flashpoint.io Open in urlscan Pro
2606:4700::6812:ee2  Public Scan

URL: https://flashpoint.io/blog/osint-tools-library/
Submission: On November 13 via manual from US — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://flashpoint.io/

<form role="search" method="get" id="searchBox" class="searchbox" action="https://flashpoint.io/">
  <input type="search" placeholder="Search for topics, resources and solutions" value="" name="s" required="">
  <button type="submit" form="searchBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>

GET https://flashpoint.io/

<form role="search" method="get" id="searchScrollBox" class="searchbox" action="https://flashpoint.io/">
  <input type="search" placeholder="What do you want to search for?" value="" name="s" required="">
  <button type="submit" form="searchScrollBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>

POST //translate.googleapis.com/translate_voting?client=te

<form id="goog-gt-votingForm" action="//translate.googleapis.com/translate_voting?client=te" method="post" target="votingFrame" class="VIpgJd-yAWNEb-hvhgNd-aXYTce"><input type="text" name="sl" id="goog-gt-votingInputSrcLang"><input type="text"
    name="tl" id="goog-gt-votingInputTrgLang"><input type="text" name="query" id="goog-gt-votingInputSrcText"><input type="text" name="gtrans" id="goog-gt-votingInputTrgText"><input type="text" name="vote" id="goog-gt-votingInputVote"></form>

Text Content

 * Platform
   Why Flashpoint?
   Learn more about Flashpoint’s products and services.
   Products
    * Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Management (VulnDB)
      Brand Intelligence
      Physical Security Intelligence
      National Security Intelligence
    * Managed Attribution
    * Automate
    * Cyber Risk Analytics
   
   Services
    * Threat Response & Readiness
    * Professional Services
    * Managed Intelligence
    * Tailored Reporting
    * Curated Alerting
    * Request for Information (RFI)
    * Data-as-a-Service

 * Solutions
   By Threats and Risks
      
    * Account Takeover
    * Ransomware
    * Protective Intelligence
   
   By Industry
    * Financial Services
    * Retail
    * Healthcare & Pharmaceuticals
    * Technology
    * Public Sector & National Security

 * Resources
   Case study
   
   How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
    * Threat Intel Blog
    * Events & Webinars
    * Resource Library
    * Cybersecurity Glossary
    * Partners

 * Company
      
    * About Us
    * Careers
    * News
    * Contact Us

 * Free trial
 * Log in
 * ▼
 * 


Why Flashpoint?
* Products
  * Flashpoint Ignite
    * Cyber Threat Intelligence
    * Vulnerability Management (VulnDB)
    * Physical Security Intelligence
    * National Security Intelligence
  * Managed Attribution
  * Automate
* Services
  * Ransomware Attack Response and Readiness
  * Professional Services
  * Tailored Reporting
  * Curated Alerting
  * Managed Intelligence
  * Request for Information
Solutions
* By Threats and Risks
  * Account Takeover
  * Ransomware and Data Extortion
  * Protective Intelligence
* By Industry
  * Financial Services
  * Retail
  * Healthcare & Pharmaceutical
  * Technology
  * Public Sector & National Security
Resource Library
* Threat Intelligence Blog
* Events & Webinars
* Resource Library
* Cybersecurity & Intelligence 101
* Partner With Flashpoint
Company
* About Us
* Flashpoint Careers
* Flashpoint News
* Contact Us



 * Platform
   Why Flashpoint?
   Learn more about Flashpoint’s products and services.
   Products
    * Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Management (VulnDB)
      Brand Intelligence
      Physical Security Intelligence
      National Security Intelligence
    * Managed Attribution
    * Automate
    * Cyber Risk Analytics
   
   Services
    * Threat Response & Readiness
    * Professional Services
    * Managed Intelligence
    * Tailored Reporting
    * Curated Alerting
    * Request for Information (RFI)
    * Data-as-a-Service

 * Solutions
   By Threats and Risks
      
    * Account Takeover
    * Ransomware
    * Protective Intelligence
   
   By Industry
    * Financial Services
    * Retail
    * Healthcare & Pharmaceuticals
    * Technology
    * Public Sector & National Security

