Open source intelligence directory

Searchable OSINT tools, tradecraft, and workflows in one field-ready handbook.

Browse by mission type, compare sources, and keep a shortlist of tools for investigations across people, companies, infrastructure, media, and geolocation.

Early access

Join the founding learner list

Get the OSINT starter pack, build notes, and an invite to test tutorials before public launch.

View starter pack

Abstract map of connected OSINT sources
0 tools 11 tracks 24 workflows

Resource Index

Tools and Techniques

Showing all resources

Exposure intelligence

Breach Lab

Safe demo search and tracker

Local Exposure Search

Check usernames, emails, or domains against a small local demo dataset and learn how real services protect sensitive searches with hashing and k-anonymity.

Login to save search history. This demo never asks for passwords.

Realtime Breach Tracker

Live demo

    Risk Boundaries

    Do not collect, buy, store, or display leaked passwords. Legitimate exposure checking should use reputable APIs, hashed lookup models, and consent-based monitoring for assets you own or are authorized to assess.

    Learning paths

    Real Tutorials

    Step-by-step techniques with evidence discipline

    Open Cyber Apprenticeship

    This fieldbook is built for people learning outside formal university paths. The goal is practical fluency: source evaluation, safe lab habits, privacy-aware investigation, and defensible reporting before advanced tooling.

    Operational playbooks

    Repeatable OSINT Workflows

    01

    Entity Baseline

    Capture names, aliases, domains, handles, registrations, known locations, and confidence levels before deep research.

    02

    Source Corroboration

    Cross-check claims against archives, official filings, media provenance, and independent data points.

    03

    Infrastructure Trail

    Pivot from domains to DNS, certificates, hosting, exposed services, repositories, and historical changes.

    04

    Geolocation Review

    Compare visual clues, satellite context, maps, shadows, weather, and street-level references.

    Analyst notes

    Build defensible findings without crossing legal lines.

    Every record is tagged by objective and category so analysts can move from collection to verification without losing source context. The breach features are deliberately designed for consent-based exposure awareness, not credential harvesting.

    Later paid tier

    What makes this more than a directory.

    Professional features should improve judgment, not just hide links.

    Evidence Quality Review

    Structured source scoring, confidence labels, contradiction checks, and report-readiness prompts before findings are shared.

    Guided Apprenticeships

    Role-based learning paths for web intelligence, blue team, breach response, geospatial OSINT, and privacy operations.

    Authorized Monitoring

    Domain-owned exposure monitoring, alert triage, remediation checklists, and audit trails designed around consent.

    Team Workspaces

    Shared cases, private notes, reviewer approvals, admin controls, and exportable evidence bundles.

    Analyst account

    Login to unlock workspace functions