Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
non-typical-OSINT-guide
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!
https://github.com/OffcierCia/non-typical-OSINT-guide
Last synced: about 18 hours ago
JSON representation
-
Understanding OSINT Fundamentals, according to [VEEXH](https://wondersmithrae.medium.com/a-beginners-guide-to-osint-investigation-with-maltego-6b195f7245cc):
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Alessandra Adina
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- advanced search
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- twitter.com/UKOSINT
- www.reddit.com/r/OSINT
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- answering
- A system for organizing, collecting, and presenting open-source intelligence
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - _k4eBBl79sqmZFs) and respectfully. - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- 15 tools you should know as a security analyst
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- OSINT: How to find information on anyone
- Introduction to OSINT
- How to Use OSINT in Cybersecurity
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- datashare.icij.org
- Pinpoint
- dtsearch.com
- Venator
- Start.me
- capacities.io
- reorproject.org
- canarytokens.org
- Universal Search
- obsidian.md
- Intercepter-NG
- metadata2go.com
- suip.biz
- How to Use OSINT to Detect Data Leaks and Breaches
- Alessandra Adina
- OSINT: How to find information on anyone
- OSINT — Beginner’s Guide (Part 1)
- Introduction to OSINT
- OSINT: FOUNDATIONS
- How to Improve Cyber Attack Detection Using Social Media?
- Are you leaking information on the web? Use these tools to find out
- OSINT: Data Leaks and Data Breaches
- OSINT with gOSINT
- OSINT (OPEN-SOURCE INTELLIGENCE) - become hard to hack!
- GitHub OSINT Topic
- SOCMINT – or rather OSINT of social media
- List of OSINT Web Resources
- How to find - Robot
- Password Game
- How to Use OSINT in Cybersecurity
- OSINT Tools - Airtable
- OSINT - HUMINT
- OSINT List
- botster.io/bots Crawling
- Yet another awesome OSINT list
- Curated OSINT List
- researchaide.org
- Cryptocurrency OSINT
- Awesome On-Chain Investigations HandBook
- Geoestimation
- Investigator tools
- Rawsec's CyberSecurity Inventory
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- leakix.net
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Exploring the Dark Side: OSINT Tools and Techniques for Unmasking Dark Web Operations
- How to find the exact location of phone, tablet or PC
- osint-mindset.gitbook.io
- Discord OSINT Toolset
- Discord OpSec for servers
- If you have been scammed…
- Navigation (my articles)
- OpSec Going Smart
- OpSec Going Smarter
- OpSec Going Smarter: Secure Smartphones
- Choosing a Reliable VPN Provider for Life & Work
- An ultimate list of rules any on-chain survivor should follow to stay safe!
- QR Code: An Underestimated Danger
- The most significant milestones in the development of communications
- 17Ydx9m7vrhnx4XjZPuGPMqrhw3sDviNTU - BTC
- My Blog on Mirror
- How to win the war, trick the KGB and protect your crypto-assets from theft by Steganography
- Attacks via a Representative Sample : Myths and Reality
- Telegram & Discord Security Best Practices
- 0xB25C5E8fA1E53eEb9bE3421C59F6A66B786ED77A - search?search=officercia.eth)
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Dork Yourself Before Someone Does!
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- A system for organizing, collecting, and presenting open-source intelligence
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- Introduction to OSINT
- OSINT: How to find information on anyone
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Introduction to OSINT
- OSINT: How to find information on anyone
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- GEOGUESSR
- SunCalc Calculator
- Mind Hacks – Psychological profiling, and mental health in OSINT investigations
- A Method for Teaching Open Source Intelligence (OSINT) Using Personalised Cloud-based Exercises
- Alternate Reality Game
- reddit.com/r/ARG
- Attack Simulations Method: Example
- The RIS Open Source Intelligence Cycle
- Net.art
- Applied Anthropology Research Methods
- Reflections on Becoming an Applied Anthropologist
- Applied Anthopology (really, study it!)
