Open source intelligence directory
Searchable OSINT tools, tradecraft, and workflows in one field-ready handbook.
Browse by mission type, compare sources, and keep a shortlist of tools for investigations across people, companies, infrastructure, media, and geolocation.
Resource Index
Tools and Techniques
Showing all resources
Exposure intelligence
Breach Lab
Safe demo search and tracker
Risk Boundaries
Do not collect, buy, store, or display leaked passwords. Legitimate exposure checking should use reputable APIs, hashed lookup models, and consent-based monitoring for assets you own or are authorized to assess.
Learning paths
Real Tutorials
Step-by-step techniques with evidence discipline
Open Cyber Apprenticeship
This fieldbook is built for people learning outside formal university paths. The goal is practical fluency: source evaluation, safe lab habits, privacy-aware investigation, and defensible reporting before advanced tooling.
Operational playbooks
Repeatable OSINT Workflows
Entity Baseline
Capture names, aliases, domains, handles, registrations, known locations, and confidence levels before deep research.
Source Corroboration
Cross-check claims against archives, official filings, media provenance, and independent data points.
Infrastructure Trail
Pivot from domains to DNS, certificates, hosting, exposed services, repositories, and historical changes.
Geolocation Review
Compare visual clues, satellite context, maps, shadows, weather, and street-level references.
Analyst notes
Build defensible findings without crossing legal lines.
Every record is tagged by objective and category so analysts can move from collection to verification without losing source context. The breach features are deliberately designed for consent-based exposure awareness, not credential harvesting.
Later paid tier
What makes this more than a directory.
Professional features should improve judgment, not just hide links.
Evidence Quality Review
Structured source scoring, confidence labels, contradiction checks, and report-readiness prompts before findings are shared.
Guided Apprenticeships
Role-based learning paths for web intelligence, blue team, breach response, geospatial OSINT, and privacy operations.
Authorized Monitoring
Domain-owned exposure monitoring, alert triage, remediation checklists, and audit trails designed around consent.
Team Workspaces
Shared cases, private notes, reviewer approvals, admin controls, and exportable evidence bundles.