Open-Source Cybersecurity Tools: OSINT & Reconnaissance

← Back to Open-Source Cybersecurity Tools Hub | Full Open Source Catalog | Main Atlas

This category contains 1254 documented tools. It focuses on capabilities used for asset discovery, external exposure mapping, and intelligence collection. Use this section when building shortlists, comparing operational tradeoffs, and mapping controls to detection/response ownership.

Category Evaluation Checklist

  • Coverage depth against your highest-priority threats and compliance obligations.
  • Operational overhead for deployment, tuning, and long-term maintenance.
  • Signal quality versus analyst workload and false-positive pressure.
  • Integration fit with SIEM, ticketing, identity, cloud, and engineering workflows.
  • Governance readiness including auditability, ownership clarity, and change control.

Jump by Name

# | 0 | 1 | 2 | 4 | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Letter

This letter section contains 3 tools.

Дезертир

  • Website: http://vk.com/app3046467
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Дезертир is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ VKontakte.

Back to Name Jump

Ответы

  • Website: https://otvet.mail.ru/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ответы is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

Фари

  • Website: https://telegram.me/faribybot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Фари is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: VIN-history lookup from getcar.by.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Letter 0

This letter section contains 1 tools.

0bin

  • Website: https://0bin.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: 0bin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Letter 1

This letter section contains 2 tools.

192 (UK)

  • Website: http://www.192.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: 192 (UK) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search by person, business, address. Limited free info, premium data upsell.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

1st Headlines

  • Website: http://www.1stheadlines.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: 1st Headlines is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Letter 2

This letter section contains 1 tools.

  • Website: http://www.2lingual.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: 2lingual Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Letter 4

This letter section contains 2 tools.

411 (US)

  • Website: http://www.411.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: 411 (US) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search by person, phone number, address, and business. Limited free info, premium data upsell.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

  • Website: https://4chansearch.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: 4chan Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

Letter A

This letter section contains 54 tools.

A penetration tester’s guide to sub-domain enumeration

  • Website: https://blog.appsecco.com/a-penetration-testers-guide-to-sub-domain-enumeration-7d842d5570f6
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: A penetration tester’s guide to sub-domain enumeration is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Written by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Introduction > Sub Domain Enumeration.

Back to Name Jump

aa419 Fake Sites Database

  • Website: https://db.aa419.org/fakebankslist.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: aa419 Fake Sites Database is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The site lists fraudulent websites, such as fake banks and online scams, identified by the Artists Against 419 community.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

aadinternals

  • Website: https://aadinternals.com/osint
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: aadinternals is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Provides tools and insights for advanced analysis and security testing of Azure Active Directory (AAD) and Microsoft 365.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Abine

  • Website: https://www.abine.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Abine is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Abusech

  • Website: https://hunting.abuse.ch
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Abusech is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Hunt across all abuse.ch platforms with one simple query.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Academia

  • Website: http://academia.edu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Academia is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a platform for sharing academic research.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Academia

  • Website: https://www.academia.edu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Academia is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Academic Journals

  • Website: http://www.academicjournals.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Academic Journals is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Accuranker

  • Website: https://www.accuranker.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Accuranker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Adium

  • Website: https://adium.im
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Adium is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Aeon

  • Website: http://www.aeontimeline.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Aeon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

African Journal Online

  • Website: http://www.ajol.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: African Journal Online is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is the world's largest and preeminent platform of African-published scholarly journals.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Agence France-Presse (AFP)

  • Website: http://www.afp.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Agence France-Presse (AFP) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

AgentFNS_Bot

  • Website: https://t.me/AgentFNS_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AgentFNS_Bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free instant counterparty check using official data (INN/OGRN).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

AGOA Data Center

  • Website: http://agoa.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AGOA Data Center is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Ahmia

  • Website: https://ahmia.fi
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ahmia is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Dark Web Search Engines.

Back to Name Jump

ahrefs

  • Website: https://ahrefs.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ahrefs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A tool for backlink research, organic traffic research, keyword research, content marketing & more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

AidData

  • Website: http://aiddata.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AidData is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

  • Website: https://open-search.aleph-networks.eu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Aleph Open Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Dark Web Search Engines.

Back to Name Jump

All-in-One

  • Website: http://all-io.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: All-in-One is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

Alleba (Philippines)

  • Website: http://www.alleba.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Alleba (Philippines) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Philippines search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

  • Website: http://www.allstocks.com/links
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AllStocksLinks is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

AllTheInternet

  • Website: http://www.alltheinternet.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AllTheInternet is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

Alltop

  • Website: http://alltop.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Alltop is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

AllYouCanRead

  • Website: http://www.allyoucanread.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AllYouCanRead is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

American Society of Civil Engineers

  • Website: http://ascelibrary.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: American Society of Civil Engineers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

AnalyzeID

  • Website: https://analyzeid.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AnalyzeID is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find Other Websites Owned By The Same Person.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

Ancestry

  • Website: http://www.ancestry.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ancestry is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Premium data, free trial with credit card.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Answers.com

  • Website: http://www.answers.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Answers.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

Aol

  • Website: https://search.aol.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Aol is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The web for America.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

AP

  • Website: http://hosted.ap.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AP is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Apify's Google Maps Scraper

  • Website: https://apify.com/compass/crawler-google-places
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Apify's Google Maps Scraper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Apollo.io

  • Website: https://www.apollo.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Apollo.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free B2B Phone Number & Email Finder. 1200 credits per user/year for free plan.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

APT Groups and Operations

  • Website: https://docs.google.com/spreadsheets/u/0/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml?pli=1#
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: APT Groups and Operations is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Know about Threat Actors, sponsored countries, their tools, methods, etc.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

APTWiki

  • Website: https://apt.threatradar.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: APTWiki is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Historical wiki with 214 actor entries.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Arbor.js

  • Website: http://arborjs.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Arbor.js is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

ArcGIS

  • Website: https://livingatlas.arcgis.com/en/browse/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ArcGIS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Archive.is

  • Website: http://archive.is
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Archive.is is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a website that allows you to archive a snapshot of you websites that will always remains online evenif the original page disappears.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

Arctic Shift

  • Website: https://github.com/ArthurHeitmann/arctic_shift
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Arctic Shift is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A tool for accessing and interacting with large dumps of Reddit data, offering an API and web interface for research and moderation purposes.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

ArkhamMirror

  • Website: https://github.com/mantisfury/ArkhamMirror
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ArkhamMirror is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Local-first AI document intelligence with offline RAG, contradiction detection, knowledge graphs, and vision AI table extraction.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Ask

  • Website: https://www.ask.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ask is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Ask something and get a answer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Ask

  • Website: http://www.ask.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ask is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

Atlas

  • Website: https://atlas.co
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Atlas is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Atlasify

  • Website: http://www.atlasify.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Atlasify is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Atom

  • Website: https://browser.ru/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Atom is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Audiense

  • Website: https://www.audiense.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Audiense is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool to identify relevant audience, discover actionable insights and inform strategies to grow your business.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

AVinfoBot

  • Website: https://t.me/AVskp_Bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AVinfoBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Used-car history via plate/VIN/phone.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

avtocodbot

  • Website: https://t.me/avtocodbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: avtocodbot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paid VIN/plate lookup.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

avtogram_bot

  • Website: https://telegram.me/ABTOGRAMBOT
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: avtogram_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paid car reports (VIN/plate): accidents, fines, liens.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

AvtoNomer

  • Website: https://t.me/avtonomerbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AvtoNomer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Finds vehicle photos by plate via platesmania.com.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Aware-online.com

  • Website: https://www.aware-online.com/en/osint-tools
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Aware-online.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Curated collection of OSINT tools and methodologies for investigations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

Awasu

  • Website: http://www.awasu.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Awasu is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

AWS Public Datasets

  • Website: http://aws.amazon.com/datasets
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: AWS Public Datasets is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Azure Tenant Resolution by PingCastle

  • Website: https://tenantresolution.pingcastle.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Azure Tenant Resolution by PingCastle is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for Azure Tenant using its domain name or its ID.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Letter B

This letter section contains 62 tools.

Baidu (China)

  • Website: http://www.baidu.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Baidu (China) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The major search engine used in China.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Baidu Images

  • Website: https://image.baidu.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Baidu Images is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Baidu Maps

  • Website: https://map.baidu.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Baidu Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Bank for International Settlements Statistics

  • Website: http://www.bis.org/statistics/index.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bank for International Settlements Statistics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Barcode Reader

  • Website: http://online-barcode-reader.inliteresearch.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Barcode Reader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Decode barcodes in C#, VB, Java, C\C++, Delphi, PHP and other languages.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Barkov.net

  • Website: http://vk.barkov.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Barkov.net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ VKontakte.

Back to Name Jump

Base

  • Website: http://www.base-search.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Base is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Batchgeo

  • Website: http://batchgeo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Batchgeo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Beaker

  • Website: http://beakernotebook.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Beaker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

BeanPaste

  • Website: https://beanpaste.fun/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BeanPaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A tiny way to share text.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

BeenVerified

  • Website: https://www.backgroundchecks.com/solutions/beenverified
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BeenVerified is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Befunky

  • Website: https://www.befunky.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Befunky is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Bellingcat

  • Website: https://www.bellingcat.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bellingcat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

Bellingcat Online Researcher Survey: Tool Wishes

  • Website: https://docs.google.com/spreadsheets/d/1vNJRMrlwI7i06diBJtRJWrvt4YuPOqlbUV5o00P_YmE/edit#gid=1378107220
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bellingcat Online Researcher Survey: Tool Wishes is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Wishlist of OSINT tools from a February Bellingcat survey.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

Bellingcat's Online Investigation Toolkit

  • Website: http://bit.ly/bcattools
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bellingcat's Online Investigation Toolkit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

Bendobrown

  • Website: https://www.youtube.com/c/Bendobrown
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bendobrown is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Videos.

Back to Name Jump

Berkely Library: Data Lab

  • Website: http://www.lib.berkeley.edu/libraries/data-lab
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Berkely Library: Data Lab is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Betaface

  • Website: https://www.betaface.com/demo.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Betaface is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Better Business Bureau

  • Website: http://www.bbb.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Better Business Bureau is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

BeVigil

  • Website: https://bevigil.com/search
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BeVigil is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for assets like Subdomains, URLs, Parameters in mobile applications.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

BeVigil-CLI

  • Website: https://github.com/Bevigil/BeVigil-OSINT-CLI
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BeVigil-CLI is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A unified command line interface and python library for using BeVigil OSINT API to search for assets such as subdomains, URLs, applications indexed from mobile applications.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Beyond

  • Website: http://www.beyond.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Beyond is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Bi.Zone

  • Website: https://gti.bi.zone/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bi.Zone is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: 148 threat groups with detailed TTPs.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Bibsonomy

  • Website: http://www.bibsonomy.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bibsonomy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Bing

  • Website: https://www.bing.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bing is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Microsoft´s search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Bing Images

  • Website: https://www.bing.com/images
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bing Images is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Bing Maps

  • Website: http://www.bing.com/maps
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bing Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Bing Videos

  • Website: http://www.bing.com/?scope=video
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bing Videos is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Bing Webmaster Tools

  • Website: http://www.bing.com/toolbox/webmaster
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bing Webmaster Tools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

BinGoo

  • Website: https://github.com/Hood3dRob1n/BinGoo
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: BinGoo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: GNU/Linux bash based Bing and Google Dorking Tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

Bitdefender Threat Map

  • Website: https://threatmap.bitdefender.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bitdefender Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Cyberthreat Real Time Map by Bitdefender.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Bitwarden

  • Website: https://bitwarden.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bitwarden is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Open-source password manager with cross-platform support.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Bizeurope

  • Website: http://www.bizeurope.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bizeurope is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Bizint

  • Website: http://www.bizint.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bizint is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Biznar

  • Website: http://biznar.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Biznar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Blackbird

  • Website: https://github.com/p1ngul1n0/blackbird
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Blackbird is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for accounts associated with a given email across various platforms.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Blacklist Checker

  • Website: https://blacklistchecker.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Blacklist Checker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Blacklist Checker is anemail blacklist checker, monitor and API that checks 100+ blacklists in seconds.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

BlackWidow

  • Website: http://softbytelabs.com/wp/blackwidow/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BlackWidow is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

BlindElephant

  • Website: http://blindelephant.sourceforge.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: BlindElephant is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Web application fingerprinter.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

Bloomberg

  • Website: http://www.bloomberg.com/research/company/overview/overview.asp
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bloomberg is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

bmi_np_bot

  • Website: https://t.me/MNProbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: bmi_np_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Identifies phone-number operator and basic info.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Boardreader

  • Website: http://boardreader.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Boardreader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

Bottlenose

  • Website: http://bottlenose.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bottlenose is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

boxcryptor

  • Website: https://www.boxcryptor.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: boxcryptor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

BP Statistical Review of World Energy

  • Website: http://www.bp.com/en/global/corporate/energy-economics/statistical-review-of-world-energy.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BP Statistical Review of World Energy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

bpaste

  • Website: https://bpa.st/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: bpaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Welcome to bpaste, this site is a pastebin. It allows you to share code with others.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Brandwatch

  • Website: https://www.brandwatch.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Brandwatch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Brave

  • Website: https://search.brave.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Brave is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a private, independent, and transparent search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Brave

  • Website: https://brave.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Brave is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is an open-source web browser that allows you to completely block ads and website trackers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

BreachHQ

  • Website: https://breach-hq.com/threat-actors
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BreachHQ is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Provides a list of all known cyber threat actors also referred to as malicious actors, APT groups or hackers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Bridge.Leslibres

  • Website: https://bridge.leslibres.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bridge.Leslibres is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Bridge.Suumitsu

  • Website: https://bridge.suumitsu.eu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bridge.Suumitsu is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

BrightCloud

  • Website: https://brightcloud.com/tools/url-ip-lookup.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BrightCloud is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Checks the reputation, category, and potential threats associated with a URL or IP address.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Bromite

  • Website: https://www.bromite.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bromite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Bromite is a Chromium fork with ad blocking and enhanced privacy; take back your browser. Works only on Android.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Browserleaks

  • Website: https://browserleaks.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Browserleaks is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: BrowserLeaks tests your browser for privacy and fingerprinting leaks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Buffer

  • Website: https://buffer.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Buffer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Built With Flarum

  • Website: https://builtwithflarum.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Built With Flarum is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

BuiltWith

  • Website: http://builtwith.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BuiltWith is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a website that will help you find out all the technologies used to build a particular websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

BunkerWeb Live Cyber Attack Threat Map

  • Website: https://threatmap.bunkerweb.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: BunkerWeb Live Cyber Attack Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Live cyber attack blocked by BunkerWeb, the open source and next generation Web Application Firewall.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Bureau Van Dijk

  • Website: http://www.bvdinfo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Bureau Van Dijk is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Business Source

  • Website: https://www.ebscohost.com/academic/business-source-complete
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Business Source is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Buzz sumo

  • Website: http://buzzsumo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Buzz sumo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: "Use our content insights to generate ideas, create high-performing content, monitor your performance and identify influencers.".

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Letter C

This letter section contains 84 tools.

CachedView

  • Website: http://cachedview.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CachedView is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

Cacoo

  • Website: https://cacoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cacoo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

CallerID Test

  • Website: https://calleridtest.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CallerID Test is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Get caller ID and telco carrier information back from a phone number.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

CampusCareerCenter

  • Website: http://www.campuscareercenter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CampusCareerCenter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Canada411

  • Website: http://www.canada411.ca
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Canada411 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search by person, phone number, and business. Free.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Canadian Business Research

  • Website: https://www.canada.ca/en/services/business/research.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Canadian Business Research is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Canva

  • Website: https://www.canva.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Canva is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Captin Fact

  • Website: https://captainfact.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Captin Fact is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Fact Checking.

Back to Name Jump

CareerBuilder

  • Website: http://www.careerbuilder.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CareerBuilder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Carrot2

  • Website: https://search.carrot2.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Carrot2 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Organizes your search results into topics.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Visual Search and Clustering Search Engines.

Back to Name Jump

CartoDB

  • Website: https://cartodb.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CartoDB is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Caselaw Access Project

  • Website: https://case.law/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Caselaw Access Project is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Collection of full text of historical (not up-to-date) cases from United States state appellate courts.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

CashedPages

  • Website: http://www.cachedpages.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CashedPages is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

Castrick

  • Website: https://castrickclues.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Castrick is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find social media accounts with email, username and phone number.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

CCleaner

  • Website: https://www.piriform.com/ccleaner
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CCleaner is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

CCTV

  • Website: https://github.com/IvanGlinkin/CCTV
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CCTV is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Close-Circuit Telegram Vision revolutionizes location tracking with its open-source design and Telegram API integration. Offering precise tracking within 50-100 meters, users can monitor others in real-time for logistics or safety, redefining how we navigate our surroundings.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Censys

  • Website: https://search.censys.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Censys is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searcher that monitors and analyzes devices.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Censys

  • Website: https://censys.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: Censys is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Censys is a search engine that allows computer scientists to ask questions about the devices and networks that compose the Internet by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

CentBrowser

  • Website: http://www.centbrowser.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CentBrowser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

CentOS Pastebin Service

  • Website: https://paste.centos.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CentOS Pastebin Service is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Stikked is an Open-Source PHP Pastebin, with the aim of keeping a simple and easy to use user interface.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Central Ops

  • Website: http://centralops.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Central Ops is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

CEPII

  • Website: http://www.cepii.fr/CEPII/en/welcome.asp
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CEPII is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

ChangeDetect

  • Website: http://www.changedetect.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ChangeDetect is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

ChangeDetection

  • Website: http://www.changedetection.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ChangeDetection is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

ChangeDetection.io

  • Website: https://changedetection.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ChangeDetection.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

ChangeDetection.io Open Source

  • Website: https://github.com/dgtlmoon/changedetection.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ChangeDetection.io Open Source is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Chart.js

  • Website: http://www.chartjs.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Chart.js is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a javascript library that allows you to create charts easly.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

chartblocks

  • Website: http://www.chartblocks.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: chartblocks is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

ChatSearchRobot

  • Website: https://t.me/ChatSearchRobot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ChatSearchRobot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Finds chats with similar topics; 709k+ VK chats.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Chatsecure

  • Website: https://chatsecure.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Chatsecure is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Check

  • Website: https://meedan.com/check
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Check is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Fact Checking.

