Prévia do material em texto
OSINT Cheat Sheets The Ultimate OSINT Cheat Sheet www.cibergy.com Alex Lozano The Intelligence Cycle Top Sources Planning & Direction Collection Processing Analysis & Production Dissemination 1 2 3 4 5 Plan, strategize, research, discuss, gather intelligence, execute task efficiently. Gather intelligence overtly and covertly, utilizing various technological resources. Compile collected data into intelligence reports. Analyze data, determine relevance, anticipate outcomes, evaluate impact on interests. Deliver analysis to policymaker, await feedback, restart cycle as necessary. OSINT Purposes ¿What is OSINT? Main Users Top Free Tools OSINT stands for Open Source Intelligence. It refers to the practice of collecting and analyzing information from publicly available sources to gather insights, identify trends, or generate intelligence. PART 1:THE FOUNDATIONS People identifiers Social media platforms News articles Reports Websites Blogs & Forums Security and Threat Intelligence: Investigations: Competitive Intelligence: Reputation Management: Journalism and Research: Disaster Response and Crises: Identifying security risks through analyzing public information on individuals and organizations. Conducting investigations into various matters by gathering relevant information. Gathering information about competitors, market trends, consumer preferences, etc. Monitoring and managing the online reputation of individuals, organizations and brands. Supporting research by gathering data to uncover facts, verify claims, and provide context. Assess the impact of natural disasters, conflicts or crises to facilitate effective response. Such as names, aliases, email addresses, phone numbers, employment history or education. Gather information from Facebook, Twitter, Instagram, LinkedIn, TikTok, and others. This can include traditional news websites, online newspapers, and other sources where news and current events are reported. Documents, publications, white papers, statistical data, and other information published by government agencies. Text, images, videos, documents, metadata, and other multimedia content. Valuable insights, opinions, discussions, and user-generated content on a wide range of topics. Governments Corporations Law Enforcement Agencies Investigators & Journalists Community sentiment Risk & threats to public safety Weather & natural disaster Personel protection & screening Due diligence Fraud investigations Supply chain risk Asset protection Brand monitoring Trending activities Critical information Crisis response Counter violent extremism Situational awareness Public safety Deep investigations Verification of information Investigative journalism Private investigation Uncover facts Access to data Web Archive Epieos OpenCorporatesHaveIBeenPwned Forensic OSINT Namechk Inteltechniques FOCA The Ultimate OSINT Cheat Sheet Alex Lozano Intelligence Analyst Key Skills Intelligence Disciplines Critical Thinking Research & Analysis Technical Skills Problem-Solving Communication Skills Evaluate information critically, considering its reliability, relevance, and implications. Gathering information from a variety of sources and ability to analyze data sets and draw conclusions. Proficiency in using analytical tools, databases, and software for data collection and analysis. Provide creative and strategic solutions to complex problems. Convey their findings clearly, both in written reports and oral briefings. Top Browser Extensions PART 2: THE FOUNDATIONS OSINT - Open Source Intelligence SOCMINT - Social Media Intelligence HUMINT - Human Intelligence GEOINT - Geospatial Intelligence IMINT - Imagery Intelligence SIGINT - Signals Intelligence Encompasses accessible information found in various mediums such as printed materials, electronic platforms, broadcast media, and online sources. A branch of OSINT that focuses specifically on gathering and analyzing information from social media platforms (posts, images, videos, public conversations, etc.) HUMINT involves direct interaction with individuals to collect valuable knowledge or access to sensitive information. Involves the analysis of geospatial data to understand and interpret activities and events occurring on Earth's surface. It combines imagery, mapping, and geographic information systems (GIS), among others. The collection, analysis, and interpretation of visual images obtained from various sources such as satellites, reconnaissance aircraft, drones, and other imaging systems. The interception and analysis of electronic signals (radio transmissions, signals, radar emissions, telecommunications data, etc.) and communications for intelligence purposes Internet Categories Surface Web Deep Web Dark Web Normal web visible for all users Websites are indexed by search engines Represents only 4% of the entire internet Web not indexed by search engines. Access is restricted to authorized users. Databases, cloud storage, sensitive data, etc. Access through software like Tor Browser. Anonymous browsing is sought by users. Ilegal activities are promoted. Computer Optimization Antivirus VPN (Virtual Private Network) Virtual Machines (VM) Web Browsers Sock Puppets A technology that allows you to create a secure connection over the internet between your device and a remote server. VPNs encrypt your internet traffic (ProtonVPN, NordVPN, CyberGhost, etc.) Web browsers are the primary tool for conducting searches and play a crucial role in conducting OSINT investigations by providing access to a wide range of online sources and tools (Brave, Firefox, Tor, etc.) Sock puppets refer to fake online identities or personas created and operated by individuals or groups for investigation purposes (FakePersonGenerator, ThisPersonDoesNotExist, ChatGPT, AI, etc.) Software-based emulations of physical computers that allow multiple operating systems (OS) to run concurrently on a single physical machine (Kali Linux, Trace Labs, Silo, Tsurugi, etc.) Antivirus software is a type of program designed to detect, prevent, and remove malicious software, commonly known as malware, from computers and networks (Windows Defender, ClamAV, Avast, etc.) uBlock Origin Exif Viewer Wayback Machine Forensic OSINT FireShot Shodan User-Agent Switcher DownThemAll Cookie AutoDelete Google Translate SputnikPrivacy Badger RevEye Vortimo 1 2 3 4 5 www.cibergy.com The Ultimate OSINT Cheat Sheet PART 3:SEARCH ENGINES Alex Lozano General Search Engines Search Operators Google Bing Yandex Baidu Yahoo Quotation Marks “ ” Search for the exact word or phrase within quotation marks. Ex.: “Joe Doe” Operator AND Find information related to both X and Y. Ex.: “OSINT” AND “Training” Operator OR Find information to either X or Y. Ex.: “Apple” OR “Microsoft” Hyphen (-) Exclude words from the search. Ex.: Jaguar Speed -Car Asterisk (*) Use * as a wildcard matching any word or phrase. Ex.: OSINT * Cheat Sheets Range (..) Search between two identifiers. Ex.: Crime rate “2000..2024” site: Find for results and for pages located on a specific domain. Ex.: site:linkedin.com filetype: Search for files with the specified extension. Ex.: “OSINT” filetype:pdf related: Find pages and results related to a given domain. Ex.: related:osintframework.com inurl: Locate pages that include a particular word in their URL. Ex.: inurl:OSINT intitle: Locate pages that include a particular word in their title. Ex.: intitle:OSINT intext: Locate pages that include a particular word in their content. Ex.: intext:OSINT Dark Web Search Engines Ahmia.fi Torch Haystak Tor.linkNot Evil DuckDuckGo The Hidden Wiki Specialized Search Engines Key Factors 1.Use multiple search engines to improve and maximize results. 2.Use search operators and the “Advanced Search” function. 3.Use international search engines (Baidu in China, Yandex in Russia). 4.Use different names (United States, US, USA, America, etc.).Monitoring The retrieved data is always in its latest and most updated form, guaranteeing real-time accuracy. Real-time Data SL Crimewall allows you to extract any data you need in an untraceable manner, ensuring OPSEC. Anonymity Organize cases in a centralized, easily accessible location, enabling collaborative teamwork on a specific project. Case Management Collect intelligence from the dark web to uncover valuable and hidden insights. Dark Web Alex Lozano ML-Driven Analysis Examine images and videos using object and biometric identification, along with text analysis for sentiment recognition. ADVANCED PLATFORMS www.cibergy.com Alex Lozano VSVS CATEGORYCATEGORY Overview Delivery & Interface Specialization Key Use Cases & Applications Visualization & Adaptability Performance & Accuracy Scalability & Deployment Strengths Weaknesses Ideal for Graph-based OSINT investigation platform that helps analysts collect, analyze, and visualize data. Modern web-based graph UI; supports SaaS, standalone desktop, and on-premise deployment. Focuses on human-centric OSINT, excelling in social media, dark web, messengers, and profiling. Social media intelligence, criminal investigations, dark web monitoring, threat actor profiling, disinformation. Includes graph, table, and map views, along with customizable settings and reporting features. Fast, responsive, and optimized for social data. Strong accuracy for people-focused OSINT. Cloud-first, highly scalable out of the box. Easy deployment, especially for teams and remote environments. Excels in criminal, social media and dark web