non-typical-OSINT-guide
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!
https://github.com/OffcierCia/non-typical-OSINT-guide
Last synced: 2 days ago
JSON representation
-
Uncategorized
-
Uncategorized
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- OSINT Is A State Of Mind
- Dork yourself before “someone” does
- OSINT Lesson №2: Occam’s Razor & Intuition
- Dork yourself before “someone” does
- OSINT + Crypto
- Also posted here!
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- On-Chain Investigations Handbook
- Awesome Intelligence
- WhatBreach
- More OpSec Studies
- A definitive guide to generating usernames for OSINT purposes
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- The Beginner’s Guide to Open-Source Intelligence (OSINT): Techniques and Tools
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Also posted here!
- Boston bombing: How internet detectives got it very wrong
- OSINT? WTF??
- How to know when to stop
- How to Become a 1000 Year Old Vampire
- How To Learn Fast
- How to Use Mind Maps to Unleash Your Brain's Creativity and Potential
- Can everybody do OSINT?
- Vicarious trauma
- osint.sh All in One OSINT Tools List
- The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
- Intelligence Studies: Types of Intelligence Collection
- Understanding the Different Types of Intelligence Collection Disciplines
- A History of OSINT: From Informing Spies to Detecting Lies
- Dork yourself before “someone” does
- Rverse Image Search
- OSINT Is A State Of Mind
- Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) - _Benjamin_Brown.pdf)
- A Brief History of Open Source Intelligence
- How OSINT powered the largest criminal investigation in US history
- How I investigate crypto hacks and security incidents: A-Z
- The Beginner’s Guide to Open-Source Intelligence (OSINT): Techniques and Tools
- Meet the Blockchain Detectives Who Track Crypto’s Hackers and Scammers
- SERM
- ORM
- Examples of opsec and privacy fails when doing OSINT
- Basic OPSEC Tips & Tricks for OSINT researchers
- The Osint Me ultimate guide to Telegram OSINT and privacy
- Dork yourself before “someone” does
- So You Think You Can Google? - Workshop With Henk van Ess
- OSINT Origins #1 - Jean-Marc Manach/@manhack
- Resisting Deterministic Thinking
- Mind-map
- Gitmind Tool
- What do you need to become an intermediate OSINTer? How can Shodan contribute to OSINT investigations?
- First Steps to Getting Started in Open Source Research
- Everything about Open Source Intelligence and OSINT Investigations
- Top OSINT & Infosec Resources for You and Your Team (2022 Edition): 100+ Blogs, Podcasts, YouTube, Books, and more!
- A Beginner’s Guide to OSINT Investigation with Maltego
- Maltego - Cyber Weapons Lab - Research like an OSINT Analyst
- Free Digital Badges for learning / developing OSINT Skills
- Tips To Encourage Your Child To Participate In Extracurricular Activities
- What skills do you need to be good at chess + how to improve it.
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- OSINT Lesson №3: AI, ChatGPT & Choosing a Pathway to Follow
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Special «Blockchain Investigations» Compilation
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Dork yourself before “someone” does
- An Awesome OSINT Mind-map
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Open Source Intelligence Investigation: From Strategy to Implementation
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- So You Think You Can Google? - Workshop With Henk van Ess
- OSINT Origins #1 - Jean-Marc Manach/@manhack
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- OSINT Lesson №1: Mind-Mapping
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- An Awesome OSINT Mind-map
- Maltego - Cyber Weapons Lab - Research like an OSINT Analyst
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Basic OPSEC Tips & Tricks for OSINT researchers
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Vicarious trauma
- How To Learn Fast
- Gitmind Tool
- What do you need to become an intermediate OSINTer? How can Shodan contribute to OSINT investigations?