Back to Name Jump

Check Point Live Cyber Threat Map

  • Website: https://threatmap.checkpoint.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Check Point Live Cyber Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Explore the top cyber threats of 2025, including ransomware, infostealers, and cloud vulnerabilities.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

CheckUser

  • Website: https://checkuser.vercel.app/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CheckUser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: search username across social networks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Chrome

  • Website: https://www.google.com/chrome
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Chrome is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Cipherstick

  • Website: https://cipherstick.tech
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cipherstick is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free OSINT Puzzles - No Account Needed!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

Circos

  • Website: http://circos.ca
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Circos is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Cisco Talos Intelligence

  • Website: https://talosintelligence.com/reputation_center
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cisco Talos Intelligence is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: IP and Domain Reputation Center for real-time threat detection.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Cisco Talos Intelligence

  • Website: https://talosintelligence.com/ebc_spam
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cisco Talos Intelligence is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

CiteSeerX

  • Website: http://citeseer.ist.psu.edu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CiteSeerX is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

cl1p

  • Website: https://Cl1p.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: cl1p is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The Internet Clipboard.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Clarify

  • Website: https://clarify.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Clarify is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Clarify

  • Website: http://clarify.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Clarify is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Classmates

  • Website: http://www.classmates.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Classmates is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: High-school focused people search. Free acounts allow creating a profile and viewing other members. Premium account required to contact other members.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

ClerkBot

  • Website: https://t.me/clerksecretbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ClerkBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Phone + username lookup; vehicle info.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Clip Blast

  • Website: http://www.clipblast.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Clip Blast is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Cloudflare Radar

  • Website: https://radar.cloudflare.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cloudflare Radar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Internet traffic patterns, attacks, and technology trends.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Clustermaps

  • Website: https://clustrmaps.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Clustermaps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find people and address information associated with them.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

CNN

  • Website: http://edition.cnn.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CNN is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Code Finder

  • Website: https://codefinder.dev/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Code Finder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The ultimate search engine for finding GitHub repositories.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

College Recruiter

  • Website: https://www.collegerecruiter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: College Recruiter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Colorbrewer

  • Website: http://colorbrewer2.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Colorbrewer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Columbus Project

  • Website: https://github.com/elmasy-com/columbus
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Columbus Project is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Columbus Project is an advanced subdomain discovery service with fast, powerful and easy to use API.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ DNS.

Back to Name Jump

commie

  • Website: https://commie.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: commie is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: commie is a pastebin script with line commenting support.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Comodo Dragon

  • Website: https://www.comodo.com/home/browsers-toolbars/browser.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Comodo Dragon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Company Registration Round the World

  • Website: http://www.commercial-register.sg.ch/home/worldwide.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Company Registration Round the World is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Company Research Resources by Country Comparably

  • Website: https://www.comparably.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Company Research Resources by Country Comparably is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

CompeteShark

  • Website: http://competeshark.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CompeteShark is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

ContactOut

  • Website: https://contactout.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ContactOut is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Unlock the world's most accurate contact data. Find emails & phone for 300M professionals.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Context

  • Website: https://ctxt.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Context is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Share whatever you see with others in seconds.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

ControlC Pastebin

  • Website: https://Controlc.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ControlC Pastebin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The easiest way to host your text.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Coowon

  • Website: http://coowon.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Coowon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Core

  • Website: https://core.ac.uk/search
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Core is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Corporate Information

  • Website: http://www.corporateinformation.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Corporate Information is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Aggregated information from publicly available sources on publicly traded companies worldwide.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

CorporationWiki

  • Website: https://www.corporationwiki.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CorporationWiki is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Craiglist

  • Website: http://losangeles.craigslist.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Craiglist is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

creately

  • Website: http://creately.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: creately is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

creationdatebot

  • Website: https://t.me/creationdatebot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: creationdatebot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Approx. Telegram account creation date.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

CredenShow

  • Website: https://credenshow.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CredenShow is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Identify your compromised credentials before others do.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data Breach Search Engines.

Back to Name Jump

creepy

  • Website: https://github.com/ilektrojohn/creepy
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: creepy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Geolocation OSINT tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Crossfilter

  • Website: http://square.github.io/crossfilter
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Crossfilter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

CrowdMap

  • Website: https://crowdmap.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CrowdMap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

CrunchBase

  • Website: http://www.crunchbase.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CrunchBase is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Business information database, with a focus on investment, acquisition, and executive data. Ancillary focus on market research and connecting founders and investors.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

CrunchBase

  • Website: https://www.crunchbase.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CrunchBase is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Detailed information on startup businesses, with a specific focus on funding sources and funding procedures used by specific businesses.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Cryptobin

  • Website: https://cryptobin.co/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cryptobin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The Ultimate Secure Pastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

CryptoBot

  • Website: https://t.me/CryptoBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CryptoBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Anonymous crypto wallet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

csvkit

  • Website: https://github.com/wireservice/csvkit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: csvkit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

CTLRQ Address Lookup

  • Website: https://ctrlq.org/maps/address
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CTLRQ Address Lookup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Cupidcr4wl

  • Website: https://github.com/OSINTI4L/cupidcr4wl
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cupidcr4wl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Username and phone number search tool that crawls adult content platforms to see if a targeted account or person is present.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Cutapaste

  • Website: https://cutapaste.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cutapaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Short Code and Share.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

CVFox

  • Website: http://www.cvfox.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: CVFox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Cyber Alert

  • Website: http://www.cyberalert.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cyber Alert is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Cyberbro

  • Website: https://github.com/stanfrbd/cyberbro
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cyberbro is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A self-hosted application, available as a Dockerized, for effortless searching and reputation checking of observables. Extracts IoCs from raw input and check their reputation using multiple services.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Cybergeist

  • Website: https://cybergeist.io/threat-actor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cybergeist is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Cybergeist.io generates intelligence profiles about key threats and threat context that is actively being discussed and reported upon across the internet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Cyotek WebCopy

  • Website: http://www.cyotek.com/cyotek-webcopy
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Cyotek WebCopy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a free tool for automatically downloading the content of a website onto your local device.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Letter D

This letter section contains 60 tools.

D3js

  • Website: https://d3js.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: D3js is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a powerful data visualization javascript library.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

DailyEarth

  • Website: http://dailyearth.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DailyEarth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

DailyMotion

  • Website: http://www.dailymotion.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DailyMotion is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Dark Web Informer

  • Website: https://darkwebinformer.com/threat-actor-database/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dark Web Informer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tracking 854 Threat Actors as of 29th of May 2025.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Data Visualization Catalogue

  • Website: http://datavizcatalogue.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Data Visualization Catalogue is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Data.com Connect

  • Website: https://connect.data.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Data.com Connect is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Data.gov.uk

  • Website: https://data.gov.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Data.gov.uk is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Databases - start.me

  • Website: https://start.me/p/QRENnO/databases
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: Databases - start.me is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Various databases which you can use for your OSINT research by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

DataSploit

  • Website: https://github.com/upgoingstar/datasploit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: DataSploit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Datasploit

  • Website: https://github.com/DataSploit/datasploit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Datasploit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool to perform various OSINT techniques on usernames, emails addresses, and domains.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Datawrapper

  • Website: https://datawrapper.de
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Datawrapper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

datXpert

  • Website: https://telegram.me/datxpertbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: datXpert is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Leak search via IntelX.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Daum (South Korea)

  • Website: https://www.daum.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Daum (South Korea) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

DBPedia

  • Website: http://wiki.dbpedia.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DBPedia is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

dCallsBot

  • Website: https://t.me/dCallsBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: dCallsBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Anonymous calls, masking, eSIM/DID.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

de digger

  • Website: https://www.dedigger.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: de digger is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a website that allows you to find any types of files that are publicly available in a Google Drive.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

Dedicated or Not

  • Website: http://dedicatedornot.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dedicated or Not is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Defuse

  • Website: https://defuse.ca/pastebin.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Defuse is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Encrypted Pastebin - Keep your data private and secure!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

DeHashed

  • Website: https://dehashed.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DeHashed is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: DeHashed helps prevent ATO with our extensive data set & breach notification solution. Match employee and consumer logins against the world’s largest repository of aggregated publicly available assets leaked from third-party breaches. Secure passwords before criminals can abuse stolen information, and protect your enterprise.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Dehashed CLI

  • Website: https://github.com/hmaverickadams/DeHashed-API-Tool
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dehashed CLI is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Command-line tool for searching breach databases via DeHashed API.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Deltafeed

  • Website: http://bitreading.com/deltafeed
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Deltafeed is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Depix

  • Website: https://github.com/beurtschipper/Depix
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: Depix is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for recovering passwords from pixelized screenshots (by de-pixelating text).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Detectiva

  • Website: http://detectiva.link/rezervBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Detectiva is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Phone/email lookup with 6 search types.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Deturl

  • Website: http://deturl.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Deturl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Download a YouTube video from any web page.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Dice

  • Website: http://www.dice.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dice is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

DiffChecker

  • Website: https://www.diffchecker.com/image-diff/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DiffChecker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

DiggReader

  • Website: http://digg.com/login?next=%2Freader
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DiggReader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

digiKam

  • Website: https://www.digikam.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: digiKam is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Digital Footprint Check

  • Website: https://www.digitalfootprintcheck.com/free-checker.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Digital Footprint Check is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Check for registered username on 100s of sites for free.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Disconnect

  • Website: https://disconnect.me
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Disconnect is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

  • Website: https://search.disconnect.me/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Disconnect Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Stop search engines from tracking your searches.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

Discord Sensor

  • Website: https://telegram.me/discordsensorbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Discord Sensor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Retrieves Discord account data.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Discoshell

  • Website: https://github.com/foozzi/discoshell
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Discoshell is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A simple discovery script that uses popular tools like subfinder, amass, puredns, alterx, massdns and others.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

DNS History

  • Website: https://completedns.com/dns-history/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DNS History is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

DNSStuff

  • Website: http://www.dnsstuff.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DNSStuff is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

DNSViz

  • Website: http://dnsviz.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DNSViz is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Do Not Track

  • Website: http://donottrack.us
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Do Not Track is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

DocumentCloud

  • Website: https://www.documentcloud.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DocumentCloud is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Platform for analyzing, annotating, and publishing documents.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

Dolphin Radar

  • Website: https://www.dolphinradar.com/web-viewer-for-instagram
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dolphin Radar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: An Instagram Post Viewer lets you view posts, stories, and profiles from public accounts with ease. Free viewer limit: 1.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Instagram.

Back to Name Jump

Domain Crawler

  • Website: http://www.domaincrawler.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Domain Crawler is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Domain Dossier

  • Website: http://centralops.net/co/DomainDossier.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Domain Dossier is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Domain Tools

  • Website: http://whois.domaintools.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Domain Tools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Whois lookup and domain/ip historical data.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

domain_analyzer

  • Website: https://github.com/eldraco/domain_analyzer
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: domain_analyzer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Analyze the security of any domain by finding all the information possible by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > Sub Domain Enumeration.

Back to Name Jump

Dominoc925

  • Website: https://dominoc925-pages.appspot.com/mapplets/cs_mgrs.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dominoc925 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

dork-cli

  • Website: https://github.com/jgor/dork-cli
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: dork-cli is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Command line Google dork tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

dorkbot

  • Website: https://github.com/utiso/dorkbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: dorkbot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Command-line tool to scan Google (or other) search results for vulnerabilities.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

DorkGenius

  • Website: https://dorkgenius.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DorkGenius is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: DorkGenius is the ultimate tool for generating custom search queries for Google, Bing, and DuckDuckGo. - Our cutting-edge app uses the power of AI to help you create advanced search queries that can find exactly what you're looking for on the web.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Google Dorks Tools.

Back to Name Jump

DorkGPT

  • Website: https://www.dorkgpt.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DorkGPT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Artificial intelligence that generates advanced search queries to find specific or hidden information on the internet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Google Dorks Tools.

Back to Name Jump

DownloadHelper

  • Website: http://www.downloadhelper.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DownloadHelper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Download any video from any websites, it just works!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

doxbin

  • Website: https://doxbin.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: doxbin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A dox style pastebin ran by hackers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

DPA International

  • Website: http://www.dpa-international.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DPA International is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

dpaste

  • Website: https://Dpaste.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: dpaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

dpaste2

  • Website: https://Dpaste.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: dpaste2 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Draugiem (Latvia)

  • Website: https://www.draugiem.lv
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Draugiem (Latvia) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Dropmark

  • Website: http://www.dropmark.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dropmark is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

DualMaps

  • Website: https://www.mapchannels.com/dualmaps7/map.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DualMaps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

DuckDuckGo

  • Website: https://duckduckgo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DuckDuckGo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: an Internet search engine that emphasizes protecting searchers' privacy.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

DuckDuckGo URL scraper

  • Website: https://github.com/its0x08/duckduckgo
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: DuckDuckGo URL scraper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A simple DuckDuckGo URL scraper.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Dupli Checker

  • Website: https://www.duplichecker.com/reverse-image-search.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Dupli Checker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: You can search for an image by uploading + with URL or typing the keyword or any word you want to explore related to images.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

dygraphs

  • Website: http://dygraphs.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: dygraphs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Letter E

This letter section contains 46 tools.

easely

  • Website: http://www.easel.ly
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: easely is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Easy whois

  • Website: https://www.easywhois.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Easy whois is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

EasyVIN

  • Website: https://t.me/EasyVINbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EasyVIN is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Cheap VIN/plate history check.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

EDGAR U.S. Securities and Exchange Commission Filings

  • Website: http://www.edgar-online.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EDGAR U.S. Securities and Exchange Commission Filings is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Periodic reports and extensive corporate disclosures from all businesses publicly traded in the United States.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Edge

  • Website: https://www.microsoft.com/en-us/windows/microsoft-edge/microsoft-edge
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Edge is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

egrul_bot

  • Website: https://t.me/egrul_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: egrul_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free counterparty-check bot.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

eHow

  • Website: http://www.ehow.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: eHow is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

eInvestigator

  • Website: https://www.einvestigator.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: eInvestigator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

Elsevier

  • Website: https://www.elsevier.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Elsevier is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Eluta (Canada)

  • Website: http://www.eluta.ca
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Eluta (Canada) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Email Address Validator

  • Website: http://www.email-validator.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Email Address Validator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Improve deliverability, reduce bounce rates, prevent fraud and minimize funnel leaks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Email Format

  • Website: http://email-format.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Email Format is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a website that allows you to find email address formats used by different companies.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Email Permutator

  • Website: https://www.polished.app/email-permutator/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Email Permutator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a powerful tool designed to aid professionals in generating a range of potential email addresses for a specific contact.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

EmailHippo

  • Website: https://tools.verifyemailaddress.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EmailHippo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is an email address verification platform that will check whether a given email address exist or not.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

EmailRep

  • Website: https://emailrep.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EmailRep is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Email address reputation and risk scoring service.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Emergent

  • Website: http://www.emergent.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Emergent is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Fact Checking.

Back to Name Jump

EmobileTracker.com

  • Website: https://www.emobiletracker.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EmobileTracker.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a service specifically designed to Track Mobile Number, Location on Google Map including information such as the owner's Name,Location,Country,Telecom provider.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

EncSF MP

  • Website: http://encfsmp.sourceforge.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EncSF MP is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Eniro (Sweden)

  • Website: http://www.eniro.se
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Eniro (Sweden) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Epic Privacy Browser

  • Website: https://www.epicbrowser.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Epic Privacy Browser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

EpicVIN

  • Website: https://epicvin.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EpicVIN is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Vehicle reports are compiled from various data sources, including historical accident records from state agencies and other entities like NMVTIS. License plate lookup that returns VIN and car millage.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Vehicle / Automobile Research.

Back to Name Jump

Epieos

  • Website: https://epieos.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Epieos is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for social accounts with e-mail and phone.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Epieos Tools

  • Website: https://tools.epieos.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Epieos Tools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Collection of OSINT tools for email investigations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Eraser

  • Website: http://eraser.heidi.ie
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Eraser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

espi0n/Dockerfiles

  • Website: https://github.com/espi0n/Dockerfiles
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: espi0n/Dockerfiles is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Dockerfiles for various OSINT tools by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

Esri

  • Website: http://www.esri.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Esri is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

ETDA

  • Website: https://apt.etda.or.th/cgi-bin/listgroups.cgi
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ETDA is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for Threat Actor groups and their tools.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Etools

  • Website: http://www.etools.ch
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Etools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

Etusivu

  • Website: https://pastebin.fi/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Etusivu is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: It's an open source clone of pastebin.com. Default Language is Finnish.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Eurojobs

  • Website: https://www.eurojobs.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Eurojobs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Europages

  • Website: http://www.europages.co.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Europages is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

European Business Register

  • Website: http://www.ebr.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: European Business Register is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

European Union Open Data Portal

  • Website: http://open-data.europa.eu/en/data
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: European Union Open Data Portal is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Eurostat

  • Website: http://ec.europa.eu/eurostat
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Eurostat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Exhibit

  • Website: http://www.simile-widgets.org/exhibit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Exhibit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

EXIFEditor.io

  • Website: https://exifeditor.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Forensics

What it does: EXIFEditor.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: In-browser, privacy first EXIF Viewer/Editor/Analysis tool (Zero Sign Up). Home to the The EXIF Guide, and The EXIF Quiz.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Forensics > Tools > Metadata Forensics.

Back to Name Jump

ExifLooter

  • Website: https://github.com/aydinnyunus/exiflooter
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ExifLooter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

ExifTool

  • Website: http://www.sno.phy.queensu.ca/~phil/exiftool
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome CTF

What it does: ExifTool is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

ExpertiseFinder

  • Website: http://www.expertisefinder.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ExpertiseFinder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

ExpertPages

  • Website: http://expertpages.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ExpertPages is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Experts.com

  • Website: http://www.experts.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Experts.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

ExportData

  • Website: https://www.exportdata.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ExportData is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Data export tool for historical tweets, followers & followings and historical trends.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

eyedex

  • Website: https://www.eyedex.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: eyedex is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Open directory search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

EyeTON

  • Website: https://telegram.me/istoneyebot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: EyeTON is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: TON wallet graph + linked profiles.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

EyeWitness

  • Website: https://github.com/ChrisTruncer/EyeWitness
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome Web Security

What it does: EyeWitness is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

Ezilon

  • Website: http://www.ezilon.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ezilon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Letter F

This letter section contains 58 tools.

Faceagle

  • Website: https://faceagle.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Faceagle is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Faceagle is a face recognition search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

FaceCheck.ID

  • Website: https://facecheck.id
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FaceCheck.ID is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Facial recognition search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Fact Check

  • Website: http://www.factcheck.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Fact Check is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Fact Checking.

Back to Name Jump

Factiva

  • Website: https://global.factiva.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Factiva is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Factiva

  • Website: http://www.dowjones.com/factiva
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Factiva is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

FaganFinder

  • Website: http://www.faganfinder.com/engines
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FaganFinder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

  • Website: https://familysearch.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Family Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Popular genealogy site. Free, but registration required. Funded by The Church Of Jesus Christ of Latter-day Saints.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

FamilyTreeNow

  • Website: https://familytreenow.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FamilyTreeNow is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Research family and geneology, no registration required, can search addresses, phone numbers, and email addresses as well as associations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Fanpage Karma

  • Website: http://www.fanpagekarma.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Fanpage Karma is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Facebook.

