Logo Passei Direto
Buscar

OSINT Excellence - Cheat Sheet Collection

Ferramentas de estudo

Material
páginas com resultados encontrados.
páginas com resultados encontrados.

Prévia do material em texto

OSINT 
Cheat Sheets
The Ultimate OSINT
Cheat Sheet
www.cibergy.com
Alex Lozano
The Intelligence Cycle
Top Sources
Planning & Direction Collection Processing Analysis & Production Dissemination
1 2 3 4 5
Plan, strategize, research,
discuss, gather intelligence,
execute task efficiently.
Gather intelligence overtly
and covertly, utilizing
various technological
resources.
Compile collected data into
intelligence reports.
Analyze data, determine
relevance, anticipate
outcomes, evaluate impact
on interests.
Deliver analysis to
policymaker, await
feedback, restart cycle as
necessary.
OSINT Purposes
¿What is OSINT?
Main Users
Top Free Tools
OSINT stands for Open Source Intelligence. It refers to the practice of
collecting and analyzing information from publicly available sources to
gather insights, identify trends, or generate intelligence.
PART 1:THE FOUNDATIONS
People identifiers
Social media platforms
News articles
Reports
Websites
Blogs & Forums
Security and Threat Intelligence: Investigations:
Competitive Intelligence: Reputation Management:
Journalism and Research: Disaster Response and Crises:
Identifying security risks through analyzing
public information on individuals and
organizations.
Conducting investigations into various matters
by gathering relevant information. 
Gathering information about competitors,
market trends, consumer preferences, etc.
Monitoring and managing the online reputation
of individuals, organizations and brands.
Supporting research by gathering data to
uncover facts, verify claims, and provide context.
Assess the impact of natural disasters, conflicts
or crises to facilitate effective response.
Such as names, aliases, email addresses, phone
numbers, employment history or education.
Gather information from Facebook, Twitter,
Instagram, LinkedIn, TikTok, and others.
This can include traditional news websites,
online newspapers, and other sources where
news and current events are reported.
Documents, publications, white papers,
statistical data, and other information published
by government agencies.
Text, images, videos, documents, metadata, and
other multimedia content.
Valuable insights, opinions, discussions, and
user-generated content on a wide range of
topics.
Governments
Corporations
Law Enforcement
Agencies
Investigators & 
Journalists
Community sentiment
Risk & threats to public safety
Weather & natural disaster 
Personel protection & screening
Due diligence
Fraud investigations
Supply chain risk
Asset protection
Brand monitoring
Trending activities
Critical information
Crisis response
Counter violent extremism
Situational awareness
Public safety
Deep investigations
Verification of information
Investigative journalism
Private investigation
Uncover facts
Access to data
Web Archive Epieos
OpenCorporatesHaveIBeenPwned
Forensic OSINT
Namechk
Inteltechniques
FOCA
The Ultimate OSINT
Cheat Sheet
Alex Lozano
Intelligence Analyst Key Skills
Intelligence Disciplines
Critical Thinking Research & Analysis Technical Skills Problem-Solving Communication Skills
Evaluate information
critically, considering its
reliability, relevance, and
implications.
Gathering information from
a variety of sources and
ability to analyze data sets
and draw conclusions.
Proficiency in using
analytical tools, databases,
and software for data
collection and analysis.
Provide creative and
strategic solutions to
complex problems.
Convey their findings
clearly, both in written
reports and oral briefings.
Top Browser Extensions
PART 2:
THE FOUNDATIONS
OSINT - Open Source Intelligence
SOCMINT - Social Media Intelligence
HUMINT - Human Intelligence
GEOINT - Geospatial Intelligence
IMINT - Imagery Intelligence
SIGINT - Signals Intelligence
Encompasses accessible information found in various mediums such as
printed materials, electronic platforms, broadcast media, and online
sources.
A branch of OSINT that focuses specifically on gathering and analyzing
information from social media platforms (posts, images, videos, public
conversations, etc.)
HUMINT involves direct interaction with individuals to collect valuable
knowledge or access to sensitive information.
Involves the analysis of geospatial data to understand and interpret
activities and events occurring on Earth's surface. It combines imagery,
mapping, and geographic information systems (GIS), among others.
The collection, analysis, and interpretation of visual images obtained from
various sources such as satellites, reconnaissance aircraft, drones, and
other imaging systems.
The interception and analysis of electronic signals (radio transmissions,
signals, radar emissions, telecommunications data, etc.) and
communications for intelligence purposes
Internet Categories
Surface Web
Deep Web
Dark Web
Normal web visible for all users
Websites are indexed by search engines
Represents only 4% of the entire internet
Web not indexed by search engines.
Access is restricted to authorized users.
Databases, cloud storage, sensitive data, etc.
Access through software like Tor Browser.
Anonymous browsing is sought by users.
Ilegal activities are promoted. 
Computer Optimization
Antivirus
VPN (Virtual Private Network)
Virtual Machines (VM)
Web Browsers
Sock Puppets
A technology that allows you to create a secure connection over the
internet between your device and a remote server. VPNs encrypt your
internet traffic (ProtonVPN, NordVPN, CyberGhost, etc.)
Web browsers are the primary tool for conducting searches and play
a crucial role in conducting OSINT investigations by providing access
to a wide range of online sources and tools (Brave, Firefox, Tor, etc.)
Sock puppets refer to fake online identities or personas created and
operated by individuals or groups for investigation purposes
(FakePersonGenerator, ThisPersonDoesNotExist, ChatGPT, AI, etc.)
Software-based emulations of physical computers that allow multiple
operating systems (OS) to run concurrently on a single physical
machine (Kali Linux, Trace Labs, Silo, Tsurugi, etc.)
Antivirus software is a type of program designed to detect, prevent,
and remove malicious software, commonly known as malware, from
computers and networks (Windows Defender, ClamAV, Avast, etc.)
uBlock 
Origin
Exif
Viewer
Wayback
Machine
Forensic
OSINT
FireShot
Shodan
User-Agent
Switcher
DownThemAll
Cookie
AutoDelete
Google
Translate
SputnikPrivacy
Badger
RevEye Vortimo
1 2 3 4 5
www.cibergy.com
The Ultimate OSINT
Cheat Sheet PART 3:SEARCH ENGINES
Alex Lozano
General Search Engines
Search Operators
Google Bing Yandex Baidu Yahoo
Quotation Marks “ ”
Search for the exact word or phrase within quotation marks. Ex.: “Joe Doe”
Operator AND
Find information related to both X and Y. Ex.: “OSINT” AND “Training”
Operator OR
Find information to either X or Y. Ex.: “Apple” OR “Microsoft”
Hyphen (-) 
Exclude words from the search. Ex.: Jaguar Speed -Car
Asterisk (*)
Use * as a wildcard matching any word or phrase. Ex.: OSINT * Cheat Sheets
Range (..)
Search between two identifiers. Ex.: Crime rate “2000..2024”
site: 
Find for results and for pages located on a specific domain. Ex.: site:linkedin.com
filetype:
Search for files with the specified extension. Ex.: “OSINT” filetype:pdf
related:
Find pages and results related to a given domain. Ex.: related:osintframework.com
inurl:
Locate pages that include a particular word in their URL. Ex.: inurl:OSINT
intitle:
Locate pages that include a particular word in their title. Ex.: intitle:OSINT
intext:
Locate pages that include a particular word in their content. Ex.: intext:OSINT
Dark Web Search Engines
Ahmia.fi Torch Haystak Tor.linkNot Evil DuckDuckGo The 
Hidden Wiki
Specialized Search Engines
Key Factors
1.Use multiple search engines to improve and maximize results.
2.Use search operators and the “Advanced Search” function.
3.Use international search engines (Baidu in China, Yandex in Russia).
4.Use different names (United States, US, USA, America, etc.).Monitoring
The retrieved data is always in its
latest and most updated form,
guaranteeing real-time accuracy.
Real-time Data
SL Crimewall allows you to extract any
data you need in an untraceable
manner, ensuring OPSEC.
Anonymity
Organize cases in a centralized, easily
accessible location, enabling collaborative
teamwork on a specific project.
Case Management
Collect intelligence from the dark web
to uncover valuable and hidden
insights.
Dark Web
Alex Lozano
ML-Driven Analysis
Examine images and videos using object and
biometric identification, along with text
analysis for sentiment recognition.
ADVANCED PLATFORMS
www.cibergy.com
Alex Lozano
VSVS
CATEGORYCATEGORY
Overview
Delivery &
Interface
Specialization
Key Use Cases
& Applications
Visualization &
Adaptability
Performance &
Accuracy
Scalability &
Deployment
Strengths
Weaknesses
Ideal for
Graph-based OSINT investigation
platform that helps analysts collect,
analyze, and visualize data.
Modern web-based graph UI;
supports SaaS, standalone desktop,
and on-premise deployment.
Focuses on human-centric OSINT,
excelling in social media, dark web,
messengers, and profiling.
Social media intelligence, criminal
investigations, dark web monitoring,
threat actor profiling,
disinformation.
Includes graph, table, and map
views, along with customizable
settings and reporting features.
Fast, responsive, and optimized for
social data. Strong accuracy for
people-focused OSINT.
Cloud-first, highly scalable out of the
box. Easy deployment, especially for
teams and remote environments.
Excels in criminal, social media and
dark web investigations, modern
web-based UI, +1,000 data sources
Less technical customization,
pricing may be enterprise-oriented,
strong internet brandwidth
Smooth, modern, ready-to-go.
