OSINT Bookmarklet Library for OSINT Investigations

Access 60+ browser-based OSINT tools for instant investigation workflows.

Extract metadata, analyze domains, and pivot across targets without installing software.

Start using bookmarklets directly in your browser below.

About This Tool

This tool is built and maintained by The OSINT Vault and created by Nicole Hurey. It runs directly in your browser and is designed for fast, real-time OSINT workflows without requiring installation.

Built to rank for high-intent OSINT searches, this fully indexable bookmarklet library gives investigators a production-ready set of browser-based utilities. Every bookmarklet is static HTML, security-reviewed, and optimized for investigative workflows without analytics or tracking. Use them to extract metadata, pivot across social platforms, run DNS and WHOIS lookups, and automate reconnaissance without leaving the browser.

Built by Nicole Hurey Client-Side Only Last Updated: 2026-02-27 Version 1.0.0
CTRL + K Search No Tracking SEO-Optimized

What This Tool Does

The OSINT Bookmarklet Library provides browser-based scripts for rapid metadata extraction, page analysis, and investigation pivots.

It keeps workflows client-side and fast for investigators and analysts.

How to Use This Tool

  1. Drag a bookmarklet to your bookmarks bar.
  2. Open a target page and run the bookmarklet.
  3. Review the extracted data and capture evidence.
  4. Document findings in your case file.

Best Use Cases

Investigation Tips

Related Tools

Page Analysis & Metadata Extraction Bookmarklets

Page analysis bookmarklets are used to extract hidden metadata, analytics fingerprints, schema markup, and tag-level evidence without leaving the current tab. Investigators use them to document what a page declares about itself, including structured data, SEO markers, and invisible inputs. These bookmarklets help validate claims during attribution work, track marketing tech for fraud or brand impersonation, and surface technical indicators for follow-on reconnaissance. Every tool below runs locally inside the browser, performs no tracking, and opens only the user-approved outputs. This category is built for fast, repeatable documentation that can be saved directly into case notes.

Meta Tag Extractor Bookmarklet

Version 1.1 • Updated 2026-02-27
Low risk

The Meta Tag Extractor bookmarklet is designed for investigators who need a fast, defensible readout of what a page claims about itself. When executed, it scans every meta tag in the DOM, including standard SEO descriptions, Open Graph fields, Twitter cards, robots directives, and custom properties. The output opens in a clean, local window so analysts can copy evidence directly into a report without relying on developer tools. This matters for attribution and reputation work because metadata often exposes brand impersonation, tracking infrastructure, or mismatched ownership data. Use it during early reconnaissance to capture the current state of a page before it changes. The bookmarklet runs client-side only and does not transmit data anywhere beyond the investigator’s browser. It is rated low risk because it reads existing HTML and displays it to the user without any network side effects, making it safe for rapid triage on sensitive cases.

Use case

Capture SEO and social metadata on a suspicious landing page before it gets updated or removed.

Drag to bookmarks
View source code
javascript:(()=>{const k='osv:meta:ts';const n=Date.now();if(localStorage.getItem(k)&&n-parseInt(localStorage.getItem(k),10)<1500){alert('Please wait before running again.');return;}localStorage.setItem(k,n);const rows=[...document.querySelectorAll('meta')].map(m=>`${m.getAttribute('name')||m.getAttribute('property')||m.getAttribute('http-equiv')||'meta'}: ${m.content||''}`);const win=window.open('','_blank');win.document.write('<pre>'+rows.join('\\n')+'</pre>');})();
osintmetadataseoreconcybersecurity

Analytics ID Finder Bookmarklet

Version 1.0 • Updated 2026-02-27
Medium risk

The Analytics ID Finder bookmarklet identifies the tracking IDs embedded in a page’s JavaScript, giving investigators a quick way to spot shared infrastructure between suspicious sites. When triggered, it scans inline scripts for common analytics identifiers such as Google Analytics, GA4, and Google Tag Manager codes. The results appear in a clean local window for rapid evidence capture. Analysts use this bookmarklet to connect domains owned by the same operator, verify affiliate campaigns, or locate duplicated tracking across cloned phishing pages. It is especially useful in takedown workflows where an investigator needs hard signals that multiple sites are part of a coordinated network. The bookmarklet runs entirely in the browser and only inspects the current DOM, but it is marked medium risk because it reads script contents that may be large and could include sensitive tokens. Use it deliberately on pages where you have authorization to collect technical data.

