OSINT Cheat Sheet
UGLABS // Ubuntu Guard Cyber // Compiled by Sirbow
Overview & Intelligence Cycle
Part 1What is OSINT?
OSINT stands for Open Source Intelligence // the practice of collecting and analyzing information from publicly available sources to generate actionable intelligence. It is systematic, lawful, and applicable across security, investigation, journalism, and business contexts.
Top Sources
- People Identifiers // Names, aliases, email addresses, phone numbers, employment and education history.
- Social Media // Facebook, X (Twitter), Instagram, LinkedIn, TikTok, Telegram, and others.
- News & Publications // Websites, newspapers, government reports, white papers, statistical data.
- Web Content // Text, images, video, documents, metadata, multimedia.
- Forums & Blogs // Community discussions, opinions, and user-generated content.
- Dark Web // .onion services, leak sites, threat actor forums (use with OPSEC).
OSINT Use Cases
- Security & Threat Intel // Identifying risks through analysis of publicly available data.
- Investigations // Gathering evidence and building intelligence pictures.
- Competitive Intelligence // Market trends, competitor activity, and consumer patterns.
- Reputation Management // Monitoring brand and personal exposure online.
- Journalism & Research // Fact verification, source corroboration, investigative reporting.
- Disaster & Crisis Response // Situational awareness and impact assessment.
The Intelligence Cycle
| 1 Planning & Direction | 2 Collection | 3 Processing | 4 Analysis & Production | 5 Dissemination |
|---|---|---|---|---|
| Define objectives, identify requirements, select sources, develop a plan. | Gather data overtly and covertly using diverse technological resources. | Organize data, remove redundancies, normalize formats, document sources. | Identify patterns, assess reliability, contextualize data, generate insights. | Create reports, tailor to audience, solicit feedback, update methods. |
Best Practices
Main Users of OSINT
| Governments | Community sentiment • Risk and threat analysis • Natural disaster response • Trending activities • Critical information monitoring |
| Corporations | Personnel protection and screening • Due diligence • Fraud investigations • Supply chain risk • Asset and brand protection |
| Law Enforcement | Crisis response • Counter violent extremism • Public safety • Deep investigations |
| Investigators & Journalists | Verification • Investigative journalism • Private investigations • Uncovering facts |
Foundations
Intelligence Analyst SkillsIntelligence Analyst Key Skills
| 1 Critical Thinking | 2 Research & Analysis | 3 Technical Skills | 4 Problem-Solving | 5 Communication |
|---|---|---|---|---|
| Evaluate information critically for reliability, relevance, and implication. | Gather from diverse sources and analyze datasets to draw conclusions. | Proficiency with analytical tools, databases, and data collection software. | Provide creative and strategic solutions to complex investigative problems. | Convey findings clearly in both written reports and oral briefings. |
Intelligence Disciplines
OSINT // Open Source Intelligence
Printed materials, electronic platforms, broadcast media, and publicly accessible online sources.
SOCMINT // Social Media Intelligence
Branch of OSINT focused on gathering and analyzing intelligence from social media platforms.
HUMINT // Human Intelligence
Direct interaction with individuals to collect valuable knowledge or access sensitive information.
GEOINT // Geospatial Intelligence
Analysis of geospatial data combining imagery, mapping, and GIS to understand Earth-surface activities.
IMINT // Imagery Intelligence
Collection and analysis of visual imagery from satellites, aircraft, drones, and other imaging systems.
SIGINT // Signals Intelligence
Interception and analysis of electronic signals, radio transmissions, radar emissions, and telecom data.
Internet Categories
Surface Web
Normal web visible to all users • Indexed by search engines • Approx. 4% of the internet
Deep Web
Not indexed by search engines • Access restricted to authorized users • Databases, cloud storage, sensitive data
Dark Web
Accessed through Tor Browser and similar tools • Anonymous browsing • High-risk environment requiring OPSEC
Investigator Setup Essentials
- Antivirus / EDR // Windows Defender, ClamAV, Malwarebytes
- VPN // Mullvad, ProtonVPN (no-log providers preferred)
- Virtual Machines // Kali Linux, Tails, Trace Labs OSINT VM, CSI Linux
- Browsers // Brave, Firefox hardened, Tor Browser
- Sock Puppets // Fake identity for investigative use: FakeNameGenerator, ThisPersonDoesNotExist
Key Browser Extensions
uBlock Origin
RevEye
Exif Viewer Pro
User-Agent Switcher
Wayback Machine
FireShot
Shodan
Privacy Badger
Vortimo
Cookie AutoDelete
Sputnik
Hunchly
Google Translate
Hive AI Detector
Search Engines
General & SpecializedGeneral Search Engines
Google Dork Operators
" " Exact Match
Search for an exact word or phrase.