Optimized both for quick and
complex investigations.
Open-source intelligence (OSINT)
and graphical link analysis tool for
cyber investigations.
A traditional, technically-oriented
desktop application with a steeper
learning curve.
Specializes in cyber threat
intelligence and infrastructure
mapping, ideal for technical
investigations.
Cyber threat intelligence, fraud
detection, penetration testing,
digital forensics.
Customizable via transforms and
scripting, with support for node-link
graphs, dashboards, and images.
High accuracy and control when
well-configured. May lag on large
graphs or slow transforms.
Desktop-focused, scalable for
enterprise with effort. Strong on-
premise option, less cloud-native.
Powerful link analysis, customizable
transforms, broad OSINT coverage
and data integration flexibility
Steep learning curve, desktop-
centric, resource intensive, limited
social media / dark web depth
Technical, flexible, customizable.
Optimized for detailed, complex
investigations.
Alex Lozano
www.cibergy.com
ADVANCED PLATFORMS
SOCMINT: Deep Social Media Access Real-Time User & Topic Monitoring
Dark Web Threat Intelligence Breach & Leak Detection
AI & ML-Powered Analysis Smart Case Management
1. Gather data (Facebook, Instagram, X, TikTok, etc).
2. Track user’s digital footprint / online presence.
3. Analyze posts, comments, likes, shares, etc.
4. Discover user interests and affinities.
5. Detect and map relationships / connections.
6. Identify patterns and trends in user behavior.
7. Use activity timelines to track patterns.
8. Monitor sentiment and public perception.
1. Set alerts for mentions of keywords, names, etc.
2. Track influence and reach of individuals / entities.
3. Monitor activists, politicians, or POIs.
4. Monitor communities, groups, and movements.
5. Detect and monitor hate speech and threats.
6. Find coordination in disinformation campaigns.
7. Real-time visualization of conversation spikes.
8. Monitor brand threats, fraud, or impersonation.
1. Track forums, marketplaces, and onion sites.
2. Monitor threat actors and known aliases.
3. Identify illegal goods / services being sold.
4. Extract PII, credentials, or leaks offered for sale.
5. Detect ransomware group chatter or affiliations.
6. Link dark web identities to surface web personas.
7. Analyze communication patterns and intentions.
8. Alerts for mentions of targeted entities.
1. Discover exposed emails and passwords.
2. Check if entities appear in breach datasets.
3. Investigate credential password reuse risks.
4. Correlate leaked databases with known users.
5. Monitor paste sites and data dump repositories.
6. Detect insider threats via leak patterns.
7. Automate breach notification alerts.
8. Map scope and impact of leaked data.
1. Monitor sentiment and public perception.
2. Summarize large datasets via NLP.
3. Flag suspicious, harmful, or hateful content.
4. Identify bots and automated communication.
5. Detect linguistic patterns and sentiment trends.
6. Facial recognition across social media platforms.
7. Image matching across surface web platforms.
8. Classify risks based on pattern recognition.
1. Build structured case files with evidence.
2. Visualize links between people, events, data, etc.
3. Collaborate across teams in investigations.
4. Tag and label entities, locations, and topics.
5. Export data for legal or intelligence reporting.
6. Manage investigation workflows and status.
7. Integrate findings from multiple data sources.
8. Centralize documentation for investigations.
OSINT 
Cheat Sheets5.Use different spellings (München, Munich, etc.).
6.Perform searches in multiple languages and locations.
7.Use multiple types of data (names, phones, emails, addresses, etc.).
Filetype Extensions
TXT - Text File
DOC - Microsoft Word
DOCX - Microsoft Word
PDF - Portable Document Format
XLSX - Microsoft Excel
XLS - Microsoft Excel
PPT - Microsoft PowerPoint
PPTX - Microsoft PowerPoint
JPG - Image
JPEG - Image
PNG - Image
GIF - Animated Image
ZIP - Compressed File
7Z - Compressed File
RAR - Compressed File
RTF - Rich Text Format
BMP - Bitmap Image
DWF - Autodesk
HTM - Web Page
HTML - Web Page
KML - Google Earth
KMZ - Google Earth
PS - Academic Papers
ODP - OpenOffice Present
ODS - OpenOffice Spreadsheet
ODT - OpenOffice Text
Ask Aol Brave Search Engine
Colossus
Qwant OCCRP 
Aleph
Intelx.io
Shodan Carrot2 Isearchfrom 2lingual Academia Internet 
Archive
Newspaper
Archive
THW
www.cibergy.com
https://www.ask.com/
The Ultimate OSINT
Cheat Sheet
Books
1.OSINT Techniques - Michael Bazzell
2.Deep Dive - Rae Baker
3.Hunting Cyber Criminals - Vinny Troia
4.OSINT Methods and Tools - Nihad A. Hassan & Rami Hijazi
5.We are bellingcat: An Intelligence Agency for the People - Eliot Higgins
6.How to Find Out Anything - Don MacLeod
7.Operator Handbook - Joshua Picolet
8.OSINT: The Art of Collecting Open Information - David Anderson
PART 4:
OSINT RESOURCES
www.cibergy.com
Virtual Machines & More
Inteltechniques VM
Sherlock Linux VM
Kali Linux VM
Trace Labs OSINT VM
CSI Linux VM
Tsurugi VM
Podcasts
News & Blogs
Youtube Channels
David
Bombal
Authentic8 Gary
Ruddell
Gralhix
Sofia Santos
Bendobrown Cody 
Bernardy
Social
Links
OSINT Dojo Forensic 
OSINT
SANS
Institute
LISA
Institute
Intelcon Manuel 
Bot
Alvaro
Chirou
Security Now NeedleStack Shadow
Dragon
The Pivot The OSINT
Bunker
News Snapshots
Layer 8 The World
of Intelligence
Telegram Groups
Cyber
Detective
OSIntOps
News
Bellingcat
EN
Brigada 
OSINT
Soxoj
Insides
Osint 
Losena
OSINT
Anatomy
OSINT
Teame
OsintTV Cyber Hunter OSINT 
Israel
GINSEG Ciberpatrulla OSINT
Excellence
Newsletters
Cyber
Detective
Sector035 The Sunday
Download
Digital
Investigations
My OSINT
News
OSINT
Ambition
The OSINT
Newsletter
Digital
Digging
OSINT
Jobs
Forensic
OSINT
Fog Of
Influence
OSINT 
Team
OSINT
Insider
OSINT
Excellence
Cyber
Detective
Secjuice Sector035 Intel
Techniques
hatless1der Maltego
Blog
Skopenow
Blog
Nixintel Offensive
OSINT
OSINT
Combine
VEEXH
Medium
SocialLinks
Blog
WebBreacher TraceLabs
Blog
CQcore SANS
Institute
LISA 
Institute
OSINTME OSINT
Curious
Blackdot
Solutions Blog
Dutch
OSINT Guy
Authentic8
Blog
Bellingcat
Blog
Knowmad OH SHINT
Blog
The SEINT Shadow
Dragon
ESPY
Blog
Alex Lozano
OSINTUX VM
Silo (platform for isolated
online investigations)
Kasm (remote desktop)
Debian (optimal Linux OS)
Tails (privacy centered OS)
https://www.ask.com/
https://www.ask.com/
https://www.ask.com/
https://www.ask.com/
https://www.ask.com/
https://www.ask.com/
The Ultimate OSINT
Cheat Sheet PART 5: 
TOOLS COLLECTIONS
OSINT Collections
Bookmarks
Alex Lozano
Start.me
Github
Cyber
Detective
Daniel Durnea
FBI Tools
OSINT
Team Links
Awesome
OSINT
OSINT
Encyclopedia
OhShINT Sinwindie
OSINT Dojo
OSINT
For Countries
Ph055a
OSINT
Datajournalism
Resources
Non Typical
OSINT Guide
Handbooks
Spreadsheets
OSINT 
Framework
OSINT
Essentials
UK 
OSINT
IntelTechniques
Search Tools
Aware
Online Tools
Toddington Andy Black
Associates
OSINT Dojo
Resources
OSINT
Toolkit
Reuser’s 
Repertorium
Malfrat’s 
OSINT Map
IntelligenceX
Tools
Achirou
OSINT Tools
Meta
OSINT
The OSINTion
Wiki
OH SHINT!