Back to Name Jump

fast-recon

  • Website: https://github.com/DanMcInerney/fast-recon
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: fast-recon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Perform Google dorks against a domain.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

FaviconHash

  • Website: https://kriztalz.sh/favicon-hash/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FaviconHash is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Generate favicon hashes of a website for use on Shodan, VirusTotal, Censys, ZoomEye or FOFA.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

FaxVIN

  • Website: https://www.faxvin.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FaxVIN is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Vehicle History Reports. A license plate lookup tool that returns info like VIN, make & model of vehicle, age, and numerous other details.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Vehicle / Automobile Research.

Back to Name Jump

Federal Bureau of Prisons - Inmate Locator (US)

  • Website: http://www.bop.gov/inmateloc
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Federal Bureau of Prisons - Inmate Locator (US) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search federal inmates incarcerated from 1982 to the present.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Feed Exileed

  • Website: http://feed.exileed.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Feed Exileed is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Feed Filter Maker

  • Website: http://feed.janicek.co
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Feed Filter Maker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

FeedBooster

  • Website: http://www.qsensei.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FeedBooster is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Feederator

  • Website: http://www.feederator.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Feederator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Feedly

  • Website: http://www.feedly.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Feedly is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

FeedReader

  • Website: http://www.feedreader.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FeedReader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

FetchRSS

  • Website: http://fetchrss.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FetchRSS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

FileListing

  • Website: https://filelisting.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FileListing is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

FilePursuit

  • Website: https://filepursuit.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FilePursuit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

Filesec.io

  • Website: https://filesec.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Filesec.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Central resource cataloging malicious file extensions, their risks, OS and mitigations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

FileVault

  • Website: https://support.apple.com/en-us/HT204837
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FileVault is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Filmot

  • Website: https://filmot.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Filmot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search within YouTube subtitles. Indexing over 573 million captions across 528 million videos and 45 million channels.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Find osint tool

  • Website: https://find.osint-tool.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Find osint tool is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches multiple OSINT tools to find information across various sources.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Find YouTube Video

  • Website: https://findyoutubevideo.thetechrobo.ca/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Find YouTube Video is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches currently 5 YouTube archives for specific videos by ID, which is really useful for finding deleted or private YouTube videos.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Find-pdf-doc

  • Website: http://www.findpdfdoc.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Find-pdf-doc is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

FindStickerCreator

  • Website: https://t.me/SPOwnerBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FindStickerCreator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Finds creator of any Telegram sticker pack.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Firefox

  • Website: https://www.mozilla.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Firefox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Fish4Jobs

  • Website: http://www.fish4.co.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Fish4Jobs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Flash Earth

  • Website: http://www.flashearth.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Flash Earth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Flickr

  • Website: https://flickr.com/search/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Flickr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Flipboard

  • Website: https://flipboard.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Flipboard is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

Flipboard

  • Website: http://flipboard.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Flipboard is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Flot

  • Website: http://www.flotcharts.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Flot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

FOCA

  • Website: https://github.com/ElevenPaths/FOCA
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Forensics, Awesome Web Security

What it does: FOCA is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: FOCA (Fingerprinting Organizations with Collected Archives) is a tool used mainly to find metadata and hidden information in the documents its scans by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

FOCA (Fingerprinting Organizations with Collected Archives)

  • Website: https://www.elevenpaths.com/labstools/foca/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: FOCA (Fingerprinting Organizations with Collected Archives) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Automated document harvester that searches Google, Bing, and DuckDuckGo to find and extrapolate internal company organizational structures.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Metadata harvesting and analysis.

Back to Name Jump

FOFA

  • Website: https://en.fofa.info/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FOFA is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Asset search and analysis tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

FOFA

  • Website: https://fofa.so/?locale=en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: FOFA is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Cyberspace Search Engine by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

Fold3 (US Military Records)

  • Website: http://www.fold3.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Fold3 (US Military Records) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search military records. Search filters limited with free access. Premium access requires subscription.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Foller.me

  • Website: http://foller.me
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Foller.me is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Follow.net

  • Website: http://follow.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Follow.net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

FollowThatPage

  • Website: http://www.followthatpage.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FollowThatPage is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Forbes Global 2000

  • Website: http://www.forbes.com/global2000/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Forbes Global 2000 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Forensically

  • Website: https://29a.ch/photo-forensics/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Forensically is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

FortiGuard Labs

  • Website: https://www.fortiguard.com/threat-actor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FortiGuard Labs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Powered by FortiGuard Labs, our Threat Actor Encyclopedia provides actionable insights, helping security teams prepare and streamline advanced threat hunting and response.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Fortiguard Labs

  • Website: https://fortiguard.fortinet.com/threat-map
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Fortiguard Labs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: FortiGuard Outbreak Alerts provides key information about on-going cybersecurity attack with significant ramifications affecting numerous companies, organizations and industries.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

FotoForensics

  • Website: http://www.fotoforensics.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FotoForensics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

Frame by Frame

  • Website: https://chrome.google.com/webstore/detail/frame-by-frame/cclnaabdfgnehogonpeddbgejclcjneh/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Frame by Frame is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Browser plugin that allows you to watch YouTube videos frame by frame.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

France24

  • Website: http://www.france24.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: France24 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Free Full PDF

  • Website: http://www.freefullpdf.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Free Full PDF is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

Freebase

  • Website: https://developers.google.com/freebase
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Freebase is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

FreeCarrierLookup

  • Website: https://freecarrierlookup.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FreeCarrierLookup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: enter a phone number and we'll return the carrier name and whether the number is wireless or landline. We also return the email-to-SMS and email-to-MMS gateway addresses for USA and Canadian* phone numbers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Friendpaste

  • Website: https://friendpaste.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Friendpaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paste stuff to your friends.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Full Fact

  • Website: https://fullfact.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Full Fact is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Fact Checking.

Back to Name Jump

FullHunt

  • Website: https://fullhunt.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FullHunt is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: FullHunt is an OSINT tool focused on identifying and protecting internet-exposed assets.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

FusionCharts

  • Website: http://www.fusioncharts.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: FusionCharts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Letter G

This letter section contains 77 tools.

Gapminder World

  • Website: http://www.gapminder.org/data
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Gapminder World is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Genealogy Bank

  • Website: http://www.genealogybank.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Genealogy Bank is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Premium data, free trial with credit card.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

  • Website: http://www.genealogylinks.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Genealogy Links is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Genealogy directory with over 50K links.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Geocreepy

  • Website: http://www.geocreepy.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Geocreepy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

GeoGig

  • Website: http://geogig.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GeoGig is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

GeoGuessr.ai

  • Website: https://geoguessr.ai
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GeoGuessr.ai is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: AI-powered geolocation tool for identifying locations from images.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

GeoInfer

  • Website: https://geoinfer.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GeoInfer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Image geolocation tool, no EXIF data required.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

GeoMacFinder

  • Website: https://t.me/geomacbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GeoMacFinder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Finds Wi-Fi AP location by MAC/BSSID.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

GeoNames

  • Website: http://www.geonames.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GeoNames is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Geosearch

  • Website: http://www.geosearchtool.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Geosearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

GeoSpy

  • Website: https://geospy.web.app/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GeoSpy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: AI based image osint tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

Gerdoo (Iran)

  • Website: http://gerdoo.me
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Gerdoo (Iran) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Getairplane

  • Website: https://telegram.me/getairplane_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Getairplane is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Phone → flight history (20 years).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

getChatList

  • Website: https://telegram.me/getchatlistbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: getChatList is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Shows user’s group list.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

GetSendGifts

  • Website: https://telegram.me/GetSendGiftsProBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GetSendGifts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Shows who sent Telegram gifts.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Ghostery

  • Website: https://www.ghostery.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ghostery is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

GhostProject

  • Website: https://ghostproject.fr/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: GhostProject is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searchable database of billions of cleartext passwords, partially visible for free.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > OSINT Online Resources.

Back to Name Jump

Ghunt

  • Website: https://github.com/mxrch/GHunt
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ghunt is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Investigate Google emails and documents.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Gibiru

  • Website: https://gibiru.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Gibiru is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Gibiru provides “uncensored search results” without collecting personal data like logging users’ IP addresses or search queries.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

  • Website: https://github.com/search?type=code
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GitHub Code Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: GitHub's enhanced code search with advanced filtering.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

GitHub gist

  • Website: https://gist.github.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GitHub gist is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

github-dorks

  • Website: https://github.com/techgaun/github-dorks
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: github-dorks is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: CLI tool to scan GitHub repos/organizations for potential sensitive information leaks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

github_monitor

  • Website: https://github.com/misiektoja/github_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: github_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of GitHub users' activities including profile and repository changes with support for email alerts, CSV logging, detection when a user blocks or unblocks you and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ GitHub.

Back to Name Jump

GithubRecon

  • Website: https://kriztalz.sh/github-recon/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GithubRecon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Lookup Github users by username or email and gather associated data.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ GitHub.

Back to Name Jump

Gitrecon

  • Website: https://github.com/atiilla/gitrecon
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Gitrecon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Node.js tool to scan GitHub repositories for exposed email addresses and names.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

gitrob

  • Website: https://github.com/michenriksen/Gitrob
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: gitrob is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reconnaissance tool for GitHub organizations by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

Glassdoor

  • Website: https://www.glassdoor.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Glassdoor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Glit

  • Website: https://github.com/shadawck/glit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Glit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Retrieve all mails of users related to a git repository, a git user or a git organization.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

globalEdge

  • Website: http://globaledge.msu.edu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: globalEdge is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

globalEDGE Database of International Business Statistics

  • Website: http://globaledge.msu.edu/tools-and-data/dibs
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: globalEDGE Database of International Business Statistics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

GlobalExperts

  • Website: http://www.theglobalexperts.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GlobalExperts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

gmapcatcher

  • Website: https://github.com/heldersepu/gmapcatcher
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: gmapcatcher is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Gnu Icecat

  • Website: https://icecatbrowser.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Gnu Icecat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

GNU PG

  • Website: https://www.gnupg.org/download/index.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GNU PG is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Goo (Japan)

  • Website: http://www.goo.ne.jp
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Goo (Japan) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

GoodFirms

  • Website: https://www.goodfirms.co/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GoodFirms is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

GooDork

  • Website: https://github.com/k3170makan/GooDork
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: GooDork is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Command line Google dorking tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

Goodsearch

  • Website: https://www.goodsearch.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Goodsearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a search engine for shopping deals online.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Goofram

  • Website: http://www.goofram.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Goofram is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

Google Adwords

  • Website: http://adwords.google.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Adwords is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Get monthly keyword volume data and stats.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

Google Alerts

  • Website: http://www.google.com/alerts
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Alerts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A content change detection and notification service.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

  • Website: http://www.google.com/cse
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Custom Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Google Developers: Charts

  • Website: https://developers.google.com/chart
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Developers: Charts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Google Earth

  • Website: http://www.google.com/earth
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Earth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Google Earth Pro

  • Website: https://www.google.com/intl/en/earth/versions/#earth-pro
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Earth Pro is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Google Finance

  • Website: https://www.google.com/finance
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Finance is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Google Groups

  • Website: https://groups.google.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Groups is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

Google Hacking Database

  • Website: https://www.exploit-db.com/google-hacking-database/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome OSINT, Awesome Cyber Security Tools

What it does: Google Hacking Database is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

Google Image

  • Website: https://images.google.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Image is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Google Lens

  • Website: https://lens.google.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Lens is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Google Maps

  • Website: https://www.google.com/maps
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Google My Maps

  • Website: https://www.google.com/maps/about/mymaps
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google My Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Google Public Data Explorer

  • Website: http://www.google.com/publicdata/directory
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Public Data Explorer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Google Scholar

  • Website: https://scholar.google.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Scholar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

  • Website: https://www.google.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Most popular search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

  • Website: https://www.google.com/trends
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Google Trends is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: See how many users are searching for specific keywords.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

gOSINT

  • Website: https://github.com/Nhoya/gOSINT
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: gOSINT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: OSINT tool with multiple modules and a telegram scraper.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Government of Canada Open Data

  • Website: http://open.canada.ca/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Government of Canada Open Data is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

GPG Tools

  • Website: https://gpgtools.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GPG Tools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

GPSVisualizer

  • Website: http://www.gpsvisualizer.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GPSVisualizer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

GraphX

  • Website: http://spark.apache.org/graphx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GraphX is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

GraphyStories

  • Website: http://app.graphystories.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GraphyStories is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

GrassGIS

  • Website: http://grass.osgeo.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GrassGIS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

GrayhatWarfare

  • Website: https://grayhatwarfare.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GrayhatWarfare is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches and indexes open Amazon S3 buckets, allowing users to find and explore potentially exposed data.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

grep.app

  • Website: https://grep.app/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: grep.app is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches code from the entire github public repositories for a given specific string or using regular expression.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

Grey Guide

  • Website: http://greyguide.isti.cnr.it
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Grey Guide is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Grey Literature Strategies

  • Website: http://greylitstrategies.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Grey Literature Strategies is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Grey Literature – List of Gateways

  • Website: http://csulb.libguides.com/graylit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Grey Literature – List of Gateways is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

GreyNet International

  • Website: http://www.greynet.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GreyNet International is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

GreyNoise

  • Website: https://viz.greynoise.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GreyNoise is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search Exposed Internet assets, Malicious IP's.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

GroupDa

  • Website: https://groupda.com/telegram/group/search
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GroupDa is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Can be used for Searching Telegram Channels. Search by Category, Countries and Language.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

GSDF

  • Website: https://github.com/We5ter/GSDF
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: GSDF is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Domain searcher named GoogleSSLdomainFinder by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > Sub Domain Enumeration.

Back to Name Jump

GSIL

  • Website: https://github.com/FeeiCN/GSIL
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: GSIL is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Github Sensitive Information Leakage(Github敏感信息泄露)by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

Guardian Project

  • Website: https://guardianproject.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Guardian Project is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Guerrilla Mail

  • Website: https://www.guerrillamail.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Guerrilla Mail is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

GuideStar

  • Website: http://www.guidestar.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: GuideStar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

GyoiThon

  • Website: https://github.com/gyoisamurai/GyoiThon
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: GyoiThon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: GyoiThon is an Intelligence Gathering tool using Machine Learning.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Letter H

This letter section contains 32 tools.

h8mail

  • Website: https://github.com/khast3x/h8mail
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: h8mail is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Password Breach Hunting and Email OSINT, locally or using premium services. Supports chasing down related email.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Hacking Cryptocurrency Miners with OSINT Techniques

  • Website: https://medium.com/@s3yfullah/hacking-cryptocurrency-miners-with-osint-techniques-677bbb3e0157
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: Hacking Cryptocurrency Miners with OSINT Techniques is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Written by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Introduction > OSINT.

Back to Name Jump

  • Website: https://www.harmari.com/search/unified
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Harmari (Unified Listings Search) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

HARO

  • Website: http://www.helpareporter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HARO is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

HashBin

  • Website: https://hashb.in/#Q===
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HashBin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: HashBin is a paste bin that never sees the contents of its pastes.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

hastebin

  • Website: https://www.toptal.com/developers/hastebin/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: hastebin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Have I Been Pwned

  • Website: https://haveibeenpwned.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Web Security

What it does: Have I Been Pwned is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search across multiple data breaches to see if your email address has been compromised.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Social Engineering Database.

Back to Name Jump

HCL Threat Map

  • Website: https://www.hcltech.com/hcl-threat-map
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HCL Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Cyber Threat Map by HCLTech.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Headhunter

  • Website: http://www.headhunter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Headhunter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

HeadlineSpot

  • Website: http://www.headlinespot.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HeadlineSpot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Here

  • Website: http://here.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Here is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

HEROIC.NOW

  • Website: https://heroic.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HEROIC.NOW is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Has your data been leaked on the dark web? Scan your identities for FREE.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data Breach Search Engines.

Back to Name Jump

HIB Ransomed

  • Website: https://haveibeenransom.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HIB Ransomed is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Because people have the right to know if their data has been leaked.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data Breach Search Engines.

Back to Name Jump

Highcharts

  • Website: http://www.highcharts.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Highcharts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

HighWire: Free Online Full-text Articles

  • Website: http://highwire.stanford.edu/lists/freeart.dtl
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HighWire: Free Online Full-text Articles is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

HimeraSearch

  • Website: https://t.me/HimeraNeGBL8Pro1dp_Search_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HimeraSearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: OSINT/HUMINT search: phones, emails, vehicles, people, courts.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

HIS Piers

  • Website: https://www.ihs.com/products/piers.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HIS Piers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Hohli

  • Website: http://charts.hohli.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hohli is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Holehe

  • Website: https://github.com/megadose/holehe
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Holehe is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Homemetry

  • Website: https://homemetry.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Homemetry is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reverse address search and allows searching for properties for sale/rent.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Hooey webprint

  • Website: http://www.hooeeywebprint.com.s3-website-us-east-1.amazonaws.com/download.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hooey webprint is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Hootsuite

  • Website: http://hootsuite.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hootsuite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Hoovers

  • Website: http://www.hoovers.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hoovers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Hotspot Shield

  • Website: https://www.hotspotshield.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hotspot Shield is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

HTTPs Everywhere

  • Website: https://www.eff.org/https-everywhere/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HTTPs Everywhere is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

HTTrack

  • Website: http://www.httrack.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HTTrack is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Allows you to download a World Wide Web site from the Internet to a local directory, building recursively all directories, getting HTML, images, and other files from the server to your computer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Human Development Reports

  • Website: http://hdr.undp.org/en/global-reports
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Human Development Reports is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Hunchly

  • Website: https://www.hunch.ly/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hunchly is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Hunchly is a web capture tool designed specifically for online investigations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Hunter Search Engine

  • Website: https://hunter.how/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hunter Search Engine is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search Exposed Internet assets, open web directories and many more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Hunter.io

  • Website: https://hunter.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome OSINT

What it does: Hunter.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Data broker providing a Web search interface for discovering the email addresses and other organizational details of a company.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Data Broker and Search Engine Services.

Back to Name Jump

Hyperlapse

  • Website: https://github.com/TeehanLax/Hyperlapse.js
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Hyperlapse is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

HypeStat

  • Website: https://www.hypestat.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: HypeStat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Letter I

This letter section contains 67 tools.

IBM X-Force Exchange Current Malicious Activity

  • Website: https://exchange.xforce.ibmcloud.com/activity/map
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IBM X-Force Exchange Current Malicious Activity is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Icann Lookup

  • Website: https://lookup.icann.org/en/lookup
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Icann Lookup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The site allows you to look up domain registration information (WHOIS) on the internet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Iconosquare

  • Website: http://iconosquare.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Iconosquare is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Instagram.

Back to Name Jump

IDCrawl

  • Website: https://www.idcrawl.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IDCrawl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for a name in popular social networks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

IDCrawl

  • Website: https://www.idcrawl.com/username
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IDCrawl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for a username in popular social networks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Idealist

  • Website: http://www.idealist.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Idealist is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

ideone

  • Website: https://Ideone.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ideone is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

IKnowYour.Dad

  • Website: https://iknowyour.dad/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IKnowYour.Dad is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Data Breach Search Engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data Breach Search Engines.