- Maltego - Cyber Weapons Lab - Research like an OSINT Analyst
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- So You Think You Can Google? - Workshop With Henk van Ess
- OSINT Origins #1 - Jean-Marc Manach/@manhack
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
-
-
Understanding OSINT Fundamentals, according to [VEEXH](https://wondersmithrae.medium.com/a-beginners-guide-to-osint-investigation-with-maltego-6b195f7245cc):
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Password OSINT
- Information Operations Recognition: from Nonlinear Analysis to Decision-making
- OSINT Analysis of the TOR Foundation
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- advanced search
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- twitter.com/UKOSINT
- www.reddit.com/r/OSINT
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- 15 tools you should know as a security analyst
- answering
- Detect Personal Information Leakage With OSINT Attack Surface Management
- A system for organizing, collecting, and presenting open-source intelligence
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - _k4eBBl79sqmZFs) and respectfully. - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- 15 tools you should know as a security analyst
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Detect Personal Information Leakage With OSINT Attack Surface Management
- Password OSINT
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- OSINT: How to find information on anyone
- Introduction to OSINT
- How to Use OSINT in Cybersecurity
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Dork Yourself Before Someone Does!
- Safeguarding OSINTers: Shielding Against Disinformation Manipulation
- Unveiling the Digital Detective: Essential OSINT Tools and Techniques for Investigators.
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- The Art of Proactive Defense: Mastering Threat Hunting with OSINT Tools
- Detect Personal Information Leakage With OSINT Attack Surface Management
- meta-webtools.com
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- datashare.icij.org
- Pinpoint
- dtsearch.com
- Venator
- Start.me
- capacities.io
- reorproject.org
- obsidian.md
- canarytokens.org
- Universal Search
- Intercepter-NG
- metadata2go.com
- suip.biz
- OSINT: FOUNDATIONS
- How to Use OSINT to Detect Data Leaks and Breaches
- OSINT: How to find information on anyone
- Introduction to OSINT
- OSINT — Beginner’s Guide (Part 1)
- How to Improve Cyber Attack Detection Using Social Media?
- Are you leaking information on the web? Use these tools to find out
- OSINT: Data Leaks and Data Breaches
- OSINT with gOSINT
- Alessandra Adina
- OSINT - HUMINT
- How to Use OSINT in Cybersecurity
- OSINT (OPEN-SOURCE INTELLIGENCE) - become hard to hack!
- GitHub OSINT Topic
- SOCMINT – or rather OSINT of social media
- List of OSINT Web Resources
- How to find - Robot
- Password Game
- OSINT Tools - Airtable
- OSINT List
- researchaide.org
- botster.io/bots Crawling
- Yet another awesome OSINT list
- Curated OSINT List
- Cryptocurrency OSINT
- Awesome On-Chain Investigations HandBook
- Investigator tools
- Rawsec's CyberSecurity Inventory
- Geoestimation
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- leakix.net
- Exploring the Dark Side: OSINT Tools and Techniques for Unmasking Dark Web Operations
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- How to find the exact location of phone, tablet or PC
- osint-mindset.gitbook.io
- Discord OSINT Toolset
- Discord OpSec for servers
- If you have been scammed…
- Navigation (my articles)
- OpSec Going Smart
- OpSec Going Smarter
- OpSec Going Smarter: Secure Smartphones
- Choosing a Reliable VPN Provider for Life & Work
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- QR Code: An Underestimated Danger
- The most significant milestones in the development of communications
- 0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A - search?search=officercia.eth)
- 17Ydx9m7vrhnx4XjZPuGPMqrhw3sDviNTU - BTC
- Telegram & Discord Security Best Practices
- How to win the war, trick the KGB and protect your crypto-assets from theft by Steganography
- My Blog on Mirror
- Attacks via a Representative Sample : Myths and Reality
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Password OSINT
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- GEOGUESSR
- SunCalc Calculator
- Mind Hacks – Psychological profiling, and mental health in OSINT investigations
- A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based Exercises
- The RIS Open Source Intelligence Cycle
- Alternate Reality Game
- reddit.com/r/ARG
- Attack Simulations Method: Example
- Net.art
- Applied Anthropology Research Methods
- Reflections on Becoming an Applied Anthropologist
- Applied Anthopology (really, study it!)
- SCP researchers
- How I found early Solana ecosystem Developers using OSINT tactics
- The Hitchhiker’s Guide to Online Anonymity
- Dork Yourself Before Someone Does!