- SCP researchers
- How I found early Solana ecosystem Developers using OSINT tactics
- The Hitchhiker’s Guide to Online Anonymity
- Dork Yourself Before Someone Does!
- Act like a Lion 🦁
- Improve Fast Reaction: Techniques to Enhance Your Reflexes
- The most skilled analysts in Open-Source Intelligence (OSINT) can make mistakes, but it is important to anticipate and revisit these in order to avoid them!
- Peering into the Mind: Psychological Profiling Through AI and Large Language Models..
- Occam’s razor
- How Occam's Razor Works
- Occam's Razor as a Scientific Principle
- CASE STUDY: Personality Profiling and the Power of OSINT
- An Enriched Threat Intelligence Platform for improving OSINT correlation, analysis, visualization and sharing capabilities
- 'Deduction' vs. 'Induction' vs. 'Abduction'
- The Difference Between Deductive and Inductive Reasoning
- Induction Rhetoric
- Deductive and Inductive Reasoning: Definition, Differences & Examples
- Privacy Concerns and Acceptance Factors of OSINT for Cybersecurity: A Representative Survey
- What Are Heuristics?
- Call of PSYOPS
- OSINT Trends for 2023 and Beyond
- The Wide-Ranging Uses of OSINT in Military Intelligence
- Publicly Available Information (PAI) Explained
- Publicly Available information: The Digital Battlefield
- Better Utilizing Publicly Available Information
- Practices of Science: False Positives and False Negatives
- False Positives and False Negatives in Information Security
- Minimize False Positives in Your OSINT Investigations
- Cognitive Bias Mitigation
- Cognitive bias mitigation - Wiki
- Recognizing and Mitigating Cognitive Biases: A Threat to Objectivity
- Cognitive Bias Mitigation: How to Make Decision-Making Rational?
- The Impact of Cognitive Biases on Professionals’ Decision-Making: A Review of Four Occupational Areas
- HARKing: hypothesizing after the results are known
- Hypothesizing after the results are known (HARKing)
- Cognitive vulnerability
- Why do we focus on one characteristic to compare when choosing between alternatives? - the-best-heuristic/)
- IARPA's plan to hack the brains of hackers
- Are Cyber Attackers Thinking Fast and Slow?
- DMBOK2
- US Comission Report - 2005
- 5 Cognitive Biases could affect your OSINT investigations
- Intuition Is More Than Just A Hunch, Says New Research
- Intuition as Emergence: Bridging Psychology, Philosophy and Organizational Science
- Intelligence Analysis: Structured Methods or Intuition?
- The Potential of Integrating Intelligence and Intuition
- Social Engineering and the Protection of High-Value Targets
- Trace My Shadow Game
- What we talk about when we talk about OSINT
- The Power of Shutting Down Your Senses: How to Boost Your Creativity and Have a Clear Mind
- Publicly Available Information: The Secret to Unclassified Data, Part I - available-information-the-secret-to-unclassified-data-part-i/)
- Improve Your Memory With a Simple Diffuser From eBay
- Latest Trends in SOCMINT, OSINT & Cyber-Psychology
- 5 Cognitive Biases That Could Affect Your OSINT Investigations
- Citizen OSINT Analysts: Motivations of Open-Source Intelligence Volunteers
- New guide on investigating and mapping perpetrators in open-source investigations
- Cchatgpt-unlock-geolocation-data
- An Overseas Businessman Died and Left Me $4.6M, So I Used OSINT & Social Engineering to Scam a Scammer
- Telegram-osint-vm-part-2
- Studies in Intelligence
- Beginners Field Guide: Where & How to Learn OSINT
- Traps used by cyber detectives…
- MAC Address Investigation
- The ULTIMATE Guide to Writing Intelligence Reports…
- OSINT Wiki
- Business Resilience Resources
- Person OSINT investigation workflow from a privacy perspective
- Setting Your Moral Compass: A Workbook for Applied Ethics in OSINT
- Reddit Bureau of Investigation
- The Dark Arts of OSINT
- Criminals Language from a Psycholinguistics point of view
- USING LANGUAGE ANALYSIS FOR IDENTIFYING AND ASSESSING OFFENDERS
- Forensic Psycholinguistics Using Language Analysis for Identifying and Assessing
- A system for organizing, collecting, and presenting open-source intelligence
- The Ultimate Guide to Human Intelligence (HUMINT)
- Undermining social engineering using open source intelligence gathering
- Signal OSINT - SIGINT
- From Dissent to OSINT? Understanding, Influencing, and Protecting Roles, Reputation, and Revenue
- The Basics: What is e-Discovery?