Use case

Identify shared tracking IDs across a cluster of scam domains to prove a single operator is running them.

Drag to bookmarks
View source code
javascript:(()=>{const k='osv:analytics:ts';const n=Date.now();if(localStorage.getItem(k)&&n-parseInt(localStorage.getItem(k),10)<1500){alert('Please wait before running again.');return;}localStorage.setItem(k,n);const ids=[...document.querySelectorAll('script')].map(s=>s.innerText).join(' ');const matches=[...ids.matchAll(/(UA-\\d{4,}-\\d+|G-[A-Z0-9]{6,}|GT-[A-Z0-9]+)/g)].map(m=>m[0]);const win=window.open('','_blank');win.document.write('<pre>'+(matches.length?matches.join('\\n'):'No analytics IDs found')+'</pre>');})();
osintmetadataanalyticsrecontracking
s.innerText.trim()).filter(Boolean);const win=window.open('','_blank');win.document.write('
'+(json.length?json.join('\\n\\n'):'No schema markup found')+'
');})();" data-search="schema markup viewer bookmarklet osint">

Schema Markup Viewer Bookmarklet

Version 1.0 • Updated 2026-02-27
Low risk

The Schema Markup Viewer bookmarklet surfaces JSON-LD and structured data embedded inside a web page. For investigators, schema provides direct clues about ownership, business locations, contact points, and declared relationships that are often overlooked. This tool extracts every JSON-LD block and renders it in a separate window so the data can be reviewed without digging through source code. It is useful when validating a brand impersonation report, checking if an entity is claiming false affiliations, or verifying that a site actually links to legitimate corporate profiles. Because schema is machine-readable, it can reveal an attacker’s operational footprint or shortcut attribution work. This bookmarklet is rated low risk, as it only reads existing markup and does not perform network requests. It keeps your workflow purely client-side and produces a copy-ready record for case files or evidence logs.

Use case

Review structured data on a suspicious vendor page to verify declared organization details.

s.innerText.trim()).filter(Boolean);const win=window.open('','_blank');win.document.write('
'+(json.length?json.join('\\n\\n'):'No schema markup found')+'
');})();">Drag to bookmarks
View source code
javascript:(()=>{const k='osv:schema:ts';const n=Date.now();if(localStorage.getItem(k)&&n-parseInt(localStorage.getItem(k),10)<1500){alert('Please wait before running again.');return;}localStorage.setItem(k,n);const json=[...document.querySelectorAll('script[type="application/ld+json"]')].map(s=>s.innerText.trim()).filter(Boolean);const win=window.open('','_blank');win.document.write('<pre>'+(json.length?json.join('\\n\\n'):'No schema markup found')+'</pre>');})();
osintmetadataschemaseorecon
`${i.name||'unnamed'} = ${i.value||''}`);const win=window.open('','_blank');win.document.write('
'+(inputs.length?inputs.join('\\n'):'No hidden inputs found')+'
');})();" data-search="hidden input finder bookmarklet osint">

Hidden Input Finder Bookmarklet

Version 1.0 • Updated 2026-02-27
Medium risk

Hidden form inputs often contain campaign identifiers, tracking parameters, and application logic that reveal how a page operates. The Hidden Input Finder bookmarklet captures those fields in seconds, presenting the name-value pairs in a clean, local output window. Investigators use it to discover lead capture workflows, detect hidden tracking, and validate whether a form is routing data to unexpected destinations. It is especially useful during phishing analysis or compliance checks, because hidden inputs can be abused to pass identifiers without user visibility. This bookmarklet does not alter form data or submit anything; it simply reads what is already present. It is rated medium risk because it exposes form fields that may include sensitive values on internal systems, so only run it where you have authorization and a legitimate investigative need.