- Act like a Lion 🦁
- Improve Fast Reaction: Techniques to Enhance Your Reflexes
- The most skilled analysts in Open-Source Intelligence (OSINT) can make mistakes, but it is important to anticipate and revisit these in order to avoid them!
- Peering into the Mind: Psychological Profiling Through AI and Large Language Models..
- Occam’s razor
- How Occam's Razor Works
- Occam's Razor as a Scientific Principle
- CASE STUDY: Personality Profiling and the Power of OSINT
- An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities
- 'Deduction' vs. 'Induction' vs. 'Abduction'
- The Difference Between Deductive and Inductive Reasoning
- Induction Rhetoric
- Deductive and Inductive Reasoning: Definition, Differences & Examples
- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
- What Are Heuristics?
- Call of PSYOPS
- OSINT Trends for 2023 and Beyond
- The Wide-Ranging Uses of OSINT in Military Intelligence
- Publicly Available Information (PAI) Explained
- Publicly Available information: The Digital Battlefield
- Better Utilizing Publicly Available Information
- Practices of Science: False Positives and False Negatives
- False Positives and False Negatives in Information Security
- Minimize False Positives in Your OSINT Investigations
- Cognitive bias mitigation - Wiki
- Cognitive Bias Mitigation
- Recognizing and Mitigating Cognitive Biases: A Threat to Objectivity
- Cognitive Bias Mitigation: How to Make Decision-Making Rational?
- The Impact of Cognitive Biases on Professionals’ Decision-Making: A Review of Four Occupational Areas
- HARKing: hypothesizing after the results are known
- Hypothesizing after the results are known (HARKing)
- Cognitive vulnerability
- Why do we focus on one characteristic to compare when choosing between alternatives? - the-best-heuristic/)
- IARPA's plan to hack the brains of hackers
- Are Cyber Attackers Thinking Fast and Slow?
- DMBOK2
- US Comission Report - 2005
- 5 Cognitive Biases could affect your OSINT investigations
- Intuition Is More Than Just A Hunch, Says New Research
- Intuition as Emergence: Bridging Psychology, Philosophy and Organizational Science
- Intelligence Analysis: Structured Methods or Intuition?
- The Potential of Integrating Intelligence and Intuition
- Social Engineering and the Protection of High-Value Targets
- What we talk about when we talk about OSINT
- Trace My Shadow Game
- Improve Your Memory With a Simple Diffuser From eBay
- Latest Trends in SOCMINT, OSINT & Cyber-Psychology
- The Power of Shutting Down Your Senses: How to Boost Your Creativity and Have a Clear Mind
- Publicly Available Information: The Secret to Unclassified Data, Part I - available-information-the-secret-to-unclassified-data-part-i/)
- 5 Cognitive Biases That Could Affect Your OSINT Investigations
- Citizen OSINT Analysts: Motivations of Open-Source Intelligence Volunteers
- An Overseas Businessman Died and Left Me $4.6M, So I Used OSINT & Social Engineering to Scam a Scammer
- New guide on investigating and mapping perpetrators in open-source investigations
- Cchatgpt-unlock-geolocation-data
- Telegram-osint-vm-part-2
- Studies in Intelligence
- Traps used by cyber detectives…
- Beginners Field Guide: Where & How to Learn OSINT
- MAC Address Investigation
- The ULTIMATE Guide to Writing Intelligence Reports…
- The Dark Arts of OSINT
- Business Resilience Resources
- Person OSINT investigation workflow from a privacy perspective
- Setting Your Moral Compass: A Workbook for Applied Ethics in OSINT
- Reddit Bureau of Investigation
- OSINT Wiki
- Criminals Language from a Psycholinguistics point of view
- USING LANGUAGE ANALYSIS FOR IDENTIFYING AND ASSESSING OFFENDERS
- Forensic Psycholinguistics Using Language Analysis for Identifying and Assessing
- The Basics: What is e-Discovery?