investigations, modern web-based UI, +1,000 data sources Less technical customization, pricing may be enterprise-oriented, strong internet brandwidth Smooth, modern, ready-to-go. Optimized both for quick and complex investigations. Open-source intelligence (OSINT) and graphical link analysis tool for cyber investigations. A traditional, technically-oriented desktop application with a steeper learning curve. Specializes in cyber threat intelligence and infrastructure mapping, ideal for technical investigations. Cyber threat intelligence, fraud detection, penetration testing, digital forensics. Customizable via transforms and scripting, with support for node-link graphs, dashboards, and images. High accuracy and control when well-configured. May lag on large graphs or slow transforms. Desktop-focused, scalable for enterprise with effort. Strong on- premise option, less cloud-native. Powerful link analysis, customizable transforms, broad OSINT coverage and data integration flexibility Steep learning curve, desktop- centric, resource intensive, limited social media / dark web depth Technical, flexible, customizable. Optimized for detailed, complex investigations. Alex Lozano www.cibergy.com ADVANCED PLATFORMS SOCMINT: Deep Social Media Access Real-Time User & Topic Monitoring Dark Web Threat Intelligence Breach & Leak Detection AI & ML-Powered Analysis Smart Case Management 1. Gather data (Facebook, Instagram, X, TikTok, etc). 2. Track user’s digital footprint / online presence. 3. Analyze posts, comments, likes, shares, etc. 4. Discover user interests and affinities. 5. Detect and map relationships / connections. 6. Identify patterns and trends in user behavior. 7. Use activity timelines to track patterns. 8. Monitor sentiment and public perception. 1. Set alerts for mentions of keywords, names, etc. 2. Track influence and reach of individuals / entities. 3. Monitor activists, politicians, or POIs. 4. Monitor communities, groups, and movements. 5. Detect and monitor hate speech and threats. 6. Find coordination in disinformation campaigns. 7. Real-time visualization of conversation spikes. 8. Monitor brand threats, fraud, or impersonation. 1. Track forums, marketplaces, and onion sites. 2. Monitor threat actors and known aliases. 3. Identify illegal goods / services being sold. 4. Extract PII, credentials, or leaks offered for sale. 5. Detect ransomware group chatter or affiliations. 6. Link dark web identities to surface web personas. 7. Analyze communication patterns and intentions. 8. Alerts for mentions of targeted entities. 1. Discover exposed emails and passwords. 2. Check if entities appear in breach datasets. 3. Investigate credential password reuse risks. 4. Correlate leaked databases with known users. 5. Monitor paste sites and data dump repositories. 6. Detect insider threats via leak patterns. 7. Automate breach notification alerts. 8. Map scope and impact of leaked data. 1. Monitor sentiment and public perception. 2. Summarize large datasets via NLP. 3. Flag suspicious, harmful, or hateful content. 4. Identify bots and automated communication. 5. Detect linguistic patterns and sentiment trends. 6. Facial recognition across social media platforms. 7. Image matching across surface web platforms. 8. Classify risks based on pattern recognition. 1. Build structured case files with evidence. 2. Visualize links between people, events, data, etc. 3. Collaborate across teams in investigations. 4. Tag and label entities, locations, and topics. 5. Export data for legal or intelligence reporting. 6. Manage investigation workflows and status. 7. Integrate findings from multiple data sources. 8. Centralize documentation for investigations. OSINT Cheat Sheets5.Use different spellings (München, Munich, etc.). 6.Perform searches in multiple languages and locations. 7.Use multiple types of data (names, phones, emails, addresses, etc.). Filetype Extensions TXT - Text File DOC - Microsoft Word DOCX - Microsoft Word PDF - Portable Document Format XLSX - Microsoft Excel XLS - Microsoft Excel PPT - Microsoft PowerPoint PPTX - Microsoft PowerPoint JPG - Image JPEG - Image PNG - Image GIF - Animated Image ZIP - Compressed File 7Z - Compressed File RAR - Compressed File RTF - Rich Text Format BMP - Bitmap Image DWF - Autodesk HTM - Web Page HTML - Web Page KML - Google Earth KMZ - Google Earth PS - Academic Papers ODP - OpenOffice Present ODS - OpenOffice Spreadsheet ODT - OpenOffice Text Ask Aol Brave Search Engine Colossus Qwant OCCRP Aleph Intelx.io Shodan Carrot2 Isearchfrom 2lingual Academia Internet Archive Newspaper Archive THW www.cibergy.com https://www.ask.com/ The Ultimate OSINT Cheat Sheet Books 1.OSINT Techniques - Michael Bazzell 2.Deep Dive - Rae Baker 3.Hunting Cyber Criminals - Vinny Troia 4.OSINT Methods and Tools - Nihad A. Hassan & Rami Hijazi 5.We are bellingcat: An Intelligence Agency for the People - Eliot Higgins 6.How to Find Out Anything - Don MacLeod 7.Operator Handbook - Joshua Picolet 8.OSINT: The Art of Collecting Open Information - David Anderson PART 4: OSINT RESOURCES www.cibergy.com Virtual Machines & More Inteltechniques VM Sherlock Linux VM Kali Linux VM Trace Labs OSINT VM CSI Linux VM Tsurugi VM Podcasts News & Blogs Youtube Channels David Bombal Authentic8 Gary Ruddell Gralhix Sofia Santos Bendobrown Cody Bernardy Social Links OSINT Dojo Forensic OSINT SANS Institute LISA Institute Intelcon Manuel Bot Alvaro Chirou Security Now NeedleStack Shadow Dragon The Pivot The OSINT Bunker News Snapshots Layer 8 The World of Intelligence Telegram Groups Cyber Detective OSIntOps News Bellingcat EN Brigada OSINT Soxoj Insides Osint Losena OSINT Anatomy OSINT Teame OsintTV Cyber Hunter OSINT Israel GINSEG Ciberpatrulla OSINT Excellence Newsletters Cyber Detective Sector035 The Sunday Download Digital Investigations My OSINT News OSINT Ambition The OSINT Newsletter Digital Digging OSINT Jobs Forensic OSINT Fog Of Influence OSINT Team OSINT Insider OSINT Excellence Cyber Detective Secjuice Sector035 Intel Techniques hatless1der Maltego Blog Skopenow Blog Nixintel Offensive OSINT OSINT Combine VEEXH Medium SocialLinks Blog WebBreacher TraceLabs Blog CQcore SANS Institute LISA Institute OSINTME OSINT Curious Blackdot Solutions Blog Dutch OSINT Guy Authentic8 Blog Bellingcat Blog Knowmad OH SHINT Blog The SEINT Shadow Dragon ESPY Blog Alex Lozano OSINTUX VM Silo (platform for isolated online investigations) Kasm (remote desktop) Debian (optimal Linux OS) Tails (privacy centered OS) https://www.ask.com/ https://www.ask.com/ https://www.ask.com/ https://www.ask.com/ https://www.ask.com/ https://www.ask.com/ The Ultimate OSINT Cheat Sheet PART 5: TOOLS COLLECTIONS OSINT Collections Bookmarks Alex Lozano Start.me Github Cyber Detective Daniel Durnea FBI Tools OSINT Team Links Awesome OSINT OSINT Encyclopedia OhShINT Sinwindie OSINT Dojo OSINT For Countries Ph055a OSINT Datajournalism Resources Non Typical OSINT Guide Handbooks Spreadsheets OSINT Framework OSINT Essentials UK OSINT IntelTechniques Search Tools Aware Online Tools Toddington Andy Black Associates OSINT Dojo Resources OSINT Toolkit Reuser’s Repertorium Malfrat’s OSINT Map IntelligenceX Tools Achirou OSINT Tools Meta OSINT The OSINTion Wiki OH SHINT! Web Resources SPJ Toolbox OSINT Combine Free Tools OSINT Geek Tools OSINT Techniques Tools OSINT Map The Ultimate OSINT Collection Verification Toolset V3nari Bookmarks Intel0logist Hun-OSINT Digintel Bruno Mortier USA DFIRDetective CSE Utopia Emmanuelle Welch AML Toolbox BBC Eye Forensics The Coins of Charon Paranoid Ch1ck CTI Resources Nixintel’s OSINT List Lorand Bodo OSINT Tools OSINT International Osintia Zoekslag Resources By Country World Resources AsINT_Collection 1. Toddington - https://www.toddington.com/resources/cheat-sheets/ 2. I-Intelligence OSINT Handbook - https://i-intelligence.eu/uploads/public- documents/OSINT_Handbook_2020.pdf 3. Aljazeera Media Institute - https://institute.aljazeera.net/sites/default/files/2023/Open%20Source%20Investi gation%20Handbook.pdf 4. Blackdot Solutions - https://blackdotsolutions.com/wp- content/uploads/2021/11/The-OSINT-Handbook_.pdf 5. The Intelligence Handbook - https://go.recordedfuture.com/the- intelligence-handbook-fourth-edition Bellingcat’s Investigation Toolkit https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ OSINT For Finding People https://docs.google.com/spreadsheets/d/1JxBbMt4JvGr--G0Pkl3jP9VDTBunR2uD3_faZXDvhxc Aaron CTI’s OSINT Collection https://docs.google.com/spreadsheets/d/1klugQqw6POlBtuzon8S0b18-gpsDwX-5OYRrB7TyNEw OSINT Combine OSINT Stack Dark Web OSINT Stack https://www.osintcombine.com/free-osint-tools/osint-bookmark-stack https://www.osintcombine.com/free-osint-tools/darkweb-bookmark-stack Offensive OSINT Tools Soxoj Awesome Social Engineering www.cibergy.com https://www.ask.com/ https://www.ask.com/ https://www.ask.com/ https://www.ask.com/ https://www.toddington.com/resources/cheat-sheets/ https://www.toddington.com/resources/cheat-sheets/ https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf ¿What is OPSEC? Operational Security (OPSEC) is a systematic process (sequence of steps) that identifies and protects sensitive information from adversaries to prevent exploitation, maintain anonymity, and keep activities undetected. OPSEC = software + hardware + practices Password Management Tool for secure password management. Encrypted database to protect passwords. Generates strong, unique passwords. Improves security and simplifies