⚠️ For educational and lawful research purposes only. Always respect privacy laws and platform TOS.
🔭 Open-Source Intelligence Portal

The Ultimate OSINT Hub

Every tool, guide, and resource you need for open-source intelligence — organized, searchable, and free.

500+Tools & Links
20+Categories
15+Guides
100%Free to Use

Quick Launch — Top Tools

👤

People Search

12 tools
🎭

Username & Social Media

14 tools
📧

Email Investigation

10 tools
📱

Phone Number Lookup

8 tools
🌐

IP, Domain & Network

16 tools
🖼️

Image & Video Analysis

10 tools
🗺️

Geolocation & Maps

10 tools
🌑

Dark Web Research

6 tools
⚠️ Dark web research carries legal and safety risks. Always use Tor Browser and take operational security precautions. Only visit .onion sites for legitimate research purposes.
🏢

Business & Corporate

10 tools
📄

Documents & Data Leaks

10 tools
🔎

Google Dorks — Quick Reference

Most Used

📂 File Type Searches

site:example.com filetype:pdf site:example.com filetype:xls site:example.com filetype:doc site:example.com filetype:txt

🔑 Sensitive Info

intitle:"index of" passwords inurl:admin site:example.com intext:"confidential" site:example.com ext:env DB_PASSWORD

📧 Email Harvesting

site:example.com intext:"@example.com" intitle:"staff" site:example.com email inurl:"contact" site:example.com

🗺️ Directory Listing

intitle:"index of /" intitle:"index of" inurl:ftp intitle:"index of" mp3 intitle:"Apache Status"

🔧 Login Pages

inurl:login site:example.com inurl:wp-admin site:example.com intitle:"Login" site:example.com inurl:"admin/login"

📸 Camera / IoT

intitle:"webcam" inurl:view intitle:"Live View" inurl:":8080" intitle:"webcam"
📰

News & Archive Research

8 tools
🛡️

Threat Intelligence

10 tools
📋

OSINT Investigation Methodology

1
Define the Objective
Clearly identify what you are looking for, who the target is, and what the legal authorization for the investigation is. Document your scope.
2
Passive Reconnaissance
Gather publicly available data without directly interacting with the target. Use WHOIS, social media, web archives, and search engines.
3
Active Information Gathering
Use tools like Shodan, DNS enumeration, and certificate searches. Be mindful that active scanning may leave traces.
4
Analysis & Correlation
Correlate gathered data, build a picture of the target using link analysis tools like Maltego. Identify gaps and pivot points.
5
Verification & Validation
Cross-check findings across multiple sources. Never rely on a single data point. Use fact-checking and image verification tools.
6
Documentation & Reporting
Record all findings with screenshots, timestamps, and source URLs. Use tools like Hunchly or CherryTree for structured note-taking.
🗂️

Explore More