- A system for organizing, collecting, and presenting open-source intelligence
- The Ultimate Guide to Human Intelligence (HUMINT)
- Undermining social engineering using open source intelligence gathering
- Signal OSINT - SIGINT
- From Dissent to OSINT? Understanding, Influencing, and Protecting Roles, Reputation, and Revenue
- Googledorking
- Searchlightosint
- Shodan
- Geolocatingimages
- Instruments-on-the-radio-waves
- Somesint
- OSINT At Home YouTube Playlist
- myosint.training
- OSINT
- Wikipedia:Wiki Game
- twitter.com/dutch_osintguy
- twitter.com/jakecreps
- The Sleuth Sheet
- OSINT Essentials
- Sector035
- Igor S. Bederov
- twitter.com/OSINTtechniques
- twitter.com/OSINTHK
- A global OSINT Community
- twitter.com/OsintJobs - jobs in OSINT
- twitter.com/OSINT_Research
- Channels about OSINT, Hacking, Security and so on
- In addition to its traditional function of enabling less miscalculated decisions, - how reservoir and improvisation pool to resolve matters in times of unexpected crises.
- Google Hacking
- GOSI: GIAC Open Source Intelligence
- SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
- Inteltechniques.net
- forensicdots.de
- Meta-secret App
- 15 tools you should know as a security analyst
- The Internet Intelligence & Investigation Handbook
- NATO OSINT HandBook
- osintnewsletter.com
- Yet another awesome OSINT book
- In recent years, public interest in open-source intelligence gathering and analysis
- Fascinating Search Engines That Search for Faces
- OSINT Tools MegaList
- Future of OSINT: People Searching with ChatGPT
- Geolocation: At The Retail Park
- gpt.censys.io
- ChatGPT for OSINT: Example
- Emoji OSINT
- Advangle
- searchcode.com
- dorkgpt.com
- OSINT & ChatGPT: 103 Ideas
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Do not treat a tool like a silver buller for all task!
- The New OSINT Cheat Code: ChatGPT
- Harnessing the Power of ChatGPT for OSINT: A Practical Guide to Your AI OSINT Assistant
- Bitcoin Investigation Manual AML
- analyzing images - 3.5156,3/2022.05.05/12:15/1/3), or measuring mountain [peak size](https://www.peakfinder.org/) in order to perform private detective investigations. Or, let's say, doing OSINT in crypto, for example, in which case your motivation will be money and self-fulfillment... Or [searching for rare stories](https://www.atlasobscura.com/articles/buying-volcanoes-robert-ripley-paricutin-whakaari.amp) even!
- Read my channel if you like this topic - INT](https://medium.com/@ibederov_en/mac-address-osint-e539504ae925) which is growing day-by-day right now. For GEOINT skills training I suggest checking [geoguessr.com](https://geoguessr.com/) & [whereami.io](https://whereami.io/).
- Open-Source Intelligence (OSINT) Reconnaissance
- Ultimate OSINT
- Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!
- Follow!
- Comparing OSINT Typosquatting Tools like DNSTwist, DNSRazzle against Bolster’s Typosquatting monitoring
- * What’s that font?
- OSINT Cheatsheet
- The Application of Abductive and Retroductive Inference for the Design and Analysis of Theory-Driven Sociological Research
- Abduction as an Aspect of Retroduction
- Abduction as an Aspect of Retroduction - 2
- Abductive reasoning
- read this channel - OSINT](https://github.com/soxoj/counter-osint-guide-en) bros. But in doing so, I urge you not to forget the key skills of information retrieval, information analytics, and information application...
- From oblivion to illumination. Part 1 | On the line of creativity and defense
- How to learn anything.
- HUMINT VS Social Engineering Resources
- 5 Ways OSINT Can Help Your Career! - Knowmad OSINT
- The Art of Attack
- Ontology Population for Open-Source Intelligence
- Cryptography & OSINT - The fundamentals
- Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)
- OSINT: username search tool
- Geolocation Challenge Writeup
- ChatGPT-osint Tool
- DozoR Team Night Game
- Codebreaking
- GeoCaching
- Escapology
- Ingress
- Geocaching
- Escapology
- Security Tips & Devices for Digital Nomads
- kasescenarios.com
- Sourcing.games
- OSINT Exercise #018
- spyingchallenge.com
- 10 Beginner OSINT CTF Solutions
- More OSINT CTFs
- OSINT Challenges List - Reddit
- 2 great OSINT Training Tools
- OSINT-Related Games - Reddit
- The 10 best location-based games
- 7 Geolocation Games to Get You Exploring the Outdoors
- Location-based game
- What is a Fox Hunt in Ham Radio?