Back to Name Jump

  • Website: http://www.ilo.org/global/research/global-reports/weso/2015/lang--en/index.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ILO World Employment and Social Outlook Trends is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

ILOSTAT

  • Website: http://www.ilo.org/ilostat/faces/oracle/webcenter/portalapp/pagehierarchy/Page137.jspx?_afrLoop=443508925711569&clean=true#%40%3F_afrLoop%3D443508925711569%26clean%3Dtrue%26_adf.ctrl-state%3Dl4dwldaf3_9
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ILOSTAT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Image Identification Project

  • Website: https://www.imageidentify.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Image Identification Project is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Image Raider

  • Website: https://www.imageraider.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Image Raider is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is our reverse image search tool for completing individual searches. When you upload an image to this page, we'll scour the internet to find its source and all of the other pages where it has been posted.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

image-match

  • Website: https://github.com/ascribe/image-match
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: image-match is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Quickly search over billions of images.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

IMF World Economic Outlook Database

  • Website: http://www.imf.org/external/ns/cs.aspx?id=28
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IMF World Economic Outlook Database is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

ImgOps

  • Website: https://imgops.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ImgOps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

Imgur

  • Website: http://imgur.com/search?q=
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Imgur is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The most popular image hosting website used by redditors.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

Impersonal.me

  • Website: http://www.impersonal.me
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Impersonal.me is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Imperva Live Threat Map

  • Website: https://www.imperva.com/cyber-threat-attack-map/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Imperva Live Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A real-time global view of DDoS attacks, hacking attempts, and bot assaults mitigated by Imperva security services.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

ImpulseAdventure

  • Website: http://www.impulseadventure.com/photo/jpeg-snoop.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ImpulseAdventure is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

Inc. 5000

  • Website: http://www.inc.com/inc5000
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Inc. 5000 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Indeed

  • Website: http://www.indeed.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Indeed is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is an online job searching website that gives job seekers free access to search for a job, post their resumes, and research companies.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Index Mundi

  • Website: http://www.indexmundi.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Index Mundi is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Infobel

  • Website: https://www.infobel.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Infobel is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search 164+ million records across 73 countries for companies and individuals. Find places, local service providers, their contact details, reviews, opening hours and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Infogr.am

  • Website: https://infogr.am
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Infogr.am is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

InfoMinder

  • Website: http://www.infominder.com/webminder
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InfoMinder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

infosec reference

  • Website: https://github.com/rmusser01/Infosec_Reference
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Web Security

What it does: infosec reference is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Information Security Reference That Doesn't Suck by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Related Awesome Lists.

Back to Name Jump

Infosniper

  • Website: http://www.infosniper.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Infosniper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

InfoTracer

  • Website: https://infotracer.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InfoTracer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for people. (Searches are paid).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Inkscape

  • Website: https://inkscape.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Inkscape is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

InMobPrefix

  • Website: https://github.com/hstsethi/in-mob-prefix
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InMobPrefix is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Dataset, charts, models about mobile phone numbers prefixes in India along with their respective state, operator.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Innocentive

  • Website: http://www.innocentive.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Innocentive is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Insecam

  • Website: http://insecam.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Insecam is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Live cameras directory.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Inshorts

  • Website: https://www.inshorts.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Inshorts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

Insight

  • Website: https://t.me/ibhld_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Insight is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Shows interests based on subscriptions.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Inspire Geoportal

  • Website: http://inspire-geoportal.ec.europa.eu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Inspire Geoportal is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

InstaAnonym

  • Website: https://t.me/instaanonymbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InstaAnonym is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Anonymous Instagram/VK viewer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

InstaBot

  • Website: https://telegram.me/InstaBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InstaBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Downloads Instagram media.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Instagram

  • Website: https://www.instagram.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Instagram is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

instagram_monitor

  • Website: https://github.com/misiektoja/instagram_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: instagram_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Instagram users' activities and profile changes with support for email alerts, CSV logging, showing media in the terminal, anonymous story downloads and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Instagram.

Back to Name Jump

InstagramPrivSniffer

  • Website: https://github.com/obitouka/InstagramPrivSniffer
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InstagramPrivSniffer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Views Instagram PRIVATE ACCOUNT'S media without login 😱.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Instagram.

Back to Name Jump

Instant Google Street View

  • Website: http://www.instantstreetview.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Instant Google Street View is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

InstantAtlas

  • Website: http://www.instantatlas.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: InstantAtlas is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

IntelHub

  • Website: https://github.com/tomsec8/IntelHub
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IntelHub is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Browser-based open-source OSINT extension. All analysis runs locally (no servers). Features include text profiler, metadata analyzer, site & archive analysis, reverse image search, crypto/telegram analyzers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Intelligence X

  • Website: https://intelx.io/tools
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Intelligence X is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paid OSINT Tool Allowing users to search for information across various sources including the dark web and public data leaks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

IntellyWeave

  • Website: https://github.com/vericle/intellyweave
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IntellyWeave is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: AI-powered OSINT platform with GLiNER entity extraction, Mapbox 3D geospatial visualization, and multi-agent archive research across 30+ international archives.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

IntelTechniques

  • Website: https://inteltechniques.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IntelTechniques is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

International Energy Agency Statistics

  • Website: http://www.iea.org/statistics
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: International Energy Agency Statistics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

International Labour Comparisons

  • Website: http://www.bls.gov/fls/chartbook.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: International Labour Comparisons is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

International Trade Center

  • Website: http://www.intracen.org/ByCountry.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: International Trade Center is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Internet Archive

  • Website: https://archive.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Internet Archive is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Internet Archive: Open Source Videos

  • Website: https://archive.org/details/opensource_movies
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Internet Archive: Open Source Videos is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Internet Experts

  • Website: http://www.internetexperts.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Internet Experts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

intoDNS

  • Website: http://www.intodns.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: intoDNS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Intrigue

  • Website: http://intrigue.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: Intrigue is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Automated OSINT & Attack Surface discovery framework with powerful API, UI and CLI.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

IP 2 Geolocation

  • Website: http://ip2geolocation.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IP 2 Geolocation is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IP 2 Location

  • Website: http://www.ip2location.com/demo.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IP 2 Location is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IP Checking

  • Website: http://www.ipchecking.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IP Checking is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IP Geolocation API DB-IP

  • Website: https://db-ip.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IP Geolocation API DB-IP is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Pprovides IP geolocation and intelligence.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IP Location

  • Website: https://www.iplocation.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IP Location is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is used for mapping of an IP address or MAC address to the real-world geographic location of an Internet-connected computing or a mobile device.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IP Location.io

  • Website: https://iplocation.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IP Location.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: IPLocation.io allows you to check the location of an IP for free.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IPFingerprints

  • Website: http://www.ipfingerprints.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IPFingerprints is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is used to find the approximate geographic location of an IP address along with some other useful information including ISP, TimeZone, Area Code, State.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

IPVoid

  • Website: http://www.ipvoid.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: IPVoid is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: IP address toolset.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Islegitsite

  • Website: https://www.islegitsite.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Islegitsite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Checks if a website is trustworthy by analyzing its reputation, domain, and security based on public sources.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Itar-Tass

  • Website: http://www.itar-tass.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Itar-Tass is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

ITP Infotrack

  • Website: https://infotrackpeople.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ITP Infotrack is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: People, vehicle, property lookup.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

ivpaste

  • Website: https://Ivpaste.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ivpaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

iZito

  • Website: http://www.izito.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: iZito is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

Letter J

This letter section contains 15 tools.

Java Infovis Toolkit

  • Website: http://philogb.github.io/jit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Java Infovis Toolkit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Jeffreys Image Metadata Viewer

  • Website: http://exif.regex.info/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Jeffreys Image Metadata Viewer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

JIMPL

  • Website: https://jimpl.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: JIMPL is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Online EXIF data viewer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

Jobs (Poland)

  • Website: http://www.jobs.pl
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Jobs (Poland) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Jobsite (UK)

  • Website: http://www.jobsite.co.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Jobsite (UK) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Journal Guide

  • Website: https://www.journalguide.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Journal Guide is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Journal Seek

  • Website: http://journalseek.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Journal Seek is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

JPEGsnoop

  • Website: https://sourceforge.net/projects/jpegsnoop
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: JPEGsnoop is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

JpGraph

  • Website: http://jpgraph.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: JpGraph is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

jqPlot

  • Website: http://www.jqplot.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: jqPlot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A Versatile and Expandable jQuery Plotting Plugin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

jsbin

  • Website: https://Jsbin.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: jsbin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Judyrecords

  • Website: https://www.judyrecords.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Judyrecords is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free. Nationwide search of 400 million+ United States court cases.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Junar

  • Website: http://junar.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Junar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

justdeleteme

  • Website: http://justdelete.me
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: justdeleteme is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

justpaste

  • Website: https://Justpaste.it
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: justpaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Letter K

This letter section contains 17 tools.

  • Website: https://kagi.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Kagi Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Liberate your search. Free of ads. Free of surveillance. Your time respected. You are the customer, never the product.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

KartaView

  • Website: https://kartaview.org/map/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: KartaView is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

KartaVision

  • Website: https://kartavision.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: KartaVision is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: search engine for KartaView imagery. It supports natural-language search and search by image.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Kartograph

  • Website: http://kartograph.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Kartograph is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Kaspersky Cyberthreat live Map

  • Website: https://cybermap.kaspersky.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Kaspersky Cyberthreat live Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find out if you are under cyber-attack here.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Katbin

  • Website: https://katb.in
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Katbin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Small, lightweight pastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

KeePass Password Safe

  • Website: http://keepass.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: KeePass Password Safe is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a free and open-source password manager that uses the most secure encryption algorithms to safegard your passwords.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Keyword Discovery

  • Website: http://www.keyworddiscovery.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Keyword Discovery is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

Keyword Spy

  • Website: http://www.keywordspy.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Keyword Spy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

KeywordTool

  • Website: http://keywordtool.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: KeywordTool is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

Klear

  • Website: http://klear.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Klear is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Kloth

  • Website: http://www.kloth.net/services
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Kloth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Knoema

  • Website: https://knoema.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Knoema is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Knowledge guide to international company registration

  • Website: http://www.icaew.com/en/library/subject-gateways/business-management/company-administration/knowledge-guide-international-company-registration
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Knowledge guide to international company registration is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

KNOWLEDGENOW

  • Website: https://know.netenrich.com/content/track/threat-actor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: KNOWLEDGENOW is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Trending Threats.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Kompass

  • Website: http://www.kompass.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Kompass is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Business directory and search.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Kribrum

  • Website: https://kribrum.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Kribrum is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Letter L

This letter section contains 31 tools.

LandMatrix

  • Website: http://landmatrix.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LandMatrix is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

lastfm_monitor

  • Website: https://github.com/misiektoja/lastfm_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: lastfm_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Last.fm users' listening activity including detection when user gets online & offline, pauses or resumes playback, all played songs, its duration, skipped songs, with optional auto-play, email alerts, CSV logging, session stats and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Music Streaming Services.

Back to Name Jump

Lastpass

  • Website: https://lastpass.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Lastpass is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Latinobarometro

  • Website: http://www.latinobarometro.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Latinobarometro is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

lazarusholic

  • Website: https://lazarus.day/actors/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: lazarusholic is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Total 203 threat actors.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Lazy Scholar

  • Website: http://www.lazyscholar.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Lazy Scholar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Leaflet

  • Website: http://leafletjs.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Leaflet is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: an open-source JavaScript library for mobile-friendly interactive maps.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Leak OSINT

  • Website: https://telegram.me/Leak_SSINTbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Leak OSINT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Phone-number leakage check.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

LeakCheck

  • Website: https://leakcheck.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LeakCheck is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Data Breach Search Engine with 7.5B+ entries collected from more than 3000 databases. Search by e-mail, username, keyword, password or corporate domain name.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

LeakRadar

  • Website: https://leakradar.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LeakRadar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Scans for compromised emails and domains in stealer logs, offering proactive breach prevention and real-time alerts.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Lenso.ai

  • Website: https://lenso.ai
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Lenso.ai is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reverse image search tool with facial recognition, created for finding people, similar images, copies of photos, identical places and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

lesma.eu

  • Website: https://lesma.eu/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: lesma.eu is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Simple paste app friendly with browser and command line.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Library of Congress: Ask a Librarian

  • Website: http://www.loc.gov/rr/askalib
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Library of Congress: Ask a Librarian is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Library, University of Michigan: Statistics and Datasets

  • Website: http://www.lib.umich.edu/browse/Statistics%20and%20Data%20Sets
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Library, University of Michigan: Statistics and Datasets is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

LibreWolf

  • Website: https://librewolf.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LibreWolf is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Privacy-focused Firefox fork with enhanced security defaults.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Licenseplates

  • Website: http://www.worldlicenseplates.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Licenseplates is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

LinEnum

  • Website: https://github.com/rebootuser/LinEnum
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: LinEnum is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Scripted local Linux enumeration and privilege escalation checker useful for auditing a host and during CTF gaming.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Privilege Escalation Tools.

Back to Name Jump

Linkedin

  • Website: https://www.linkedin.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Linkedin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Commonly used social-media platform with a focus on professional profiles and recruitment. Spans a wide variety of industries. Very useful for gathering information on what specific individuals are active within an entity.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Linkedin Groups

  • Website: http://www.linkedin.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Linkedin Groups is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

LinkedInDumper

  • Website: https://github.com/l4rm4nd/LinkedInDumper
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LinkedInDumper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Script to dump/scrape/extract company employees info from LinkedIn API.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ LinkedIn.

Back to Name Jump

Linkode(alpha)

  • Website: https://linkode.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Linkode(alpha) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Linkode is the useful pastebin!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

LinkScope Client

  • Website: https://github.com/AccentuSoft/LinkScope_Client
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LinkScope Client is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: LinkScope Client Github repository.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Linkuroius

  • Website: http://linkurio.us
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Linkuroius is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

LIONIC Cyber Threat Map

  • Website: https://www.lionic.com/monitoring/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LIONIC Cyber Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Listify

  • Website: http://listify.okfnlabs.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Listify is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Turn a Google spreadsheet into a beautiful, searchable listing in seconds.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Liveuamap

  • Website: https://liveuamap.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Liveuamap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

LocalFocus

  • Website: https://www.localfocus.nl
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: LocalFocus is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Lockbin

  • Website: https://lockbin.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Lockbin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

lol_monitor

  • Website: https://github.com/misiektoja/lol_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: lol_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of LoL (League of Legends) players gaming activities including detection when a user starts or finishes a match with support for email alerts, CSV logging, playtime stats and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Gaming Platforms.

Back to Name Jump

Lucidchart

  • Website: https://www.lucidchart.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Lucidchart is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: the intelligent diagramming application that brings teams together to make better decisions and build the future.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

  • Website: https://search.lycos.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Lycos Image Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Letter M

This letter section contains 54 tools.

MagPortal

  • Website: http://www.magportal.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MagPortal is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Maigret OSINT bot

  • Website: https://t.me/osint_maigret_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Maigret OSINT bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Username search on 1,366 sites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Mailbox

  • Website: https://mailbox.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mailbox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

MailTester

  • Website: http://mailtester.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MailTester is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: hunt for emails and improve your email deliverability.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Mailvelope

  • Website: https://www.mailvelope.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mailvelope is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Majestic

  • Website: https://majestic.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Majestic is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find out who links to your website.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Malpedia

  • Website: https://malpedia.caad.fkie.fraunhofer.de/actors
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Malpedia is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Get List of threat actor groups.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Maltego

  • Website: https://www.maltego.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Maltego is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Maltego Telegram

  • Website: https://github.com/vognik/maltego-telegram
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Maltego Telegram is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Rich Set of Entities & Transforms for OSINT on Telegram with Maltego.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Mamont

  • Website: https://www.mmnt.ru/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mamont is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Map Maker

  • Website: https://maps.co
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Map Maker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

MapAList

  • Website: http://mapalist.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MapAList is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

MapBox

  • Website: https://www.mapbox.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MapBox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Mapchart.net

  • Website: https://mapchart.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mapchart.net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

MapChecking

  • Website: https://www.mapchecking.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MapChecking is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Maperitive

  • Website: http://maperitive.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Maperitive is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

MapHub

  • Website: https://maphub.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MapHub is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Mapillary

  • Website: https://www.mapillary.com/app/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mapillary is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

MapJam

  • Website: http://mapjam.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MapJam is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Mapline

  • Website: https://mapline.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mapline is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Mapquest

  • Website: https://www.mapquest.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mapquest is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Mark Monitor WHOIS

  • Website: https://whois-webform.markmonitor.com/whois/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mark Monitor WHOIS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Displays domain registration information.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Master Password

  • Website: http://masterpasswordapp.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Master Password is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Maven

  • Website: http://www.maven.co
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Maven is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

MaxMind

  • Website: https://www.maxmind.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MaxMind is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Maxthon

  • Website: http://www.maxthon.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Maxthon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Meawfy

  • Website: https://meawfy.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Meawfy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Advanced Mega.nz File Search Engine. Search and discover files from Mega.nz with our intelligent crawler technology. Access over 9 million indexed files instantly.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

Mention

  • Website: https://en.mention.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mention is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Mergent Intellect

  • Website: http://www.mergentintellect.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mergent Intellect is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Mergent Online

  • Website: http://www.mergentonline.com/login.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mergent Online is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Metacafe

  • Website: http://www.metacafe.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Metacafe is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Metadata Viewer

  • Website: https://kriztalz.sh/metadata-viewer/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Metadata Viewer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Online EXIF data viewer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

metagoofil

  • Website: https://github.com/laramies/metagoofil
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: metagoofil is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Metadata harvester.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Metadata harvesting and analysis.