 * Resources
   Case study
   
   How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
    * Threat Intel Blog
    * Events & Webinars
    * Resource Library
    * Cybersecurity Glossary
    * Partners

 * Company
      
    * About Us
    * Careers
    * News
    * Contact Us

 * Free trial
 * Log in
 * 
 * 




Blogs

BLOG


OSINT TOOLS LIBRARY

A constantly updated list of web-based OSINT tools and techniques from across
the open-source intelligence community, curated by Flashpoint

SHARE THIS:
Flashpoint
January 13, 2023

Table Of Contents

Table of Contents
Text-based Search
Analysis
Automation & Efficiency
Data Organization
Image & Video Tools
Geolocation
Identity Protection & Safety
Education & Training

Welcome! Thank you for visiting our OSINT Tools Library. Here you will find
information and links to some of the most useful OSINT tools and techniques from
across the OSINT community. We encourage you to bookmark this page and refer
back to it to support you in your investigations. This page is updated
regularly, so be sure to check in from time to time!


TEXT-BASED SEARCH


BOOST YOUR GOOGLING SKILLS

Google is an incredibly powerful free resource for anyone doing online research.
Learn how to get the best results out of this search engine with the company’s
own guide to Google search refinement.


DETERMINE A DOMAIN’S EXTERNAL THREAT LANDSCAPE

theHarvester is a command-line tool included in Kali Linux that acts as a
wrapper for a variety of search engines and is used to find email accounts,
subdomain names, virtual hosts, open ports/banners, and employee names related
to a domain from different public sources (such as search engines and PGP key
servers). theHarvester is designed to be used during the reconnaissance stage of
a red team assessment or penetration test.


SEARCH FOR EMAIL ADDRESSES

The service Hunter.io is popular for offensive security professionals and OSINT
practitioners looking to find email addresses for members of an organization or
to find out additional information about an email address. Hunter.io has a free
plan with an API that allows for 25 searches and 50 verifications per month.


SEARCH FOR SOURCE CODE

If you’re looking at a unique piece of malicious code within a script, it can
help to check if that same unique snippet is found elsewhere in the code.
PublicWWW is a public search engine for source code that will help you do
exactly that. For a good example, find a small portion of the Magecart skimmer,
put it into the search engine, and look at the results.


FIND DEEP WEB DATA

90% of the internet isn’t indexed by search engines. This includes many internal
links and deep websites. If you’re looking for a file that was shared by a
company between two people or organizations, you most likely won’t be able to
find it in Google or any other search engine. URLScan has many of these links
indexed in their historical scans. If you type in a domain for any website into
their search engine, you’ll find multiple links from that domain in the search
results. It’s a great way to do deep web research without needing access or
logins.


SEARCH FOR BITCOIN ADDRESSES

Blockchain and cryptocurrency investigations have been a rather recent
development in the OSINT space and are gaining relevance as more threat actors
and scams begin using cryptocurrency as their transaction method of choice. If
you’re looking into a crypto wallet related to ransomware, blackmailing, fraud,
etc., check out chainabuse.com. It’s a public database of addresses used for
nefarious reasons. They also have an API if you want to build an OSINT tool for
crypto.


POWER UP YOUR SEARCH

You.com is an AI-powered search engine. It’s privacy-centric (like DuckDuckGo),
but it has built-in functionality like social media searching, video searching,
etc. and it separates the results by category.


SEARCH PASTEBIN DUMPS

Pastebin is a great resource for OSINT collection. A great tool to search for
Pastebin data is PsbDmp. At the time of writing this, PsbDmp had 25990293
Pastebin dumps in its archive. You can easily use its search engine to check if
the data point you’re investigating is in its archive.


SEARCH SHODAN

If you’re doing technical OSINT collection or investigation, you’ve probably
heard of Shodan. At first glance, Shodan can be intimidating and it can be hard
to find what you’re looking for. Fortunately, Jake Jarvis put together a guide
with multiple use cases and examples for searching on Shodan. From prison pay
phones to industrial control systems, there’s a ton of untapped potential inside
of Shodan’s index.