Web Resources
SPJ
Toolbox
OSINT Combine
Free Tools
OSINT 
Geek Tools
OSINT
Techniques
Tools
OSINT
Map
The Ultimate
OSINT
Collection
Verification
Toolset
V3nari 
Bookmarks
Intel0logist Hun-OSINT Digintel Bruno Mortier
USA
DFIRDetective CSE 
Utopia
Emmanuelle
Welch
AML
Toolbox
BBC Eye
Forensics
The Coins 
of Charon
Paranoid Ch1ck
CTI Resources
Nixintel’s 
OSINT List
Lorand Bodo
OSINT Tools
OSINT
International
Osintia
Zoekslag
Resources
By Country
World
Resources
AsINT_Collection
1. Toddington - https://www.toddington.com/resources/cheat-sheets/ 
2. I-Intelligence OSINT Handbook - https://i-intelligence.eu/uploads/public-
documents/OSINT_Handbook_2020.pdf 
3. Aljazeera Media Institute -
https://institute.aljazeera.net/sites/default/files/2023/Open%20Source%20Investi
gation%20Handbook.pdf
4. Blackdot Solutions - https://blackdotsolutions.com/wp-
content/uploads/2021/11/The-OSINT-Handbook_.pdf 
5. The Intelligence Handbook - https://go.recordedfuture.com/the-
intelligence-handbook-fourth-edition 
Bellingcat’s Investigation Toolkit
https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ 
OSINT For Finding People
https://docs.google.com/spreadsheets/d/1JxBbMt4JvGr--G0Pkl3jP9VDTBunR2uD3_faZXDvhxc 
Aaron CTI’s OSINT Collection
https://docs.google.com/spreadsheets/d/1klugQqw6POlBtuzon8S0b18-gpsDwX-5OYRrB7TyNEw
OSINT
Combine
OSINT Stack
Dark Web OSINT Stack
https://www.osintcombine.com/free-osint-tools/osint-bookmark-stack
https://www.osintcombine.com/free-osint-tools/darkweb-bookmark-stack 
Offensive
OSINT Tools
Soxoj Awesome 
Social
Engineering
www.cibergy.com
https://www.ask.com/
https://www.ask.com/
https://www.ask.com/
https://www.ask.com/
https://www.toddington.com/resources/cheat-sheets/
https://www.toddington.com/resources/cheat-sheets/
https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf
¿What is OPSEC?
Operational Security (OPSEC) is a systematic process
(sequence of steps) that identifies and protects sensitive
information from adversaries to prevent exploitation,
maintain anonymity, and keep activities undetected.
OPSEC = software + hardware + practices
Password Management
Tool for secure password management.
Encrypted database to protect
passwords.
Generates strong, unique passwords.
Improves security and simplifies
management.
Key Considerations
Alex Lozano
OPSEC should always be practiced, regardless of how
trivial an investigation might seem.
OPSEC needs to be tailored to the activity or
investigation.
Assume online activities are being monitored.
OPSEC is a continuous practice that should become
second nature to individuals.
Continuously adapt as new threats/techniques emerge.
Continuously assess the potential risks before sharing
any information, whether online or offline.
Keep research separate from personal/professional
activities.
Research OSINT tools thoroughly before use.
Virtual Machines & More
Inteltechniques VM
Sherlock Linux VM
Kali Linux VM
Trace Labs OSINT VM
CSI Linux VM
Tsurugi VM
OSINTUX VM
Silo (platform for isolated
online investigations)
Kasm (remote desktop)
Debian (optimal Linux OS)
Tails (privacy centered OS)
Web Browsers
Firefox Brave TOR KeepassXC
Phones & Emails VPNs Sock Puppets
Browser Addons:
HTTPS Everywhere
uBlock Origin
Privacy Badger
User-Agent-Switcher
Canvas Defender
Prevents traceability to your real
identity.
Reduces risk of account linkage
detection.
Enhances security from potential
breaches.
Hushed, Protonmail, Tutanota, etc.
Useful to mask your true IP address
location.
Prevents tracking by websites and
services.
Enhances privacy when conducting
research.
ProtonVPN, NordVPN, etc.
Protects real identity during
investigations.
Avoids detection by target entities.
Gathers information without raising
suspicion.
Fake Name Generation, This Person
Does Not Exist, ChatGPT, etc.
The Ultimate OSINT
Cheat SheetPART 6:
Operational Security
www.cibergy.com
1 2 3
4 5 6
7 8 9
By Social Links By DarkOwl & Socialgist By Skopenow
By Fivecast By Skopenow & DarkOwl By Blackdot & ShadowDragon
By Blackdot Solutions By Social Links By SANS Institute
Discover the power of AI in open-source
intelligence work, spanning threat intelligence,
sentiment analysis, entity profiling, and more.Staying ahead of cyber adversaries requires a
deep understanding of the latest trends and
innovations in the cybersecurity space.
Learn how to enhance event security with
OSINT for pre-event assessment, venue
profiling, and real-time threat detection.
 OSINT is not merely keeping pace with change
but also leading the charge in revolutionizing
intelligence.
Insights on emerging threats and the latest
OSINT tools and techniques to detect and
prevent them.
How OSINT can be used to counter serious and
organised crime, stopping criminal networks in
their tracks.
Explore how OSINT is evolving, best practices
for its use in every sector and how new
technologies can support investigators.
Practical look at some essential techniques that
every private investigator needs to know to
maximize their investigative scope.
How the OSINT landscape is changing, and 
decisions organizations can make that can
severely hinder their OSINT operations'
effectiveness. 
OSINT AND AI: A NEW
DAWN OF DATA ANALYSIS
THE PRIVATE INVESTIGATOR’S
OSINT TOOLKIT
OSINT WORKFLOWS 
FOR EVENT SECURITY
TOP TRENDS AND
PREDICTIONS IN OSINT
THE FUTURE OF OSINT
REAL WORLD OSINT ADVICE
FOR THE CURRENT CHANGING
LANDSCAPE57 min
51 min
53 min
44 min122 min
60 min
THE EVOLVING ROLE 
OF OSINT
56 min
Alex Lozano
9 Top OSINT Webinars
ABOUT LATEST TRENDS AND USE CASES
INVESTIGATING SERIOUS
AND ORGANIZED CRIME
WITH OSINT60 min
EXPLORING EMERGING 
TRENDS IN CYBERSECURITY
30 min
www.cibergy.com
Identify Online Information
Identify personal information and media of the executive, relatives and close
associates. Check for home, vehicle, email address, phone, and password exposure.
Executive’s and family social media profiles, online activity, and posts to assess
their interests, habits, and potential vulnerabilities. Check privacy settings.
Find Primary Risks
Personal Data Exposure
Exposed Home Address
Exposed Email or Phone
Predictable Location or Routine
Exposed Credentials or Passwords
Direct or Indirect Threats
Social media accounts often contain a wealth of personal
information, including photos, locations, activities, and
connections.
It allows malicious individuals to locate and
potentially harm them in their own residence.
This can lead to harassment, unsolicited communication,
phishing attempts, or even more serious threats such as
extortion or blackmail.
Knowing their daily activities or travel patterns allows
malicious individuals to anticipate their movements and
exploit vulnerabilities in their security.
Unauthorized access to sensitive information,
financial accounts, or even critical systems.
Threats against the executive or their family members
pose an immediate danger to their safety and well-being
Take Actions to Minimize Risks
Detect Threat Category
Physical Threat
Digital Threat
Indirect Threat
Vulnerability to assault, kidnapping, burglaries or harassment.
Risks posed by environmental factors or civil unrest in regions.
Corporate espionage or sabotage by competitors or insiders.
Monitoring of data breaches and other vulnerabilities.
Cyber threats targeting the executive’s digital assets / accounts.
Reputational damage if sensitive information is leaked online.
Threats against family members or personal relationships.
Indirect threats made against business or employees.
Mishandling of crisis and inadequate response to controversies.
Know The Right Tool
Samdesk
Situational awareness
Real-time crisis alerts
Employee safety
InGrav
PeopleMon
ShadowDragon
Horizon
Social media intelligence
Network analysis
POIs investigation
Social media intelligence
Online monitoring
Geolocation analysis
Skopenow
POIs investigation
Social media intelligence
Situational awareness
Social Links
Crimewall
NexusXplore
Social media intelligence
Online monitoring
POIs investigation
POIs investigation
Situational awareness
Social network analysis
Lock down executive and family
members personal social media.
Regular monitoring of online chatter,
social media, and news reports.
Background check services to vet
individuals and organizations.
Change breached passwords. Create
unique passwords for all accounts.
Request “right to erasure” for
platforms sharing PII.
Search for information about travel
plans, itineraries, and future events.
Conduct a comprehensive search of
the executive's digital footprint.
Share with law enforcement direct
and credible threats.
The OSINT Cheat Sheet
For Executive Protection 
Alex Lozano
Executives & CEOs
Political Figures
Celebrities
High Net Worth Individuals
Dignitaries
Professional Athletes
Musicians & Actors
Other VIPs
VIP IndividualsOSINT For Executive Protection
Integrating OSINT into Executive Protection strategies can provide
security teams with valuable intelligence and insights to proactively
mitigate risks and ensure the safety and security of the executive.
Monitor online chatter, social media conversations, and forums for any threats,
harassment, or hostile sentiment directed towards the executive.
Assess the potential security risks associated with the executive's travel
destinations, transportation arrangements, and accommodations.
Monitor online mentions, reviews, and news coverage related to the executive's
reputation, brand image, and professional activities.
Identify any compromised accounts, leaked credentials, or other indicators of
cyber threats targeting the executive's personal information or digital assets.
Recognize potential security vulnerabilities, access points, and emergency exits
for relevant locations to inform security planning and risk mitigation efforts.
www.cibergy.com
The OSINT Cheat Sheet
For Brand Intelligence
Alex Lozano
Why is It Essential?
Customer Trust & Loyalty
Competitive Advantage
Crisis Resilience
Attracting Talent
Customer Acquisition & Retention
Financial Performance
A strong reputation fosters trust and encourages
customer loyalty. 
It can be a deciding factor for consumers when
choosing between similar products or services.
Brands with strong reputations are better able to
withstand negative events or crises. 
Companies with good reputations are more
attractive to top talent.
A good reputation makes it easier to acquire new
customers and retain existing ones.
Command higher prices, achieve better market
positions, and attract more investment.
Stakeholder Relationships
Positive reputation helps in building strong
relationships with stakeholders, including
investors, partners, and suppliers.
