OSINT Cybersecurity
✧ OPEN SOURCE INTELLIGENCE ✧

OSINT UNCOVERED

15 Essential Tools & How to Use Them

Google Dorking Maltego Shodan theHarvester Intelligence X Censys
✧ CREATED BY RIHAM ✧

TABLE OF CONTENTS

🔍 What is OSINT?

Open Source Intelligence (OSINT) is the systematic collection and analysis of publicly available information to produce actionable intelligence.

Golden rule: Information is not intelligence. Raw data must be verified, correlated, and contextualized.

What qualifies as open source? Websites, social media, DNS records, Shodan, public records, archives, and leaked data (ethically handled).

OSINT Investigation

📌 Where OSINT is Used

User GroupApplications
CybersecurityThreat detection, attack surface mapping, red teaming
Law EnforcementCriminal investigations, missing persons, suspect tracking
JournalismFact-checking, war crimes documentation (Bellingcat)
Corporate SecurityDue diligence, third-party risk, brand protection
Financial/AMLFraud detection, shell company identification
Google Dorking
Search Technique Free
Google Dorking

Advanced search operators that expose invisible data – login panels, config files, exposed documents, and databases.

📘 How to Use:

Use CaseApplication
Penetration TestingDiscover admin panels, backup files, open directories
Breach AssessmentFind publicly indexed database dumps
Competitive IntelUncover competitor's exposed documents
Personal AuditCheck your own domain exposure
Bellingcat Toolkit
Resource Directory Free
Bellingcat Toolkit

Curated OSINT resources from world‑leading investigators – geolocation, image verification, satellite imagery, and more.

📘 How to Use:

Use CaseApplication
War Crimes DocumentationGeolocate conflict videos via satellite imagery
Disinformation DebunkingReverse image search, ELA analysis
Human RightsTrack forced evictions using historical imagery
Maltego
Visual Link Analysis Free CE / Paid
Maltego

Interactive relationship graphs connecting emails, domains, people, IPs, and social media using 100+ data sources.

📘 How to Use:

Use CaseApplication
Cybercrime InvestigationLink emails → social accounts → crypto wallets → infrastructure
Fraud DetectionMap shell companies, nominee directors
Attack Surface MappingVisualize all domains, IPs, certs related to your org
Shodan
IoT Search Free tier / Pro
Shodan

Search engine for internet‑connected devices – webcams, routers, servers, industrial control systems.

📘 How to Use:

Use CaseApplication
Attack Surface ManagementIdentify unauthorized devices, forgotten servers
Vulnerability PrioritizationScan for Log4j, ProxyShell on your IPs
Third‑Party RiskAssess vendor security posture
theHarvester
Email Discovery Open Source
theHarvester

Email, subdomain & employee name harvester from public sources.

📘 How to Use:

theHarvester -d example.com -l 100 -b bing,duckduckgo,threatcrowd
Use CaseApplication
Pentest ReconBuild target list, find staging servers
Phishing AssessmentDiscover exposed employee emails
Shadow ITUncover dev/test subdomains
Intelligence X
Dark Web Archive Free tier / Paid
Intelligence X

Dark web, data leak & historical WHOIS archive. Selector‑based search (email, domain, IP, bitcoin).

📘 How to Use:

Use CaseApplication
Credential ExposureSearch company email domain in breach archives
Dark Web IntelMonitor paste sites without Tor
Historical WHOISRecover pre‑GDPR registration data
Censys
Certificate Search Free / Commercial
Censys

Internet asset & certificate search – stronger on SSL/TLS than Shodan.

📘 How to Use:

Use CaseApplication
Phishing InvestigationCert fingerprint → all malicious domains using same cert
Shadow ITFind unauthorized subdomains with valid certs
Expiry MonitoringCertificates near expiration
OSINT Framework
Resource Directory Free
OSINT Framework

Tree‑structured directory of OSINT tools by information type (username, email, domain, IP).