LOOK UP BUSINESSES USING SECRETARY OF STATE DATA

If you’re doing business-related investigations for entities in the United
States, you’ll often be requested to pull Secretary of State documents for state
filings of that business. These can be hard to track down if you visit each
individual state website and pull the information that way. Fortunately, Cobalt
Intelligence made a tool that pulls Secretary of State filings for businesses in
all states from one search engine, saving a lot of time on business lookups.


COLLECT WEBSITE METADATA

If collecting metadata is important to your OSINT workflow or are building a URL
or domain-specific OSINT tool, finding a reliable, fast way of grabbing that
information from a target URL can be tricky if that’s not your area of
expertise. Fortunately, there’s an API called Website Metadata that can easily
grab metadata for any URL you specify.


REVERSE CLEARTEXT AND HASHED PASSWORDS

Similar to using Google dorks for Pastebin, you can also reverse cleartext and
hashed passwords to find more information. If you have a cleartext password, use
an online hashing tool like MD5 Hash Generator to turn it into a hash; if you
have a hashed password, use hashes.com to turn it into cleartext.

From there, you can use tools like Dehashed or IntelX to turn those cleartext or
hashed passwords into emails, phone numbers, names, etc. to further expand your
ability to pivot across different data sources and build a full digital record.


FIND LEAKED EMAILS ON GITHUB

If you’re doing OSINT investigations into GitHub repositories, you might be
interested to see who is all making commits to that project. Fortunately,
finding email addresses in these commits from Github users is pretty simple. The
hard part is grabbing all of that content, specifically on larger projects.
GitRecon will do that for you in one motion.

Example: You find a GitHub repository that says it’s a PoC of an exploit for a
software vulnerability. Upon further investigation, you find that it’s actually
a honeypot for malware. You can use GitRecon to figure out who is involved if
that information is available.


UNCOVER MORE LINKEDIN DATA

If you’re doing OSINT research and come across information from LinkedIn but
your sock account isn’t a close enough connection to the target to get useful
information, Revealin might help you uncover more. Exploiting a design flaw in
LinkedIn, Revealin gives you the full name of a person when it only shows only
an initial without needing to expand your network.

Think about the methods this tool uses. The more familiar you are with these
concepts, the more you can find your own internet easter eggs and level up your
OSINT game.


GATHER OSINT FROM HASHES ON PASTEBIN

If you’re looking to collect a series of hashes values, such as passwords or
IOCs, you can use a specific Google dork to locate them in a website like
Pastebin.

site:pastebin.com intext:“SHA256”

You can change out SHA256 with any other algorithm including: MD5, SHA1, MySQL,
NTLM, or SHA512.

Once you have a hash, you can check it against places like VirusTotal to see if
it’s malicious or not.


LOOK UP PHONE NUMBERS WITH PHOMBER

Phomber is an easy-to-use, free Python tool for reverse phone number lookups.


FIND THE PERSON’S NAME BEHIND ANY GMAIL ADDRESS

1. Create a Google document

2. Share the document with the Gmail address

3. Untick the “Notify people” box The name will be disclosed.


SEARCH USERNAMES ACROSS MULTIPLE DOMAINS

Developed by a group of OSINT practitioners, the WhatsMyName tool allows you to
enumerate usernames across many websites. The results can be exported as a CSV,
PDF, or Excel file.


SEARCH SOCIAL MEDIA USERNAME AVAILABILITY

Namecheckup.com enables you to search for social media username availability
across 253 different platforms and apps. It also helps investigators locate
additional profiles for individuals who used the same username for several
profiles.


CHECK DOMAIN AVAILABILITY

Namechk checks 36 different domain name possibilities and 100+ social media
websites and online platforms. Sites include Facebook, Twitter, YouTube,
Blogger, Twitch, Tumblr, TikTok, WordPress, eBay, Yelp, Flickr, and PayPal.


SEARCH MULTIPLE ONLINE MARKETPLACES AT ONCE

SearchTempest is a search engine for online classified ads that delivers results
from all of Facebook Marketplace, Craigslist, eBay, and Amazon, and several
others.