management. Key Considerations Alex Lozano OPSEC should always be practiced, regardless of how trivial an investigation might seem. OPSEC needs to be tailored to the activity or investigation. Assume online activities are being monitored. OPSEC is a continuous practice that should become second nature to individuals. Continuously adapt as new threats/techniques emerge. Continuously assess the potential risks before sharing any information, whether online or offline. Keep research separate from personal/professional activities. Research OSINT tools thoroughly before use. Virtual Machines & More Inteltechniques VM Sherlock Linux VM Kali Linux VM Trace Labs OSINT VM CSI Linux VM Tsurugi VM OSINTUX VM Silo (platform for isolated online investigations) Kasm (remote desktop) Debian (optimal Linux OS) Tails (privacy centered OS) Web Browsers Firefox Brave TOR KeepassXC Phones & Emails VPNs Sock Puppets Browser Addons: HTTPS Everywhere uBlock Origin Privacy Badger User-Agent-Switcher Canvas Defender Prevents traceability to your real identity. Reduces risk of account linkage detection. Enhances security from potential breaches. Hushed, Protonmail, Tutanota, etc. Useful to mask your true IP address location. Prevents tracking by websites and services. Enhances privacy when conducting research. ProtonVPN, NordVPN, etc. Protects real identity during investigations. Avoids detection by target entities. Gathers information without raising suspicion. Fake Name Generation, This Person Does Not Exist, ChatGPT, etc. The Ultimate OSINT Cheat SheetPART 6: Operational Security www.cibergy.com 1 2 3 4 5 6 7 8 9 By Social Links By DarkOwl & Socialgist By Skopenow By Fivecast By Skopenow & DarkOwl By Blackdot & ShadowDragon By Blackdot Solutions By Social Links By SANS Institute Discover the power of AI in open-source intelligence work, spanning threat intelligence, sentiment analysis, entity profiling, and more.Staying ahead of cyber adversaries requires a deep understanding of the latest trends and innovations in the cybersecurity space. Learn how to enhance event security with OSINT for pre-event assessment, venue profiling, and real-time threat detection. OSINT is not merely keeping pace with change but also leading the charge in revolutionizing intelligence. Insights on emerging threats and the latest OSINT tools and techniques to detect and prevent them. How OSINT can be used to counter serious and organised crime, stopping criminal networks in their tracks. Explore how OSINT is evolving, best practices for its use in every sector and how new technologies can support investigators. Practical look at some essential techniques that every private investigator needs to know to maximize their investigative scope. How the OSINT landscape is changing, and decisions organizations can make that can severely hinder their OSINT operations' effectiveness. OSINT AND AI: A NEW DAWN OF DATA ANALYSIS THE PRIVATE INVESTIGATOR’S OSINT TOOLKIT OSINT WORKFLOWS FOR EVENT SECURITY TOP TRENDS AND PREDICTIONS IN OSINT THE FUTURE OF OSINT REAL WORLD OSINT ADVICE FOR THE CURRENT CHANGING LANDSCAPE57 min 51 min 53 min 44 min122 min 60 min THE EVOLVING ROLE OF OSINT 56 min Alex Lozano 9 Top OSINT Webinars ABOUT LATEST TRENDS AND USE CASES INVESTIGATING SERIOUS AND ORGANIZED CRIME WITH OSINT60 min EXPLORING EMERGING TRENDS IN CYBERSECURITY 30 min www.cibergy.com Identify Online Information Identify personal information and media of the executive, relatives and close associates. Check for home, vehicle, email address, phone, and password exposure. Executive’s and family social media profiles, online activity, and posts to assess their interests, habits, and potential vulnerabilities. Check privacy settings. Find Primary Risks Personal Data Exposure Exposed Home Address Exposed Email or Phone Predictable Location or Routine Exposed Credentials or Passwords Direct or Indirect Threats Social media accounts often contain a wealth of personal information, including photos, locations, activities, and connections. It allows malicious individuals to locate and potentially harm them in their own residence. This can lead to harassment, unsolicited communication, phishing attempts, or even more serious threats such as extortion or blackmail. Knowing their daily activities or travel patterns allows malicious individuals to anticipate their movements and exploit vulnerabilities in their security. Unauthorized access to sensitive information, financial accounts, or even critical systems. Threats against the executive or their family members pose an immediate danger to their safety and well-being Take Actions to Minimize Risks Detect Threat Category Physical Threat Digital Threat Indirect Threat Vulnerability to assault, kidnapping, burglaries or harassment. Risks posed by environmental factors or civil unrest in regions. Corporate espionage or sabotage by competitors or insiders. Monitoring of data breaches and other vulnerabilities. Cyber threats targeting the executive’s digital assets / accounts. Reputational damage if sensitive information is leaked online. Threats against family members or personal relationships. Indirect threats made against business or employees. Mishandling of crisis and inadequate response to controversies. Know The Right Tool Samdesk Situational awareness Real-time crisis alerts Employee safety InGrav PeopleMon ShadowDragon Horizon Social media intelligence Network analysis POIs investigation Social media intelligence Online monitoring Geolocation analysis Skopenow POIs investigation Social media intelligence Situational awareness Social Links Crimewall NexusXplore Social media intelligence Online monitoring POIs investigation POIs investigation Situational awareness Social network analysis Lock down executive and family members personal social media. Regular monitoring of online chatter, social media, and news reports. Background check services to vet individuals and organizations. Change breached passwords. Create unique passwords for all accounts. Request “right to erasure” for platforms sharing PII. Search for information about travel plans, itineraries, and future events. Conduct a comprehensive search of the executive's digital footprint. Share with law enforcement direct and credible threats. The OSINT Cheat Sheet For Executive Protection Alex Lozano Executives & CEOs Political Figures Celebrities High Net Worth Individuals Dignitaries Professional Athletes Musicians & Actors Other VIPs VIP IndividualsOSINT For Executive Protection Integrating OSINT into Executive Protection strategies can provide security teams with valuable intelligence and insights to proactively mitigate risks and ensure the safety and security of the executive. Monitor online chatter, social media conversations, and forums for any threats, harassment, or hostile sentiment directed towards the executive. Assess the potential security risks associated with the executive's travel destinations, transportation arrangements, and accommodations. Monitor online mentions, reviews, and news coverage related to the executive's reputation, brand image, and professional activities. Identify any compromised accounts, leaked credentials, or other indicators of cyber threats targeting the executive's personal information or digital assets. Recognize potential security vulnerabilities, access points, and emergency exits for relevant locations to inform security planning and risk mitigation efforts. www.cibergy.com The OSINT Cheat Sheet For Brand Intelligence Alex Lozano Why is It Essential? Customer Trust & Loyalty Competitive Advantage Crisis Resilience Attracting Talent Customer Acquisition & Retention Financial Performance A strong reputation fosters trust and encourages customer loyalty. It can be a deciding factor for consumers when choosing between similar products or services. Brands with strong reputations are better able to withstand negative events or crises. Companies with good reputations are more attractive to top talent. A good reputation makes it easier to acquire new customers and retain existing ones. Command higher prices, achieve better market positions, and attract more investment. Stakeholder Relationships Positive reputation helps in building strong relationships with stakeholders, including investors, partners, and suppliers. Real-Time Monitoring Sentiment Analysis Crisis Management Competitor Insights Influencer Engagement OSINT tools can continuously scan social media, forums, news sites, and other online platforms to track what is being said about a brand. Customer Feedback Collection Market and Trend Analysis OSINT For Brand Intelligence By leveraging OSINT, brands can proactively manage their reputation, respond swiftly to potential issues, and continuously align their strategies with customer expectations and market dynamics. Main Strategies Advanced OSINT tools often include sentiment analysis features, which help in categorizing mentions of the brand as positive, negative, or neutral. Early detection of negative mentions or potential crises can help brands respond promptly before issues escalate. By monitoring competitors, OSINT provides valuable information about their activities, strategies, and public perception. OSINT can identify key influencers, bloggers, and thought leaders who have significant influence over public opinion. This feedback can be used to improve products, services, and customer support, thereby enhancing overall brand reputation. Understanding what