📘 How to Use:

Use CaseApplication
Investigation PlanningStart with username → see all search resources
Tool DiscoveryFind alternatives to your usual tools
TrainingLearn OSINT categories systematically
BuiltWith
Technology Profiler Free / Pro
BuiltWith

Website technology stack detection – CMS, analytics, hosting, frameworks, email providers.

📘 How to Use:

Use CaseApplication
Vulnerability AssessmentDetect outdated software versions
Competitive AnalysisSee what tech competitors use
Acquisition Due DiligenceProfile target's tech debt
Metagoofil
Metadata Extraction Open Source
Metagoofil

Extracts metadata (authors, usernames, paths, software) from public documents.

📘 How to Use:

metagoofil -d example.com -t pdf,doc,xls -l 30 -o docs/ -f report.html
Use CaseApplication
Credential GuessingExtract username patterns for wordlists
Internal Network MappingDiscover internal server names from document paths
Data LeakageFind confidential documents exposed online
AlienVault OTX
Threat Intelligence Free
AlienVault OTX

Community threat intelligence – IoC pulses (IPs, domains, hashes, TTPs).

📘 How to Use:

Use CaseApplication
Threat HuntingProactively search for IoCs in your environment
Incident ResponsePivot on IP/hash to understand broader campaign
Vulnerability PrioritizationCheck if CVE is actively exploited
SpiderFoot
Automated Correlation Legacy OSS / Paid
SpiderFoot

Automated OSINT correlation across 200+ modules. Note: Open‑source version unmaintained.

📘 How to Use (Legacy):

git clone https://github.com/smicallef/spiderfoot.git && python3 sf.py -l 127.0.0.1:5001
Use CaseApplication
Continuous Attack SurfacePeriodic scans to detect new exposures
M&A AssessmentQuick deep‑dive on acquisition target
Fraud InvestigationConnect fraudulent emails/domains automatically
Ahmia.fi
Tor Search Free
Ahmia.fi

Clearnet search engine for Tor hidden services (.onion). No Tor browser needed.

📘 How to Use:

Use CaseApplication
Data Leak MonitoringSearch your company/domain on .onion leak sites
Dark Web IntelTrack discussions about vulnerabilities
Fraud InvestigationResearch counterfeit markets without Tor
Netcraft
Security Analysis Free
Netcraft Site Report

Security, SSL, hosting history, email authentication (SPF/DKIM/DMARC), phishing reputation.

📘 How to Use:

Use CaseApplication
Phishing InvestigationCheck SSL validity, prior abuse, registrar
Email Security AuditVerify SPF/DMARC configuration
Brand ImpersonationRun report on typosquatted domains
Jake AI
AI‑Integrated Free credits / Paid
Jake AI / MCP Server

Conversational OSINT – ask in plain English: "What domains are on this IP? Show WHOIS history."

📘 How to Use:

Use CaseApplication
Rapid PivotingMulti‑step queries without switching tools
Non‑Tech AnalystsConduct OSINT via natural language
Report GenerationBuild infrastructure profiles conversationally

⚖️ Legal & Ethical Boundaries

✅ Permitted

  • Viewing public content
  • Using official APIs (rate limits)
  • Archiving public information
  • Passive reconnaissance

❌ Not Permitted

  • Bypassing paywalls / authentication
  • Impersonation / deception
  • Violating terms of service
  • Active scanning without authorization

📌 Privacy regulations (GDPR, CCPA) apply. Public information does not mean unrestricted use. Always balance intelligence objectives with reasonable privacy expectations. Verify tool status – many OSS tools become stale.

✧ CREATED BY RIHAM ✧
RIHAM
OSINT Researcher & Cybersecurity Enthusiast
Passionate about open source intelligence, digital forensics, and making investigative techniques accessible to everyone. This resource is dedicated to the global OSINT community — learn, verify, and investigate ethically.

© 2026 · All rights reserved · Free for educational use with attribution

🔍 v2.0 · Last updated: February 2026 · 15 Essential Tools

Built with ❤️ for the OSINT community · Free to share with attribution

OSINT Uncovered · 15 Essential Tools · Created by RIHAM