Ex: "John Doe" "Ubuntu Guard"
AND / OR
Combine or alternate search terms.
Ex: "OSINT" AND "Training" / "Apple" OR "Microsoft"
- Exclude
Exclude specific words from results.
Ex: Jaguar speed -car
* Wildcard
Matches any word or phrase.
Ex: OSINT * cheat sheet
.. Range
Search between two values.
Ex: crime rate "2020..2025"
site:
Restrict to a specific domain.
Ex: site:linkedin.com
filetype:
Search for specific file extensions.
Ex: "OSINT" filetype:pdf
related:
Find pages related to a domain.
Ex: related:osintframework.com
inurl: / intitle: / intext:
Target specific URL, title, or body content.
Ex: inurl:admin intitle:login
cache:
View cached version of a page.
Ex: cache:example.com
Effective Search Principles
- 1Use multiple search engines // Google, Yandex, and Bing return different results.
- 2Use Advanced Search and operators to narrow scope.
- 3Use regional engines // Baidu for China, Yandex for Russia.
- 4Try name variations // nicknames, abbreviations, transliterations.
- 5Search in multiple languages relevant to the subject.
- 6Combine multiple data types // names, phones, emails, handles.
- 7Check cached and archived versions of removed pages.
Useful Filetypes
PDF · DOC · DOCX · XLS · XLSX · PPT · PPTX · TXT · RTF · CSV · KML · KMZ · ZIP · JPG · PNG
Dark Web Search Engines
Specialized Search Engines
Email OSINT Tools
Email Intelligence| Tool | Purpose | Tool | Purpose | Tool | Purpose |
|---|---|---|---|---|---|
| GHunt | Google account OSINT | EPIEOS | Email reverse lookup | OSINT Industries | Email & phone reverse lookup |
| Castrick Clues | Email reverse lookup | Holehe | Check email across sites | Mailcat | Find email by nickname |
| EmailRep.io | Email reputation scoring | HaveIBeenPwned | Data breach search | DeHashed | Credential breach search |
| BreachDirectory | Data breach search | Whoxy | WHOIS reverse lookup | Reverse Whois | Domain WHOIS search |
| ScamSearch.io | Scammer database | ThatsThem | People search engine | osint.rocks | Email tools aggregator |
| Skymem | Find company emails | SignalHire | Professional email finder | Hunter.io | Domain email finder |
| ProtonMail | Secure investigation email | Addy.io | Email aliasing / masking | SimpleLogin | Email alias service |
Phone Number OSINT Tools
Phone Intelligence| Tool | Purpose | Tool | Purpose | Tool | Purpose |
|---|---|---|---|---|---|
| Free Carrier Lookup | Carrier identification | CarrierLookup | Carrier identification | Truecaller | Number lookup and ID |
| EPIEOS | Phone reverse lookup | OSINT Industries | Phone reverse lookup | Castrick Clues | Phone reverse lookup |
| PhoneInfoga | Phone info gathering framework | NumLookup | Reverse phone lookup | osint.rocks | Multi-tool OSINT suite |
| General search engine | Bing | General search engine | UniversalSearchBot | Telegram search bot | |
| WhitePages | Phone numbers database | DeHashed | Data breach search | SpyDialer | Free reverse lookup |
| Ignorant | Check phones across sites | Detectdee | Check phone on platforms | HaveIBeenZuckered | Facebook data breach check |
Dark Web OSINT Tools
Dark Web Intelligence| Tool | Purpose | Tool | Purpose | Tool | Purpose |
|---|---|---|---|---|---|
| Tor Browser | Dark web access browser | Ahmia.fi | Dark web search engine | Onion.live | Onion site directory |
| Tor.link | Tor-to-web gateway | Telemetr.io | Telegram channel search | HaveIBeenPwned | Data breach checker |
| DeHashed | Credential breach search | LeakOSINT | Telegram leak search bot | UniversalSearchBot | Telegram search bot |
| DeepDarkCTI | Dark web CTI sources | OCCRP Aleph | Financial and leak data search | PGP Tool | Encrypt, decrypt, verify PGP |
| Intelligence X | Paste, leak, and dark web search | Library of Leaks | Leaks & breach database | TorCrawl.py | Crawl and extract .onion pages |
6 Key OSINT Steps for Investigating the Dark Web
1. Define Clear Objectives
Before diving into dark web research, define specific objectives // tracking illegal activity, identifying cyber threats, or gathering intelligence on a group or individual. Know exactly what you are looking for before you start.