Real-Time Monitoring
Sentiment Analysis
Crisis Management
Competitor Insights
Influencer Engagement
OSINT tools can continuously scan social media, forums, news sites, and other
online platforms to track what is being said about a brand. 
Customer Feedback Collection
Market and Trend Analysis
OSINT For Brand Intelligence
By leveraging OSINT, brands can proactively manage their reputation,
respond swiftly to potential issues, and continuously align their
strategies with customer expectations and market dynamics.
Main Strategies
Advanced OSINT tools often include sentiment analysis features, which help in
categorizing mentions of the brand as positive, negative, or neutral.
Early detection of negative mentions or potential crises can help brands respond
promptly before issues escalate.
By monitoring competitors, OSINT provides valuable information about their
activities, strategies, and public perception.
OSINT can identify key influencers, bloggers, and thought leaders who have
significant influence over public opinion.
This feedback can be used to improve products, services, and customer support,
thereby enhancing overall brand reputation.
Understanding what customers want and predicting future trends helps in making
strategic decisions that positively influence brand perception.
Internal Monitoring
OSINT ensures employees represent the brand well online and identifies internal
issues to prevent damage to the brand’s reputation.
Competitive Disadvantage
Decreased Sales
BrandDevaluation
Negative Media Coverage
Employee Turnover
Loss of Trust
Legal Scrutiny
Lower Profitability
Social Media Blacklash
Increased Costs
Negative Effects
Actions to Enhance Reputation
Monitor and respond to
online feedback
Build and maintain positive
online media relations
Engage with your online
audience
Ensure excellent online
customer service
Promote online Corporate
Social Responsibility (CSR)
Encourage and showcase
positive online reviews
Create and share high-quality
content
Leverage influencer and brand
ambassadors partnerships
Know The Right Tool
ShadowDragon
Horizon
Twitter monitoring
List management
Advanced search features
SocialLinks 
Crimewall
Social media intelligence
Online monitoring
POIs investigation
Talkwalker
Social listening
Brand awareness
Sentiment analysis
Brandwatch
Alto
Intelligence
Social listening
Brand awareness
Sentiment analysis
Risk & Threat detection
Crisis management
Monitoring & alerts
Social media intelligence
Online monitoring
POIs investigation
TweetDeck
www.cibergy.com
Intelligence Quotes
BY RENOWNED PERSONALITIES
Alex Lozano
Stephen Hawking
Maria Konnikova
Albert Einstein
Henry Mintzberg
Sadhguru
John F. Kennedy Helen Keller Simone de Beauvoir
Edward de Bono Anaïs Nin
Intelligence is the
ability to recognize
patterns. Intelligence is the
ability to make
sense of things,
rather than simply
knowing a lot of
things.
The measure of
intelligence is the
ability to change.
Intelligence is the
ability to see
patterns, connect
dots, and extract
meaning from
complexity.
Intelligence is the
ability to adapt to
change.
Intelligence is the
ability to take in
information and use
it to make decisions.
Intelligence is not the
ability to store
information, but to
know where to find it.
Intelligence is the
ability to think
independently and
to understand things
deeply.
Intelligence is the
ability to find and
solve problems and
create products of
value in the world.
Intelligence is the
ability to see
possibilities where
others see closed
doors.
www.cibergy.com
OSINT Tips
Cheat Sheet
Alex Lozano
OPSEC: Your Essential Shield The Golden Rule of Verification
Develop Technical
Skills
Customer Focus
Pivot, Pivot & Pivot
Stay Up-To-Date Think Creatively
Documenting Your Way to Intelligence
By understanding the customer's goals
and priorities, analysts can prioritize their
efforts to focus on gathering the most
valuable information.
Become flexible in transitioning between
data points and sources.
It's crucial to gather extensive, confirmed data
to aid in solving the case.
Become acquainted with
essential OSINT tools and
master advanced search
strategies.
Lower adversary exploitation risk.
Stay anonymous by hiding who you are.
Keep activities hard to trace and follow.
The accuracy of information is paramount.
Trustworthiness. Not all sources are reliable.
Verified data is crucial for effective decisions.
Join an OSINT community;
monitor social media, listen to
podcasts, attend workshops,
and read books and blogs.
Be creative in your approach
to finding information, and
consider unconventional
sources or methods.
Keep thorough documentation of your findings, including
the sources you used and the methodologies employed.
This helps ensure transparency and reproducibility.
www.cibergy.com
Alex Lozano
Technical skills can secure you a job.
But interpersonal skills will advance your career.
10 soft skills to accelerate your OSINT career:
1. Analytical Thinking
Identify relevant information.
Spot patterns.
Evaluate data credibility.
2. Attention to Detail
Ensure accuracy.
Avoid missing details.
Prevent incorrect conclusions.
3. Critical Thinking
Question assumptions.
Assess source validity.
Make sound judgments.
4. Communication Skills
Convey findings clearly.
Ensure understanding.
Present complex info simply.
5. Problem-Solving
Tackle unique challenges.
Develop innovative strategies.
Find effective solutions.
6. Curiosity
Dig deeper.
Learn new tools.
Stay updated.
7. Adaptability
Adjust to changes.
Use new tools effectively.
Stay relevant.
8. Ethical Judgment
Handle sensitive info responsibly.
Maintain integrity.
Make ethical decisions.
9. Collaboration
Work well in teams.
Share insights.
Achieve common goals.
10. Time Management
Prioritize tasks.
Meet deadlines.
Manage workload efficiently.
Thanks for reading! If you found this interesting, follow for more
insights on OSINT!
www.cibergy.com
Alex Lozano
7 Essential OSINT Steps for Executive & VIP Security.
Use these steps as a checklist:
1. Personal Information and Media Analysis
Identify personal information and media of the executive, relatives and associates. 
Check for home, vehicle, email address, phone, and password exposure.
2. Threat Detection and Risk Monitoring
Monitor online chatter, social media conversations, and forums for any threats,
harassment, or hostile sentiment directed towards the executive.
3. Social Media Vulnerability Assessment
Explore executive’s and family social media profiles, online activity, and posts to assess
their interests, habits, and potential vulnerabilities. Check privacy settings.
4. Travel and Accommodation Risk Assessment
Assess the potential security risks associated with the executive's travel destinations,
transportation arrangements, and accommodations.
5. Reputation Management and Media Monitoring
Monitor online mentions, reviews, and news coverage related to the executive's
reputation, brand image, and professional activities.
6. Cybersecurity Threat Identification
Identify any compromised accounts, leaked credentials, or other indicators of cyber
threats targeting the executive's personal information or digital assets.
7. Physical Security and Vulnerability Mapping
Recognize potential security vulnerabilities, access points, and emergency exits for
relevant locations to inform security planning and risk mitigation efforts.
Thanks for reading! If you found this interesting, follow for more
insights on OSINT!
www.cibergy.com
Planning and
Dire
ctio
n
Data 
Collection
Processing and
Exploitation
Di
ss
em
in
at
io
n 
an
d 
Fe
ed
ba
ck
Analysis and
Production
Planning & 
Direction
Data
Collection
Processing & 
Exploitaition
Analysis & 
Production
Dissemination
& Feedback
Plan, strategize, research, discuss,
gather intelligence, execute task
efficiently.
Gather intelligence overtly and
covertly, utilizing various
technological resources.
Compile collected data into
intelligence reports.
Analyze data, determine
relevance, anticipate outcomes,
evaluate impact on interests.
Deliver analysis to policymaker,
await feedback, restart cycle as
necessary.
OSINT - Open Source
Intelligence
Encompasses accessible
information found in various
mediums such as printed
materials
Step by Step Tips
The Intelligence Cycle
General Aspects
Define Objectives
Identify Requirements
Select Sources
Develop a Plan
Alex Lozano
The Intelligence Cycle
For Open Source Intelligence (OSINT) Professionals
Use Diverse Sources
Automate If Possible
Verify Credibility
Stay Ethical and Legal
Organize Data
Remove Redundancies
Normalize Formats
Document Sources
Identify Patterns
Assess Reliability
Contextualize Data
Generate Insights
Create Reports
Tailor to Audience
Solicit Feedback
Update Methods
Strive for precision and correctness
Cross-check information with multiple
sources
Maintain a sense of urgency
Ensure timely delivery
Use credible sources and methods
Continuously evaluate the reliability
Adhere to legal and moral guidelines
Comply with ethical standards
Stay flexible and ready to adjust
Be prepared to pivot quickly
Ensure OPSEC thorough all phases 
Implement measures to safeguard
www.cibergy.com
uBlock Origin
Blocks ads and
trackers 
Cookie
AutoDelete
Control cookies
Privacy Badger
Block tracking
scripts
Google Translate
Translate text
DownThemAll
Bulk download files
from websites
RevEye
Reverse image
search
Exif Viewer
View metadataWayback
Machine
Web archive
User-Agent
Switcher
Modify your U-A
Shodan
Retrieve website
information
Vortimo
Analyze web
content
Fireshot
Screen capture
Sputnik
Search digital
identifiers
Forensic OSINT
Screen capture
Bot Sentinel
Detect bots on
X (Twitter)
Hunchly
Capture web
pages
Instant Data
Scraper
Data scraper
Context Search
Quickly search
for text
Video
DownloadHelper
Download videos
ESUIT
Facebook content
downloader
Hive AI Detector
Detect AI-
generated media
Alex Lozano
21 BROWSER EXTENSIONS
For Open Source Intelligence (OSINT) Professionals
www.cibergy.com
Alex Lozano
21 BLOGS & NEWS SITES
For Open Source Intelligence (OSINT) Professionals
Cyber
Detective
Secjuice
Sector035
Authentic8
Blog
Rae Baker
Blog
VEEXH
Medium
OH SHINT
Blog
OSINT
Combine
Bellingcat
Blog
Skopenow
Blog
ShadowDragon
Blog
Maltego
Blog
hatless1der
OSINTME
SocialLinks
Blog
Nixintel
Blackdot
Solutions Blog
Offensive
OSINT
ESPY
Blog
OSINT
Team
CQcore
www.cibergy.com
https://www.ask.com/
Alex Lozano
21 OSINT COLLECTIONS
For Intelligence Analysts and Investigators
OSINT
Framework
Inteltechniques
Search Tools
The Ultimate
OSINT Collection
Malfrat’s
OSINT Map
Meta
OSINT
SPJ
Toolbox
OSINT
Techniques
Tools
OSINT
Essentials
Aware Online
Tools
OSINT Dojo
Resources
IntelligenceX
Tools
Bellingcat’s
Online OSINT
Toolkit
OSINT Combine
Free Tools
OSINT Toolkit
UK 
OSINT
Toddington
Reuser’s
Repertorium
Achirou OSINT
Tools
OH SHINT!