GATHER INFORMATION FROM INSTAGRAM

Toutatis allows you to extract information from Instagram accounts such as
e-mails, phone numbers, and more. (Python required).


SEARCH FACEBOOK

Who Posted What is a Facebook keyword search for people who work in the public
interest. It allows you to search keywords on specific dates. Donations are
encouraged.


SEARCH A DIGITAL LIBRARY

Internet Archive is a non-profit library of millions of free books, movies,
software, music, websites, and more. Its mission is to provide universal access
to all knowledge.


REVERSE EMAIL SEARCH

Epeios is a search engine that allows you to perform reverse email searches,
find related Google reviews, and see which websites are associated with any
email address.


ANALYSIS


INVESTIGATE URL SHORTENED LINKS FOR OSINT

If you’re doing OSINT data collection at scale, you’re likely to come across a
lot of shortened links. If you try to manually investigate each one, which is a
viable method, it’s going to take a lot of time. Fortunately, there’s an
open-source tool that will expand those links for you at scale. Links like
bit.ly, adf.ly, lnx.lu, linkbucks.com, and adfoc.us can be expanded
automatically with urlExpander. Whether you have a million links or a hundred,
be sure to check it out.


VISUALLY INVESTIGATE CRYPTOCURRENCY

If you’re tracking a lot of illicit actors, you’ve probably had some exposure to
cryptocurrency investigations. A common challenge in crypto investigations is
making sense of extremely large datasets. Many tools will show you a single
connection and rely on you importing that information into a different tool like
Maltego to form visual connections. Breadcrumbs is a blockchain analytics
platform accessible to everyone. It offers a range of tools for investigating,
monitoring, tracking, and sharing relevant information on blockchain
transactions. It solves the problem of connecting the dots between transactions
and wallets. The free tier provides limited access to almost all functions
including monitoring and graph creation. Whether you’re new to this space or
looking for a budget-friendly solution, this is worth a look.


LEVERAGE THIS DOMAIN OSINT MULTI-TOOL

For investigations, it’s helpful to keep a running list of found data points
into as many tools and resources as possible. Sometimes a slight change in
configuration from one tool to another can offer a different angle or set of
information. Investigator is an OSINT multi-tool for domains. It has a variety
of modules to help dig deeper into specific categories. The web app format makes
it possible to use with limited technical knowledge or in controlled
environments.


TRY BITCROOK

Bitcrook is an OSINT multi-tool that might check a couple of your boxes in a
single script. Bitcrook is unique because it factors in court cases from
case.law and data from Melissa. It also has standard modules like IP and
username lookup.


FIND OUT HOW A SITE WAS BUILT

Builtwith enables you to look under the hood of any website so you can
understand how it functions and what frameworks/technologies it is using.


AUTOMATION & EFFICIENCY


SHORTEN REPETITIVE TASKS IN TERMINAL

If you spend a lot of time in the terminal for OSINT collection and analysis,
you probably run the same commands over and over. There’s the classic meme of
pressing the up arrow a million times until you find the command you were
looking for. What if you could create a shortened version of that command to
reference quickly and use at will? PCMD lets you do that. Type in a long,
specific command, save it as a shortcut with PCMD, and use it over and over
without having to type it out.


DISCOVER THE BEST OSINT THREADS

Some of the best OSINT techniques and workflows can be found on Twitter. The
issue with Twitter is that they break them up into multiple messages so
discovering threads can be difficult if the post doesn’t specifically say it’s a
thread. If you’ve read a thread on Twitter before, you have likely seen people
tagging apps like ThreadReaderApp to consolidate the thread into one post. What
you might not know is that you can query all threads they create on their
website just by searching for #OSINT.


COLLECT ONION URLS AUTOMATICALLY

Because the dark web doesn’t have a free, unified search engine like Google,
OSINT researchers who don’t have access to a service like Flashpoint have to
either hunt for it manually or rely on static databases like dark.fail to find
more. OnionSearch aggregates the search results of multiple dark web search
engines that index these links allowing you to search for things in multiple
places at once. If you’re looking for a free tool to discover new dark web URLs,
OnionSearch is worth checking out.