customers want and predicting future trends helps in making strategic decisions that positively influence brand perception. Internal Monitoring OSINT ensures employees represent the brand well online and identifies internal issues to prevent damage to the brand’s reputation. Competitive Disadvantage Decreased Sales BrandDevaluation Negative Media Coverage Employee Turnover Loss of Trust Legal Scrutiny Lower Profitability Social Media Blacklash Increased Costs Negative Effects Actions to Enhance Reputation Monitor and respond to online feedback Build and maintain positive online media relations Engage with your online audience Ensure excellent online customer service Promote online Corporate Social Responsibility (CSR) Encourage and showcase positive online reviews Create and share high-quality content Leverage influencer and brand ambassadors partnerships Know The Right Tool ShadowDragon Horizon Twitter monitoring List management Advanced search features SocialLinks Crimewall Social media intelligence Online monitoring POIs investigation Talkwalker Social listening Brand awareness Sentiment analysis Brandwatch Alto Intelligence Social listening Brand awareness Sentiment analysis Risk & Threat detection Crisis management Monitoring & alerts Social media intelligence Online monitoring POIs investigation TweetDeck www.cibergy.com Intelligence Quotes BY RENOWNED PERSONALITIES Alex Lozano Stephen Hawking Maria Konnikova Albert Einstein Henry Mintzberg Sadhguru John F. Kennedy Helen Keller Simone de Beauvoir Edward de Bono Anaïs Nin Intelligence is the ability to recognize patterns. Intelligence is the ability to make sense of things, rather than simply knowing a lot of things. The measure of intelligence is the ability to change. Intelligence is the ability to see patterns, connect dots, and extract meaning from complexity. Intelligence is the ability to adapt to change. Intelligence is the ability to take in information and use it to make decisions. Intelligence is not the ability to store information, but to know where to find it. Intelligence is the ability to think independently and to understand things deeply. Intelligence is the ability to find and solve problems and create products of value in the world. Intelligence is the ability to see possibilities where others see closed doors. www.cibergy.com OSINT Tips Cheat Sheet Alex Lozano OPSEC: Your Essential Shield The Golden Rule of Verification Develop Technical Skills Customer Focus Pivot, Pivot & Pivot Stay Up-To-Date Think Creatively Documenting Your Way to Intelligence By understanding the customer's goals and priorities, analysts can prioritize their efforts to focus on gathering the most valuable information. Become flexible in transitioning between data points and sources. It's crucial to gather extensive, confirmed data to aid in solving the case. Become acquainted with essential OSINT tools and master advanced search strategies. Lower adversary exploitation risk. Stay anonymous by hiding who you are. Keep activities hard to trace and follow. The accuracy of information is paramount. Trustworthiness. Not all sources are reliable. Verified data is crucial for effective decisions. Join an OSINT community; monitor social media, listen to podcasts, attend workshops, and read books and blogs. Be creative in your approach to finding information, and consider unconventional sources or methods. Keep thorough documentation of your findings, including the sources you used and the methodologies employed. This helps ensure transparency and reproducibility. www.cibergy.com Alex Lozano Technical skills can secure you a job. But interpersonal skills will advance your career. 10 soft skills to accelerate your OSINT career: 1. Analytical Thinking Identify relevant information. Spot patterns. Evaluate data credibility. 2. Attention to Detail Ensure accuracy. Avoid missing details. Prevent incorrect conclusions. 3. Critical Thinking Question assumptions. Assess source validity. Make sound judgments. 4. Communication Skills Convey findings clearly. Ensure understanding. Present complex info simply. 5. Problem-Solving Tackle unique challenges. Develop innovative strategies. Find effective solutions. 6. Curiosity Dig deeper. Learn new tools. Stay updated. 7. Adaptability Adjust to changes. Use new tools effectively. Stay relevant. 8. Ethical Judgment Handle sensitive info responsibly. Maintain integrity. Make ethical decisions. 9. Collaboration Work well in teams. Share insights. Achieve common goals. 10. Time Management Prioritize tasks. Meet deadlines. Manage workload efficiently. Thanks for reading! If you found this interesting, follow for more insights on OSINT! www.cibergy.com Alex Lozano 7 Essential OSINT Steps for Executive & VIP Security. Use these steps as a checklist: 1. Personal Information and Media Analysis Identify personal information and media of the executive, relatives and associates. Check for home, vehicle, email address, phone, and password exposure. 2. Threat Detection and Risk Monitoring Monitor online chatter, social media conversations, and forums for any threats, harassment, or hostile sentiment directed towards the executive. 3. Social Media Vulnerability Assessment Explore executive’s and family social media profiles, online activity, and posts to assess their interests, habits, and potential vulnerabilities. Check privacy settings. 4. Travel and Accommodation Risk Assessment Assess the potential security risks associated with the executive's travel destinations, transportation arrangements, and accommodations. 5. Reputation Management and Media Monitoring Monitor online mentions, reviews, and news coverage related to the executive's reputation, brand image, and professional activities. 6. Cybersecurity Threat Identification Identify any compromised accounts, leaked credentials, or other indicators of cyber threats targeting the executive's personal information or digital assets. 7. Physical Security and Vulnerability Mapping Recognize potential security vulnerabilities, access points, and emergency exits for relevant locations to inform security planning and risk mitigation efforts. Thanks for reading! If you found this interesting, follow for more insights on OSINT! www.cibergy.com Planning and Dire ctio n Data Collection Processing and Exploitation Di ss em in at io n an d Fe ed ba ck Analysis and Production Planning & Direction Data Collection Processing & Exploitaition Analysis & Production Dissemination & Feedback Plan, strategize, research, discuss, gather intelligence, execute task efficiently. Gather intelligence overtly and covertly, utilizing various technological resources. Compile collected data into intelligence reports. Analyze data, determine relevance, anticipate outcomes, evaluate impact on interests. Deliver analysis to policymaker, await feedback, restart cycle as necessary. OSINT - Open Source Intelligence Encompasses accessible information found in various mediums such as printed materials Step by Step Tips The Intelligence Cycle General Aspects Define Objectives Identify Requirements Select Sources Develop a Plan Alex Lozano The Intelligence Cycle For Open Source Intelligence (OSINT) Professionals Use Diverse Sources Automate If Possible Verify Credibility Stay Ethical and Legal Organize Data Remove Redundancies Normalize Formats Document Sources Identify Patterns Assess Reliability Contextualize Data Generate Insights Create Reports Tailor to Audience Solicit Feedback Update Methods Strive for precision and correctness Cross-check information with multiple sources Maintain a sense of urgency Ensure timely delivery Use credible sources and methods Continuously evaluate the reliability Adhere to legal and moral guidelines Comply with ethical standards Stay flexible and ready to adjust Be prepared to pivot quickly Ensure OPSEC thorough all phases Implement measures to safeguard www.cibergy.com uBlock Origin Blocks ads and trackers Cookie AutoDelete Control cookies Privacy Badger Block tracking scripts Google Translate Translate text DownThemAll Bulk download files from websites RevEye Reverse image search Exif Viewer View metadataWayback Machine Web archive User-Agent Switcher Modify your U-A Shodan Retrieve website information Vortimo Analyze web content Fireshot Screen capture Sputnik Search digital identifiers Forensic OSINT Screen capture Bot Sentinel Detect bots on X (Twitter) Hunchly Capture web pages Instant Data Scraper Data scraper Context Search Quickly search for text Video DownloadHelper Download videos ESUIT Facebook content downloader Hive AI Detector Detect AI- generated media Alex Lozano 21 BROWSER EXTENSIONS For Open Source Intelligence (OSINT) Professionals www.cibergy.com Alex Lozano 21 BLOGS & NEWS SITES For Open Source Intelligence (OSINT) Professionals Cyber Detective Secjuice Sector035 Authentic8 Blog Rae Baker Blog VEEXH Medium OH SHINT Blog OSINT Combine Bellingcat Blog Skopenow Blog ShadowDragon Blog Maltego Blog hatless1der OSINTME SocialLinks Blog Nixintel Blackdot Solutions Blog Offensive OSINT ESPY Blog OSINT Team CQcore www.cibergy.com https://www.ask.com/ Alex Lozano 21 OSINT COLLECTIONS For Intelligence Analysts and Investigators OSINT Framework Inteltechniques Search Tools The Ultimate OSINT Collection Malfrat’s OSINT Map Meta OSINT SPJ Toolbox OSINT Techniques Tools OSINT Essentials Aware Online Tools OSINT Dojo Resources IntelligenceX Tools Bellingcat’s Online OSINT Toolkit OSINT Combine Free Tools OSINT