Web Resources
The OSINTion
Wiki
OSINT Map
www.cibergy.com
https://www.ask.com/
GHunt
Info from gmail
accounts 
EPIEOS
Email reverse
lookup
Holehe
Chek email in
different sites
OSINT Industries
Mailcat
Find email by
nickname
Castrick
Email reverse
lookup
EmailRep.io
Email
reputation
BreachDirectory
Scamsearch.io
Scammer details
database
osint.rocks
Email tools
collection
HaveIBeenPwned
Whoxy
Lookup domain
WHOIS
That’s Them
People search
engine
Skymem
Find emails of
companies
Simple Login
Mask your
email address
Hunter.io
Find professional
emails
DeHashed
Reverse Whois
Domain WHOIS
search
InsE
Instagram email
finder
SignalHire
Find professional
emails
Proton Mail
Free & secure
email service
Alex Lozano
21 EMAIL ADDRESS TOOLS
For Open Source Intelligence (OSINT) Professionals
Search data
breaches
Email reverse
lookup
Search data
breaches
Search data
breaches
T
www.cibergy.com
www.cibergy.com
Free Carrier
Lookup
Carrier
identification
Carrier Lookup
Carrier
identification
Truecaller
Number lookup
service
Twilio
Spy Dialer
Number lookup
service
Apeiron
Number lookup
service
EPIEOS
Phone reverse
lookup
Google
Phoneinfoga
Info gathering
framework
WhatssApp
Checkleaked
Whatsapp Profile
Information
OSINT Industries
Bing
General search
engine
NumLookup
Reverse phone
lookup
WhitePages
Phone numbers
database
Ignorant
Check phones
on sites
Detectdee
Check phones
on sites
Castrick
UniversalSearchBot
Telegram phone
search bot
osint.rocks
Multiple OSINT
tools
DeHashed
Search data
breaches
HaveIbeenzuckered
Facebook data
breach checker
Alex Lozano
21 PHONE NUMBER TOOLS
For Open Source Intelligence (OSINT) Professionals
Phone reverse
lookup
Number lookup
service
Phone reverse
lookup
General search
engine
www.cibergy.com
TOR 
Browser
Web browser
Ahmia
Search engine
Torch
Search engine
HayStack
Onion Engine
Search engine
Tor66
Search engine
Telemetry
Telegram
search
DeHashed
DeepDarkCTI
Collection of 
CTI sources
Tor.link
Links to onion
sites
Library of Leaks
LeakOSINT
Telegram bot
DarkwebDaily.
Live
The Hidden Wiki
Links to onion
sites
TOR2web
Access to Tor
hidden services
Aleph
Search data on
the Dark web
HaveIbeenPwned
UniversalSearchBot
Telegram bot
Onion.live
Links to onion
sites
TorCrawl.py
Crawl and extract
webpages
PGP Tool
Encrypt, decrypt,
and verificate PGP
Alex Lozano
21 DARK WEB TOOLS
For Open Source Intelligence (OSINT) Professionals
Leaks &
breaches
Search engine
Search data
breaches
Search data
breaches
Links to onion
sites
O
Apple Store
www.cibergy.com
Alex Lozano
40 ONLINE COMMUNITIES
For Person Of Interest (POI) OSINT Investigations
Strava
Fitness tracking
app
Garmin Connect
Fitness tracking
app
Google Reviews
Customer review
platform
Trustpilot
Business reviews
website
Google Store
Google product
shop (Reviews)
4chan Discord
Voice, video chat
Apple products
store (Reviews)
Tripadvisor
Amazon Reviews
Online shopping
marketplace
Komoot
Twitch
Livestreaming
platform
Travel reviews
platform
Outdoor activity
planner
Anonymous
message board
Booking Reviews
Yelp
Local business
reviews
Reddit
Steam
Video game
marketplace
Tumblr
Microblogging
social network
Medium
Blogging and
writing site
Foursquare
Location check-
in app
Blogger
Simple blogging
platform
Meetup
Group event
organizer
Paypal
Online payment
service
Flickr
Photo sharing
platform
Goodreads
Book reviews
site
Github
Code repository
platform
Bluesky
Alternative to
Twitter (X)
Nextdoor
Neighborhood
social network
Craiglist
Classifieds
advertisement site
Travel booking
site
Online discussion
forum
Pinterest
Visual inspiration
platform
Gravatar
One-page
personal site
Gettr
Conservative
social media
Academia.edu
Research
sharing site
Onlyfans
Subscription
content platform
Skype
Video calling
platform
Gab
Free speech
network
Soundcloud
Music sharing
platform
Tinder
Dating app
Duolingo
Language
learning app
Myspace
Early social
network
Badoo
Dating app
Alex Lozano
60 High-Demand Jobs in Open
Source Intelligence (OSINT)
Government
1.OSINT Analyst - Conduct open source intelligence for national security.
2.Cyber Intelligence Analyst - Monitor and analyze cyber threats.
3. Intelligence Officer - Use OSINT to support defense and security operations.
4.Counterterrorism Analyst - Analyze open-source information to prevent terrorism.
5.Law Enforcement Intelligence Analyst - Support law enforcement operations.
6.Border Security Analyst - Utilize OSINT for monitoring and securing borders.
7.Public Health Intelligence Officer - Use OSINT to track public health threats.
8.Diplomatic Security Analyst - Provide security analysis for diplomatic missions.
9.Military Intelligence Analyst - Support military operations with OSINT.
10.Threat Analyst - Identify and analyze threats to national security.
