovery with brand and handle monitoring. Official site. Username OSINT Guide.
- Blackbird — Username enumeration across multiple services. Official site. Username OSINT Guide.
- Snoop — Username OSINT framework that checks a wide range of sites. Official site. Username OSINT Guide.
- Namecheckr — Username availability and discovery across web platforms. Official site. Username OSINT Guide.
- Instant Username — Rapid username availability scanning. Official site. Username OSINT Guide.
- UserSearch — Web-based username aggregation across multiple platforms. Official site. Username OSINT Guide.
- Social Searcher — Social mention search for usernames and keywords. Official site. Username OSINT Guide.
- GitHub Search — Developer platform search for usernames and repos. Official site. Username OSINT Guide.
- GitLab Search — Open source repo search for user profiles. Official site. Username OSINT Guide.
- Reddit Search — Platform search for username activity. Official site. Username OSINT Guide.
- Keybase — Identity proofs and username-linked cryptographic claims. Official site. Username OSINT Guide.
- Disqus — Comment platform that exposes public usernames and profile links. Official site. Username OSINT Guide.
- Steam Community Search — Gaming platform search that surfaces usernames and IDs. Official site. Username OSINT Guide.
- About.me — Profile aggregation service useful for username and bio pivots. Official site. Username OSINT Guide.
- Flickr Search — Photo sharing platform where usernames can reveal visual trails. Official site. Username OSINT Guide.
- Medium Search — Public blogging search for handles and author profiles. Official site. Username OSINT Guide.
Username results must be validated with profile signals, timelines, and overlaps. Do not merge identities without corroboration.
Phone intelligence tools
Phone investigations connect online identities to contact infrastructure. These tools focus on validation, carrier metadata, and public listings. For methodology, use the Phone OSINT Guide.
- PhoneInfoga — Open-source phone OSINT framework for carrier and metadata analysis. Official site. Phone OSINT Guide.
- Truecaller — Caller identification and public number lookup service. Official site. Phone OSINT Guide.
- NumVerify — Phone validation API for line type and carrier checks. Official site. Phone OSINT Guide.
- Twilio Lookup — Carrier and line-type enrichment for phone numbers. Official site. Phone OSINT Guide.
- CarrierLookup — Rapid carrier metadata check for US numbers. Official site. Phone OSINT Guide.
- OpenCNAM — Caller name lookup supporting phone attribution checks. Official site. Phone OSINT Guide.
- Whitepages — Public directory for phone listings and associated records. Official site. Phone OSINT Guide.
- FastPeopleSearch — Public records search with phone and address pivots. Official site. Phone OSINT Guide.
- USPhoneBook — Directory search for phone-to-identity pivots. Official site. Phone OSINT Guide.
- That’s Them — People search tool with phone-based lookup. Official site. Phone OSINT Guide.
- Spokeo — Aggregated people search and phone intelligence. Official site. Phone OSINT Guide.
- Intelius — Identity lookup with phone-based records. Official site. Phone OSINT Guide.
- ZabaSearch — Public search engine for phone and address data. Official site. Phone OSINT Guide.
- NumLookup — US number lookup and validation. Official site. Phone OSINT Guide.
- Nomorobo Lookup — Spam and robocall identification for numbers. Official site. Phone OSINT Guide.
- Telnyx Number Lookup — Carrier and portability intelligence. Official site. Phone OSINT Guide.
- Veriphone — Phone validation with carrier and region data. Official site. Phone OSINT Guide.
- National Cellular Directory — US directory lookup for mobile numbers. Official site. Phone OSINT Guide.
- Sync.ME — Caller ID and crowdsourced number insights. Official site. Phone OSINT Guide.
- TruePeopleSearch — People lookup with phone pivots. Official site. Phone OSINT Guide.
Phone intelligence should be handled cautiously. Some directory sites are noisy; always validate with multiple sources before reporting.
Image and visual verification tools
Image tools focus on authenticity checks, metadata extraction, and locating original sources. These tools help investigators verify images tied to profiles, listings, and claims. For methodology, use the Image OSINT Guide.
- Google Images — Broad reverse image search for locating reuse across the web. Official site. Image OSINT Guide.
- Bing Visual Search — Microsoft’s visual search engine for reverse lookup. Official site. Image OSINT Guide.
- Yandex Images — Reverse image search with strong facial and object detection. Official site. Image OSINT Guide.
- TinEye — Image matching engine with historical results. Official site. Image OSINT Guide.
- PimEyes — Face search engine for public image discovery. Official site. Image OSINT Guide.
- FotoForensics — Error level analysis for detecting image manipulation. Official site. Image OSINT Guide.