Back to Name Jump

Metatube

  • Website: http://www.metatube.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Metatube is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Microsoft Academic

  • Website: http://academic.research.microsoft.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Microsoft Academic is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Million Short

  • Website: https://millionshort.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Million Short is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Minerva OSINT

  • Website: https://minervaosint.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Minerva OSINT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Email search tool that finds and aggregates data on a target email from over a hundred websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

MISP Galaxy

  • Website: https://www.misp-galaxy.org/360net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MISP Galaxy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Known or estimated adversary groups as identified by 360.net.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

Mixi (Japan)

  • Website: https://mixi.jp
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mixi (Japan) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

mnp_bot

  • Website: https://t.me/mnp_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: mnp_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Phone operator + region.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Modest Maps

  • Website: http://modestmaps.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Modest Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Mojeek

  • Website: https://www.mojeek.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mojeek is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Mojeek is a growing independent search engine which does not track you.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

Monster

  • Website: http://www.monster.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Monster is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Mostly Harmless

  • Website: http://kerrick.github.io/Mostly-Harmless/#features
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mostly Harmless is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Mostly Harmless looks up the page you are currently viewing to see if it has been submitted to reddit.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

MotherSearchBot

  • Website: https://t.me/MotherSearchBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MotherSearchBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Google-like Telegram search.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Mozilla HTTP Observatory

  • Website: https://developer.mozilla.org/en-US/observatory
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mozilla HTTP Observatory is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Observatory⁩ enhances web security by analyzing compliance with best security practices.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

MuckRack

  • Website: http://muckrack.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MuckRack is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Extensive database of U.S. government public records obtained through federal and state public records requests. Automated tool that will make public records requests and follow up until records are obtained on your behalf.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Mugshots

  • Website: https://mugshots.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mugshots is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Mullvad Browser

  • Website: https://mullvad.net/en/browser
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Mullvad Browser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Privacy-focused browser developed in collaboration with Tor Project.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Multirbl

  • Website: https://multirbl.valli.org/dnsbl-lookup
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Multirbl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: MultiRBL Valli checks if an IP or domain is listed on multiple public RBLs (blacklists) simultaneously.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

MustBePresent

  • Website: http://mustbepresent.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MustBePresent is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

mxtoolbox

  • Website: https://mxtoolbox.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: mxtoolbox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free online tools to investigate/troubleshoot email server issues.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Myallsearch

  • Website: http://www.myallsearch.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Myallsearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

MyTweetAlerts

  • Website: https://www.mytweetalerts.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: MyTweetAlerts is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A tool to create custom email alerts based on Twitter search.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Letter N

This letter section contains 32 tools.

n0paste

  • Website: https://n0paste.eu/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: n0paste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paste and share your code online.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Najdi (Slovenia)

  • Website: http://www.najdi.si
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Najdi (Slovenia) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Name Checkr

  • Website: http://www.namecheckr.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Name Checkr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: checks a domain and username across many platforms.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Name Checkup

  • Website: https://namecheckup.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Name Checkup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a search tool that allows you to check the avilability of a givrn username from all over the social media. Inaddition it also sllows you to check the avilability of a given domain name.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Name Chk

  • Website: http://www.namechk.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Name Chk is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Check over 30 domains and more than 90 social media account platforms.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

NameKetchup

  • Website: https://nameketchup.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NameKetchup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: checks domain name and username in popular social media sites and platforms.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

NAPALM FTP Indexer

  • Website: https://www.searchftps.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NAPALM FTP Indexer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

Nation Master

  • Website: http://www.nationmaster.com/statistics
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Nation Master is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

National Company Registers

  • Website: https://en.wikipedia.org/wiki/List_of_company_registers
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: National Company Registers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

National Speakers Association

  • Website: http://www.nsaspeaker.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: National Speakers Association is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Naukri (India)

  • Website: http://www.naukri.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Naukri (India) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

  • Website: http://www.naver.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Naver (South Korea) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

nekobin

  • Website: https://nekobin.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: nekobin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paste code, save and share the link!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

NerdyData

  • Website: https://nerdydata.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NerdyData is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search engine for source code.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

NetBootcamp OSINT Tools

  • Website: http://netbootcamp.org/osinttools/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: NetBootcamp OSINT Tools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Collection of OSINT links and custom Web interfaces to other services.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > OSINT Online Resources.

Back to Name Jump

Netcraft Site Report

  • Website: http://toolbar.netcraft.com/site_report?url=undefined#last_reboot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Netcraft Site Report is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is an online database that will provide you a report with detail information about a particular website and the history associated with it.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Netlas.io

  • Website: https://app.netlas.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Netlas.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

NETSCOUT Cyber Threat Map

  • Website: https://horizon.netscout.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NETSCOUT Cyber Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Real-Time DDoS Attack Map.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Netvibes

  • Website: http://www.netvibes.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Netvibes is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

NEUROAUTOSEARCH

  • Website: https://t.me/noblackAuto_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NEUROAUTOSEARCH is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Car DB search + neural networks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

New Paste

  • Website: https://paste1.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: New Paste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: I wanna paste because typing is so boring!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

NGA GEOINT

  • Website: https://github.com/ngageoint
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NGA GEOINT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Ning

  • Website: http://www.ning.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ning is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

NixIntel

  • Website: https://nixintel.info/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NixIntel is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

Nixory

  • Website: http://nixory.sourceforge.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Nixory is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Nod

  • Website: http://get-nod.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Nod is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

Nodebox

  • Website: https://www.nodebox.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Nodebox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a family of tools gives you the leverage to create generative design the way you want.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

NoPaste

  • Website: https://nopaste.boris.sh/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NoPaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: NoPaste is an open-source website similar to Pastebin where you can store any piece of code, and generate links for easy sharing.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

nopaste.net

  • Website: https://nopaste.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: nopaste.net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: nopaste.net is a temporary file host, nopaste and clipboard across machines. You can upload files or text and share the link with others.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

NoScript

  • Website: https://noscript.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NoScript is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Notes

  • Website: https://notes.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Notes is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: fast.easy.short.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

NRC Research Press

  • Website: http://www.nrcresearchpress.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: NRC Research Press is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Letter O

This letter section contains 56 tools.

Oblivion

  • Website: https://github.com/loseys/Oblivion
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Oblivion is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Observable

  • Website: https://observablehq.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Observable is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a modern way to create powerful, performant, polyglot data apps built on open source.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

OCCRP Aleph

  • Website: https://aleph.occrp.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OCCRP Aleph is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

ODCrawler

  • Website: https://odcrawler.xyz/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ODCrawler is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A search engine for open directories. Find millions of publicly available files!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

ODIN

  • Website: https://search.odin.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ODIN is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Used to search for Hosts, CVEs & Exposed Buckets/Files and shows a website is vulnerable or not. 10 Free Searches Per Day.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Odnoklassniki (Russia)

  • Website: http://ok.ru
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Odnoklassniki (Russia) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

OECD Aid Database

  • Website: http://www.oecd.org/dac/stats/data.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OECD Aid Database is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

OECD Data

  • Website: https://data.oecd.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OECD Data is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Offliberty

  • Website: http://offliberty.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Offliberty is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a website that lets you access any online content without a permanent Internet connection.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Offshore Leak Database

  • Website: https://offshoreleaks.icij.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Offshore Leak Database is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

OffShore.cat

  • Website: https://offshore.cat/vpn
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OffShore.cat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: list of vpns for the privacy conscious.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ VPN Services.

Back to Name Jump

OkSearch

  • Website: https://telegram.me/OkSearchBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OkSearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search channels, bots, groups by keyword.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

OmeaReader

  • Website: http://www.jetbrains.com/omea/reader
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OmeaReader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

One Look Reverse Dictionary

  • Website: http://www.onelook.com/reverse-dictionary.shtml
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: One Look Reverse Dictionary is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

OneMillionTweetMap

  • Website: http://onemilliontweetmap.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OneMillionTweetMap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Onet.pl (Poland)

  • Website: http://www.onet.pl
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Onet.pl (Poland) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

OnWebChange

  • Website: http://onwebchange.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OnWebChange is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

ONYPHE

  • Website: https://search.onyphe.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ONYPHE is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: OSINT engine indexing exposed assets and services across the internet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Open Access Scientific Journals

  • Website: http://www.pagepress.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Open Access Scientific Journals is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Open DNS

  • Website: https://www.opendns.com/home-internet-security
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Open DNS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Open Grey

  • Website: http://www.opengrey.eu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Open Grey is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Open PGP

  • Website: https://www.enigmail.net/index.php/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Open PGP is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Open Street Map

  • Website: http://www.openstreetmap.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Open Street Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

OpenCorporates

  • Website: https://opencorporates.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenCorporates is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Global search of registered corporate entities and their associated individual officers or investors.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

OpenDataUABot

  • Website: https://t.me/OpenDataUABot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenDataUABot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Ukrainian OSINT bot.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

OPENHUNTING.IO

  • Website: https://openhunting.io/threat-library
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OPENHUNTING.IO is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Threat Library Collecting Information.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

OpenLayers

  • Website: http://openlayers.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenLayers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A high-performance, feature-packed library for all your mapping needs.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

OpenLinkProfiler

  • Website: http://www.openlinkprofiler.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenLinkProfiler is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

OPENLOAD Bot

  • Website: https://t.me/OPENLOADTOPBOT
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OPENLOAD Bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Semi-automated OSINT/vuln scanning suite.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

OpenOwnership Register

  • Website: https://register.openownership.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenOwnership Register is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

OpenRefine

  • Website: https://github.com/OpenRefine
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenRefine is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free & open source power tool for working with messy data and improving it.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

OpenSanctions

  • Website: https://www.opensanctions.org/search/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpenSanctions is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Information on sanctions and public office holders.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Opera

  • Website: http://www.opera.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Opera is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

OpinionCrawl

  • Website: http://www.opinioncrawl.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OpinionCrawl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Orange (France)

  • Website: http://www.orange.fr
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Orange (France) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Orbis directory

  • Website: http://orbisdirectory.bvdinfo.com/version-20161014/OrbisDirectory/Companies
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Orbis directory is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Orbit

  • Website: https://github.com/s0md3v/Orbit
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Orbit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Draws relationships between crypto wallets with recursive crawling of transaction history.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Oscobo Search Engine

  • Website: https://oscobo.co.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Oscobo Search Engine is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

OSINT Ambition Publication

  • Website: https://publication.osintambition.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT Ambition Publication is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

OSINT Belarus

  • Website: https://t.me/s/osintby
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT Belarus is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

OSINT Dojo

  • Website: https://www.osintdojo.com/resources/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT Dojo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

OSINT Framework

  • Website: http://osintframework.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome OSINT

What it does: OSINT Framework is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Collection of various OSINT tools broken out by category.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > OSINT Online Resources.

Back to Name Jump

OSINT Team

  • Website: https://www.osintteam.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT Team is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

OSINT Techniques

  • Website: https://www.osinttechniques.com/blog
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT Techniques is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

OSINT x UCCU Workshop on Open Source Intelligence

  • Website: https://www.slideshare.net/miaoski/osint-x-uccu-workshop-on-open-source-intelligence
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: OSINT x UCCU Workshop on Open Source Intelligence is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Written by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Introduction > OSINT.

Back to Name Jump

OSINT-Steam

  • Website: https://osint-steam.vercel.app/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT-Steam is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: An tool that returns public information, such as friends list and possible locations, from Steam profiles.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Steam.

Back to Name Jump

OSINT-Tool

  • Website: https://www.osint-tool.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT-Tool is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A browser extension that gives you access to a suite of OSINT utilities (Dehashed, Epieos, Domaintools, Exif data, Reverse image search, etc) directly on any webpage you visit.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

OSINT.SH

  • Website: https://osint.sh/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINT.SH is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Information Gathering Toolset.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

OSINTCurious

  • Website: https://osintcurio.us/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINTCurious is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

OSINTEye

  • Website: https://github.com/atiilla/OsintEye
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OSINTEye is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: OSINT Eye: A WPF Desktop Application for GitHub Intelligence, Social Media Reconnaissance, and Subdomain Discovery.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Osintgram

  • Website: https://github.com/Datalux/Osintgram
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Osintgram is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Osintgram offers an interactive shell to perform analysis on Instagram account of any users by its nickname.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Instagram.

Back to Name Jump

Osintkit

  • Website: https://t.me/osintkit_check_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Osintkit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Ukrainian lookup: passport, tax ID, email, phone, address, vehicles, Telegram.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

OTS- One Time Secrets

  • Website: https://ots.hackliberty.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: OTS- One Time Secrets is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: An encrypted pastebin site. No login needed!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Outwit

  • Website: http://www.outwit.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Outwit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find, grab and organize all kinds of data and media from online sources.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Overseas Company Registers

  • Website: https://www.gov.uk/government/publications/overseas-registries/overseas-registries
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Overseas Company Registers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Oxford Journals

  • Website: http://www.oxfordjournals.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Oxford Journals is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Letter P

This letter section contains 72 tools.

paaster

  • Website: https://paaster.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: paaster is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paaster is a secure and user-friendly pastebin application that prioritizes privacy and simplicity. With end-to-end encryption and paste history, Paaster ensures that your pasted code remains confidential and accessible.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

PageGlimpse

  • Website: http://www.pageglimpse.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PageGlimpse is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

pagodo

  • Website: https://github.com/opsdisk/pagodo
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: pagodo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Automate Google Hacking Database scraping.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

Palladio

  • Website: http://hdlab.stanford.edu/palladio
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Palladio is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Visualize complex historical data with ease.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Panopticlick

  • Website: https://panopticlick.eff.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Panopticlick is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Parseek (Iran)

  • Website: http://www.parseek.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Parseek (Iran) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

PasswordSearch

  • Website: https://telegram.me/PasswordSearchBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PasswordSearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Shows leaked passwords for an email.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

PastBin.net

  • Website: https://pastbin.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PastBin.net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Similar to Pastebin website where you can store code/text online for a set period of time and share to anyone anywhere. Search Option Available.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Paste.Cash

  • Website: https://www.paste.cash/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Paste.Cash is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paste.CASH Is a privacy respected and encrypted pastebin hosted by Cash Hosting. Every paste are encrypted using 256 bits AES.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

paste.debian

  • Website: https://Paste.debian.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: paste.debian is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

paste.in.ua

  • Website: https://paste.in.ua/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: paste.in.ua is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Simple pastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

paste.kde

  • Website: https://Paste.kde.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: paste.kde is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Paste.Monster

  • Website: https://paste.monster/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Paste.Monster is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Share your thoughts online. API Available.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Paste.Quest

  • Website: https://pastequest.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Paste.Quest is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Copy and Paste text online to share with anyone anywhere. Use the password option to add a password to the pasted information.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

paste.sh

  • Website: https://paste.sh/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: paste.sh is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: This is an encrypted paste site. Simply type or paste code here and share the URL. Saving is Automatic.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

paste.ubuntu

  • Website: https://paste.ubuntu.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: paste.ubuntu is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Pastebin

  • Website: https://pastebin.pl/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pastebin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Store code/text online for a set period of time and share to anybody on earth.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

  • Website: https://tor.link/paste/new
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pastebin - Tor Link is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Paste text to store or share with others.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Pastebin.cz

  • Website: https://www.pastebin.cz/en/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pastebin.cz is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A simple Pastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Pastery

  • Website: https://www.pastery.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pastery is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The sweetest pastebin in the world!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

PasteShr

  • Website: https://www.pasteshr.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PasteShr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Store any text online for easy sharing. Search option available!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

PasteSite.Net

  • Website: https://pastesite.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PasteSite.Net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The new generation pastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

  • Website: https://oedci.uspto.gov/OEDCI/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Patent Attorneys/Agent Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Official listing of U.S. attorneys qualified to represent individuals in U.S. patent office proceedings.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Paul Hensel’s General Informational Data Page

  • Website: http://www.paulhensel.org/dataintl.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Paul Hensel’s General Informational Data Page is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

PeekYou

  • Website: https://www.peekyou.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PeekYou is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: PeekYou offers the ability to search for people with checks done against more sites. Can check for arrest records as well.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Peepmail

  • Website: http://www.samy.pl/peepmail
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Peepmail is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a tool that allows you to discover business email addresses for users, even if their email address may not be publicly available or shared.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Peerblock

  • Website: http://forums.peerblock.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Peerblock is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Penn World Table

  • Website: http://www.rug.nl/research/ggdc/data/pwt/pwt-8.1
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Penn World Table is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Pentest-Tools.com

  • Website: https://pentest-tools.com/information-gathering/google-hacking
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pentest-Tools.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: uses advanced search operators (Google Dorks) to find juicy information about target websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Perplexity

  • Website: https://www.perplexity.ai
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Perplexity is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: AI-powered search engine with source citations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Perry Castaneda Library

  • Website: https://www.lib.utexas.edu/maps
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Perry Castaneda Library is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

personal-security-checklist

  • Website: https://github.com/Lissy93/personal-security-checklist
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: personal-security-checklist is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: by @Lissy93.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Related Awesome Lists.

Back to Name Jump

Perspective

  • Website: https://github.com/finos/perspective
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Perspective is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: interactive data visualization and analytics component, well-suited for large, streaming and static datasets.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Pew Research Center

  • Website: http://www.pewinternet.org/datasets
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pew Research Center is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

PGPKeyAnalyser

  • Website: https://kriztalz.sh/pgp-key-analyser/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PGPKeyAnalyser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Analyse and view the details of a PGP key online without having to download the asc file.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Phind

  • Website: https://www.phind.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Phind is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: AI search engine optimized for developers and technical questions.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Phone Validator

  • Website: https://www.phonevalidator.com/index.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Phone Validator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Pretty accurate phone lookup service, particularly good against Google Voice numbers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

PhoneInfoga

  • Website: https://github.com/sundowndev/PhoneInfoga
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PhoneInfoga is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Advanced information gathering & OSINT framework for phone numbers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

PhotoBucket

  • Website: https://photobucket.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PhotoBucket is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Photon

  • Website: https://github.com/s0md3v/Photon
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Web Security

What it does: Photon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Incredibly fast crawler designed for OSINT by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

Pic2Map

  • Website: https://www.pic2map.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pic2Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

PicTriev

  • Website: http://www.pictriev.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PicTriev is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a face search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Pidgin

  • Website: https://www.pidgin.im
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pidgin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Piktochart

  • Website: https://piktochart.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Piktochart is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

PimEyes

  • Website: https://telegram.me/pimeyesbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PimEyes is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Face-search across social networks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

PimEyes

  • Website: https://pimeyes.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PimEyes is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: an online face search engine that goes through the Internet to find pictures containing given faces.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Pingroupie

  • Website: http://pingroupie.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pingroupie is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Pinterest.

Back to Name Jump

Pinterest

  • Website: http://www.pinterest.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pinterest is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is an image sharing social media service used to easly discover, share and save ideas using visual representation.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Pinterest Pin Stats

  • Website: https://chromewebstore.google.com/detail/pinterest-pin-stats-sort/mcmkeopcpbfgjlakblglpcccpodbjkel
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pinterest Pin Stats is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Display hidden Pinterest stats for each pin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Pinterest.

Back to Name Jump

Pipl

  • Website: https://pipl.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pipl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a provider of identity solutions.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Pixel Block

  • Website: https://chrome.google.com/webstore/detail/pixelblock/jmpmfcjnflbcoidlgapblgpgbilinlem
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pixel Block is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Pixsy

  • Website: https://www.pixsy.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pixsy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Take back control of your images. See where & how your images are being used online!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Pixxa

  • Website: http://www.pixxa.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pixxa is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Plotly

  • Website: https://plot.ly
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Plotly is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Plunkett Research

  • Website: http://www.plunkettresearchonline.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Plunkett Research is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Polymaps

  • Website: http://polymaps.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Polymaps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Population Reference Bureau Data Finder

  • Website: http://www.prb.org/DataFinder.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Population Reference Bureau Data Finder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Preceden

  • Website: https://www.preceden.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Preceden is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Create a Visual Timeline About Any Topic.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

  • Website: https://predictasearch.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Predicta Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for social accounts with e-mail and phone.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Presearch

  • Website: https://presearch.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Presearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Presearch is a decentralized, community-driven search engine that protects your privacy and rewards you when you search.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

Press Reader

  • Website: http://www.pressreader.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Press Reader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Privacy Badger

  • Website: https://www.eff.org/privacybadger
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Privacy Badger is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Privacy.com

  • Website: https://privacy.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Privacy.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Virtual payment cards for online privacy and security.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Privazer

  • Website: http://privazer.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Privazer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

ProfileImageIntel

  • Website: https://profileimageintel.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ProfileImageIntel is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Social media and WhatsApp profile image tool to find when a profile image was uploaded.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Analysis.