Private Sector
Technology & Software Freelance & Consultancy
Journalism & Academia Non-Profit Organizations
11. Corporate Security Analyst - Use OSINT to protect corporate assets.
12. Fraud Investigator - Investigate fraud using open source data.
13. Cyber Threat Analyst - Monitor and mitigate cyber threats.
14. SOC (Security Operations Center) Analyst - Monitor and analyze security events.
15. Brand Protection Specialist - Monitor and protect brand reputation.
16. Due Diligence Investigator - Conduct background checks and investigations.
17. Incident Response Analyst - Utilize OSINT during cyber incident investigations.
18. Digital Forensics Investigator - Use OSINT in digital forensics investigations.
19. Red Team Operator - Use OSINT to plan and execute simulated cyber attacks.
20. Competitive Intelligence Analyst - Analyze market and competitor information.
21. OSINT Tool Developer - Develop software tools for OSINT gathering.
22. Data Engineer - Design and manage systems that process and analyze OSINT.
23. Machine Learning Engineer - Implement ML models to analyze OSINT data.
24. Software Engineer - Build applications for OSINT analysis and visualization.
25. Data Scientist - Use statistical and computational techniques to extract insights.
26. AI Researcher - Develop AI algorithms to enhance OSINT capabilities.
27. Web Scraping Specialist - Create scripts / tools to collect data from web sources.
28. Geospatial Analyst - Analyze spatial data from open sources for intel purposes.
29. Cybersecurity Software Developer - Develop security software usingOSINT.
30. Cloud Architect - Design cloud infrastructure to support OSINT operations.
31. Freelance OSINT Investigator - Offer OSINT services on a contract basis.
32. Security Consultant - Provide security analysis using open-source intelligence.
33. Private Investigator - Use OSINT for private investigations.
34. Risk Consultant - Offer risk assessments using open sources.
35. Social Media Consultant - Analyze social media trends for clients.
36. Cybersecurity Consultant - Provide cybersecurity services using OSINT.
37. Competitive Intelligence Consultant - Advise businesses on market intelligence.
38. Crisis Management Consultant - Use OSINT to manage crises.
39. Brand Protection Consultant - Help businesses protect their brand using OSINT.
40. KYC / AML Consultant - Provide KYC / AML services using OSINT.
41. Investigative Journalist - Use OSINT to uncover stories and investigate issues.
42. Research Analyst - Conduct open-source research for academic studies.
43. Cybersecurity Researcher - Investigate cybersecurity threats using OSINT.
44. OSINT Author - Write books and articles on OSINT techniques and applications.
45. Fact-Checker - Verify the accuracy of information using open-source data.
46. Foreign Correspondent - Use OSINT to report on international news.
47. Intelligence Studies Professor - Teach and research OSINT methodologies.
48. OSINT Instructor - Provide training and teach courses on open-source intelligence.
49. Business Reporter - Analyze and report on business trends and market data.
50. Data Scientist - Analyze open-source data for academic research.
51. Human Rights Researcher - Use OSINT to document human rights abuses.
52. Environmental Research Analyst - Monitor environmental issues using OSINT.
53. Crisis Response Analyst - Use OSINT to respond to humanitarian crises.
54. NGO Security Analyst - Ensure the security of non-profit operations with OSINT.
55. Transparency Investigator - Investigate corruption and promote transparency.
56. Social Media Analyst - Monitor social media for advocacy and awareness.
57. Policy Analyst - Use OSINT to inform policy recommendations.
58. Public Health Researcher - Track and analyze public health data.
59. Conflict Researcher - Monitor and analyze conflicts using open sources.
60. Disaster Response Analyst - Use OSINT for disaster preparedness and response.
www.cibergy.com
Alex Lozano
60 High-Demand Services in
Open Source Intelligence (OSINT)
Social Media & Online Monitoring
1. Social Media Monitoring: Track and analyze content across social media platforms.
2. Sentiment Analysis: Analyze public opinions through sentiment on social platforms.
3. Disinformation Detection: Identify and combat false or misleading information.
4. Brand Protection: Monitor and safeguard corporate reputation and trademarks.
5. Social Engineering Awareness: Detect social engineering cyber threats.
6. Public Sentiment Tracking: Measure public mood and opinions on issues.
7. Online Reputation Management: Manage and improve online public perception.
8. Virtual Event Monitoring: Track and analyze activities in virtual events.
9. Influencer Analysis: Assess influence and reach of online personalities.
10. Hashtag / Keyword Analysis: Analyze topics through hashtags and keywords.
Cybersecurity & Threat Intelligence
Geospatial & Environmental Competitive & Market Intelligence
Legal, Compliance & Policy Research Research, Analysis & Training
11. Cyber Threat Intelligence: Identify and mitigate emerging cyber threats.
12. Dark Web Monitoring: Monitor dark web for threats and illicit activities.
13. Threat Actor Profiling: Analyze and understand cyber threat actor behaviors.
14. Incident Response Support: Provide intelligence during cybersecurity incidents.
15. Digital Forensics Support: Use OSINT to aid digital forensic investigations.
16. Online Fraud Investigations: Detect and investigate online fraud activities.
17. Counter-Terrorism Intelligence: Analyze threats to prevent terrorist activities.
18. Compliance Monitoring: Ensure adherence to legal and regulatory standards.
19. Threat Intelligence Fusion: Integrate multiple data sources for analysis.
20. Vulnerability Assessment: Identify and analyze security vulnerabilities and risks.
21. Geolocation Analysis: Determine locations using open-source geospatial data.
22. Geospatial Intelligence: Analyze spatial data to support operational decisions.
23. Environmental Intelligence: Monitor environmental risks and impacts globally.
24. Travel Risk Assessment: Evaluate risks associated with travel and locations.
25. Disaster Preparedness: Analyze data for effective disaster response planning.
26. Event Monitoring: Track events for real-time situational awareness.
27. Supply Chain Risk Assessment: Assess risks within supply chain operations.
28. Geospatial Data Visualization: Visualize spatial data for clearer intelligence insights.
29. Border Security Analysis: Use OSINT for monitoring and securing borders.
30. Mapping Humanitarian Crises: Analyze and map crises for humanitarian response.
31. Competitive Intelligence: Analyze competitors’ strategies and market positions.
32. Due Diligence: Conduct thorough investigations before major business decisions.
33. Financial Intelligence: Analyze financial data for fraud and insights.
34. Trade and Market Analysis: Evaluate market trends and trade opportunities.
35. Recruitment Intelligence: Analyze recruitment trends and practices.
36. Emerging Technology Tracking: Monitor and assess new technologies and trends.
37. Business Intelligence: Extract insights from business data and operations.
38. Political Intelligence: Assess political risks and opportunities in markets.
39. Market Entry Risk Assessment: Evaluate risks in entering new markets.
40. Brand Protection: Safeguard brand from competitive threats and misuse.
41. Public Records Research: Retrieve information from accessible public records.
42. Background Checks: Verify individuals’ histories for employment or investigations.
43. Regulatory and Policy Analysis: Analyze laws and policies affecting operations.
44. Legal and Ethical Compliance: Ensure adherence to legal and ethical guidelines.
45. Government and Policy Analysis: Study governmental actions and policy impacts.
46. Document Analysis: Review documents for legal and regulatory compliance.
47. Law Enforcement Support: Provide intelligence support to LEAs.
48. Crisis Communication: Manage communication during legal crises.
49. Human Intelligence (HUMINT) Support: Integrate human intelligence with OSINT.
50. Corruption Investigations: Investigate corruption and promote transparency.
51. Research Services: Provide detailed insights through comprehensive research.
52. Academic and Scientific Research: Research in academic and scientific fields.
53. Education and Training: Develop and deliver OSINT training programs.
54. Cultural Sensitivity Training: Train on cultural awareness for international ops.
55. Public Health Surveillance: Monitor health data to track disease spread.
56. Humanitarian Assistance Research: Support humanitarian efforts through OSINT.
57. Crisis Simulation and Exercises: Prepare for crises through simulated scenarios.
58. Local and Regional Conflict Analysis: Analyze conflicts at local and regional levels.
59. OSINT Tool Development and Training: Create and teach OSINT software tools.
60. Machine Learning and AI for OSINT: Apply AI to enhance OSINT capabilities.
www.cibergy.com
Alex Lozano
EUROPEAN BUSINESS DATA
OSINT Cheat Sheet
GERMANY
RUSSIA SPAIN
NETHERLANDS SWITZERLAND
UNITED KINGDOM
ITALYFRANCE
Handelsregister - https://www.handelsregister.de
Bundesanzeiger - https://www.bundesanzeiger.de
Unternehmensregister - https://www.unternehmensregister.de 
Creditreform - https://firmeneintrag.creditreform.de
North Data - https://www.northdata.de
Companies House -https://www.gov.uk
Opencorporates - https://opencorporates.com
The Gazette- https://www.thegazette.co.uk
Company Check - https://www.companycheck.co.uk
Bizstats - https://bizstats.co.uk
Infogreffe - https://www.infogreffe.fr
Societe - https://www.societe.com
Pappers - https://www.pappers.fr
Verif - https://www.verif.com
BODACC - https://www.bodacc.fr
Registro delle Imprese - https://www.registroimprese.it
Infocamere - https://www.infocamere.it
Empresite - https://www.empresite.it
Opencorporates - https://opencorporates.com
Pagine Gialle - https://www.paginegialle.it
EGRUL - https://egrul.nalog.ru
Rusprofile - https://www.rusprofile.ru
Zachestnyibiznes - https://zachestnyibiznes.ru
List-org - https://www.list-org.com
Kontur Focus - https://focus.kontur.ru
Registro Mercantil Central - https://www.rmc.es
BORME - https://www.boe.es
Axesor - https://www.axesor.es
Librebor.me - https://librebor.me
Datoscif - https://www.datoscif.es
Kamer van Koophandel (KvK) - https://www.kvk.nl
OpenKvK - https://openkvk.nl
Drimble - https://drimble.nl
DNB Business Register - https://www.dnb.nl/en/public-register
Dun & Bradstreet - https://www.dnb.com
Zefix - https://www.zefix.ch
SIX Swiss Exchange - https://www.six-group.com
SHAB - https://www.shab.ch
Moneyhouse - https://www.moneyhouse.ch
Swissreg - https://www.swissreg.ch
PART 1
www.cibergy.com
SOCMINT TOOLS
 Cheat Sheet
Turbo Downloader
Download photos, videos and reels from
Instagram.
ESuit
Extensions to export followers, comments, likes,
emails, phones from profiles.
Toutatis
Tool that allows you to extract info such as
emails, phones, etc.
Instaloader
Scrapes public and private profiles, hashtags,
stories, feeds, media, metadata, etc.
Inteltechniques IG Search Tool
Search for detailed information on Instagram.
X (Twitter)
Instagram
Tik Tok
Alex Lozano
Facebook
PART 1
Tweetdeck (X Pro)
Interface where users can organize, monitor, and
interact with multiple Twitter feeds in real-time.
Deleted Tweet Finder
Search for deleted tweets across multiple
archival services.
Twint
Scraps data from X profiles without relying
on X’s API.
Warble 
Email Alerts for Twitter.
Inteltechniques Twitter Search Tool
Search for detailed information on Twitter.
Instant Data Scraper
Extracts data from web pages and exports it as
Excel or CSV files.
ESUIT
Facebook extension to download photos, videos,
comments, likes, posts, etc.
HaveIBeenZuckered
Check if your telephone number is present
within the Facebook data breach.
FB Sleep Stats
Gather data about Facebook users sleep patterns.
Inteltechniques Facebook Search Tool
Search for detailed information on Facebook.
Bravedown
Download videos and stories from top social media
platforms. 
Tik Tok Scraper
Scrape TikTok followers from any public profile.
Hashtag Analysis
Download posts and videos from TikTok for
a given set of hashtags over a period of time.
Export Comments
Exports comments from your social media
posts to Excel file.