3. Identify Relevant Marketplaces & Forums
Use dark web search engines like Ahmia.fi. Use OSINT databases that collect and track known dark web sites. Join relevant forums or communities where users exchange information.
5. Monitor Threat Actors
Observe chatter in forums, marketplaces, and social media. Use automated crawlers and monitoring tools. Track threat actors and criminal activity over time.
2. Maintain Strict OPSEC
Use virtual machines to minimize malware and tracking risk. Use Tor Browser for anonymous browsing. Layer with a no-log VPN. Enable strong firewalls and MFA.
4. Gather and Analyze Metadata
Analyze site uptime, traffic, and server details. Review timestamps, file formats, and server responses. Collect crypto transaction metadata where relevant. Identify patterns revealing vulnerabilities.
6. Analyze Cryptocurrency
Use blockchain explorers // Blockchair, OXT, Breadcrumbs.app. Trace wallet addresses linked to dark web markets. Look for laundering patterns. Link wallets to known marketplaces or suspects.
SOCMINT // Social Media Intelligence
Social Media ToolsFacebook
- Instant Data Scraper // Extract data from pages, export as CSV/Excel
- HaveIBeenZuckered // Check if your phone was in the Facebook breach
- Facebook Advanced Search // Search posts, photos, videos, places by filter
- Who Posted What // keyword + date search for historical Facebook posts
Instagram
- Instaloader // Scrape public profiles, hashtags, stories (CLI tool)
- StorySaver.net // Download and archive stories
- Osintgram // Extract info from public Instagram profiles (CLI)
- Picuki // Browse Instagram profiles without an account
X (Twitter)
- X Advanced Search // twitter.com/search-advanced // date, location, user filters
- Twayback Machine // Recover deleted tweets via Wayback archive
- SocialBlade // Track follower growth and activity metrics
- Bot Sentinel // Detect bot accounts and inauthentic behavior
TikTok & LinkedIn
- TikTok Quick Search // OSINT Combine tool for username and hashtag lookups
- TikTok Scraper // Scrape followers from any public TikTok profile
- LinkedIn Sales Navigator // Advanced people and company search
- Recruit'em // X-ray search LinkedIn profiles via Google dorking
Telegram
- TGStat // Channel and group statistics
- Telemetr.io // Channel search and analytics
- IntelligenceX Telegram // Search Telegram channels for leaked data
- UniversalSearchBot // Telegram bot for phone and username search
Username / Cross-Platform
- Sherlock // Hunt usernames across 300+ social media platforms (CLI)
- Maigret // Collect profile info from username across sites
- WhatsMyName // Check username availability across services
- Namechk // Check username across major platforms
Browser Extensions for OSINT
Browser Tools| Extension | Purpose | Extension | Purpose | Extension | Purpose |
|---|---|---|---|---|---|
| uBlock Origin | Block ads and trackers | Cookie AutoDelete | Automatic cookie control | Google Translate | In-page text translation |
| RevEye | Reverse image search | Privacy Badger | Block tracking scripts | Exif Viewer Pro | View image metadata / EXIF |
| Wayback Machine | Access archived snapshots | FireShot | Full-page screen capture | User-Agent Switcher | Modify browser user-agent |
| Shodan | Site tech & exposure info | Sputnik | Search digital identifiers | Vortimo | Web content analysis |
| Hunchly | Capture and log web pages | Bot Sentinel | Detect bots on X/Twitter | Hive AI Detector | Detect AI-generated media |
| Instant Data Scraper | Extract table data from pages | Context Search | Quick search selected text | Video DownloadHelper | Download embedded video |
OSINT Resources
Books, Blogs, VMs & ToolsRecommended Books
- 1OSINT Techniques // Michael Bazzell (updated annually)
- 2Deep Dive // Rae Baker
- 3Hunting Cyber Criminals // Vinny Troia
- 4We Are Bellingcat // Eliot Higgins
- 5OSINT Methods and Tools // Nihad A. Hassan & Rami Hijazi
- 6Operator Handbook // Joshua Picolet
- 7How to Find Out Anything // Don MacLeod
Podcasts
Security Now
NeedleStack
The OSINT Bunker
The Pivot
Layer 8
The World of Intelligence
ShadowDragon
Darknet Diaries
OSINT Virtual Machines
Kali Linux VM
Trace Labs OSINT VM
CSI Linux VM
Tsurugi VM
OSINTUX VM
Sherlock Linux VM
Privacy OS
Tails OS
Whonix
Blogs & News
Tool Collections & Frameworks
AI-Powered OSINT
AI IntelligenceKey AI Concepts for OSINT
Artificial Intelligence (AI)Technology enabling machines to perform tasks that normally require human cognition.