Back to Name Jump

Proton Mail

  • Website: https://protonmail.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Proton Mail is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

PRS Risk Indicators

  • Website: http://www.prsgroup.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PRS Risk Indicators is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

psn_monitor

  • Website: https://github.com/misiektoja/psn_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: psn_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Sony Playstation (PSN) players gaming activities including detection when a user gets online/offline or plays games with support for email alerts, CSV logging, playtime stats and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Gaming Platforms.

Back to Name Jump

PublicWWW

  • Website: https://publicwww.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: PublicWWW is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

Pullpush

  • Website: https://pullpush.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pullpush is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: PullPush is a service for the indexing and retrieval of content that Reddit users have submitted to Reddit. Helpful for finding deleted/removed posts & comments.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

Pushshift API

  • Website: https://pushshift.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Pushshift API is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A powerful API that provides access to historical Reddit data, including posts, comments, and metadata for analysis and research—more information .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

pygreynoise

  • Website: https://github.com/GreyNoise-Intelligence/pygreynoise
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: pygreynoise is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Greynoise Python Library.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Letter Q

This letter section contains 14 tools.

QGIS

  • Website: http://qgis.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: QGIS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

QlikView

  • Website: https://www.visualintelligence.co.nz/qlikview
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: QlikView is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Quadrigram

  • Website: http://www.quadrigram.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Quadrigram is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Qualys SSL Check

  • Website: https://www.ssllabs.com/ssltest/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Web Security

What it does: Qualys SSL Check is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Online service that performs a deep analysis of the configuration of any SSL web server on the public internet. Provided by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Quantcast

  • Website: https://www.quantcast.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Quantcast is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Qubes OS

  • Website: https://www.qubes-os.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Security, Awesome OSINT, Awesome Cyber Security Tools

What it does: Qubes OS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Qubes OS is a free and open-source security-oriented operating system meant for single-user desktop computing.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Security > Operating Systems > Privacy & Security.

Back to Name Jump

  • Website: https://www.quetzal-search.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Quetzal Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Quick Sprout

  • Website: https://www.quicksprout.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Quick Sprout is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

QuickCode

  • Website: https://quickcode.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: QuickCode is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Python and R data analysis environment.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

QuickMaps

  • Website: https://chrome.google.com/webstore/detail/quick-maps/bgbojmobaekecckmomemopckmeipecij
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: QuickMaps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Quora

  • Website: http://www.quora.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Quora is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

Qwant

  • Website: http://www.qwant.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Qwant is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: French search engine that relies on Microsoft Bing.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

Qwant

  • Website: https://www.qwant.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Qwant is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The search engine that respects your privacy.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

Qzone (China)

  • Website: http://qzone.qq.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Qzone (China) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Letter R

This letter section contains 40 tools.

Raphael

  • Website: http://dmitrybaranovskiy.github.io/raphael
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Raphael is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

raven

  • Website: https://github.com/0x09AL/raven
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: raven is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: raven is a Linkedin information gathering tool that can be used by pentesters to gather information about an organization employees using Linkedin by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

RAW

  • Website: http://raw.densitydesign.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RAW is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Reacher

  • Website: https://reacher.email
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reacher is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Real-time email verification API, written in Rust, 100% open-source.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

RECAP Archive

  • Website: https://www.courtlistener.com/recap/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RECAP Archive is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Public archive of PACER court documents.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

Recon-ng

  • Website: https://github.com/lanmaster53/recon-ng
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Security, Awesome Penetration Testing, Awesome Cyber Security Tools

What it does: Recon-ng is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Recon-ng is a full-featured Web Reconnaissance framework written in Python. Recon-ng has a look and feel similar to the Metasploit Framework.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

ReconDog

  • Website: https://github.com/s0md3v/ReconDog
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: ReconDog is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reconnaissance Swiss Army Knife by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

RecruitEm

  • Website: https://recruitin.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RecruitEm is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

REDARCS

  • Website: https://the-eye.eu/redarcs/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: REDARCS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reddit archives 2005-2023.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

Reddit

  • Website: https://www.reddit.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reddit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Reddit Archive

  • Website: http://www.redditarchive.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reddit Archive is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Historical archives of reddit posts.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

Reddit Comment Lookup

  • Website: https://randomtools.io/reddit-comment-search/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reddit Comment Lookup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for reddit comments by reddit username.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

  • Website: https://redditcommentsearch.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reddit Comment Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Analyze a reddit users by comment history.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

Reddit Suite

  • Website: https://chrome.google.com/webstore/detail/reddit-enhancement-suite/kbmfpngjjgdllneeigpgjifpgocmfgmb
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reddit Suite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Enhances your reddit experience.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

Reddit User Analyser

  • Website: https://atomiks.github.io/reddit-user-analyser/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reddit User Analyser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: reddit user account analyzer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

RedditMetis

  • Website: https://redditmetis.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RedditMetis is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: RedditMetis is a Reddit user analysis tool to see the summary and statistics for a Reddit account, including top posts and user activity etc.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

RedirectDetective

  • Website: http://redirectdetective.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RedirectDetective is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Reed (UK)

  • Website: http://www.reed.co.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reed (UK) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Reeder

  • Website: http://reederapp.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reeder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

RegDateBot

  • Website: https://t.me/regdate_clone_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RegDateBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Registration date by ID/forward.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Remote DNS Lookup

  • Website: https://remote.12dt.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Remote DNS Lookup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Rentry

  • Website: https://rentry.co/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Rentry is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Rentry.co is a markdown paste service service with preview, custom urls and editing. Fast, simple and free.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Reposearch

  • Website: http://codefinder.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reposearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

ReseacherID

  • Website: http://www.researcherid.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ReseacherID is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Research Gate

  • Website: http://www.researchgate.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Research Gate is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Resolver

  • Website: https://metaproductsrevolver.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Resolver is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Reunion

  • Website: http://reunion.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reunion is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: People search. Limited free info, premium data upsell.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Reuters

  • Website: http://www.reuters.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reuters is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Reverse Phone Check

  • Website: https://www.reversephonecheck.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reverse Phone Check is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Look up names, addresses, phone numbers, or emails and anonymously discover information about yourself, family, friends, or old schoolmates. Powered by infotracer.com.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Reverse Phone Lookup

  • Website: http://www.reversephonelookup.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Reverse Phone Lookup is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Detailed information about phone carrier, region, service provider, and switch information.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

RiteTag

  • Website: https://ritetag.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RiteTag is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Rival IQ

  • Website: https://www.rivaliq.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Rival IQ is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Robtex

  • Website: https://www.robtex.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Robtex is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is an IP address and domain name based researching websites that offers multiple services such as Reverse DNS Lookup, Whois, and AS Macros.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Ronin

  • Website: https://ronin-rb.dev
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: Ronin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free and Open Source Ruby Toolkit for Security Research and Development, providing many different libraries and commands for a variety of security tasks, such as recon, vulnerability scanning, exploit development, exploitation, post-exploitation, and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Multi-paradigm Frameworks.

Back to Name Jump

Router Passwords

  • Website: https://www.routerpasswords.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Router Passwords is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Online database of default router passwords.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

RSS Feed Reader

  • Website: https://chrome.google.com/webstore/detail/rss-feed-reader/pnjaodmkngahhkoihejjehlcdlnohgmp
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RSS Feed Reader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

RSS Micro

  • Website: http://www.rssmicro.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RSS Micro is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

RSS Search Engine

  • Website: http://ctrlq.org/rss
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RSS Search Engine is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

RSS Search Hub

  • Website: http://www.rsssearchhub.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RSS Search Hub is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

RSSOwl

  • Website: http://www.rssowl.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: RSSOwl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Letter S

This letter section contains 139 tools.

Safari

  • Website: http://www.apple.com/safari
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Safari is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

SafeNote

  • Website: https://safenote.co/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SafeNote is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: SafeNote is a free web-based service that allows you to share a note or a file with confidentiality. There is no way to spying on you even to a hacker.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

SAGE Journals

  • Website: http://online.sagepub.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SAGE Journals is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

SameID

  • Website: http://sameid.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SameID is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

SangMata (beta)

  • Website: https://t.me/SangMata_beta_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SangMata (beta) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Name-change history via /search_id.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

SangMataInfo_bot

  • Website: https://t.me/SangMataInfo_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SangMataInfo_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Username change history.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

SANS OSINT Summit 2021 (Playlist)

  • Website: https://www.youtube.com/playlist?list=PLs4eo9Tja8bj3jJvv42LxOkhc2_ylpS9y
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT, Awesome Threat Detection, Awesome Hacking

What it does: SANS OSINT Summit 2021 (Playlist) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Threat Detection and Hunting > Videos.

Back to Name Jump

SAPO (Portugal)

  • Website: http://www.sapo.pt
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SAPO (Portugal) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

SAS Planet

  • Website: http://www.sasgis.org/sasplaneta/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SAS Planet is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Software used to view, download and stitch satellite images.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Satellites Pro

  • Website: https://satellites.pro/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Satellites Pro is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

SatIntel

  • Website: https://github.com/ANG13T/SatIntel
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SatIntel is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

SaveYoutubeBot

  • Website: https://t.me/SaveYoutubeBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SaveYoutubeBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Finds and downloads YouTube videos.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Science Publications

  • Website: http://www.thescipub.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Science Publications is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

ScienceDirect

  • Website: http://www.sciencedirect.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ScienceDirect is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

ScienceDomain

  • Website: http://www.sciencedomain.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ScienceDomain is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

SCIRP

  • Website: http://www.scirp.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SCIRP is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Scoot

  • Website: http://www.scoot.co.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Scoot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Scribble Maps

  • Website: http://scribblemaps.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Scribble Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Scribd

  • Website: http://www.scribd.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Scribd is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

Script Safe

  • Website: https://chrome.google.com/webstore/detail/scriptsafe/oiigbmnaadbkfbmpbfijlflahbdbdgdf?hl=en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Script Safe is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

  • Website: https://scrt.link/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: scrt.link is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Share a Secret with a link that only works one time and then self-destructs.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Search.ch (Switzerland)

  • Website: http://www.search.ch
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Search.ch (Switzerland) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Search.com

  • Website: https://www.search.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Search.com is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search the Web by searching the best engines from one place.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Search4faces

  • Website: https://search4faces.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Search4faces is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a service for searching people on the Internet by photo.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Search_firm_bot

  • Website: https://t.me/Search_firm_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Search_firm_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches organizations, banks, postal codes.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

SearchBug

  • Website: http://www.searchbug.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SearchBug is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: People search. Limited free info, premium data upsell.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

SearchCode

  • Website: https://searchcode.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SearchCode is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Help find real world examples of functions, API's and libraries across 10+ sources.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

SearchDorks

  • Website: https://kriztalz.sh/search-dorks/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SearchDorks is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Generate Search Engine (Google, FOFA, Shodan, Censys, ZoomEye) Dorks using AI.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Google Dorks Tools.

Back to Name Jump

SearchFiles.de

  • Website: https://searchfiles.de/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SearchFiles.de is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ File Search.

Back to Name Jump

Searchforchats

  • Website: https://telegram.me/searchforchatsbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Searchforchats is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches chats by keywords.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

SearchIsBack

  • Website: https://searchisback.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SearchIsBack is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Facebook.

Back to Name Jump

SearchPeopleFREE

  • Website: https://www.searchpeoplefree.com/phone-lookup
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SearchPeopleFREE is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a reverse name, address, email address, or phone lookup that allows you to discover the owner of a phone number or who lives at an address.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Sector035

  • Website: https://sector035.nl/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sector035 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

Secure Gateway Live Cyber Threat Map

  • Website: https://securegateway.com/map/v5/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Secure Gateway Live Cyber Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Securesha

  • Website: https://securesha.re
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Securesha is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

security-list

  • Website: https://github.com/zbetcheckin/Security_list
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: security-list is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: by @zbetcheckin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Related Awesome Lists.

Back to Name Jump

Seek (Australia)

  • Website: http://www.seek.com.au
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Seek (Australia) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Seekr

  • Website: https://github.com/seekr-osint/seekr
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Seekr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A multi-purpose all in one toolkit for gathering and managing OSINT-Data with a neat web-interface. Can be used for note taking and username checking.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Selfoss

  • Website: http://selfoss.aditu.de
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Selfoss is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

SEMrush

  • Website: https://www.semrush.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SEMrush is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Sentiment140

  • Website: http://www.twittersentiment.appspot.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sentiment140 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Sentinel Hub

  • Website: https://www.sentinel-hub.com/explore/sentinelplayground/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sentinel Hub is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

SEO Chat Tools

  • Website: http://tools.seochat.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SEO Chat Tools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

SEOTools for Excel

  • Website: http://seotoolsforexcel.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SEOTools for Excel is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

SerpApi

  • Website: https://serpapi.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SerpApi is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Scrapes Google search and 25+ search engines with ease and retruns a raw JSON. Supports 10 API wrappers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

SerpScan

  • Website: https://github.com/Alaa-abdulridha/SerpScan
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SerpScan is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Powerful PHP script designed to allow you to leverage the power of dorking straight from the comfort of your command line. Analyzes data from Google, Bing, Yahoo, Yandex, and Badiu.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Serpstat

  • Website: https://serpstat.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Serpstat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

SESRIC Basic Social and Economic Indicators

  • Website: http://www.sesric.org/baseind.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SESRIC Basic Social and Economic Indicators is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

SESRIC Databases

  • Website: http://www.sesric.org/databases-index.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SESRIC Databases is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Seznam(Czech Republic)

  • Website: https://seznam.cz
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Seznam(Czech Republic) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Shadowserver

  • Website: https://dashboard.shadowserver.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Shadowserver is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Dashboard with global statistics on cyber threats collected by the Shadowserver Foundation.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Shanti Interactive

  • Website: http://www.viseyes.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Shanti Interactive is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Sherlock

  • Website: https://t.me/Getcontact123qwerty_bot?start=_ref_jGW8Sa_iEmG9V
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sherlock is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Name/phone/email search + vehicle data.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Sherlock

  • Website: https://github.com/sherlock-project/sherlock
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sherlock is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for a username in multiple platforms/websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

SherlockEye

  • Website: https://sherlockeye.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SherlockEye is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for publicly available information connected to a username, uncovering associated profiles and activities across the web.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

SheSource

  • Website: http://www.shesource.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SheSource is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Shotstars

  • Website: https://github.com/snooppr/shotstars
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Shotstars is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: An advanced tool for checking GitHub repositories, with star statistics, including fake star analysis and data visualization.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ GitHub.

Back to Name Jump

ShtrafKZBot

  • Website: https://t.me/ShtrafKZBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ShtrafKZBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Fines, taxes, penalties; traffic violations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Signal

  • Website: https://signal.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Signal is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: End-to-end encrypted messaging and calls.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Silent circle

  • Website: https://www.silentcircle.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Silent circle is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Silobreaker

  • Website: http://www.silobreaker.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Silobreaker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Similar Web

  • Website: https://www.similarweb.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Similar Web is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Compare any website traffic statistics & analytics.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

SimilarSites

  • Website: http://www.similarsites.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SimilarSites is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Discover websites that are similar to each other.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Similar Sites Search.

Back to Name Jump

SimplyEmail

  • Website: https://github.com/SimplySecurity/SimplyEmail
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: SimplyEmail is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Email recon made fast and easy.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Email search and analysis tools.

Back to Name Jump

SimplyHired

  • Website: http://www.simplyhired.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SimplyHired is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Sintelix

  • Website: https://sintelix.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sintelix is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Sintelix is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

SitesLike

  • Website: http://www.siteslike.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SitesLike is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find similar websites by category.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Similar Sites Search.

Back to Name Jump

SiteSucker

  • Website: http://ricks-apps.com/osx/sitesucker/index.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SiteSucker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

Skiptracer

  • Website: https://github.com/xillwillx/skiptracer
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: Skiptracer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: OSINT scraping framework that utilizes basic Python webscraping (BeautifulSoup) of PII paywall sites to compile passive information on a target on a ramen noodle budget.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Skopenow

  • Website: https://www.skopenow.com/news
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Skopenow is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

Sleipnir

  • Website: http://www.fenrir-inc.com/jp/sleipnir
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sleipnir is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Sleuth For The Truth

  • Website: http://sleuthforthetruth.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sleuth For The Truth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

SlideShare

  • Website: http://www.slideshare.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SlideShare is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Document and Slides Search.

Back to Name Jump

Slimjet

  • Website: http://www.slimjet.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Slimjet is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

SmallSEOTools

  • Website: http://smallseotools.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SmallSEOTools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

SMS Activate

  • Website: https://t.me/PrivatePhoneBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SMS Activate is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Virtual numbers from 50+ countries.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

sn0int

  • Website: https://github.com/kpcyrd/sn0int
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome OSINT

What it does: sn0int is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Semi-automatic OSINT framework and package manager.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Sn1per

  • Website: https://github.com/1N3/Sn1per
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: Sn1per is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Automated Pentest Recon Scanner.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT).

Back to Name Jump

Snappa

  • Website: https://snappa.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Snappa is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

snippet.host

  • Website: https://snippet.host/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: snippet.host is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Minimal text and code snippet hosting.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

snitch

  • Website: https://github.com/Smaash/snitch
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: snitch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Information gathering via dorks.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Dorking tools.

Back to Name Jump

Snoop

  • Website: https://github.com/snooppr/snoop/blob/master/README.en.md
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Snoop is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for a nickname on the web (OSINT world).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Snopes

  • Website: http://www.snopes.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Snopes is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The definitive Internet reference source for urban legends, folklore, myths, rumors, and misinformation.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Fact Checking.

Back to Name Jump

Snov.io

  • Website: https://snov.io/email-finder
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Snov.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find email addresses on any website.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Social Analyzer

  • Website: https://github.com/qeeqbox/social-analyzer
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Social Analyzer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

Social DownORNot

  • Website: http://social.downornot.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Social DownORNot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

  • Website: https://blog.sociallinks.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Social Links is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ OSINT Blogs.

Back to Name Jump

Social Mapper

  • Website: https://github.com/SpiderLabs/social_mapper
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: Social Mapper is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Social Media Enumeration & Correlation Tool by Jacob Wilkin(Greenwolf) by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

Social Searcher

  • Website: http://www.social-searcher.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Social Searcher is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

SocialBakers

  • Website: http://www.socialbakers.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SocialBakers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

SocialBlade

  • Website: http://socialblade.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SocialBlade is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Socialcatfish

  • Website: https://socialcatfish.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Socialcatfish is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Superextensive people search which works worldwide. Searches are done from 200 Billion records.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

SOCRadar LABS

  • Website: https://socradar.io/labs/threat-actor/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SOCRadar LABS is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Know threat actor tactics, techniques, and past activities. Access detailed profiles and track their activities.Keep up with the latest threats and Tactics, Techniques, and Procedures (TTPs).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

SoGou (China)

  • Website: http://www.sogou.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SoGou (China) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Soovle

  • Website: http://www.soovle.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Soovle is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

Sourcebot

  • Website: https://www.sourcebot.dev/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sourcebot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Index thousands of repos on your machine and search through them in a fast, powerful, and modern web interface.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

SourceGraph

  • Website: https://sourcegraph.com/search
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SourceGraph is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search code from millions of open source repositories.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Code Search.