OSINT Combine TikTok Quick Search 
Search usernames and hashtags on TikTok via a
browser.
www.cibergy.com
 The Ultimate
 OSINT Cheat Sheet
Maltego
Network analysis
Online monitoring
POI investigations
InGrav
PeopleMon
Pimeyes
Social media intelligence
Network analysis
POIs investigations
Reverse Image Search
POI Identification
Online monitoring
Skopenow
POI investigations
Social media intelligence
Situational awareness
NexusXplore
Social Links
Crimewall
Social media intelligence
Online monitoring
POI investigations
POI investigations
Situational awareness
Social network analysis
Alex Lozano
¿What is Facebook?
Facebook is a social media platform where people can
connect with friends, share photos and videos, post
updates, join groups, follow pages, chat with others,
and interact with their network.
Key Tips For Investigations
1.Always use sock puppets for Facebook investigations.
2.Start POI searches on Facebook as the primary social platform.
3. If unsuccessful, search for relatives, friends, groups or pages.
4. Identify the user’s ID as the first step. Do the same with pages.
5.Tagged pictures can provide extremely valuable information.
6.Use three dots on profile’s feed to find related topics and individuals.
7.Leverage Facebook’s advanced search options to narrow down results.
8. Inteltechniques Facebook Search Tool facilitates your searches.
9.Marketplace offers unique solutions for investigating fraud.
10.Monitor Facebook Live to analyze live events worldwide.
11.The Facebook data breach helps easily find profiles (+533 accounts).
12.Pivoting from FB to other social media platforms is key for success.
13.Add friends / click ads / like posts to avoid being blocked.
14.Document all findings with links and user/pages IDs.
Top Free Tools
Instant Data Scraper
Extracts data from web pages and exports it as Excel or CSV
files.
ESUIT
Facebook extension to download photos, videos, comments,
likes, posts, etc.
HaveIBeenZuckered
Check if your telephone number is present within the
Facebook data breach.
FB Sleep Stats
Gather data about Facebook users sleep patterns.
Inteltechniques Facebook Search Tool
Search for detailed information on Facebook.
Main Information Sources
Top Paid Tools
Profile Information
Friends & Connections
Photos & Videos
Check-ins & Location
Posts & Comments
Groups & Pages
Events & Activities
Communication Patterns
Tags & Mentions
Likes & Reactions
Timeline Analysis
Marketplace & Live
OSINT Investigations & Guidelines
Personal
Information
& Behavior
Social
Connections
& Network
POI Identification through personal data: names, locations...
Check interests and preferences through public interactions.
Identify habits, routines, and time-based behavior.
Review timelines for a history of significant events.
Establish social circles and associations through friends lists.
Investigate groups and pages to find interests and affiliations.
Identify tags to highlight relationships and key contacts.
Observe public conversations and comment threads.
Use tools to automate searches and visualizing social networks.
Map movements, routines, and frequently visited places.
Reveal locations, dates, and activities from public images.
Gain insights on attended activities and upcoming plans.
Access historical posts to track movements or behavior changes.
Facebook
Marketplace
Compare listings to reports to identify stolen goods.
Analyze listings to uncover patterns linked to organized crime.
Facebook
Live
Gather immediate insights into events as they unfold.
Identify key participants and understand public sentiment.
Location
& Movement
2024
www.cibergy.com
www.cibergy.com
Top Paid Tools
 THE ULTIMATE
 SOCMINT CHEAT SHEET
Alex Lozano
Top Free Tools
Turbo Downloader
Download photos, videos and reels from
Instagram.
ESuit
Browser extensions to export followers,
comments, likes, emails, phones from profiles.
Toutatis
Tool that allows you to extract info such as
emails, phones, etc.
Instaloader
Scrapes public and private profiles, hashtags,
stories, feeds, media, metadata, etc.
Toolzu
Analyze profiles, download content and view
accounts without logging in.
Dumpor
Analyze profiles, download content and view
accounts without logging in.
Instatracker
An Instagram tracker that logs any changes to
an Instagram account.
Social Blade
Search for detailed statistics and analytics.
¿What is Instagram?
Instagram is a social media platform where
people can share photos, videos, and stories
with their followers. It was launched in 2010
and is now owned by Meta Platforms.
Key Tips For Investigations
1.Always use sock puppets for Instagram investigations. Log in with Facebook.
2.Follow users / click ads / like posts to avoid being blocked.
3.Pivot to Instagram after starting POI searches on Facebook.
4. If unsuccessful, search for relatives, friends, or related users.
5.Use contacts syncing to reveal the Instagram profile linked to a phone number.
6. Identify the user’s ID as the first step. Do the same with relevant posts.
7.Tagged pictures can provideextremely valuable information.
8.Comments on post are often crucial to find hidden or personal information.
9.Always record stories and lives in real time. They disappear. 
10.Extract visible followers/following lists early to avoid losing access.
11.Use three dots on profile to find username changes and creation date.
12.Pivoting from IG to other social media platforms is key for success.
13.Document all findings with links and user/posts IDs.
Main Information Sources
Username & Handle
Bio, Contact & Links
Followers & Following Lists
Profile Photos
Photos & Videos
Tagged Posts
Reels (short videos)
Stories & Highlights
Live Streams
Captions & Comments
Geotagged Posts & Check-ins
Leaked Data
OSINT Investigations & Guidelines
Identity
Verification
Content &
Media
Analysis
Cross-reference username & profile name with other platforms.
Reverse image search profile pictures and post images.
Examine bio links for connected identities.
Analyze account age, followers, posting patterns.
Use tools or manually archive posts, stories, and highlights.
Log post caption, hashtags, tagged users, mentions, date/time.
Analyze visual content for geolocation clues and additional info.
Archive live-stream content if accesible (screen recording).
Manually or automatically map followers and following lists.
Map which users consistently tag or are tagged by the subject.
Map who regularly comments/likes content.
Trace mentions to uncover additional individuals or groups.
Monitor hashtags and geotagged posts for breaking events.
Cross-reference Instagram content with other platforms.
Use visual clues in photos/videos for geolocation.
Regularly scan for posts related to ongoing events of interest.
Network
Mapping
Geospatial &
Event
Monitoring
Social Links Crimewall
SOCMINT, POI investigations, and network analysis.
Usersearch.ai
OSINT and POI investigations.
Maltego 
Network analysis and social media monitoring.
Analyze posting times. Look for consistent behavior.
Examine language patterns (dialect, slang, emojis).
Compare frequency of stories vs feed posts.
Monitor engagement spikes and interpret activity.
Behavioral &
Temporal
Analysis
2025
Top Free Tools
Save From
Easily download and extract audio from YouTube
videos and shorts.
YouTube-Comments.io
Extract and filter comments from videos.
YouTube Comment Finder
Query terms and find specific comments posted
to a Youtube video.
Channel ID Comment Picker
Find YouTube Channel ID, and related
channel information and statistics.
MW Metadata
Obtain metadata from a video, creator, channel,
playlist...
Down Sub
Download subtitles from YouTube videos.
Internet Archive
Identify, play and gather details from delated
videos.
YouTube Channel Crawler
Find and filter YouTube channels.
Watan Network
Check in which countries a YouTube is blocked.
Unlisted Videos
Submit, search and watch unlisted videos.
Inteltechniques Videos Tool
Search for detailed information on YouTube.
Aware Online YouTube Search Tool
Search for detailed information on YouTube.
¿What is YouTube?
YouTube is a popular online video sharing
platform that enables users to upload, view,
share, comment, and engage with video
content. 
Key Tips For Investigations
1.Do not log in to Google when conducting YouTube investigations.
2. Identify the video ID as the first step. Do the same with channels, users, and playlists.
3.Reverse image search will provide valuable information about reach and impact.
4.Extracting comments is essential for further research.
5. Investigate video frames to gather additional details.
6.Consider extracting metadata for thorough documentation.
7. Investigate the profile/channel hosting the content.
8.Copies of videos on other platforms can reveal additional discussions or threats.
9.The video thumbnail is crucial for finding other copies.
10.Tools like Inteltechniques and Aware Online can streamline your searches.
11.Monitor YouTube Live to analyze live events worldwide.
12.Pivoting from YouTube to other social media platforms is key to success.
13.Document all findings, including links, video IDs, and channel IDs.
Main Information Sources
Video Content
Video Metadata
Channel Information
Video Comments
Audio Analysis
Collaborations
Linked External Content
Historical Video Archive
Trends, Interactions & Impact
Content Themes
Live Streams
Chats & Audience
OSINT Investigations & Guidelines
Profile &
Channel
Information
Content &
Media
Analysis
Check channel names and about sections to identify creators.
Investigate links to external websites and social media profiles.
Examine subscriber count and views to assess reach & influence.
Track content changes to spot evolving interests.
Analyze video content for visual evidence (faces, locations, clues).
Review videos frame-by-frame for missed information.
Use audio from videos to detect background sounds.
Review video metadata for keywords and timestamps.
Check thumbnails for text or hidden details.
Scan comments for key users, opinions and sentiment.
Watch live chats for active audience behavior and engagement.
Identify collaborators through shared videos or mentions.
Examine playlists and curated content for recurring themes.
Activity &
Location
Use geotags and landmarks to find locations.
Track live-streamed events for real-time details.
Gather immediate insights into events as they unfold.
Identify key participants and understand public sentiment.
Interaction &
Engagement
YouTube 
Live
Alex Lozano
2024
www.cibergy.com
Alex Lozano
8 Excellent Youtube 
Channels On OSINT
Bendobrown
Gralhix - Sofia
Santos
A collection of solutions to OSINT exercises.