Natural Language Processing (NLP)Technology that helps computers understand, interpret, and work with human language.
Machine Learning (ML)Systems that learn from data and improve performance over time without explicit programming.
Generative AIAI that creates new content // text, images, code // based on training data.
Computer VisionTechnology that enables computers to interpret and analyze visual information from images and video.
AI Strategies in OSINT
Data Collection
AI algorithms automate large-scale data gathering. NLP extracts intelligence from unstructured text.
Data Analysis
ML identifies patterns, trends, anomalies, and correlations across large datasets rapidly.
Image & Video Analysis
Detect and analyze objects, faces, logos, text, and geolocation within multimedia.
Sentiment Analysis
Analyze tone and sentiment in social media, forums, and public sources.
Risk Assessment
Assess source credibility, flag anomalies, and prioritize high-risk indicators automatically.
AI OSINT Tools (2025)
Analyze data, summarize findings, generate queries, assist in pattern recognition.
AI geolocates images // analyzes visual content to determine the location where a photo was taken.
Reverse image search focused on facial recognition. Upload a photo to find matching images online.
Compare global news perspectives across 50,000+ sources. Track event development over time.
Rapidly interpret complex data and generate clear intelligence summaries.
AI Considerations for OSINT
- 1Never submit sensitive subject data to public AI tools // data may be logged or used for training.
- 2Choose AI tools that fit the specific needs of your investigation.
- 3Double-check all AI-generated outputs against primary sources.
- 4Always confirm AI findings with human review before acting on them.
- 5Use AI to accelerate, not replace, human analytical judgment.
- 6Watch for hallucinations // AI can fabricate plausible but false information.
- 7Watch for inherent bias in AI-generated insights and recommendations.
- 8Regularly evaluate the quality impact of AI on your investigations.
Operational Security
OPSEC for InvestigatorsWhat is OPSEC?
Operational Security (OPSEC) is a systematic process that identifies and protects sensitive information from adversaries to prevent exploitation, maintain anonymity, and keep activities undetected.
OPSEC = software + hardware + deliberate practices
Key OPSEC Principles
- 1Always practice OPSEC regardless of how trivial an investigation seems.
- 2Tailor OPSEC to the specific activity or investigation.
- 3Assume all online activities are being monitored.
- 4OPSEC is a continuous practice // it must become second nature.
- 5Continuously adapt as new threats and techniques emerge.
- 6Assess risks before sharing any information online or offline.
- 7Keep research separate from personal and professional accounts.
- 8Research OSINT tools thoroughly before using them // some tools alert targets.