Use case

Inspect a partner signup page for hidden campaign tracking or routing parameters.

`${i.name||'unnamed'} = ${i.value||''}`);const win=window.open('','_blank');win.document.write('
'+(inputs.length?inputs.join('\\n'):'No hidden inputs found')+'
');})();">Drag to bookmarks
View source code
javascript:(()=>{const k='osv:hidden:ts';const n=Date.now();if(localStorage.getItem(k)&&n-parseInt(localStorage.getItem(k),10)<1500){alert('Please wait before running again.');return;}localStorage.setItem(k,n);const inputs=[...document.querySelectorAll('input[type="hidden"]')].map(i=>`${i.name||'unnamed'} = ${i.value||''}`);const win=window.open('','_blank');win.document.write('<pre>'+(inputs.length?inputs.join('\\n'):'No hidden inputs found')+'</pre>');})();
osintmetadataformsreconsecurity

Page Fingerprint Summary Bookmarklet

Version 1.0 • Updated 2026-02-27
Medium risk

The Page Fingerprint Summary bookmarklet packages a quick forensic snapshot of the current page into a single readable block. It captures the URL, title, language, and referrer and presents them in a JSON-style summary that is easy to copy into investigative notes. Analysts use this tool for triage when responding to reports of impersonation, misinformation, or policy abuse. The point is speed: in seconds you can lock in the basics without opening developer tools or losing focus. This bookmarklet is marked medium risk because it includes referrer data that may expose sensitive navigation context on internal systems, so it should only be run under authorized conditions. It performs no network calls beyond the page you are already viewing. The output helps create consistent evidence logs across investigations and supports repeatable, structured documentation.

Use case

Capture a structured snapshot of a suspicious page for an internal incident report.

Drag to bookmarks
View source code
javascript:(()=>{const k='osv:fingerprint:ts';const n=Date.now();if(localStorage.getItem(k)&&n-parseInt(localStorage.getItem(k),10)<1500){alert('Please wait before running again.');return;}localStorage.setItem(k,n);const info={title:document.title,url:location.href,lang:document.documentElement.lang,referrer:document.referrer};const win=window.open('','_blank');win.document.write('<pre>'+JSON.stringify(info,null,2)+'</pre>');})();
osintmetadatafingerprintreconsecurity

Are These OSINT Bookmarklets Safe?

Yes, when used as intended. Every bookmarklet in this library runs client-side in your browser, performs no background data collection, and does not transmit data to third-party analytics or tracking systems. Each tool is visible, readable, and open to review, which means you can inspect the source before use. Bookmarklets only execute when you click them, and the code is intentionally short to keep the behavior transparent. TheOSINTVault bookmarklets are designed for authorized investigations and public data gathering only. If you are working on sensitive internal systems, use them under your organization’s policy and only where you have permission to collect data.

Update Log & Changelog

2026-02-27: Initial release with 60+ OSINT bookmarklets, structured data markup, and downloadable JSON export.

Frequently Asked Questions

What is an OSINT bookmarklet?

An OSINT bookmarklet is a small JavaScript tool saved as a bookmark that runs investigative actions in the current browser tab.

How do bookmarklets work?

They execute client-side JavaScript on demand, either extracting data from the current page or opening a vetted OSINT lookup in a new tab.

Are bookmarklets safe?

These bookmarklets are client-side only, do not collect data, and are fully transparent. Always inspect code before use on sensitive systems.

How do investigators use browser-based OSINT tools?

Investigators use them for rapid pivots, metadata extraction, and validation while staying inside the browser.

Copied