- 9 Virtual Games to Play When You Can't Be Together
- Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT)
- A Guide to Open-Source Intelligence (OSINT)
- Intelligent evidence: Using open source intelligence (OSINT) in criminal proceedings
- The Intelligence Cycle: Generating OSINT from OSINF
- OSINT Films List
- SEARCHING
- The Most Hated Man on the Internet
- Why Did You Kill Me?
- Web of Make Believe: Death, Lies and the Internet
- Don't F**k With Cats: Hunting an Internet Killer
- Reddit Ruined Their Lives: The Innocent Victims Of Internet Justice
- Cyber Hell: Exposing an Internet Horror
- Who Am I - Kein System ist sicher
- The History of Analog Horror
- Dark Web: Cicada 3301
- Movie 43 (LOL)
- Mr. Robot
- Män som hatar kvinnor
- Open Source Intelligence, commonly referred to as OSINT,
- Any cool movies related to OSINT?
- OSINT Movies List
- OSINT Movie Time for the Holidays
- The best films about OSINT
- Intelligence Television and Movies About Spies, Spying, Intelligence and Espionage
- DOD film list – spreadsheet version
- Week in OSINT 2020-12
- ARG SubReddit
- OSINT SubReddit
- John Doe Strikes Again
- Measurement and Signature Intelligence (MASINT)
- One Search To Rule Them All – Boolean Searches For Images
- SOC Puppet Creation Guide
- The Three Types of Intelligence for Threat Intelligence: A Comprehensive Guide
- Unmasking OSINT: A Data Aggregation Journey
- My recently read OSINT & security books – recommendations
- The Open Source Intelligence Analysis Bookshelf
- 7 OSINT Books Every Analyst Should Read
- Books by Michael Bazzell
- The Official CIA Manual of Trickery and Deception — H. Keith Melton, Robert Wallace (2009) - cia-manual-of-trickery-and-deception/)
- Ultimate Spy
- Spycraft
- Bestselling Books by Kevin Mitnick
- Zettelkasten Method With Obsidian- How to Take Smart Notes
- Setting Up a Zettelkasten in Obsidian: More Than a Note-Taking App
- obsidian-zettelkasten
- Getting started with Zettelkasten
- front-running/tailgating
- "There's No Such Thing As Open Source Intelligence"
- Actually a great book about attacks & defenses
- OSINT Guide – Open Source Intelligence
- The Art of Proactive Defense: Mastering Threat Hunting with OSINT Tools
- The Missing Semester of Your OSINT Education
- AaronCTI's OSINT Resource Collection
- anonfriendly.com
- I'll show you how to make money using OSINT
- osintjobs.sociallinks.io
- Join an already existing crew...
- strategytribe.io
- Part-time tasks
- Detect Personal Information Leakage With OSINT Attack Surface Management
- mullvad.net/en/browser
- lampyre.io
- cylect.io
- tazeros.com/webanalytics
- geohints.com
- meta-webtools.com
- app.shadowmap.org
- Automated Website Takedown
- OSINT+ChatGPT PDF
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- ChatGPT + OSINT
- Bonus OSINT Twitter Crypto toolset
- tgscanrobot
- velociraptor.app
- Web3/NFT OSINT
- maigret_osint_bot
- telesint_bot
- Twitter to TG bot
- Awesome TG channel
- cybdetective.substack.com
- Top OSINT sources and vishing pretexts from DEF CON’s social engineering competition
- As practice shows
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Using ddg.gg for OSINT
- Uncovering Hidden Connections: Using Maltego Holehe to Map Out a Person’s Digital Footprint
- Espionage PDF
- Hacktoria — Human Traffickers
- Password OSINT
- Using AI to Develop Realistic Sock Puppet Accounts
- ARCHIVING & OSINT
- Visualizing Darknet
- Open Source Intelligence: The Beginners’ Guide to OSINT
- DarkNet OSINT Guide
- OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020
- Information Operations Recognition: from Nonlinear Analysis to Decision-making
- OSINT Analysis of the TOR Foundation
- Top 10 OSINT Tools for Nickname Investigation
- Remember, Your task for this - _k4eBBl79sqmZFs) and respectfully. - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Password OSINT
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Detect Personal Information Leakage With OSINT Attack Surface Management
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Alessandra Adina
- wondersmith_rae - day analysis and can be used as a foundation for an investigation. **(Who, what, when, where, why, in what way, by what means)**
- Dork Yourself Before Someone Does!