REMOVE WEB ELEMENTS MORE EFFICIENTLY

Many OSINT workflows require adding and removing web elements to reveal certain
details. Snip allows you to permanently remove certain web elements so that you
never see them again. This is very useful for frequently visited websites.


BUILD WORKFLOWS WITH AUTOMA

This Chrome extension allows you to create a workflow using a drag-and-drop
interface and save it as a playbook to replay at any time. From auto-fill forms,
to repetitive tasks, to taking screenshots, to scraping data from a website,
Automa is pretty flexible. If you want to automate some of your OSINT workflows,
give this a spin.


EXTRACT DATA FROM ANY WEBSITE

Instant Data Scraper is an automated data extraction tool for any website. It
uses AI to predict which data is most relevant on an HTML page and allows saving
it to Excel or CSV files (XLS, XLSX, CSV).


AUTOMATE SCRAPING WITH BROWSE AI

If you’ve ever used Instant Data Scraper, this tool will be very familiar to
you. What Browse AI does that Instant Data Scraper doesn’t is set up automated
scraping tasks and export the results automatically to a Google Sheet. If you
want a no-code way of scraping websites or want to build quick proofs on
concepts before committing to writing a custom web scraper, give this a shot.


AUTOMATE WRITING TASKS WITH TANGO

For writers of blog posts or documentation articles, Tango is a very handy tool.
Tango allows you to write step-by-step tutorials with screenshots in a few
seconds. It works by recording your actions on the screen while enabled and
converting that into a process-based how-to guide when the recording stops.


MANIPULATE DATASETS FROM TERMINAL

OSINT practitioners frequently run across TXT and CSV files. Often, the
formatting for CSV files is not compatible with your investigation and you need
to remove certain columns, add others, change column titles, etc. If you’re
looking to remove all columns except for a select few, use this trick:

$ cut -d, -f<column number> –complement input.csv > output.csv

Example:

$ cut -d, -f4 –complement osint.csv > oshint.csv

This will remove the fourth column of osint.csv and save it to oshint.csv. If
you remove –complement, you’ll remove all columns except for column 4.

To learn more about this Linux command, check out this article.


SEARCH THROUGH LARGE DATASETS WITH EASE

Leaked credential databases are a key component to investigations into
individuals with a small digital footprint. Sometimes, these datasets can be
hundreds of gigabytes in size. Opening them in any software or browser and
looking for applicable information can be a struggle.

Enter Ripgrep. It allows you to recursively look through a database—regardless
of size—for a specific data point, and see if it exists. There’s a bit of a
learning curve so you might want to check out this video before getting started.


DATA ORGANIZATION


EXPORT OR PRINT FULL-PAGE SCREENSHOTS

GoFullPage is a Google Chrome extension that allows you to capture an entire
webpage as a screenshot. This is useful for storing or archiving pages in a
specific state—or when you need to share a webpage with someone who might not
have access to that page.


ARCHIVE DIGITAL EVIDENCE

Save as MHTML is useful, but is limited in the fact that it can only capture one
page at a time. If you want to download multiple pages or an entire website as
MHTML. Enter SinglePage. SinglePage allows you to capture the current tab, a
specific selection, multiple tabs, highlighted text, etc. It also has a SHA256
module to hash your evidence.


MANAGE CSV FILES WITH CSVKIT

If you’re dealing with spreadsheets on a regular basis, it can be hard to manage
really large datasets. CSVKit is a suite of command-line tools for converting to
and working with CSV files. It allows you to convert file types (like CSV to
JSON), select certain types of information from the dataset, or import the data
to PostGreSQL. The lookup capability is especially useful. 

Example: csvgrep -c phone_number -r “555-555-\d{4}” data.csv > new.csv

You can lookup a phone number and take it from the main dataset and add it to a
new one.


CONVERT URLS TO PDFS

PDF my URL allows you to download a website to a PDF for offline viewing. You
can convert a single page or an entire website to a PDF and remain anonymous
because the app’s IP address requests the information from the website, not
yours.