Toolkit UK OSINT Toddington Reuser’s Repertorium Achirou OSINT Tools OH SHINT! Web Resources The OSINTion Wiki OSINT Map www.cibergy.com https://www.ask.com/ GHunt Info from gmail accounts EPIEOS Email reverse lookup Holehe Chek email in different sites OSINT Industries Mailcat Find email by nickname Castrick Email reverse lookup EmailRep.io Email reputation BreachDirectory Scamsearch.io Scammer details database osint.rocks Email tools collection HaveIBeenPwned Whoxy Lookup domain WHOIS That’s Them People search engine Skymem Find emails of companies Simple Login Mask your email address Hunter.io Find professional emails DeHashed Reverse Whois Domain WHOIS search InsE Instagram email finder SignalHire Find professional emails Proton Mail Free & secure email service Alex Lozano 21 EMAIL ADDRESS TOOLS For Open Source Intelligence (OSINT) Professionals Search data breaches Email reverse lookup Search data breaches Search data breaches T www.cibergy.com www.cibergy.com Free Carrier Lookup Carrier identification Carrier Lookup Carrier identification Truecaller Number lookup service Twilio Spy Dialer Number lookup service Apeiron Number lookup service EPIEOS Phone reverse lookup Google Phoneinfoga Info gathering framework WhatssApp Checkleaked Whatsapp Profile Information OSINT Industries Bing General search engine NumLookup Reverse phone lookup WhitePages Phone numbers database Ignorant Check phones on sites Detectdee Check phones on sites Castrick UniversalSearchBot Telegram phone search bot osint.rocks Multiple OSINT tools DeHashed Search data breaches HaveIbeenzuckered Facebook data breach checker Alex Lozano 21 PHONE NUMBER TOOLS For Open Source Intelligence (OSINT) Professionals Phone reverse lookup Number lookup service Phone reverse lookup General search engine www.cibergy.com TOR Browser Web browser Ahmia Search engine Torch Search engine HayStack Onion Engine Search engine Tor66 Search engine Telemetry Telegram search DeHashed DeepDarkCTI Collection of CTI sources Tor.link Links to onion sites Library of Leaks LeakOSINT Telegram bot DarkwebDaily. Live The Hidden Wiki Links to onion sites TOR2web Access to Tor hidden services Aleph Search data on the Dark web HaveIbeenPwned UniversalSearchBot Telegram bot Onion.live Links to onion sites TorCrawl.py Crawl and extract webpages PGP Tool Encrypt, decrypt, and verificate PGP Alex Lozano 21 DARK WEB TOOLS For Open Source Intelligence (OSINT) Professionals Leaks & breaches Search engine Search data breaches Search data breaches Links to onion sites O Apple Store www.cibergy.com Alex Lozano 40 ONLINE COMMUNITIES For Person Of Interest (POI) OSINT Investigations Strava Fitness tracking app Garmin Connect Fitness tracking app Google Reviews Customer review platform Trustpilot Business reviews website Google Store Google product shop (Reviews) 4chan Discord Voice, video chat Apple products store (Reviews) Tripadvisor Amazon Reviews Online shopping marketplace Komoot Twitch Livestreaming platform Travel reviews platform Outdoor activity planner Anonymous message board Booking Reviews Yelp Local business reviews Reddit Steam Video game marketplace Tumblr Microblogging social network Medium Blogging and writing site Foursquare Location check- in app Blogger Simple blogging platform Meetup Group event organizer Paypal Online payment service Flickr Photo sharing platform Goodreads Book reviews site Github Code repository platform Bluesky Alternative to Twitter (X) Nextdoor Neighborhood social network Craiglist Classifieds advertisement site Travel booking site Online discussion forum Pinterest Visual inspiration platform Gravatar One-page personal site Gettr Conservative social media Academia.edu Research sharing site Onlyfans Subscription content platform Skype Video calling platform Gab Free speech network Soundcloud Music sharing platform Tinder Dating app Duolingo Language learning app Myspace Early social network Badoo Dating app Alex Lozano 60 High-Demand Jobs in Open Source Intelligence (OSINT) Government 1.OSINT Analyst - Conduct open source intelligence for national security. 2.Cyber Intelligence Analyst - Monitor and analyze cyber threats. 3. Intelligence Officer - Use OSINT to support defense and security operations. 4.Counterterrorism Analyst - Analyze open-source information to prevent terrorism. 5.Law Enforcement Intelligence Analyst - Support law enforcement operations. 6.Border Security Analyst - Utilize OSINT for monitoring and securing borders. 7.Public Health Intelligence Officer - Use OSINT to track public health threats. 8.Diplomatic Security Analyst - Provide security analysis for diplomatic missions. 9.Military Intelligence Analyst - Support military operations with OSINT. 10.Threat Analyst - Identify and analyze threats to national security. Private Sector Technology & Software Freelance & Consultancy Journalism & Academia Non-Profit Organizations 11. Corporate Security Analyst - Use OSINT to protect corporate assets. 12. Fraud Investigator - Investigate fraud using open source data. 13. Cyber Threat Analyst - Monitor and mitigate cyber threats. 14. SOC (Security Operations Center) Analyst - Monitor and analyze security events. 15. Brand Protection Specialist - Monitor and protect brand reputation. 16. Due Diligence Investigator - Conduct background checks and investigations. 17. Incident Response Analyst - Utilize OSINT during cyber incident investigations. 18. Digital Forensics Investigator - Use OSINT in digital forensics investigations. 19. Red Team Operator - Use OSINT to plan and execute simulated cyber attacks. 20. Competitive Intelligence Analyst - Analyze market and competitor information. 21. OSINT Tool Developer - Develop software tools for OSINT gathering. 22. Data Engineer - Design and manage systems that process and analyze OSINT. 23. Machine Learning Engineer - Implement ML models to analyze OSINT data. 24. Software Engineer - Build applications for OSINT analysis and visualization. 25. Data Scientist - Use statistical and computational techniques to extract insights. 26. AI Researcher - Develop AI algorithms to enhance OSINT capabilities. 27. Web Scraping Specialist - Create scripts / tools to collect data from web sources. 28. Geospatial Analyst - Analyze spatial data from open sources for intel purposes. 29. Cybersecurity Software Developer - Develop security software usingOSINT. 30. Cloud Architect - Design cloud infrastructure to support OSINT operations. 31. Freelance OSINT Investigator - Offer OSINT services on a contract basis. 32. Security Consultant - Provide security analysis using open-source intelligence. 33. Private Investigator - Use OSINT for private investigations. 34. Risk Consultant - Offer risk assessments using open sources. 35. Social Media Consultant - Analyze social media trends for clients. 36. Cybersecurity Consultant - Provide cybersecurity services using OSINT. 37. Competitive Intelligence Consultant - Advise businesses on market intelligence. 38. Crisis Management Consultant - Use OSINT to manage crises. 39. Brand Protection Consultant - Help businesses protect their brand using OSINT. 40. KYC / AML Consultant - Provide KYC / AML services using OSINT. 41. Investigative Journalist - Use OSINT to uncover stories and investigate issues. 42. Research Analyst - Conduct open-source research for academic studies. 43. Cybersecurity Researcher - Investigate cybersecurity threats using OSINT. 44. OSINT Author - Write books and articles on OSINT techniques and applications. 45. Fact-Checker - Verify the accuracy of information using open-source data. 46. Foreign Correspondent - Use OSINT to report on international news. 47. Intelligence Studies Professor - Teach and research OSINT methodologies. 48. OSINT Instructor - Provide training and teach courses on open-source intelligence. 49. Business Reporter - Analyze and report on business trends and market data. 50. Data Scientist - Analyze open-source data for academic research. 51. Human Rights Researcher - Use OSINT to document human rights abuses. 52. Environmental Research Analyst - Monitor environmental issues using OSINT. 53. Crisis Response Analyst - Use OSINT to respond to humanitarian crises. 54. NGO Security Analyst - Ensure the security of non-profit operations with OSINT. 55. Transparency Investigator - Investigate corruption and promote transparency. 56. Social Media Analyst - Monitor social media for advocacy and awareness. 57. Policy Analyst - Use OSINT to inform policy recommendations. 58. Public Health Researcher - Track and analyze public health data. 59. Conflict Researcher - Monitor and analyze conflicts using open sources. 60. Disaster Response Analyst - Use OSINT for disaster preparedness and response. www.cibergy.com Alex Lozano 60 High-Demand Services in Open Source Intelligence (OSINT) Social Media & Online Monitoring 1. Social Media Monitoring: Track and analyze content across social media platforms. 2. Sentiment Analysis: Analyze public opinions through sentiment on social platforms. 3. Disinformation Detection: Identify and combat false or misleading information. 4. Brand Protection: Monitor and safeguard corporate reputation and trademarks. 5. Social Engineering Awareness: Detect social engineering cyber threats. 6. Public Sentiment Tracking: Measure public mood and opinions on issues. 7. Online Reputation Management: Manage and improve online public perception. 8. Virtual Event Monitoring: Track and analyze activities in virtual events. 