Back to Name Jump

Sources

  • Website: http://www.sources.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sources is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Spacebin

  • Website: https://spaceb.in/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Spacebin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Spacebin is a modern Pastebin server implemented in Go and is capable of serving notes, novels, code, or any other form of text.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Spamhaus

  • Website: https://check.spamhaus.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Spamhaus is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Lookup Reputation Checker.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

SpiderFoot

  • Website: https://github.com/smicallef/spiderfoot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SpiderFoot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: SpiderFoot Github repository.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Spideroak

  • Website: https://spideroak.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Spideroak is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

SpiderSuite

  • Website: https://github.com/3nock/SpiderSuite
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SpiderSuite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: An advance, cross-platform, GUI web security crawler.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Spike

  • Website: http://www.newswhip.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Spike is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

Spokeo

  • Website: http://www.spokeo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Spokeo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: People search. Limited free info, premium data upsell.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

spotify_monitor

  • Website: https://github.com/misiektoja/spotify_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: spotify_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Spotify friends' listening activity including detection when user gets online & offline, played songs, its duration, skipped songs, with optional auto-play, email alerts, CSV logging, session stats and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Music Streaming Services.

Back to Name Jump

spotify_profile_monitor

  • Website: https://github.com/misiektoja/spotify_profile_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: spotify_profile_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Spotify users' activities and profile changes, including playlists, with support for email alerts, CSV logging, showing media in the terminal, detection of profile picture changes and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Music Streaming Services.

Back to Name Jump

Springer

  • Website: http://link.springer.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Springer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Spy Dialer

  • Website: http://spydialer.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Spy Dialer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Get the voicemail of a cell phone & owner name lookup.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

SpyFu

  • Website: http://www.spyfu.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SpyFu is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

SpyGGbot

  • Website: https://telegram.me/SpyGGbot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SpyGGbot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: TON balances, NFT owners, Fragment usernames.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Spyse

  • Website: https://spyse.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Security, Awesome Malware Analysis, Awesome Hacking

What it does: Spyse is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Data gathering service that collects web info using OSINT. Provided info: IPv4 hosts, domains/whois, ports/banners/protocols, technologies, OS, AS, maintains huge SSL/TLS DB, and more... All the data is stored in its own database allowing get the data without scanning.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Security > Web > Scanning / Pentesting.

Back to Name Jump

Squatm3gator

  • Website: https://github.com/david3107/squatm3gator
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Squatm3gator is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Enumerate available domains generated modifying the original domain name through different cybersquatting techniques.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

SRWare Iron

  • Website: http://www.srware.net/en/software_srware_iron.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SRWare Iron is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

StackExchange

  • Website: http://stackexchange.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: StackExchange is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

Startpage

  • Website: https://www.startpage.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Startpage is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The world’s most private search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

Statista

  • Website: http://www.statista.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Statista is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

StatsCrop

  • Website: http://www.statscrop.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: StatsCrop is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

StealSeek

  • Website: https://stealseek.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: StealSeek is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Powerful search engine designed to help you find and analyze data breaches.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data Breach Search Engines.

Back to Name Jump

Steam-OSINT

  • Website: https://github.com/matiash26/steam-osint
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Steam-OSINT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Open-source OSINT tool for accurate mutual friends analysis on Steam, supporting full friend lists.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Steam.

Back to Name Jump

steam_monitor

  • Website: https://github.com/misiektoja/steam_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: steam_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Steam players' gaming activities including detection when a user gets online/offline or plays games with support for email alerts, CSV logging, playtime stats and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Gaming Platforms.

Back to Name Jump

Steganography Online Codec

  • Website: https://www.pelock.com/products/steganography-online-codec
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Steganography Online Codec is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

stored.website

  • Website: https://stored.website
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: stored.website is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

Storyful

  • Website: http://storyful.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Storyful is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

StoryMap

  • Website: https://storymap.knightlab.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: StoryMap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

StoryMaps

  • Website: http://storymaps.arcgis.com/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: StoryMaps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Sub3 Suite

  • Website: https://github.com/3nock/sub3suite
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sub3 Suite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A research-grade suite of tools for intelligence gathering & target mapping with both active and passive(100+ modules) intelligence gathering capabilities.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

SubDomainRadar.io

  • Website: https://subdomainradar.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SubDomainRadar.io is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Fast subdomain finder with multiple search modes and the most extensive data sources, offering real-time notifications.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

subDomainsBrute

  • Website: https://github.com/lijiejie/subDomainsBrute
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: subDomainsBrute is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A simple and fast sub domain brute tool for pentesters by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > Sub Domain Enumeration.

Back to Name Jump

Subreddits

  • Website: http://subreddits.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Subreddits is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Discover new subreddits.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

SunCalc

  • Website: https://www.suncalc.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: SunCalc is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Superdesk

  • Website: https://www.superdesk.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Superdesk is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

Surfface

  • Website: https://surfface.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Surfface is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: face search and people finder indexing social profiles and public images from social media and the web.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

surfraw

  • Website: https://github.com/kisom/surfraw
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: surfraw is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Fast UNIX command line interface to a variety of popular WWW search engines.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Data Broker and Search Engine Services.

Back to Name Jump

Surftg_bot

  • Website: https://t.me/surftg_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Surftg_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searches Telegram messages.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Surveilliance Self Defense

  • Website: https://ssd.eff.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Surveilliance Self Defense is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Swisscows

  • Website: https://swisscows.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Swisscows is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Meta Search.

Back to Name Jump

swisscows

  • Website: https://swisscows.com/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: swisscows is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Anonymous search engine, a family-friendly, privacy-focused search engine based in Switzerland.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy Focused Search Engines.

Back to Name Jump

Sync.ME

  • Website: https://sync.me/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Sync.ME is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a caller ID and spam blocker app.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Letter T

This letter section contains 80 tools.

Tableau

  • Website: http://www.tableausoftware.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tableau is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Tableau

  • Website: http://www.tableau.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tableau is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Tableau Public

  • Website: https://public.tableau.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tableau Public is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Tagboard

  • Website: https://tagboard.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tagboard is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Tagdef

  • Website: https://tagdef.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tagdef is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Tagul

  • Website: https://tagul.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tagul is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Taringa (Latin America)

  • Website: http://www.taringa.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Taringa (Latin America) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Taylor & Francis Online

  • Website: http://www.tandfonline.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Taylor & Francis Online is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Telegago

  • Website: https://cse.google.com/cse?q=+&cx=006368593537057042503:efxu7xprihg#gsc.tab=0&gsc.q=%20&gsc.page=1
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telegago is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A Google Advanced Search specifically for finding public and private Telegram Channels and Chatrooms.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Telegram Channel Joiner

  • Website: https://github.com/spmedia/Telegram-Channel-Joiner
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telegram Channel Joiner is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: grow your Free and Premium Telegram accounts easily with this channel joiner script.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Telegram channels scraper TeleGraphite

  • Website: https://github.com/hamodywe/telegram-scraper-TeleGraphite
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telegram channels scraper TeleGraphite is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Telegram Scraper & JSON Exporter & telegram channels scraper.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Telegram Finder

  • Website: https://www.telegram-finder.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telegram Finder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A tool to find Telegram users by their phone number, linkedin url or email.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Telegram Nearby Map

  • Website: https://github.com/tejado/telegram-nearby-map
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telegram Nearby Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Webapp based on OpenStreetMap and the official Telegram library to find the position of nearby users.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Telepahty

  • Website: https://github.com/proseltd/Telepathy-Community
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telepahty is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Telepathy is a tool that archives Telegram chats and analyzes communication patterns within the app. By providing insights into user interactions, message frequency, and content trends, Telepathy helps investigators understand the dynamics and relationships within Telegram groups and channels.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Telerecon

  • Website: https://github.com/sockysec/Telerecon
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Telerecon is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A reconnaissance framework for researching and investigating Telegram.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

TeleSearch

  • Website: https://telesearch.me/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TeleSearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search and find your desired Telegram channels, groups, bots and games quickly and easily with Telesearch​.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Teleteg

  • Website: https://teleteg.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Teleteg is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The ultimate Telegram search engine. 10 results for free plan.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

TeleTracker

  • Website: https://github.com/tsale/TeleTracker
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TeleTracker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: TeleTracker is a simple set of Python scripts designed for anyone investigating Telegram channels. It helps you send messages quickly and gather useful channel information easily.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

TextBin

  • Website: https://textbin.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TextBin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Secure pastebin where you can paste and store any type of text or code snippets online and share it with your friends.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Textbin-Code

  • Website: https://textbin.online/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Textbin-Code is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: SECURE YOUR CODE!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Textures.js

  • Website: https://riccardoscalco.github.io/textures
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Textures.js is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

TgramSearch

  • Website: https://tgramsearch.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TgramSearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Convenient search for Telegram channels, as well as a structured catalog with over 700000 Telegram channels. Available in 8+ Languages.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

tgworld

  • Website: https://tg.world/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: tgworld is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The Global Search System TG.World will help you find Channels, Groups and Bots in Telegram in any language and for any country in the world!.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Thales

  • Website: https://cds.thalesgroup.com/en/cyberthreat/attacks-page
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Thales is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find Threat actor groups in a graphical attack explorer.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Threat Actor Search.

Back to Name Jump

ThatsThem

  • Website: https://thatsthem.com/reverse-email-lookup
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ThatsThem is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reverse Email Lookup.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

The Art of Subdomain Enumeration

  • Website: https://blog.sweepatic.com/art-of-subdomain-enumeration/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: The Art of Subdomain Enumeration is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Written by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Introduction > Sub Domain Enumeration.

Back to Name Jump

The Atlas of Economic Complexity

  • Website: http://atlas.cid.harvard.edu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: The Atlas of Economic Complexity is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

The Data and Story Library

  • Website: http://lib.stat.cmu.edu/DASL
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: The Data and Story Library is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

The most complete guide to finding anyone’s email

  • Website: https://www.blurbiz.io/blog/the-most-complete-guide-to-finding-anyones-email
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: The most complete guide to finding anyone’s email is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Written by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Introduction > OSINT.

Back to Name Jump

The National Archives (UK)

  • Website: http://www.nationalarchives.gov.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: The National Archives (UK) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search UK national archives.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

The Old Reader

  • Website: http://theoldreader.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: The Old Reader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

The Open Syllabus Project

  • Website: http://opensyllabusproject.org/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: The Open Syllabus Project is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

the-endorser

  • Website: https://github.com/eth0izzle/the-endorser
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: the-endorser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool that allows you to draw out relationships between people on LinkedIn via endorsements/skills.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ LinkedIn.

Back to Name Jump

theHarvester

  • Website: https://github.com/laramies/theHarvester
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome OSINT, Awesome Cyber Security Tools

What it does: theHarvester is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Gather emails, subdomains, hosts, employee names, open ports and banners from different public sources like search engines, PGP key servers and SHODAN computer database.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Metadata harvesting and analysis.

Back to Name Jump

These Are the Tools Open Source Researchers Say They Need

  • Website: https://www.bellingcat.com/resources/2022/08/12/these-are-the-tools-open-source-researchers-say-they-need/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: These Are the Tools Open Source Researchers Say They Need is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Results of a survey Bellingcat conducted in February 2022.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Resources.

Back to Name Jump

TheWebCo

  • Website: https://thewebco.ai
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TheWebCo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The single source of people intelligence.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

Threads

  • Website: https://www.threads.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Threads is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Text-based conversation app from Meta.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

ThreatsEye Live Cyber Threat Map

  • Website: https://threatseye.io/threats-map
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ThreatsEye Live Cyber Threat Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Real-time visualization of global cyber attacks and threats. Monitor live cyber security incidents, attack origins, targets, and threat categories worldwide.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Live Cyber Threat Maps.

Back to Name Jump

Thunderbird

  • Website: https://www.thunderbird.net/en-US/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Thunderbird is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

TIDoS-Framework

  • Website: https://github.com/theInfectedDrake/TIDoS-Framework
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: TIDoS-Framework is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A comprehensive web application audit framework to cover up everything from Reconnaissance and OSINT to Vulnerability Analysis by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Penetration Testing.

Back to Name Jump

Tik-tok

  • Website: https://datanews.github.io/tik-tok
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tik-tok is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Tiki-toki

  • Website: http://www.tiki-toki.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tiki-toki is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Timeflow

  • Website: https://github.com/FlowingMedia/TimeFlow/wiki
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Timeflow is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Timeline

  • Website: http://timeline.knightlab.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Timeline is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Timeline

  • Website: http://www.simile-widgets.org/timeline
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Timeline is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Timetoast

  • Website: http://www.timetoast.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Timetoast is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Tinder

  • Website: https://www.gotinder.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tinder is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

TinEye

  • Website: https://tineye.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TinEye is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Reverse image search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

tinfoleak

  • Website: https://github.com/vaguileradiaz/tinfoleak
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: tinfoleak is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The most complete open-source tool for Twitter intelligence analysis by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > OSINT - Open-Source Intelligence.

Back to Name Jump

TinyScan

  • Website: https://www.tiny-scan.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TinyScan is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Another powerful URL scan tool that provides comprehensive information about any given URL. Get insights into IP address, location, screenshots, technology stack, performance metrics, and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Toofr

  • Website: https://www.toofr.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Toofr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find Anyone’s Email Address in Seconds.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Topix

  • Website: http://www.topix.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Topix is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News.

Back to Name Jump

Tor Browser

  • Website: https://www.torproject.org/projects/torbrowser.html.en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tor Browser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tor is a free software that prevents people from learning your location or browsing habits by letting you communicate anonymously on the Internet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Torch

  • Website: http://www.torchbrowser.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Torch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

TorrentFreak List of VPNs

  • Website: https://torrentfreak.com/vpn-services-anonymous-review-2017-170304/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TorrentFreak List of VPNs is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ VPN Services.

Back to Name Jump

TOsint

  • Website: https://github.com/drego85/tosint
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TOsint is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tosint (Telegram OSINT) is a powerful tool designed to extract valuable information from Telegram bots and channels. It serves as an essential resource for security researchers, investigators, and anyone interested in gathering insights from various Telegram entities.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

Toutatis

  • Website: https://github.com/megadose/toutatis
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Toutatis is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: a tool that allows you to extract information from instagrams accounts such as s, phone numbers and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Instagram.

Back to Name Jump

Trace

  • Website: https://trace.manus.space
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Trace is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Real-time OSINT platform to search usernames, emails, phone numbers, and full names across 600+ platforms with breach detection and AI risk scoring.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

TracerouteVisualizer

  • Website: https://kriztalz.sh/traceroute-visualizer/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TracerouteVisualizer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: An online tool that displays your mtr / traceroute / flyingroutes output on a map for visual analysis.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Trading Economics

  • Website: http://www.tradingeconomics.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Trading Economics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Transparency.org Corruption Perception Index

  • Website: http://www.transparency.org/cpi2015
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Transparency.org Corruption Perception Index is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Trends24

  • Website: http://trends24.in
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Trends24 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

TRExpertWitness

  • Website: https://trexpertwitness.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TRExpertWitness is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

Trooclick

  • Website: http://trooclick.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Trooclick is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ News Digest and Discovery Tools.

Back to Name Jump

Truecaller

  • Website: https://truecaller.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Truecaller is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Global reverse phone number search.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Tubuep

  • Website: https://github.com/bibanon/tubeup
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tubuep is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Downloads online videos via yt-dlp, then reuploads them to the Internet Archive for preservation. Note: if you would like to archive comments too, you need to install version 0.0.33 and use the --get-comments flag, however you will still have the new yt-dlp fixes and features, but existing tubeup bugs cannot be fixed, unless you do manual work.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Tumblr

  • Website: https://www.tumblr.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tumblr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

  • Website: http://www.tumblr.com/search
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Tumblr Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Tumblr.

Back to Name Jump

TuriBot

  • Website: https://t.me/TuriBot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TuriBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Resolves username from Telegram ID.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

TutPaste

  • Website: https://tutpaste.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TutPaste is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Welcome to our fast and free online paste tool. Paste and share your text or code snippets with anyone, anywhere, no registration required.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

TwChat

  • Website: http://twchat.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TwChat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

TweetMap

  • Website: http://mapd.csail.mit.edu/tweetmap
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TweetMap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

TweetMap

  • Website: http://worldmap.harvard.edu/tweetmap
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: TweetMap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Twilio

  • Website: https://www.twilio.com/docs/lookup/v2-api
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twilio is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Look up a phone numbers carrier type, location, etc. Twilio offers free accounts that come with credits you can use with their API. Each lookup is only ~$0.01-$0.02 typically on US and CAN numbers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Phone Number Research.

Back to Name Jump

Twingly

  • Website: http://www.twingly.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twingly is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Blog Search.

Back to Name Jump

Twitter

  • Website: https://twitter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twitter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

  • Website: https://twitter.com/search-advanced?lang=en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twitter Advanced Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Twitter Audit

  • Website: https://www.twitteraudit.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twitter Audit is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Twitter Chat Schedule

  • Website: http://tweetreports.com/twitter-chat-schedule
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twitter Chat Schedule is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

  • Website: http://search.twitter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Twitter Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Twitter.

Back to Name Jump

Letter U

This letter section contains 27 tools.

Ubersuggest

  • Website: http://ubersuggest.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Ubersuggest is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

uBlock Origin

  • Website: https://github.com/gorhill/uBlock
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: uBlock Origin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

UCBrowser

  • Website: http://www.ucweb.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UCBrowser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

UN COMTRADE Database

  • Website: http://comtrade.un.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UN COMTRADE Database is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

UN Data

  • Website: http://data.un.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UN Data is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Unamer

  • Website: https://telegram.me/unamer_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Unamer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Username ownership history.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

UNCTAD Country Fact Sheets

  • Website: http://unctad.org/en/Pages/DIAE/World%20Investment%20Report/Country-Fact-Sheets.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNCTAD Country Fact Sheets is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

UNCTAD Investment Country Profiles

  • Website: http://unctad.org/en/Pages/Publications/Investment-country-profiles.aspx
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNCTAD Investment Country Profiles is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

UNCTAD STAT

  • Website: http://unctadstat.unctad.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNCTAD STAT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

UNDPs Human Development Index

  • Website: http://hdr.undp.org/en/data
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNDPs Human Development Index is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

UNECE

  • Website: http://w3.unece.org/PXWeb/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNECE is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

UNESCO Institute for Statistics

  • Website: http://uis.unesco.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNESCO Institute for Statistics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Unfurl

  • Website: https://dfir.blog/unfurl/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Unfurl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Unfurl analyzes and breaks down URLs into useful forensic components for digital investigation.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

UniCourt

  • Website: https://unicourt.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UniCourt is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Limited free searches, premium data upsell. Nationwide search of 100 million+ United States court cases.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

UNIDO Statistical Databases

  • Website: http://www.unido.org/resources/statistics/statistical-databases.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNIDO Statistical Databases is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Universal Scammer List

  • Website: https://universalscammerlist.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Universal Scammer List is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: This acts as the website-portion for the subreddit /r/universalscammerlist. That subreddit, in conjuction with this website and a reddit bot, manages a list of malicious reddit accounts and minimizes the damage they can deal. This list is referred to as the "USL" for short.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Reddit.