SAVE WEBPAGES AS HTML FILES

SingleFile is a Google Chrome extension that helps you to save a complete page
(with CSS, images, fonts, frames, etc.) as a single HTML file.


IMAGE & VIDEO TOOLS


REVERSE IMAGE SEARCH WITH REVEYE

RevEye is a Firefox add-on that allows you to perform reverse image search with
Google, Bing, or Tineye.


TRY A VISUAL SEARCH WITH MICROSOFT BING

Bing visual search is simple and intuitive, allowing you to drag and drop any
image, type any URL into the search bar, or even take a photo directly in its
home dashboard.


VERIFY CONTENT ON SOCIAL NETWORKS

The InVID verification plugin is a Chrome extension designed to help journalists
debunk fake news and verify image and video content.


FIND AND DOWNLOAD ALL IMAGES ON A WEB PAGE

Imageye Image Downloader is a tool that helps you find the images published on a
web page.


GET BETTER INSTAGRAM DATA

A common method for finding connections on social media is by looking at
followers, followings, and engagements (comments, likes, etc.). Instagram is
becoming more and more difficult to collect data from. Sterra allows you to get
information about an Instagram account through its followers and followings.
Here are some things it considers:

 * A probability function to determine the close social circle of your target
 * Export of the followers / following lists (with their details) to excel and
   csv


CAPTURE YOUTUBE METADATA AT SCALE

If you’re collecting video OSINT, it’s important to document the metadata. For
YouTube specifically, YouTube Metadata Bulk allows you to capture metadata for a
single video or for a list of videos. That metadata can be exported as TXT,
JSON, CSV, or PNG. Entities like tags, geolocation, links, and upload times can
be grabbed instantly.


BUILD YOUR OWN REVERSE IMAGE SEARCH

Reverse image searching is a major technique used in OSINT collection and
analysis. The issue with many reverse image tools is that you’re reliant on the
algorithms of Google, etc. to find a positive match. While these tools are often
reliable, wouldn’t it be great if you could build your own? Well, you can. This
Github project gives provides the foundation for building your own reverse image
tool. It’ll find exact matches and near matches out of the box; however, you
could combine it with things like facial recognition to make it more
sophisticated and accurate.


SCAN AND DETECT DEEPFAKE VIDEOS

Deepfake videos are becoming a huge problem on the internet. From Tom Cruise, to
Barack Obama’s public service announcements, the future of disinformation looks
pretty grim with the ability to create fake videos that fool the masses.

Deepware provides a web app and API that helps identify deepfake videos. Whether
it’s stored locally or hosted on a URL online, you can send it to Deepware for
review. If you want to add this capability to an OSINT tool, the API is very
straightforward and easy to use.


TRY FACEBOOK’S BUILT-IN OCR

You can search for specific alphanumeric strings, such as license plate numbers
on Facebook and comb through images to find a match. Facebook automatically
tries to use OCR within its images for displaying relevant results. I tried a
search for “MWP-46-99” (a license plate) and got the following result:




VIEW IMAGE EXIF DATA

EXIFdata.com is an online application that lets you upload an image and view the
associated data such as shutter speed, exposure compensation, F number, date,
time, and more.


GEOLOCATION


IMPROVE YOUR GEOLOCATION SKILLS

GeoGuessr has become the official primer for developing your geolocation skills.
It gives you continuous exposure to different scenarios to train your deduction
skills. Give it a read or three and watch your scores improve. Take what you
learn on GeoGuessr and apply it to real challenges.


BOOTSTRAP GEOLOCATION

AllYouCanRead is a collection of newspapers that are local to a specific city,
county, etc. If you collect all of the newspapers you’re interested in and pull
their RSS feed, you can use keyword filters to look for keywords of locations
within publications of papers local to that location. So looking for “San
Francisco” in a San Francisco-based newspaper is likely to yield results from
that area. Scale that across multiple cities and countries and you have
bootstrapped geolocation.


DETECT SHIPS

The Ship Detection Tool, built by Bellingcat, is a satellite imaging tool that
uses Synthetic Aperture Radar (SAR) imagery to identify ships in port, at
anchor, or at sea.