9. Influencer Analysis: Assess influence and reach of online personalities. 10. Hashtag / Keyword Analysis: Analyze topics through hashtags and keywords. Cybersecurity & Threat Intelligence Geospatial & Environmental Competitive & Market Intelligence Legal, Compliance & Policy Research Research, Analysis & Training 11. Cyber Threat Intelligence: Identify and mitigate emerging cyber threats. 12. Dark Web Monitoring: Monitor dark web for threats and illicit activities. 13. Threat Actor Profiling: Analyze and understand cyber threat actor behaviors. 14. Incident Response Support: Provide intelligence during cybersecurity incidents. 15. Digital Forensics Support: Use OSINT to aid digital forensic investigations. 16. Online Fraud Investigations: Detect and investigate online fraud activities. 17. Counter-Terrorism Intelligence: Analyze threats to prevent terrorist activities. 18. Compliance Monitoring: Ensure adherence to legal and regulatory standards. 19. Threat Intelligence Fusion: Integrate multiple data sources for analysis. 20. Vulnerability Assessment: Identify and analyze security vulnerabilities and risks. 21. Geolocation Analysis: Determine locations using open-source geospatial data. 22. Geospatial Intelligence: Analyze spatial data to support operational decisions. 23. Environmental Intelligence: Monitor environmental risks and impacts globally. 24. Travel Risk Assessment: Evaluate risks associated with travel and locations. 25. Disaster Preparedness: Analyze data for effective disaster response planning. 26. Event Monitoring: Track events for real-time situational awareness. 27. Supply Chain Risk Assessment: Assess risks within supply chain operations. 28. Geospatial Data Visualization: Visualize spatial data for clearer intelligence insights. 29. Border Security Analysis: Use OSINT for monitoring and securing borders. 30. Mapping Humanitarian Crises: Analyze and map crises for humanitarian response. 31. Competitive Intelligence: Analyze competitors’ strategies and market positions. 32. Due Diligence: Conduct thorough investigations before major business decisions. 33. Financial Intelligence: Analyze financial data for fraud and insights. 34. Trade and Market Analysis: Evaluate market trends and trade opportunities. 35. Recruitment Intelligence: Analyze recruitment trends and practices. 36. Emerging Technology Tracking: Monitor and assess new technologies and trends. 37. Business Intelligence: Extract insights from business data and operations. 38. Political Intelligence: Assess political risks and opportunities in markets. 39. Market Entry Risk Assessment: Evaluate risks in entering new markets. 40. Brand Protection: Safeguard brand from competitive threats and misuse. 41. Public Records Research: Retrieve information from accessible public records. 42. Background Checks: Verify individuals’ histories for employment or investigations. 43. Regulatory and Policy Analysis: Analyze laws and policies affecting operations. 44. Legal and Ethical Compliance: Ensure adherence to legal and ethical guidelines. 45. Government and Policy Analysis: Study governmental actions and policy impacts. 46. Document Analysis: Review documents for legal and regulatory compliance. 47. Law Enforcement Support: Provide intelligence support to LEAs. 48. Crisis Communication: Manage communication during legal crises. 49. Human Intelligence (HUMINT) Support: Integrate human intelligence with OSINT. 50. Corruption Investigations: Investigate corruption and promote transparency. 51. Research Services: Provide detailed insights through comprehensive research. 52. Academic and Scientific Research: Research in academic and scientific fields. 53. Education and Training: Develop and deliver OSINT training programs. 54. Cultural Sensitivity Training: Train on cultural awareness for international ops. 55. Public Health Surveillance: Monitor health data to track disease spread. 56. Humanitarian Assistance Research: Support humanitarian efforts through OSINT. 57. Crisis Simulation and Exercises: Prepare for crises through simulated scenarios. 58. Local and Regional Conflict Analysis: Analyze conflicts at local and regional levels. 59. OSINT Tool Development and Training: Create and teach OSINT software tools. 60. Machine Learning and AI for OSINT: Apply AI to enhance OSINT capabilities. www.cibergy.com Alex Lozano EUROPEAN BUSINESS DATA OSINT Cheat Sheet GERMANY RUSSIA SPAIN NETHERLANDS SWITZERLAND UNITED KINGDOM ITALYFRANCE Handelsregister - https://www.handelsregister.de Bundesanzeiger - https://www.bundesanzeiger.de Unternehmensregister - https://www.unternehmensregister.de Creditreform - https://firmeneintrag.creditreform.de North Data - https://www.northdata.de Companies House -https://www.gov.uk Opencorporates - https://opencorporates.com The Gazette- https://www.thegazette.co.uk Company Check - https://www.companycheck.co.uk Bizstats - https://bizstats.co.uk Infogreffe - https://www.infogreffe.fr Societe - https://www.societe.com Pappers - https://www.pappers.fr Verif - https://www.verif.com BODACC - https://www.bodacc.fr Registro delle Imprese - https://www.registroimprese.it Infocamere - https://www.infocamere.it Empresite - https://www.empresite.it Opencorporates - https://opencorporates.com Pagine Gialle - https://www.paginegialle.it EGRUL - https://egrul.nalog.ru Rusprofile - https://www.rusprofile.ru Zachestnyibiznes - https://zachestnyibiznes.ru List-org - https://www.list-org.com Kontur Focus - https://focus.kontur.ru Registro Mercantil Central - https://www.rmc.es BORME - https://www.boe.es Axesor - https://www.axesor.es Librebor.me - https://librebor.me Datoscif - https://www.datoscif.es Kamer van Koophandel (KvK) - https://www.kvk.nl OpenKvK - https://openkvk.nl Drimble - https://drimble.nl DNB Business Register - https://www.dnb.nl/en/public-register Dun & Bradstreet - https://www.dnb.com Zefix - https://www.zefix.ch SIX Swiss Exchange - https://www.six-group.com SHAB - https://www.shab.ch Moneyhouse - https://www.moneyhouse.ch Swissreg - https://www.swissreg.ch PART 1 www.cibergy.com SOCMINT TOOLS Cheat Sheet Turbo Downloader Download photos, videos and reels from Instagram. ESuit Extensions to export followers, comments, likes, emails, phones from profiles. Toutatis Tool that allows you to extract info such as emails, phones, etc. Instaloader Scrapes public and private profiles, hashtags, stories, feeds, media, metadata, etc. Inteltechniques IG Search Tool Search for detailed information on Instagram. X (Twitter) Instagram Tik Tok Alex Lozano Facebook PART 1 Tweetdeck (X Pro) Interface where users can organize, monitor, and interact with multiple Twitter feeds in real-time. Deleted Tweet Finder Search for deleted tweets across multiple archival services. Twint Scraps data from X profiles without relying on X’s API. Warble Email Alerts for Twitter. Inteltechniques Twitter Search Tool Search for detailed information on Twitter. Instant Data Scraper Extracts data from web pages and exports it as Excel or CSV files. ESUIT Facebook extension to download photos, videos, comments, likes, posts, etc. HaveIBeenZuckered Check if your telephone number is present within the Facebook data breach. FB Sleep Stats Gather data about Facebook users sleep patterns. Inteltechniques Facebook Search Tool Search for detailed information on Facebook. Bravedown Download videos and stories from top social media platforms. Tik Tok Scraper Scrape TikTok followers from any public profile. Hashtag Analysis Download posts and videos from TikTok for a given set of hashtags over a period of time. Export Comments Exports comments from your social media posts to Excel file. OSINT Combine TikTok Quick Search Search usernames and hashtags on TikTok via a browser. www.cibergy.com The Ultimate OSINT Cheat Sheet Maltego Network analysis Online monitoring POI investigations InGrav PeopleMon Pimeyes Social media intelligence Network analysis POIs investigations Reverse Image Search POI Identification Online monitoring Skopenow POI investigations Social media intelligence Situational awareness NexusXplore Social Links Crimewall Social media intelligence Online monitoring POI investigations POI investigations Situational awareness Social network analysis Alex Lozano ¿What is Facebook? Facebook is a social media platform where people can connect with friends, share photos and videos, post updates, join groups, follow pages, chat with others, and interact with their network. Key Tips For Investigations 1.Always use sock puppets for Facebook investigations. 2.Start POI searches on Facebook as the primary social platform. 3. If unsuccessful, search for relatives, friends, groups or pages. 4. Identify the user’s ID as the first step. Do the same with pages. 5.Tagged pictures can provide extremely valuable information. 6.Use three dots on profile’s feed to find related topics and individuals. 7.Leverage Facebook’s advanced search options to narrow down results. 8. Inteltechniques Facebook Search Tool facilitates your searches. 9.Marketplace offers unique solutions for investigating fraud. 10.Monitor Facebook Live to analyze live events worldwide. 11.The Facebook data breach helps easily find profiles (+533 accounts). 12.Pivoting from FB to other social media platforms is key for success. 13.Add friends / click ads / like posts to avoid being blocked. 