- OSINT Inception
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Lock-Picking
- geodetective.io Training
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- metaosint.github.io
- How to Become an Open-Source Intelligence (OSINT) Investigator
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- How to Use OSINT in Cybersecurity
- How can you become a one-man-army OSINT specialist?
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Detect Personal Information Leakage With OSINT Attack Surface Management
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Netstalking: In-Depth
- Cognitive vulnerabilities of the practitioner-analyst
- E-Discovery, Forensics, and Open Source Intelligence in Legal Research
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- StreetCLIP
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Mind Hacks – Psychological profiling, and mental health in OSINT investigations
- OpSec researches and data terminals - contributions are welcome.
- Dork Yourself Before Someone Does!
- obsidian.md OSINT Templates
- The most skilled analysts in Open-Source Intelligence (OSINT) can make mistakes, but it is important to anticipate and revisit these in order to avoid them!
- Deductive and Inductive Reasoning: Definition, Differences & Examples
- Minimize False Positives in Your OSINT Investigations
- Social Engineering and the Protection of High-Value Targets
- Safeguarding OSINTers: Shielding Against Disinformation Manipulation
- Unveiling the Digital Detective: Essential OSINT Tools and Techniques for Investigators.
- A system for organizing, collecting, and presenting open-source intelligence
- New-Generation OSINT Framework
- Python for OSINT 21 days
- OSINT At Home YouTube Playlist
- Awesome Cyber Skills
- Awesome Maps
- Google Hacking
- SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
- 15 tools you should know as a security analyst
- Sherlock
- ChatGeoPT
- Advangle
- OSINT + AI
- OSINT - SAN
- OSINT Buddy
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Awesome Free ChatGPT
- CavalierGPT
- A collection of several hundred online tools for OSINT
- Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!
- Counter OSINT Guide
- PainlessPeek Tool - GEOINT
- Querytool
- Best Tool For Information Gathering 🔎
- spyingchallenge.com
- Counter OSINT
- SEARCHING
- The Most Hated Man on the Internet
- Why Did You Kill Me?
- Web of Make Believe: Death, Lies and the Internet
- Don't F**k With Cats: Hunting an Internet Killer
- Reddit Ruined Their Lives: The Innocent Victims Of Internet Justice
- Cyber Hell: Exposing an Internet Horror
- Who Am I - Kein System ist sicher
- The History of Analog Horror
- Movie 43 (LOL)
- Open Windows
- Män som hatar kvinnor
- Offensive OSINT Tools
- Ultimate Spy
- Awesome OSINT
- OSINT Guide
- osintjobs
- www.jobprotocol.xyz
- Detect Personal Information Leakage With OSINT Attack Surface Management
- TinyCheck
- osintui
- OSINT for Countries
- meta-webtools.com
- dnstwist
- GVision
- Social Media OSINT Tools Collection
- Data Journalism Resources
- Digital Forensics Guide
- Bellingcat hackathon - stratosphere Project
- osint-Brazil
- spiderfoot
- Inpaint-Anything
- Maltego Transforms List
- OSINT open-source tools catalogue
- Template for new OSINT command-line tools
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Awesome Telegram OSINT
- Remember, Your task for this - _k4eBBl79sqmZFs) and respectfully. - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- A next-generation crawling and spidering framework
- E4GL30S1NT
- Awesome-chatgpt
- Intercepter-NG
- Awesome Deblurring
- Alessandra Adina - makers to take appropriate actions based on their findings. While different organisations use variations on different intelligence cycles, a popular one is a five-step cycle: **Planning, Gathering, Analyzing, Dissemination, and Feedback.**