- ExifTool — Metadata extraction utility for images and media. Official site. Image OSINT Guide.
- Jeffrey’s Image Metadata Viewer — Web-based EXIF parsing for quick metadata checks. Official site. Image OSINT Guide.
- InVID Verification Plugin — Video and image verification toolkit. Official site. Image OSINT Guide.
- ImgOps — Multi-engine image search and analysis gateway. Official site. Image OSINT Guide.
- Forensically — Browser-based forensic filters for images. Official site. Image OSINT Guide.
- Microsoft Photos Metadata Viewer — Local metadata inspection for image files. Official site. Image OSINT Guide.
- Reverse Image Search (Labnol) — Multi-engine reverse search tool. Official site. Image OSINT Guide.
- PhotoDNA (concept reference) — Hash-based image matching for known content. Official site. Image OSINT Guide.
- Karma Decay — Reddit-focused reverse image lookup. Official site. Image OSINT Guide.
- Search by Image (browser extension) — Multi-search reverse image extension. Official site. Image OSINT Guide.
- Flickr API — Searchable image database for attribution and reuse. Official site. Image OSINT Guide.
- Wikimedia Commons — Public image database for source comparisons. Official site. Image OSINT Guide.
- OpenStreetMap Image Layers — Geospatial context for visual verification. Official site. Image OSINT Guide.
- Mapillary — Street-level image database useful for location confirmation. Official site. Image OSINT Guide.
Image results should be treated as leads and validated through context. Capture metadata and preserve the original file whenever possible.
Blockchain investigation tools
Blockchain OSINT helps investigators trace wallet activity, validate transaction history, and map on-chain relationships. These tools are useful when a case involves cryptocurrency or wallet attribution. For methodology, use the OSINT Handbook.
- Etherscan — Ethereum blockchain explorer for wallet and transaction analysis. Official site. OSINT Handbook.
- Blockchain.com Explorer — Bitcoin explorer with transaction and address data. Official site. OSINT Handbook.
- Blockchair — Multi-chain explorer with analytics and address profiling. Official site. OSINT Handbook.
- BTC.com Explorer — Bitcoin blockchain explorer with transaction details. Official site. OSINT Handbook.
- Blockstream Explorer — Bitcoin and Liquid explorer for UTXO analysis. Official site. OSINT Handbook.
- Mempool.space — Bitcoin mempool and fee analysis with transaction insights. Official site. OSINT Handbook.
- Ethplorer — Token and wallet explorer for Ethereum assets. Official site. OSINT Handbook.
- BitInfoCharts — Blockchain statistics and address activity charts. Official site. OSINT Handbook.
- Tokenview — Multi-chain explorer with address and token intelligence. Official site. OSINT Handbook.
- BSCScan — Binance Smart Chain explorer for transactions and contracts. Official site. OSINT Handbook.
- Polygonscan — Polygon network explorer for on-chain analysis. Official site. OSINT Handbook.
- Arbiscan — Arbitrum network explorer for transaction tracing. Official site. OSINT Handbook.
- Tronscan — TRON blockchain explorer with wallet and token data. Official site. OSINT Handbook.
- Solscan — Solana explorer for address and token analysis. Official site. OSINT Handbook.
- Solana Explorer — Official Solana network explorer. Official site. OSINT Handbook.
- CardanoScan — Cardano blockchain explorer for address tracing. Official site. OSINT Handbook.
- Litecoin Explorer — Litecoin blockchain search and transaction data. Official site. OSINT Handbook.
- XRPSCAN — XRP Ledger explorer for wallet monitoring. Official site. OSINT Handbook.
- Bitcoin Visuals — Network-level Bitcoin analytics and charts. Official site. OSINT Handbook.
- OXT — Bitcoin transaction graphing and address analysis. Official site. OSINT Handbook.
Blockchain investigations require careful interpretation. Transaction flows are visible, but attribution still requires off-chain evidence and controlled assumptions.
How to use this list
Start with the investigation question and select tools that fit your pivot. If the case begins with an email, use the email tools and the Email OSINT Guide to structure the workflow. For username pivots, follow the Username OSINT Guide and confirm overlaps before concluding identity. Phone and image investigations require careful context preservation, so follow the Phone OSINT Guide and Image OSINT Guide for defensible documentation.
Use the OSINT Vault workflow tools to keep evidence consistent. The Google Dork Generator standardizes precision search, the Multi-Search Launcher runs pivots quickly, the OSINT Bookmarklet Library captures evidence, and the Report Composer turns evidence into a defensible report.
Finally, document uncertainty. Investigations fail when analysts over-claim. The workflow should make uncertainty visible, not hide it. That is how OSINT becomes defensible and repeatable.