- Googledorking
- Searchlightosint
- Shodan
- Geolocatingimages
- Instruments-on-the-radio-waves
- Somesint
- OSINT At Home YouTube Playlist
- myosint.training
- OSINT
- Wikipedia:Wiki Game
- twitter.com/dutch_osintguy
- twitter.com/jakecreps
- The Sleuth Sheet
- OSINT Essentials
- Sector035
- Igor S. Bederov
- twitter.com/OSINTHK
- A global OSINT Community
- twitter.com/OSINT_Research
- twitter.com/OSINTtechniques
- twitter.com/OsintJobs - jobs in OSINT
- Channels about OSINT, Hacking, Security and so on
- In addition to its traditional function of enabling less miscalculated decisions, - how reservoir and improvisation pool to resolve matters in times of unexpected crises.
- Google Hacking
- GOSI: GIAC Open Source Intelligence
- SEC487: Open-Source Intelligence (OSINT) Gathering and Analysis
- Inteltechniques.net
- forensicdots.de
- Meta-secret App
- 15 tools you should know as a security analyst
- The Internet Intelligence & Investigation Handbook
- NATO OSINT HandBook
- osintnewsletter.com
- Yet another awesome OSINT book
- Fascinating Search Engines That Search for Faces
- OSINT Tools MegaList
- Future of OSINT: People Searching with ChatGPT
- Geolocation: At The Retail Park
- In recent years, public interest in open-source intelligence gathering and analysis
- gpt.censys.io
- ChatGPT for OSINT: Example
- Emoji OSINT
- Advangle
- searchcode.com
- dorkgpt.com
- OSINT & ChatGPT: 103 Ideas
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Do not treat a tool like a silver buller for all task!
- The New OSINT Cheat Code: ChatGPT
- Harnessing the Power of ChatGPT for OSINT: A Practical Guide to Your AI OSINT Assistant
- Bitcoin Investigation Manual AML
- analyzing images - 3.5156,3/2022.05.05/12:15/1/3), or measuring mountain [peak size](https://www.peakfinder.org/) in order to perform private detective investigations. Or, let's say, doing OSINT in crypto, for example, in which case your motivation will be money and self-fulfillment... Or [searching for rare stories](https://www.atlasobscura.com/articles/buying-volcanoes-robert-ripley-paricutin-whakaari.amp) even!
- Read my channel if you like this topic - INT](https://medium.com/@ibederov_en/mac-address-osint-e539504ae925) which is growing day-by-day right now. For GEOINT skills training I suggest checking [geoguessr.com](https://geoguessr.com/) & [whereami.io](https://whereami.io/).
- Open-Source Intelligence (OSINT) Reconnaissance
- Ultimate OSINT
- Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT!
- Follow!
- Comparing OSINT Typosquatting Tools like DNSTwist, DNSRazzle against Bolster’s Typosquatting monitoring
- * What’s that font?
- OSINT Cheatsheet
- The Application of Abductive and Retroductive Inference for the Design and Analysis of Theory-Driven Sociological Research
- Abduction as an Aspect of Retroduction
- Abduction as an Aspect of Retroduction - 2
- Abductive reasoning
- read this channel - OSINT](https://github.com/soxoj/counter-osint-guide-en) bros. But in doing so, I urge you not to forget the key skills of information retrieval, information analytics, and information application...
- How to learn anything.