> “Open-source information is going to be of incalculable value both to our
> intelligence community and military in the future.”
> 
> Glenn gerstell, former general counsel of the national security agency


IDENTITY PROTECTION & SAFETY


IDENTIFY BREACHED ACCOUNTS

Have I Been Pwned is a free web-based tool that allows you to quickly assess if
you may have been put at risk due to an online account having been compromised
or “pwned” in a data breach.


CHECK DATA POINTS AGAINST SPAM

If you’re investigating a lot of data, specifically IP addresses, emails, or
usernames, make sure to check Stop Forum Spam to see if any of the data points
you’re dealing with are found there. If you find a positive hit on any of your
searches, you can pivot on the found data points to find more information.
Example: If you have an IP address and get a match, it’ll give you an email and
a username. You can reverse those back into Stop Forum Spam or any other OSINT
tool you use.


CREATE CREDIT CARDS FOR YOUR SOCK PUPPET

When building a sock puppet (alternate persona), it’s important to create as
complete a profile as possible. Many websites require a credit card to sign up.
Using Card Generator, you can make a card tied specifically to your sock puppet
and maintain consistency across the web without compromising your identity.


EDUCATION & TRAINING


LEVEL UP YOUR TELEGRAM INVESTIGATIONS

If you’re collecting data from Telegram, there are a ton of tools you can use to
find new users, groups, channels, etc. Awesome Telegram OSINT is a collection of
tools, tactics, and techniques for extracting information from Telegram. If
you’re a seasoned Telegram collector or just getting started, this is your
one-stop shop.

WEBINAR REPLAY

Telegram for OSINT: Level Up Your Investigations

Watch Now




READ OSINT CASE STUDIES

One of the best ways to learn about new tools, tactics, and techniques is to
read case studies. “Exposing the Invisible” has a list of case studies on its
website that can inspire you in your own investigations.


CHECK OUT MORE OSINT RESOURCES

 * Oh Shint on GitHub.
 * osintcurio.us


OSINT TRAINERS:

 * SANS Institute
 * Hetherington Group
 * Toddington International
 * Camelot Investigations




BEGIN YOUR FREE TRIAL TODAY.

Get a Free Trial

Contact Sales

6218 Georgia Avenue NW
Suite #1
PMB 3032
Washington, DC, 20011
United States

+1 (888) 468-3598

Contact us

 * 
 * 
 * 
 * 

 * Platform
   * Why Flashpoint?
   * Flashpoint Ignite
   * Cyber Threat Intelligence
   * Vulnerability Management (VulnDB)
   * Physical Security Intelligence
   * National Security Intelligence
   * Managed Attribution
   * Automate
   * Cyber Risk Analytics
   * Ransomware Attack Response and Readiness
   * Professional Services
   * Managed Intelligence
   * Tailored Reporting
   * Curated Alerting
   * Request for Information (RFI)
 * Solutions
   * Cyber Threat Intelligence
   * Fraud
   * Corporate and Physical Security
   * Vulnerability Management
   * DevSecOps
   * Insider Threat
   * Financial Services
   * Retail
   * Healthcare & Pharmaceutical
   * Technology
   * Public Sector & National Security
 * Company
   * About Us
   * Flashpoint Careers
   * Flashpoint News
   * Contact Us
 * Resources
   * Threat Intelligence Blog
   * Resource Library
   * Events & Webinars
   * Partner With Flashpoint
   * Cybersecurity & Intelligence 101

© 2023 Flashpoint. All rights reserved.
 * Privacy Policy
 * Terms of Service
 * Cookie Policy
 * CCPA
 * Legal


Originaltext

Diese Übersetzung bewerten
Mit deinem Feedback können wir Google Übersetzer weiter verbessern



We have updated our Privacy Policy and Cookie Policy which go into effect on May
25, 2018, to comply with the new requirements of GDPR. These changes reflect
increased transparency requirements mandated by the GDPR. Changes include
clarifying and providing additional information about: your privacy rights and
how to exercise them; how we collect, use, share and protect your personal
information; and the legal bases we rely on to process your personal
information. Please review these policies to confirm your acceptance of the
recent changes. Continue? Yes No