14.Document all findings with links and user/pages IDs. Top Free Tools Instant Data Scraper Extracts data from web pages and exports it as Excel or CSV files. ESUIT Facebook extension to download photos, videos, comments, likes, posts, etc. HaveIBeenZuckered Check if your telephone number is present within the Facebook data breach. FB Sleep Stats Gather data about Facebook users sleep patterns. Inteltechniques Facebook Search Tool Search for detailed information on Facebook. Main Information Sources Top Paid Tools Profile Information Friends & Connections Photos & Videos Check-ins & Location Posts & Comments Groups & Pages Events & Activities Communication Patterns Tags & Mentions Likes & Reactions Timeline Analysis Marketplace & Live OSINT Investigations & Guidelines Personal Information & Behavior Social Connections & Network POI Identification through personal data: names, locations... Check interests and preferences through public interactions. Identify habits, routines, and time-based behavior. Review timelines for a history of significant events. Establish social circles and associations through friends lists. Investigate groups and pages to find interests and affiliations. Identify tags to highlight relationships and key contacts. Observe public conversations and comment threads. Use tools to automate searches and visualizing social networks. Map movements, routines, and frequently visited places. Reveal locations, dates, and activities from public images. Gain insights on attended activities and upcoming plans. Access historical posts to track movements or behavior changes. Facebook Marketplace Compare listings to reports to identify stolen goods. Analyze listings to uncover patterns linked to organized crime. Facebook Live Gather immediate insights into events as they unfold. Identify key participants and understand public sentiment. Location & Movement 2024 www.cibergy.com www.cibergy.com Top Paid Tools THE ULTIMATE SOCMINT CHEAT SHEET Alex Lozano Top Free Tools Turbo Downloader Download photos, videos and reels from Instagram. ESuit Browser extensions to export followers, comments, likes, emails, phones from profiles. Toutatis Tool that allows you to extract info such as emails, phones, etc. Instaloader Scrapes public and private profiles, hashtags, stories, feeds, media, metadata, etc. Toolzu Analyze profiles, download content and view accounts without logging in. Dumpor Analyze profiles, download content and view accounts without logging in. Instatracker An Instagram tracker that logs any changes to an Instagram account. Social Blade Search for detailed statistics and analytics. ¿What is Instagram? Instagram is a social media platform where people can share photos, videos, and stories with their followers. It was launched in 2010 and is now owned by Meta Platforms. Key Tips For Investigations 1.Always use sock puppets for Instagram investigations. Log in with Facebook. 2.Follow users / click ads / like posts to avoid being blocked. 3.Pivot to Instagram after starting POI searches on Facebook. 4. If unsuccessful, search for relatives, friends, or related users. 5.Use contacts syncing to reveal the Instagram profile linked to a phone number. 6. Identify the user’s ID as the first step. Do the same with relevant posts. 7.Tagged pictures can provideextremely valuable information. 8.Comments on post are often crucial to find hidden or personal information. 9.Always record stories and lives in real time. They disappear. 10.Extract visible followers/following lists early to avoid losing access. 11.Use three dots on profile to find username changes and creation date. 12.Pivoting from IG to other social media platforms is key for success. 13.Document all findings with links and user/posts IDs. Main Information Sources Username & Handle Bio, Contact & Links Followers & Following Lists Profile Photos Photos & Videos Tagged Posts Reels (short videos) Stories & Highlights Live Streams Captions & Comments Geotagged Posts & Check-ins Leaked Data OSINT Investigations & Guidelines Identity Verification Content & Media Analysis Cross-reference username & profile name with other platforms. Reverse image search profile pictures and post images. Examine bio links for connected identities. Analyze account age, followers, posting patterns. Use tools or manually archive posts, stories, and highlights. Log post caption, hashtags, tagged users, mentions, date/time. Analyze visual content for geolocation clues and additional info. Archive live-stream content if accesible (screen recording). Manually or automatically map followers and following lists. Map which users consistently tag or are tagged by the subject. Map who regularly comments/likes content. Trace mentions to uncover additional individuals or groups. Monitor hashtags and geotagged posts for breaking events. Cross-reference Instagram content with other platforms. Use visual clues in photos/videos for geolocation. Regularly scan for posts related to ongoing events of interest. Network Mapping Geospatial & Event Monitoring Social Links Crimewall SOCMINT, POI investigations, and network analysis. Usersearch.ai OSINT and POI investigations. Maltego Network analysis and social media monitoring. Analyze posting times. Look for consistent behavior. Examine language patterns (dialect, slang, emojis). Compare frequency of stories vs feed posts. Monitor engagement spikes and interpret activity. Behavioral & Temporal Analysis 2025 Top Free Tools Save From Easily download and extract audio from YouTube videos and shorts. YouTube-Comments.io Extract and filter comments from videos. YouTube Comment Finder Query terms and find specific comments posted to a Youtube video. Channel ID Comment Picker Find YouTube Channel ID, and related channel information and statistics. MW Metadata Obtain metadata from a video, creator, channel, playlist... Down Sub Download subtitles from YouTube videos. Internet Archive Identify, play and gather details from delated videos. YouTube Channel Crawler Find and filter YouTube channels. Watan Network Check in which countries a YouTube is blocked. Unlisted Videos Submit, search and watch unlisted videos. Inteltechniques Videos Tool Search for detailed information on YouTube. Aware Online YouTube Search Tool Search for detailed information on YouTube. ¿What is YouTube? YouTube is a popular online video sharing platform that enables users to upload, view, share, comment, and engage with video content. Key Tips For Investigations 1.Do not log in to Google when conducting YouTube investigations. 2. Identify the video ID as the first step. Do the same with channels, users, and playlists. 3.Reverse image search will provide valuable information about reach and impact. 4.Extracting comments is essential for further research. 5. Investigate video frames to gather additional details. 6.Consider extracting metadata for thorough documentation. 7. Investigate the profile/channel hosting the content. 8.Copies of videos on other platforms can reveal additional discussions or threats. 9.The video thumbnail is crucial for finding other copies. 10.Tools like Inteltechniques and Aware Online can streamline your searches. 11.Monitor YouTube Live to analyze live events worldwide. 12.Pivoting from YouTube to other social media platforms is key to success. 13.Document all findings, including links, video IDs, and channel IDs. Main Information Sources Video Content Video Metadata Channel Information Video Comments Audio Analysis Collaborations Linked External Content Historical Video Archive Trends, Interactions & Impact Content Themes Live Streams Chats & Audience OSINT Investigations & Guidelines Profile & Channel Information Content & Media Analysis Check channel names and about sections to identify creators. Investigate links to external websites and social media profiles. Examine subscriber count and views to assess reach & influence. Track content changes to spot evolving interests. Analyze video content for visual evidence (faces, locations, clues). Review videos frame-by-frame for missed information. Use audio from videos to detect background sounds. Review video metadata for keywords and timestamps. Check thumbnails for text or hidden details. Scan comments for key users, opinions and sentiment. Watch live chats for active audience behavior and engagement. Identify collaborators through shared videos or mentions. Examine playlists and curated content for recurring themes. Activity & Location Use geotags and landmarks to find locations. Track live-streamed events for real-time details. Gather immediate insights into events as they unfold. Identify key participants and understand public sentiment. Interaction & Engagement YouTube Live Alex Lozano 2024 www.cibergy.com Alex Lozano 8 Excellent Youtube Channels On OSINT Bendobrown Gralhix - Sofia Santos A collection of solutions to OSINT exercises. Videos about OSINT tools and analysis. Tips on geolocation techniques and real-life examples. Forensic OSINT The OSINT Curious Project Gary Ruddell OSINT Dojo Authentic8 Cody Bernardy Videos on OSINT, maps, and data. Learn geolocation, satellite imagery, and analysis. OSINT tutorials for digital investigations. Explore OSINT with a forensic focus. Learn OSINT tools for investigations. Resources for professionals and tech enthusiasts. OSINT tips and tools for beginners. 