Back to Name Jump

UNStats Social Indicators

  • Website: http://unstats.un.org/unsd/demographic/products/socind
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UNStats Social Indicators is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Upsala Conflict Data Program

  • Website: http://www.pcr.uu.se/research/UCDP
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Upsala Conflict Data Program is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

urlDNA

  • Website: https://urldna.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: urlDNA is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Unleash website insights! urldna.io analyzes url, monitors brands and track phishing sites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

URLVoid

  • Website: http://www.urlvoid.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: URLVoid is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Analyzes a website through multiple blacklist engines and online reputation tools to facilitate the detection of fraudulent and malicious websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

US Data and Statistics

  • Website: https://www.usa.gov/statistics
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: US Data and Statistics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

User Searcher

  • Website: https://www.user-searcher.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: User Searcher is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: User-Searcher is a powerful and free tool to help you search username in 2000+ websites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

user-scanner

  • Website: https://github.com/kaifcodec/user-scanner.git
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: user-scanner is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Takes an email, scan on various popular sites, games and retrieve info if the email is registered there or not.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

username_to_id_bot

  • Website: https://t.me/username_to_id_bot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: username_to_id_bot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Returns user/chat/channel/bot ID.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

USGS (EarthExplorer)

  • Website: https://earthexplorer.usgs.gov/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: USGS (EarthExplorer) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

UsInfoBot

  • Website: https://t.me/usinfobot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UsInfoBot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Resolves username from ID (inline).

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ Telegram.

Back to Name Jump

UVRX

  • Website: http://www.uvrx.com/social.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: UVRX is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Letter V

This letter section contains 35 tools.

Validin

  • Website: https://app.validin.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Validin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Website and API to search current and historical DNS records for free.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Vault

  • Website: http://www.vault.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Vault is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Well-known ranking of largest United States Corporations.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

vaultbin

  • Website: https://vaultb.in/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: vaultbin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Vaultbin is a blazingly fast and secure alternative to Pastebin and Hastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

vcsmap

  • Website: https://github.com/melvinsh/vcsmap
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: vcsmap is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Plugin-based tool to scan public version control systems for sensitive information.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Source code repository searching tools.

Back to Name Jump

Venacus

  • Website: https://venacus.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Venacus is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search for your data breaches and get notified when your data is compromised.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data Breach Search Engines.

Back to Name Jump

Venngage

  • Website: https://venngage.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Venngage is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Veoh

  • Website: http://www.veoh.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Veoh is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Verify Email

  • Website: http://verify-email.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Verify Email is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The fastest and most accurate email verification tool.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Verisign

  • Website: http://dnssec-debugger.verisignlabs.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Verisign is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

versionista

  • Website: http://versionista.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: versionista is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Verybin

  • Website: https://www.verybin.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Verybin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Anonymous and encrypted pastebin. Data is encrypted/decrypted in the browser using 256 bits AES and no IP address logged.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

VHostScan

  • Website: https://github.com/codingo/VHostScan
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome Hacking

What it does: VHostScan is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

ViaMichelin

  • Website: http://www.viamichelin.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ViaMichelin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Video Stabilization Methods

  • Website: https://github.com/yaochih/awesome-video-stabilization
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Video Stabilization Methods is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

View in Google Earth

  • Website: http://www.mgmaps.com/kml/#view
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: View in Google Earth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

ViewDNS.info

  • Website: http://viewdns.info
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ViewDNS.info is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Vimeo

  • Website: https://vimeo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Vimeo is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

VirusTotal domain information

  • Website: https://www.virustotal.com/en/documentation/searching/#getting-domain-information
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Web Security

What it does: VirusTotal domain information is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Searching for domain information by .

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Web Security > Tools > Reconnaissance > Sub Domain Enumeration.

Back to Name Jump

Vis.js

  • Website: http://visjs.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Vis.js is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Visme

  • Website: http://www.visme.co
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Visme is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Visualize Free

  • Website: http://visualizefree.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Visualize Free is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Visualize.me

  • Website: http://vizualize.me
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Visualize.me is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

visually

  • Website: http://create.visual.ly
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: visually is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

visualping

  • Website: https://visualping.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: visualping is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Vivaldi

  • Website: https://vivaldi.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Vivaldi is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Powerful, Private and Personal Web Browser.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Vizala

  • Website: https://vizala.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Vizala is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

  • Website: http://vk.com/communities
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VK Community Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ VKontakte.

Back to Name Jump

  • Website: http://vk.com/people
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VK People Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ VKontakte.

Back to Name Jump

VK.watch

  • Website: https://vk.watch/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VK.watch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ VKontakte.

Back to Name Jump

VK5

  • Website: http://vk5.city4me.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VK5 is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > Social Media Tools > ↑ VKontakte.

Back to Name Jump

VKontakte

  • Website: https://vk.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VKontakte is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

VoilaNorbert

  • Website: https://www.voilanorbert.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VoilaNorbert is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find anyone's contact information for lead research or talent acquisition.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Email Search / Email Check.

Back to Name Jump

Vortex

  • Website: http://www.dotmatics.com/products/vortex
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Vortex is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Voter Records

  • Website: https://voterrecords.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Voter Records is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Free political research tool to study more than 100 Million US voter records.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

VPN Comparison by That One Privacy Guy

  • Website: https://thatoneprivacysite.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: VPN Comparison by That One Privacy Guy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a summary list of top best VPN services.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ VPN Services.

Back to Name Jump

Letter W

This letter section contains 58 tools.

w3snoop

  • Website: http://webboar.com.w3snoop.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: w3snoop is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a website that gives you a free and comprehensive report about a specific website.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

wafw00f

  • Website: https://github.com/EnableSecurity/wafw00f
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome Cyber Security Tools

What it does: wafw00f is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Identifies and fingerprints Web Application Firewall (WAF) products.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

Walla (Israel)

  • Website: http://www.walla.co.il
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Walla (Israel) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Wappalyzer

  • Website: https://www.wappalyzer.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome Cyber Security Tools

What it does: Wappalyzer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Detect web technologies including CMS, frameworks, analytics, and servers.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

Waterfox

  • Website: https://www.waterfox.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Waterfox is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Fast and Private Web Browser. Get privacy out of the box with Waterfox.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

WATools

  • Website: https://watools.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WATools is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Real-Time Search, Social Media Search, and General Social Media Tools.

Back to Name Jump

Wayback Machine

  • Website: http://archive.org/web/web.php
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wayback Machine is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Explore the history of a website.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

Wayback Machine Archiver

  • Website: https://github.com/jsvine/waybackpack
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wayback Machine Archiver is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

waybackpy

  • Website: https://github.com/akamhy/waybackpy
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: waybackpy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Python package & CLI tool that interfaces the Wayback Machine APIs.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web History and Website Capture.

Back to Name Jump

Waybackurls

  • Website: https://github.com/tomnomnom/waybackurls
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Waybackurls is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Fetch all URLs known by the Wayback Machine for a domain.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

Web-Check

  • Website: https://web-check.as93.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Web-Check is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: All-in-one tool for viewing website and server meta data.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

WebAssistant

  • Website: http://www.proxy-offline-browser.com/download.html
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WebAssistant is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

WebMeUp

  • Website: http://webmeup.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WebMeUp is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is the Web's freshest and fastest growing backlink index, and the primary source of backlink data for SEO PowerSuite.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

WebReader

  • Website: http://www.getwebreader.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WebReader is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Webscore

  • Website: https://garvit835.github.io/WebScore/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Webscore is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Enter a website URL to check its legitimacy.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Webscout

  • Website: https://webscout.io/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Webscout is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A Swiss Army knife for scaled intelligence and metadata on IP addresses and domains.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

webscreenshot

  • Website: https://github.com/maaaaz/webscreenshot
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: webscreenshot is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Simple script to take screenshots of websites from a list of sites.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

Website Informer

  • Website: http://website.informer.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Website Informer is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Website Ripper Copier

  • Website: http://www.tensons.com/products/websiterippercopier
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Website Ripper Copier is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Offline Browsing.

Back to Name Jump

WebSite Watcher

  • Website: http://www.aignes.com/index.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WebSite Watcher is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

WebsiteTechMiner.py

  • Website: https://github.com/cybersader/WebsiteTechMiner-py
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WebsiteTechMiner.py is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: automates gathering website profiling data into a CSV from the "BuiltWith" or "Wappalyzer" API for tech stack information, technographic data, website reports, website tech lookups, website architecture lookups, etc.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Weibo (China)

  • Website: http://weibo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Weibo (China) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

WhatBreach

  • Website: https://github.com/Ekultek/WhatBreach
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: WhatBreach is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Search email addresses and discover all known breaches that this email has been seen in, and download the breached database if it is publicly available.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Email search and analysis tools.

Back to Name Jump

WhatIsMyIPAddress

  • Website: http://whatismyipaddress.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WhatIsMyIPAddress is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

WhatsMyName

  • Website: https://whatsmyname.app/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WhatsMyName is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: check for usernames across many different platforms.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Username Check.

Back to Name Jump

WhatWaf

  • Website: https://github.com/Ekultek/WhatWaf
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: WhatWaf is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Detect and bypass web application firewalls and protection systems.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

WhatWeb

  • Website: https://github.com/urbanadventurer/WhatWeb
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome Cyber Security Tools

What it does: WhatWeb is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Website fingerprinting tool to identify web technologies.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Web application and resource analysis tools.

Back to Name Jump

White Pages (US)

  • Website: http://www.whitepages.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: White Pages (US) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: People search. Limited free info, premium data upsell.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

WHO Data

  • Website: http://www.who.int/gho/en
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WHO Data is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Who.is

  • Website: https://who.is/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Who.is is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Domain whois information.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Whois Arin Online

  • Website: https://whois.arin.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Whois Arin Online is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: is a web service for Whois data contained within ARIN's registration database.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

WhoIsHostingThis

  • Website: http://www.whoishostingthis.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WhoIsHostingThis is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

WhoisMind

  • Website: http://www.whoismind.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WhoisMind is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Whoisology

  • Website: https://whoisology.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Whoisology is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

WhoIsRequest

  • Website: http://whoisrequest.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WhoIsRequest is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

Wickr

  • Website: https://wickr.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wickr is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

WiGLE.net

  • Website: https://wigle.net/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing, Awesome OSINT

What it does: WiGLE.net is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Wi-fi "wardriving" database. Contains a global map containing crowdsourced information on the location, name, and other properties of wi-fi networks. Software available to download to contribute data to the public infoset.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > OSINT Online Resources.

Back to Name Jump

Wikimapia

  • Website: http://wikimapia.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wikimapia is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Wiley

  • Website: http://eu.wiley.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wiley is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

Winds

  • Website: http://winds.getstream.io
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Winds is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Web Monitoring.

Back to Name Jump

Windy

  • Website: https://www.windy.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Windy is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

WIPO

  • Website: https://www3.wipo.int/branddb/en/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WIPO is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Wolfram Alpha

  • Website: https://www.wolframalpha.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wolfram Alpha is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Wolfram Alpha is a computational knowledge engine (answer engine) developed by Wolfram Alpha. It will compute expert-level answers using Wolfram’s breakthrough.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Word Tracker

  • Website: https://www.wordtracker.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Word Tracker is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

World Bank Data

  • Website: http://data.worldbank.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Bank Data is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

World Bank Data

  • Website: http://datatopics.worldbank.org/consumption/home
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Bank Data is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

World Bank Doing Business

  • Website: http://www.doingbusiness.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Bank Doing Business is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

World Bank Enterprise Surveys

  • Website: http://www.enterprisesurveys.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Bank Enterprise Surveys is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

World Bank Investing Across Borders

  • Website: http://iab.worldbank.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Bank Investing Across Borders is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

World Digital Library

  • Website: http://www.wdl.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Digital Library is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

World Integrated Trade Solution

  • Website: http://wits.worldbank.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: World Integrated Trade Solution is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

WorldMap Harvard

  • Website: http://worldmap.harvard.edu
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WorldMap Harvard is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Worldwide OSINT Tools Map

  • Website: https://cipher387.github.io/osintmap/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Worldwide OSINT Tools Map is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: A global map of databases and OSINT sources by applicable location.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

WorldWideScience.org

  • Website: http://worldwidescience.org
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WorldWideScience.org is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

WOT

  • Website: https://www.mywot.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WOT is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Wpscan

  • Website: https://wpscan.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Wpscan is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Scan your WordPress site and get an instant report on its security.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Write.as

  • Website: https://write.as/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Write.as is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Type words, put them on the internet.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

WTO Statistics

  • Website: https://www.wto.org/english/res_e/statis_e/statis_e.htm
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: WTO Statistics is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Data and Statistics.

Back to Name Jump

Letter X

This letter section contains 3 tools.

xbox_monitor

  • Website: https://github.com/misiektoja/xbox_monitor
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: xbox_monitor is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Tool for real-time tracking of Xbox Live players gaming activities including detection when a user gets online/offline or plays games with support for email alerts, CSV logging, playtime stats and more.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Gaming Platforms.

Back to Name Jump

Xing

  • Website: https://www.xing.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Xing is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Major Social Networks.

Back to Name Jump

Xing

  • Website: http://www.xing.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Xing is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

Letter Y

This letter section contains 18 tools.

Yahoo Answers

  • Website: http://answers.yahoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yahoo Answers is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Q&A Sites.

Back to Name Jump

Yahoo Groups

  • Website: https://groups.yahoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yahoo Groups is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Forums and Discussion Boards Search.

Back to Name Jump

  • Website: https://images.search.yahoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yahoo Image Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Yahoo Maps

  • Website: https://maps.yahoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yahoo Maps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

  • Website: http://video.search.yahoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yahoo Video Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

  • Website: https://www.yahoo.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yahoo! Search is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: The search engine that helps you find exactly what you're looking for.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

Yandex (Russia)

  • Website: http://www.yandex.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yandex (Russia) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

Yandex Browser

  • Website: https://browser.yandex.com/desktop/main
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yandex Browser is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Browsers.

Back to Name Jump

Yandex Images

  • Website: https://www.yandex.com/images
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yandex Images is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Image Search.

Back to Name Jump

Yandex Wordstat

  • Website: https://wordstat.yandex.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Yandex Wordstat is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Keywords Discovery and Research.

Back to Name Jump

Yar

  • Website: https://github.com/Furduhlutur/yar
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome Penetration Testing

What it does: Yar is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Clone git repositories to search through the whole commit history in order of commit time for secrets, tokens, or passwords.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome Penetration Testing > Open Sources Intelligence (OSINT) > Source code repository searching tools.

Back to Name Jump

YOU

  • Website: https://you.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: YOU is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: AI search engine.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ General Search.

Back to Name Jump

You Get Signal

  • Website: http://www.yougetsignal.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: You Get Signal is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Domain and IP Research.

Back to Name Jump

YouControl

  • Website: https://youcontrol.com.ua/en/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: YouControl is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Company Research.

Back to Name Jump

YouTube

  • Website: https://www.youtube.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: YouTube is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

YouTube Geofind

  • Website: https://mattw.io/youtube-geofind/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: YouTube Geofind is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

YouTube Metadata

  • Website: https://mattw.io/youtube-metadata/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: YouTube Metadata is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

yt-dlp

  • Website: https://github.com/yt-dlp/yt-dlp/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: yt-dlp is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Downloads videos from almost any online platform, along with information, thumbnails, subtitles, descriptions, and comments (comments only on a select few sites like Youtube and a few small sites). If a site is not supported, or a useful or crucial piece of metadata, including comments, is missing, create an issue.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Video Search and Other Video Tools.

Back to Name Jump

Letter Z

This letter section contains 14 tools.

ZabaSearch

  • Website: https://www.zabasearch.com/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ZabaSearch is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ People Investigations.

Back to Name Jump

Zanran

  • Website: http://zanran.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zanran is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Speciality Search Engines.

Back to Name Jump

Zapmeta

  • Website: http://www.zapmeta.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zapmeta is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Visual Search and Clustering Search Engines.

Back to Name Jump

Zarebin (Iran)

  • Website: http://zarebin.ir
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zarebin (Iran) is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Main National Search Engines.

Back to Name Jump

ZBin

  • Website: https://zbin.dev/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ZBin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Private & Secure Pastebin.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Zeemaps

  • Website: https://www.zeemaps.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zeemaps is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump

Zen

  • Website: https://github.com/s0md3v/Zen
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zen is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Find email addresses of Github users urls and other data effortlessly.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Other Tools.

Back to Name Jump

ZeroBin

  • Website: https://sebsauvage.net/paste/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ZeroBin is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: ZeroBin is a minimalist, opensource online pastebin where the server has zero knowledge of pasted data. Data is encrypted/decrypted in the browser using 256 bits AES.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Pastebins.

Back to Name Jump

Zetoc

  • Website: http://zetoc.jisc.ac.uk
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zetoc is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Academic Resources and Grey Literature.

Back to Name Jump

ZingChart

  • Website: http://www.zingchart.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ZingChart is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Infographics and Data Visualization.

Back to Name Jump

Zintro

  • Website: https://www.zintro.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zintro is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Expert Search.

Back to Name Jump

ZipRecruiter

  • Website: https://www.ziprecruiter.com
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ZipRecruiter is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Job Search Resources.

Back to Name Jump

ZMail

  • Website: http://zmail.sourceforge.net
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: ZMail is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Privacy and Encryption Tools.

Back to Name Jump

Zoom Earth

  • Website: https://zoom.earth/
  • Model: Open Source
  • Category: OSINT & Reconnaissance
  • Source Lists: Awesome OSINT

What it does: Zoom Earth is used in osint & reconnaissance programs to support asset discovery, external exposure mapping, and intelligence collection. Source summaries describe it as: Source list entry describing this security tool and its use case.

Operational value: Security teams commonly use this capability to improve consistency between detection, investigation, and response decisions, especially when alerts, evidence collection, and triage ownership are distributed across multiple teams.

Typical deployment pattern: Implementations usually start with scoped pilot coverage, baseline logging/telemetry validation, and explicit runbook mapping so analysts understand when to escalate, contain, or defer.

Selection considerations: As an open-source option, teams usually evaluate maintainer activity, release cadence, and community response quality. Related source context: Awesome OSINT > ↑ Geospatial Research and Mapping Tools.

Back to Name Jump