- HUMINT VS Social Engineering Resources
- From oblivion to illumination. Part 1 | On the line of creativity and defense
- 5 Ways OSINT Can Help Your Career! - Knowmad OSINT
- The Art of Attack
- Ontology Population for Open-Source Intelligence
- Cryptography & OSINT - The fundamentals
- Use Zero-Width Characters to Hide Secret Messages in Text (& Even Reveal Leaks)
- OSINT: username search tool
- Geolocation Challenge Writeup
- ChatGPT-osint Tool
- DozoR Team Night Game
- Codebreaking
- GeoCaching
- Escapology
- Ingress
- Geocaching
- Escapology
- Security Tips & Devices for Digital Nomads
- kasescenarios.com
- Sourcing.games
- OSINT Exercise #018
- spyingchallenge.com
- 10 Beginner OSINT CTF Solutions
- More OSINT CTFs
- OSINT Challenges List - Reddit
- 2 great OSINT Training Tools
- OSINT-Related Games - Reddit
- The 10 best location-based games
- 7 Geolocation Games to Get You Exploring the Outdoors
- Location-based game
- What is a Fox Hunt in Ham Radio?
- 9 Virtual Games to Play When You Can't Be Together
- Intelligence in the internet age: The emergence and evolution of Open Source Intelligence (OSINT)
- A Guide to Open-Source Intelligence (OSINT)
- Intelligent evidence: Using open source intelligence (OSINT) in criminal proceedings
- The Intelligence Cycle: Generating OSINT from OSINF
- OSINT Films List
- SEARCHING
- The Most Hated Man on the Internet
- Why Did You Kill Me?
- Web of Make Believe: Death, Lies and the Internet
- Don't F**k With Cats: Hunting an Internet Killer
- Reddit Ruined Their Lives: The Innocent Victims Of Internet Justice
- Cyber Hell: Exposing an Internet Horror
- Who Am I - Kein System ist sicher
- The History of Analog Horror
- Dark Web: Cicada 3301
- Movie 43 (LOL)
- Mr. Robot
- Open Windows
- Män som hatar kvinnor
- Open Source Intelligence, commonly referred to as OSINT,
- Any cool movies related to OSINT?
- OSINT Movies List
- OSINT Movie Time for the Holidays
- The best films about OSINT
- Intelligence Television and Movies About Spies, Spying, Intelligence and Espionage
- DOD film list – spreadsheet version
- Week in OSINT 2020-12
- ARG SubReddit
- OSINT SubReddit
- John Doe Strikes Again
- Measurement and Signature Intelligence (MASINT)
- One Search To Rule Them All – Boolean Searches For Images
- SOC Puppet Creation Guide
- The Three Types of Intelligence for Threat Intelligence: A Comprehensive Guide
- Unmasking OSINT: A Data Aggregation Journey
- My recently read OSINT & security books – recommendations
- The Open Source Intelligence Analysis Bookshelf
- 7 OSINT Books Every Analyst Should Read
- Books by Michael Bazzell
- The Official CIA Manual of Trickery and Deception — H. Keith Melton, Robert Wallace (2009) - cia-manual-of-trickery-and-deception/)
- Bestselling Books by Kevin Mitnick
- Spycraft
- Ultimate Spy
- Zettelkasten Method With Obsidian- How to Take Smart Notes
- Setting Up a Zettelkasten in Obsidian: More Than a Note-Taking App
- obsidian-zettelkasten
- Getting started with Zettelkasten
- front-running/tailgating
- "There's No Such Thing As Open Source Intelligence"
- Actually a great book about attacks & defenses
- OSINT Guide – Open Source Intelligence
- The Art of Proactive Defense: Mastering Threat Hunting with OSINT Tools
- The Missing Semester of Your OSINT Education
- AaronCTI's OSINT Resource Collection
- anonfriendly.com
- I'll show you how to make money using OSINT
- osintjobs.sociallinks.io
- Join an already existing crew...