10 minute videos on OSINT skills and tools. Quality OSINT blogs, and tutorials. Short, actionable OSINT video tutorials. Discover new tools and methods easily. Explore cyber intelligence tools and techniques. Free OSINT guidance for beginners. Training on OSINT tools and methods. Skill-building OSINT challenges and tutorials. Engaging OSINT podcasts for continuous learning. Motivating deeper exploration of OSINT topics. Essential tips on OSINT techniques and skills. Real-life OSINT investigations for practical learning. Step-by-step tutorials on OSINT tools. Engaging OSINT challenges to test your skills. www.cibergy.com Alex Lozano Maltego Social Links Crimewall Perform OSINT and SOCMINT across 500+ sources Graph, table, and map visualizations for insights ML-driven analysis & real-time monitoring Skopenow NexusXplore DarkOwl Vision UI Talkwalker Blackdot Solutions Videris Onyx Fivecast Perform rapid OSINT searches and complex investigations Collect, cross-correlate, and store intelligence Monitor and analyze large volumes of data instantly Instant aggregated data for actionable insights Object recognition, analytics and automated reports Visualize intelligence in a variety of layouts GEOINT for real-time, location-specific insights Robust public and corporate records access Secure, anonymized dark web and OSINT browsing Real-time threat monitoring with darknet data Automated alerts and customizable, secure search tools Advanced exposure metrics to assess cyber risk Powerful social listening for team-wide data access Effective media monitoring and brand performance Benchmarking to track industry and competitors OSINT platform for efficient, large-scale investigations Visualize networks and corporate links for clear insights Rapid, AI-driven risk detection and prioritization Fast, broad digital footprint mapping for verification AI-drivenrisk assessment across vast data sources Scalable OSINT solution for deep data collection GREAT OSINT PLATFORMS For Advanced Investigations www.cibergy.com Before diving into dark web research, define specific objectives. Knowing exactly what you're looking for, whether it's: Tracking illegal activity. Identifying cyber threats. Gathering intelligence on a specific group. Security is essential when accessing the dark web: Use virtual machines (VMs) to minimize risks of malware or tracking. Employ Tor Browser or I2P for anonymous browsing. Consider using VPNs to add an extra layer of privacy. Enable strong firewalls, and use multi-factor authentication to secure your system. You can identify relevant marketplaces, forums, or sites through the following methods: Search engines for the dark web like Ahmia.fi. OSINT databases that collect and track known dark web sites and domains. Join dark web forums or communities where users exchange information. Extracting and analyzing metadata from dark web resources can provide key insights: Analyze site uptime, traffic, and server details using tools like OnionScan to understand vulnerabilities and identify patterns. Review timestamps, file formats, and server responses to gather technical information about sites or transactions. Collect Bitcoin transaction metadata if investigating cryptocurrency payments related to illicit activities. Monitoring individuals or groups is an important part of dark web investigations: Observe chatter in forums, marketplaces, and on social media platforms (both surface and dark web). Use automated web crawlers and monitoring tools to track activity related to the keywords or targets of interest. Leverage OSINT tools that scrape the dark web for information on particular topics, such as threat actors, vendors, or criminal activities. Many illicit transactions on the dark web are conducted using cryptocurrencies, especially Bitcoin: Use blockchain explorers like Blockchair or CipherTrace to trace wallet addresses linked to dark web markets. Look for patterns of movement or laundering activities. Link crypto wallets to known marketplaces or suspect individuals by tracking addresses and transaction histories. 6 KEY OSINT STEPS For Investigating the Dark Web Alex Lozano Define Clear Objectives Maintain OPSEC Identify Relevant Dark Web Marketplaces and Forums Gather and Analyze Metadata Monitor Threat Actors and Activity Analyze Cryptocurrency Transactions www.cibergy.com www.cibergy.com @Cibergy Strategic Due Diligence A comprehensive assessment process used primarily in mergers and acquisitions (M&A) to evaluate the strategic fit, value, and potential risks associated with a target company. Employee Due Diligence The process of evaluating and verifying the background, qualifications, and suitability of potential or current employees to ensure they meet the standards for their roles within an organization. Management Due Diligence (MDD) Evaluating the capabilities, track record, and potential of the management team of a target company, in the context of mergers and acquisitions (M&A), investments, or partnerships. Customer Due Diligence (CDD) Verifying the identity of customers and assessing the potential risks they pose in terms of money laundering, terrorist financing, and other financial crimes. Investment Due Diligence The process of evaluating an investment opportunity to ensure that it aligns with the investor’s goals, risk tolerance, and expected returns. ESG Due Diligence The process of assessing a target company or investment's environmental, social, and governance (ESG) factors to evaluate its sustainability practices, ethical impact, and potential risks. Types of Investigations. Due Diligence. It is essential to use data extraction tools to gather relevant information about the target organization, asset, or individuals. Due diligence investigations include the analysis of financial reports, social media, legal documents, news, and other data sources. Alex Lozano The Ultimate OSINT & AI Cheat SheetPART 1: AI FOUNDATIONS Alex Lozano OSINT & AI Strategies Data Collection AI algorithms automate data gathering from online sources. Natural Language Processing (NLP) for extracting information from unstructured text data. Data Analysis Machine learning and deep learning for quick analysis of OSINT data. Identify patterns, trends, anomalies, and correlations within the data. Image and Video Analysis Automatically detect and analyze objects, faces, logos, and text within multimedia context. Sentiment Analysis Analyze sentiment expressed in text data collected from social media and news articles. Helps gauge public opinion, detect emerging trends, and assess potential impact. Identification Automatically identify people, organizations, or locations mentioned in OSINT data. Entity Recognition Track activities of specific individuals or groups. Identify potential threats by recognizing critical entities. Risk Assessment Assess credibility and reliability of OSINT sources using AI algorithms. Key Definitions Artificial Intelligence (AI) Natural Language Processing (NLP) Machine Learning (ML) Generative AI Computer Vision Technology that makes machines smart, allowing them to do tasks that usually need human thinking. A technology that helps computers understand and work with human language, like speech and text. A way for computers to learn from data and improve their performance over time without being explicitly programmed. A type of AI that creates new content, such as images, music, or text, based on what it has learned. A technology that enables computers to see, interpret, and understand the visual world, like recognizing objects in photos. Content Generation Write reports, generate summaries, or produce visualizations based on the data collected by OSINT. OSINT & AI Tools Key Considerations 1 - Avoid using AI tools for sensitive data to prevent exposure. 2 - Choose AI tools that fit your investigation’s needs. 3 - Weigh costs of AI against doing it manually. 4 - Double-check sources to avoid incorrect information. 5 - Always confirm AI findings with human review. 6 - Regularly evaluate AI’s impact on investigation quality. 7 - Use AI to speed up, not replace, human analysis. 8 - Limit AI use to avoid over-reliance on it. 9 - Watch for biases in AI-generated insights. 10 - Be cautious of over-complicating simple tasks with AI. ChatGPT Rapidly analyze vast data for actionable insights. Automate and enhance threat intelligence gathering. Identify patterns and trends in open-source data. Copilot Simplify complex data for rapid intelligence interpretation. Generate clear insights from diverse information sources. Provide on-demand assistance for thorough data analysis. Geospy FaceCheck.id Consensus AskNews App MyMapAI AI tool to analyze images and determine their location. Interprets details and correlates with geospatial data. Visually displays the exact location on the map. Reverse image search tool focused on faces and people. Upload a photo to find matching images on the internet. Intuitive, no advanced technical knowledge required. Academic search engine powered by AI. Search over 200M papers across all domains of science. Access research-backed insights for intelligence analysis. Compare global news perspectives (50,000+ sources). Track event development and sentiment trends over time. Map real-time interactions across entities and stories. Create context-rich diagrams from diverse data sources. Collaborate on intelligence maps in real-time. Summarize web data for quick intelligence visualization. www.cibergy.com www.cibergy.com Social Media Automation tools accelerate investigations and minimize routine tasks. Automation Gather social media data from platforms such as Facebook, LinkedIn, X, Instagram, TikTok, and more. You can establish specific parameters and receive notifications for relevant activities.