- OSINT: How to find information on anyone
- Introduction to OSINT
- Are you leaking information on the web? Use these tools to find out
- OrienterNet Visual Localization in 2D Public Maps with Neural Matching
- OSINT-TOOLS-CLI
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- GraphSense Maltego Transform
- osint-mindset.gitbook.io
- Telegram OSINT
- OSINT Discord resources
- TelegramOnlineSpy
- Discord & Telegram OSINT references
- Awesome Discord
- this repository
- SunCalc Calculator
- Mind Hacks – Psychological profiling, and mental health in OSINT investigations
- Alternate Reality Game
- Act like a Lion 🦁
- 'Deduction' vs. 'Induction' vs. 'Abduction'
- The Difference Between Deductive and Inductive Reasoning
- Publicly Available Information: The Secret to Unclassified Data, Part I - available-information-the-secret-to-unclassified-data-part-i/)
- Recognizing and Mitigating Cognitive Biases: A Threat to Objectivity
- The Impact of Cognitive Biases on Professionals’ Decision-Making: A Review of Four Occupational Areas
- 5 Cognitive Biases could affect your OSINT investigations
- Intuition as Emergence: Bridging Psychology, Philosophy and Organizational Science
- The Power of Shutting Down Your Senses: How to Boost Your Creativity and Have a Clear Mind
- Citizen OSINT Analysts: Motivations of Open-Source Intelligence Volunteers
- New guide on investigating and mapping perpetrators in open-source investigations
- The Dark Arts of OSINT
- OSINT Map
- Forensic Psycholinguistics Using Language Analysis for Identifying and Assessing
- A system for organizing, collecting, and presenting open-source intelligence
- OSINT At Home YouTube Playlist
- OSINT
- twitter.com/UKOSINT
- twitter.com/dutch_osintguy
- twitter.com/jakecreps
- twitter.com/OSINTtechniques
- twitter.com/OSINTHK
- A global OSINT Community
- twitter.com/OSINT_Research
- SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
- Image Research OSINT
- Geolocation OSINT
- Social Media OSINT
- Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!
- Follow!
- myosint.training/courses/
- How to learn anything.
- The Art of Attack
- osint.games
- A Guide to Open-Source Intelligence (OSINT)
- SEARCHING
- The Most Hated Man on the Internet
- Why Did You Kill Me?
- Web of Make Believe: Death, Lies and the Internet
- Don't F**k With Cats: Hunting an Internet Killer
- Reddit Ruined Their Lives: The Innocent Victims Of Internet Justice
- Cyber Hell: Exposing an Internet Horror
- The History of Analog Horror
- Dark Web: Cicada 3301
- Movie 43 (LOL)
- Open Windows
- Män som hatar kvinnor
- OSINT Movies List
- Ultimate Spy
- OSINT Guide
- OSINT Guide – Open Source Intelligence
- anonfriendly.com
- osintjobs
- www.jobprotocol.xyz
- Join an already existing crew...
- strategytribe.io
- dorkgenius.com
- ChatGPT + OSINT
- Web3/NFT OSINT
- cybdetective.substack.com
- Advangle
- A system for organizing, collecting, and presenting open-source intelligence
Programming Languages
Categories
Sub Categories
Keywords
osint
23
awesome-list
11
awesome
8
information-gathering
7
cybersecurity
4
pentesting
4
infosec
4
reconnaissance
4
threat-intelligence
4
security
4
hacking
4
cli
3
osint-tools
3
threatintel
3
python
3
osint-tool
3
socmint
3
osint-resources
3
osint-python
3
python3
2
telegram
2
telethon
2
cti
2
privacy
2
forensics
2
redteam
2
rust
2
social-media
2
ethereum
2
blockchain
2
bitcoin
2
osint-framework
2
osint-reconnaissance
2
recon
2
guide
2
bot
2
lookup
2
whois
2
domains
2
tools
2
artificial-intelligence
2
chatgpt
2
curated-list
2
humint
2
social
2
threat-hunting
2
gocrawler
1
free
1
headless
1
spider-framework
1