Videos about OSINT tools and analysis.
Tips on geolocation techniques and real-life examples.
Forensic
OSINT
The OSINT
Curious Project
Gary Ruddell
OSINT Dojo
Authentic8
Cody Bernardy
Videos on OSINT, maps, and data.
Learn geolocation, satellite imagery, and analysis.
OSINT tutorials for digital investigations.
Explore OSINT with a forensic focus.
Learn OSINT tools for investigations.
Resources for professionals and tech enthusiasts.
OSINT tips and tools for beginners.
10 minute videos on OSINT skills and tools.
Quality OSINT blogs, and tutorials.
Short, actionable OSINT video tutorials.
Discover new tools and methods easily.
Explore cyber intelligence tools and techniques.
Free OSINT guidance for beginners.
Training on OSINT tools and methods.
Skill-building OSINT challenges and tutorials.
Engaging OSINT podcasts for continuous learning.
Motivating deeper exploration of OSINT topics.
Essential tips on OSINT techniques and skills.
Real-life OSINT investigations for practical learning.
Step-by-step tutorials on OSINT tools.
Engaging OSINT challenges to test your skills.
www.cibergy.com
Alex Lozano
Maltego
Social Links
Crimewall
Perform OSINT and SOCMINT across 500+ sources
Graph, table, and map visualizations for insights
ML-driven analysis & real-time monitoring
Skopenow
NexusXplore
DarkOwl
Vision UI
Talkwalker
Blackdot
Solutions Videris
Onyx Fivecast
Perform rapid OSINT searches and complex investigations
Collect, cross-correlate, and store intelligence
Monitor and analyze large volumes of data instantly
Instant aggregated data for actionable insights
Object recognition, analytics and automated reports
Visualize intelligence in a variety of layouts
GEOINT for real-time, location-specific insights
Robust public and corporate records access
Secure, anonymized dark web and OSINT browsing
Real-time threat monitoring with darknet data
Automated alerts and customizable, secure search tools
Advanced exposure metrics to assess cyber risk
Powerful social listening for team-wide data access
Effective media monitoring and brand performance
Benchmarking to track industry and competitors
OSINT platform for efficient, large-scale investigations
Visualize networks and corporate links for clear insights
Rapid, AI-driven risk detection and prioritization
Fast, broad digital footprint mapping for verification
AI-drivenrisk assessment across vast data sources
Scalable OSINT solution for deep data collection
GREAT OSINT PLATFORMS
For Advanced Investigations
www.cibergy.com
Before diving into dark web research,
define specific objectives. Knowing exactly
what you're looking for, whether it's: 
Tracking illegal activity.
Identifying cyber threats.
Gathering intelligence on a specific group.
Security is essential when accessing the dark web:
Use virtual machines (VMs) to minimize risks of
malware or tracking.
Employ Tor Browser or I2P for anonymous browsing.
Consider using VPNs to add an extra layer of privacy.
Enable strong firewalls, and use multi-factor
authentication to secure your system.
You can identify relevant marketplaces,
forums, or sites through the following
methods:
Search engines for the dark web like Ahmia.fi.
OSINT databases that collect and track known
dark web sites and domains.
Join dark web forums or communities where
users exchange information.
Extracting and analyzing metadata from dark web
resources can provide key insights:
Analyze site uptime, traffic, and server details using tools
like OnionScan to understand vulnerabilities and identify
patterns.
Review timestamps, file formats, and server responses to
gather technical information about sites or transactions.
Collect Bitcoin transaction metadata if investigating
cryptocurrency payments related to illicit activities.
Monitoring individuals or groups is an 
important part of dark web investigations:
Observe chatter in forums, marketplaces, and on
social media platforms (both surface and dark
web).
Use automated web crawlers and monitoring
tools to track activity related to the keywords or
targets of interest.
Leverage OSINT tools that scrape the dark web for
information on particular topics, such as threat
actors, vendors, or criminal activities.
Many illicit transactions on the dark web are
conducted using cryptocurrencies, especially
Bitcoin:
Use blockchain explorers like Blockchair or
CipherTrace to trace wallet addresses linked to dark
web markets.
Look for patterns of movement or laundering activities.
Link crypto wallets to known marketplaces or suspect
individuals by tracking addresses and transaction
histories.
6 KEY OSINT STEPS 
For Investigating the Dark Web
Alex Lozano
Define Clear Objectives Maintain OPSEC
Identify Relevant Dark Web
Marketplaces and Forums Gather and Analyze Metadata
Monitor Threat Actors and
Activity
Analyze Cryptocurrency 
Transactions
www.cibergy.com
www.cibergy.com
@Cibergy
Strategic Due Diligence
A comprehensive assessment process used
primarily in mergers and acquisitions (M&A) to
evaluate the strategic fit, value, and potential risks
associated with a target company. 
Employee Due Diligence
The process of evaluating and verifying the
background, qualifications, and suitability of
potential or current employees to ensure they meet
the standards for their roles within an organization.
Management Due Diligence (MDD)
Evaluating the capabilities, track record, and
potential of the management team of a target
company, in the context of mergers and
acquisitions (M&A), investments, or partnerships.
Customer Due Diligence (CDD)
Verifying the identity of customers and assessing
the potential risks they pose in terms of money
laundering, terrorist financing, and other financial
crimes. 
Investment Due Diligence
The process of evaluating an investment opportunity
to ensure that it aligns with the investor’s goals, risk
tolerance, and expected returns.
ESG Due Diligence
The process of assessing a target company or
investment's environmental, social, and governance
(ESG) factors to evaluate its sustainability practices,
ethical impact, and potential risks. 
Types of Investigations.
Due Diligence.
It is essential to use data extraction
tools to gather relevant information
about the target organization, asset,
or individuals.
Due diligence investigations include
the analysis of financial reports, social
media, legal documents, news, and
other data sources.
Alex Lozano
The Ultimate OSINT & AI
Cheat SheetPART 1:
AI FOUNDATIONS
Alex Lozano
OSINT & AI Strategies
Data Collection
AI algorithms automate data gathering from online sources.
Natural Language Processing (NLP) for extracting information
from unstructured text data.
Data Analysis
Machine learning and deep learning for quick analysis of
OSINT data.
Identify patterns, trends, anomalies, and correlations within
the data.
Image and Video Analysis
Automatically detect and analyze objects, faces, logos, and
text within multimedia context.
Sentiment Analysis
Analyze sentiment expressed in text data collected from
social media and news articles.
Helps gauge public opinion, detect emerging trends, and
assess potential impact.
Identification
Automatically identify people, organizations, or locations
mentioned in OSINT data.
Entity Recognition
Track activities of specific individuals or groups.
Identify potential threats by recognizing critical entities.
Risk Assessment
Assess credibility and reliability of OSINT sources using AI
algorithms.
Key Definitions
Artificial 
Intelligence (AI)
Natural Language
Processing (NLP)
Machine 
Learning (ML) Generative AI Computer 
Vision
Technology that makes
machines smart, allowing
them to do tasks that
usually need human
thinking.
A technology that helps
computers understand and
work with human language,
like speech and text.
A way for computers to
learn from data and
improve their performance
over time without being
explicitly programmed.
A type of AI that creates
new content, such as
images, music, or text,
based on what it has
learned.
A technology that enables
computers to see, interpret,
and understand the visual
world, like recognizing
objects in photos.
Content Generation
Write reports, generate summaries, or produce
visualizations based on the data collected by OSINT.
OSINT & AI Tools
Key Considerations
1 - Avoid using AI tools for sensitive data to prevent exposure.
2 - Choose AI tools that fit your investigation’s needs.
3 - Weigh costs of AI against doing it manually.
4 - Double-check sources to avoid incorrect information.
5 - Always confirm AI findings with human review.
6 - Regularly evaluate AI’s impact on investigation quality.
7 - Use AI to speed up, not replace, human analysis.
8 - Limit AI use to avoid over-reliance on it.
9 - Watch for biases in AI-generated insights.
10 - Be cautious of over-complicating simple tasks with AI.
ChatGPT
Rapidly analyze vast data for actionable insights.
Automate and enhance threat intelligence gathering.
Identify patterns and trends in open-source data.
Copilot
Simplify complex data for rapid intelligence interpretation.
Generate clear insights from diverse information sources.
Provide on-demand assistance for thorough data analysis.
Geospy
FaceCheck.id
Consensus
AskNews App
MyMapAI
AI tool to analyze images and determine their location.
Interprets details and correlates with geospatial data.
Visually displays the exact location on the map.
Reverse image search tool focused on faces and people.
Upload a photo to find matching images on the internet.
Intuitive, no advanced technical knowledge required.
Academic search engine powered by AI.
Search over 200M papers across all domains of science.
Access research-backed insights for intelligence analysis.
Compare global news perspectives (50,000+ sources).
Track event development and sentiment trends over time.
Map real-time interactions across entities and stories.
Create context-rich diagrams from diverse data sources.
Collaborate on intelligence maps in real-time.
Summarize web data for quick intelligence visualization.
www.cibergy.com
www.cibergy.com
Social Media
Automation tools accelerate
investigations and minimize routine
tasks.
Automation
Gather social media data from platforms
such as Facebook, LinkedIn, X,
Instagram, TikTok, and more.
You can establish specific parameters
and receive notifications for relevant
activities.

Mais conteúdos dessa disciplina