Recommended OPSEC Tools
Web Browsers
Brave • Firefox (hardened) • Tor Browser
Browser Addons
uBlock Origin • Privacy Badger • User-Agent Switcher • Canvas Blocker • Cookie AutoDelete
VPNs
Mullvad VPN • ProtonVPN • IVPN (no-log, audited providers)
Password Management
Bitwarden (cloud) • KeePassXC (local) // unique credentials per account, encrypted vault
Secure Communications
ProtonMail • Tutanota • Signal (messaging)
Sock Puppets
FakeNameGenerator • ThisPersonDoesNotExist // Separate devices or VMs recommended
OSINT Best Practices
OPSEC is Your Shield
- Reduce adversary exploitation risk
- Stay anonymous // hide who you are
- Keep activities hard to trace
The Golden Rule of Verification
- Accuracy of information is paramount
- Not all sources are trustworthy or reliable
- Verified data drives effective decisions
Build Technical Skills
- Master essential OSINT tools and platforms
- Learn advanced search strategies and dorks
- Practice regularly across different contexts
Stay Focused on Objectives
- Understand the goals and priorities upfront
- Gather the most valuable intelligence first
- Tailor intelligence output to the audience
Pivot, Pivot, Pivot
- Transition flexibly between data points
- Gather extensive, confirmed data
- Follow leads wherever they take you
Stay Current
- Join an OSINT community or forum
- Monitor social media, read blogs, attend workshops
- Tools and platforms change // so must your skills
Think Creatively
- Consider unconventional sources and methods
- Challenge assumptions about data location
- Apply lateral thinking to complex investigations
Document Everything
- Keep thorough notes of all findings
- Record sources used and methodologies applied
- Ensures transparency, reproducibility, and legal use
Brand Intelligence
Reputation & Brand MonitoringBrand OSINT Strategies
- 1Real-Time Monitoring
Continuously scan social media, forums, news, and review platforms for brand mentions. - 2Sentiment Analysis
Categorize mentions as positive, negative, or neutral using OSINT and AI tools. - 3Crisis Management
Early detection of negative mentions allows brands to respond before escalation. - 4Competitor Insights
Gather intelligence on competitor activities, strategies, and public perception. - 5Influencer Mapping
Identify key influencers, bloggers, and thought leaders with significant audience reach. - 6Customer Feedback
Collect and analyze open-source customer feedback for product and service improvement. - 7Market Trend Analysis
Track emerging trends and predict market direction from open-source signals.
Why Brand Intelligence Matters
Customer Trust & Loyalty
A strong reputation builds trust and encourages repeat business.
Competitive Advantage
Reputation influences consumer decisions between similar products and services.
Crisis Resilience
Strong brands weather negative events more effectively with early OSINT monitoring.
Talent Attraction
Organisations with strong reputations attract better candidates.
Financial Performance
Brand equity directly impacts pricing power, market position, and investor confidence.
Risks of Poor Brand Reputation
Decreased Sales
Brand Devaluation
Social Media Backlash
Loss of Trust
Employee Turnover
Legal Scrutiny
Negative Media Coverage
Competitive Disadvantage
OSINT for Executive Protection
VIP Security IntelligenceVIP Individuals
| Executives & CEOs | Political Figures | Celebrities | High Net Worth Individuals |
| Dignitaries | Professional Athletes | Musicians & Actors | Other VIPs |
7 Essential OSINT Steps for Exec Protection
- 1Personal Information & Media Analysis
Identify exposed personal info, relatives, associates. Check for address, vehicle, email, phone, and credential exposure. - 2Threat Detection & Risk Monitoring
Monitor online chatter, social media, and forums for any threats or hostile sentiment targeting the individual. - 3Social Media Vulnerability Assessment
Explore executive and family social media profiles for habits, interests, routines, and potential vulnerabilities. - 4Travel & Accommodation Risk Assessment
Assess security risks for travel destinations, transportation, and accommodation arrangements. - 5Reputation & Media Monitoring
Monitor mentions, reviews, and news coverage related to the executive's reputation and activities. - 6Cybersecurity Threat Identification
Identify compromised accounts, leaked credentials, or indicators of cyber threats targeting the individual. - 7Physical Security & Vulnerability Mapping
Identify potential vulnerabilities, access points, and emergency routes for key locations.
Primary Risks to Detect
Personal Data Exposure
Social media containing photos, locations, daily activities, and network connections.
Exposed Home Address
Allows malicious individuals to locate and potentially harm the subject at their residence.
Exposed Email or Phone
Can lead to harassment, targeted phishing, or extortion campaigns.
Predictable Routine
Adversaries can anticipate movements and exploit predictable patterns for physical access.
Exposed Credentials
Unauthorized access to sensitive information, financial accounts, or critical systems.
Threat Categories
Physical: Assault, kidnapping, burglaries, harassment, corporate espionage.
Digital: Data breaches, cyber attacks, reputational damage from leaked information.
Indirect: Threats against family, business threats, mishandled crises.
Digital: Data breaches, cyber attacks, reputational damage from leaked information.
Indirect: Threats against family, business threats, mishandled crises.