- strategytribe.io
- Part-time tasks
- Detect Personal Information Leakage With OSINT Attack Surface Management
- mullvad.net/en/browser
- lampyre.io
- cylect.io
- tazeros.com/webanalytics
- meta-webtools.com
- app.shadowmap.org
- Automated Website Takedown
- OSINT+ChatGPT PDF
- geohints.com
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- ChatGPT + OSINT
- Bonus OSINT Twitter Crypto toolset
- tgscanrobot
- velociraptor.app
- Web3/NFT OSINT
- maigret_osint_bot
- telesint_bot
- Twitter to TG bot
- Awesome TG channel
- Top OSINT sources and vishing pretexts from DEF CON’s social engineering competition
- Uncovering Hidden Connections: Using Maltego Holehe to Map Out a Person’s Digital Footprint
- As practice shows
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Using ddg.gg for OSINT
- cybdetective.substack.com
- Espionage PDF
- Hacktoria — Human Traffickers
- Password OSINT
- Using AI to Develop Realistic Sock Puppet Accounts
- ARCHIVING & OSINT
- Visualizing Darknet
- Open Source Intelligence: The Beginners’ Guide to OSINT
- DarkNet OSINT Guide
- OPEN SOURCE INTELLIGENCE TOOLS AND RESOURCES HANDBOOK 2020
- Information Operations Recognition: from Nonlinear Analysis to Decision-making
- OSINT Analysis of the TOR Foundation
- Top 10 OSINT Tools for Nickname Investigation
- Password OSINT
- Remember, Your task for this - _k4eBBl79sqmZFs) and respectfully. - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- iplogger.org
- Alessandra Adina
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Detect Personal Information Leakage With OSINT Attack Surface Management
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- Alessandra Adina
- Dork Yourself Before Someone Does!
- wondersmith_rae - day analysis and can be used as a foundation for an investigation. **(Who, what, when, where, why, in what way, by what means)**
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- OSINT Inception
- Lock-Picking
- geodetective.io Training
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Password OSINT
- Remember, Your task for this - [Ron Kaminsky](https://medium.com/@ronkaminskyy/from-zero-to-sherlock-the-ultimate-osint-adventure-5f9d8c45ae2)
- OSINT: How to find information on anyone
- Introduction to OSINT
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Ron Kaminsky - the-digital-detective-essential-osint-tools-and-techniques-for-investigators-adf486ad2ccd) the vast amount of data available in open sources has opened up new possibilities and transformed the investigative landscape. By utilizing OSINT tools effectively, investigators can save time, gather comprehensive information, and uncover connections that may have otherwise remained hidden. The techniques and methodologies explored in this guide provide a roadmap for conducting thorough and successful OSINT investigations.
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- metaosint.github.io
- How to Become an Open-Source Intelligence (OSINT) Investigator
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- OSINT: How to find information on anyone
- Introduction to OSINT
- How to Use OSINT in Cybersecurity
- Alessandra Adina
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- How can you become a one-man-army OSINT specialist?
- Dork Yourself Before Someone Does!
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- ChatGPT: The AI-Powered Secret Weapon for OSINT
- Detect Personal Information Leakage With OSINT Attack Surface Management
- GoldenOwl - checking tools, staying updated on disinformation techniques, collaborating with trusted communities, educating others, [maintaining ethical standards](https://osintteam.blog/safeguarding-osinters-shielding-against-disinformation-manipulation-dfbbfbf1db08), and cross-checking information, OSINTers can fortify themselves against manipulation and uphold the integrity of their research.
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- E-Discovery, Forensics, and Open Source Intelligence in Legal Research
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Netstalking: In-Depth
- Cognitive vulnerabilities of the practitioner-analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Alessandra Adina
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Alessandra Adina
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Alessandra Adina
- OSINT: How to find information on anyone
- Introduction to OSINT
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- A system for organizing, collecting, and presenting open-source intelligence
- 15 tools you should know as a security analyst
- StreetCLIP
- Using OSINT Search Engines To Collect Cyber Threat Intelligence
- Human Touch in Digital Defense: Virtual HUMINT’s Battle Against Cyber Threats
- From Zero to Google Dorking Hero: Enhancing Your OSINT Arsenal
- Alessandra Adina
- OSINT: How to find information on anyone
- Introduction to OSINT
-
Uncategorized
-
Uncategorized
- So You Think You Can Google? - Workshop With Henk van Ess
- OSINT Origins #1 - Jean-Marc Manach/@manhack
- OSINT Lesson №1: Mind-Mapping
- OSINT Lesson №2: Occam’s Razor & Intuition
- OSINT Lesson №3: AI, ChatGPT & Choosing a Pathway to Follow
- Dork yourself before “someone” does
- OSINT + Crypto
- Also posted here!
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- On-Chain Investigations Handbook
- Awesome Intelligence
- WhatBreach
- More OpSec Studies
- A definitive guide to generating usernames for OSINT purposes
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Also posted here!
- Boston bombing: How internet detectives got it very wrong
- OSINT? WTF??
- How to know when to stop
- How to Become a 1000 Year Old Vampire
- How To Learn Fast
- How to Use Mind Maps to Unleash Your Brain's Creativity and Potential
- Can everybody do OSINT?
- Vicarious trauma
- osint.sh All in One OSINT Tools List
- The Not Yet Exploited Goldmine of OSINT: Opportunities, Open Challenges and Future Trends
- Intelligence Studies: Types of Intelligence Collection
- Understanding the Different Types of Intelligence Collection Disciplines
- A History of OSINT: From Informing Spies to Detecting Lies
- Rverse Image Search
- OSINT Is A State Of Mind
- Cognitive Bias and Critical Thinking in Open Source Intelligence (OSINT) - _Benjamin_Brown.pdf)
- A Brief History of Open Source Intelligence
- How OSINT powered the largest criminal investigation in US history
- Meet the Blockchain Detectives Who Track Crypto’s Hackers and Scammers
- How I investigate crypto hacks and security incidents: A-Z
- The Beginner’s Guide to Open-Source Intelligence (OSINT): Techniques and Tools
- SERM
- ORM
- Examples of opsec and privacy fails when doing OSINT
- Basic OPSEC Tips & Tricks for OSINT researchers
- The Osint Me ultimate guide to Telegram OSINT and privacy
- Dork yourself before “someone” does
- So You Think You Can Google? - Workshop With Henk van Ess
- OSINT Origins #1 - Jean-Marc Manach/@manhack
- Resisting Deterministic Thinking
- Mind-map
- Gitmind Tool
- What do you need to become an intermediate OSINTer? How can Shodan contribute to OSINT investigations?
- First Steps to Getting Started in Open Source Research
- Everything about Open Source Intelligence and OSINT Investigations
- Top OSINT & Infosec Resources for You and Your Team (2022 Edition): 100+ Blogs, Podcasts, YouTube, Books, and more!
- A Beginner’s Guide to OSINT Investigation with Maltego
- Maltego - Cyber Weapons Lab - Research like an OSINT Analyst
- Free Digital Badges for learning / developing OSINT Skills
- Tips To Encourage Your Child To Participate In Extracurricular Activities
- What skills do you need to be good at chess + how to improve it.
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Special «Blockchain Investigations» Compilation
- Dork yourself before “someone” does
- Also posted here!
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Also posted here!
- Dork yourself before “someone” does
- An Awesome OSINT Mind-map
- Open Source Intelligence Investigation: From Strategy to Implementation
- Basic OPSEC Tips & Tricks for OSINT researchers
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
- Dork yourself before “someone” does
-
Programming Languages
Categories
Sub Categories
Keywords
osint
4
awesome
2
awesome-list
2
geopolitics
1
economics
1
cybersecurity
1
crypto
1
awesome-lists
1
awesome-intelligence
1
visualization
1
tether
1
on-chain-investigation
1
on-chain-analysis
1
investigation
1
ethereum
1
due-diligence
1
blockchain
1
bitcoin
1
awsome-lists
1
awesome-readme
1
username-generator
1
username-checker
1
transformations
1
socmint
1
permutations-and-combinations
1
permutations
1
pentesting
1
guide
1
generators
1
generator
1
emails
1
domains
1
breaches
1
breach
1
tor
1
terrorism
1
stocks
1
malware
1
hacktoberfest2024
1
aml
1