Osint Research Tools
Osint Research Tools
Research Tools
for Threat Intelligence
21 OSINT RESEARCH TOOLS
Introduction
To help investigators make use of the vast expanse of information available on the
surface, deep and dark web, Authentic8 experts have curated a list of the most
useful tools. With these resources, investigators can simplify their research and
improve productivity.
Table of Contents
1. OSINT Framework: Find Free OSINT Resources ..................................................................................................... 3
2. IDA Pro: Perform State-of-the-Art Binary Code Analysis ....................................................................................... 3
3. Creepy: Gather Geolocation Information ..................................................................................................................4
4. Maltego Transform Hub: Mine, Merge and Map Information.................................................................................4
5. DNSdumpster: Find and Look Up DNS Records .....................................................................................................5
6. TinEye: Reverse Image Search ....................................................................................................................................5
7. Shodan: The Search Engine for the IoT .....................................................................................................................6
8. Wayback Machine: Explore Billions of Webpages...................................................................................................6
9. Have I Been Pwned: Find Out if Your Account Has Been Compromised .......................................................... 7
10. CipherTrace: Follow the Money ................................................................................................................................. 7
11. Voter Records: Search Anyone’s Public Records....................................................................................................8
12. Whitepages: Find People and Perform Background Checks ..............................................................................8
13. Fake Name Generator: Disguise Your Identity........................................................................................................9
14. CityProtect: Explore Crime Maps ..............................................................................................................................9
15. Torch Search Engine: Explore the DarkNet .......................................................................................................... 10
16. Dark.fail: Go Deeper into the Darknet .................................................................................................................... 10
17. PhishTank: Use PhishTank to Research Suspected Phishes ............................................................................... 11
18. HoneyDB: Community-Driven Honeypot Sensor Data Collection .................................................................... 11
19. ThreatMiner: IOC Lookup and Contextualization................................................................................................. 12
20. VirusTotal: Analyze Suspicious Files and URLs ................................................................................................... 12
21. ExploitDB: The Most Comprehensive Exploit Collection ................................................................................... 13
Silo for Research: Secure, Anonymous Online Investigations................................................................................. 14
21 OSINT RESEARCH TOOLS
USE CASE
When you plug a piece of data (such as an
email address, phone number, name, etc.)
into the framework, it returns all known online
sources that contain information relevant
to that data. OSINT Framework also offers
a list of potential resources where more
information related to that particular source
can be found.
USE CASE
An incident response team loads a malicious
artifact found on a breached server into
IDA Pro to further analyze and understand
its behavior, potential damage and method
of traversal. IDA Pro can also be used as
a debugger to aid analysts in reading and
examining the hostile code.
3
21 OSINT RESEARCH TOOLS
USE CASE
Once the plugin is configured, a user can feed
the tool a social media artifact. Creepy draws
all available locations on the map, allowing the
user to see where the devices were located
when the information was posted.
WHAT IT IS
Integrate data from public sources,
commercial vendors and internal sources via
the Maltego Transform Hub. All data comes
pre-packaged as Transforms, ready to be
used in investigations. Maltego takes one
artifact and finds more.
USE CASE
A user feeds Maltego domain names,
IP addresses, domain records, URLs or
emails. The service finds connections and
relationships within the data and allows
users to create graphs in an intuitive point-
and-click logic.
4
21 OSINT RESEARCH TOOLS
WHAT IT IS
DNSdumpster is a free domain research tool
that can discover hosts related to a domain.
Finding visible hosts from the attackers’
perspective is an important part of the
security assessment process.
USE CASE
After a user enters a domain name,
DNSdumpster identifies and displays all
associated subdomains, helping map an
organization’s entire attack surface based on
DNS records.
WHAT IT IS
TinEye is an image-focused web crawling
database that allows users to search by image
and find where that image appears online.
USE CASE
An investigator uploads an image to TinEye
or searches by URL. TinEye constantly
crawls the web and adds images to its
extensive index (as of August 2021, over 48
billion images).
5
21 OSINT RESEARCH TOOLS
USE CASE
Shodan helps researchers monitor all
devices within their network that are directly
accessible from the internet and therefore
vulnerable to attacks.
USE CASE
Suppose a website was seized by the FBI,
but the original content is no longer there.
Researchers can use Wayback Machine to
reveal information that the site may have
contained prior to the raid.
6
21 OSINT RESEARCH TOOLS
USE CASE
Users can securely enter email addresses
and passwords to find out if they have been
hacked. The site returns a complete list of
breaches where specific accounts have been
exposed, and it lists what types of data (email
addresses, names, passwords, locations, etc.)
have been stolen.
WHAT IT IS
Maltego CipherTrace is a popular security
research and forensics tool that uses the
Bitcoin blockchain to track funds. CipherTrace
uses identifiers for criminal, mixer, dark
market, gambling, ATM and exchange
activities. It comes in the form of a Maltego
Transform plugin.
USE CASE
Create directed graphs to track an asset's
final destination, even when a Bitcoin mixer
attempts to launder the funds.
7
21 OSINT RESEARCH TOOLS
USE CASE
A researcher could gain comprehensive
information about any person’s affiliations,
location and connections.
USE CASE
A useful tool for verifying that the persons a
researcher is dealing with are who they say
they are. Investigations can locate people
and businesses, verify their addresses,
look up phone numbers and even perform
complete background checks.
8
21 OSINT RESEARCH TOOLS
USE CASE
A fake identity can be useful for filling out
online forms without giving out personal
details, using it as a pseudonym on the
internet, testing payment options with
randomly generated credit card numbers and
all other types of research where an analyst
doesn’t want to expose his or her real identity.
USE CASE
A user can analyze quantified criminal
behavior in a geographic area over time to
help build an intelligence-lead brief.
9
21 OSINT RESEARCH TOOLS
USE CASE
Torch promises peace of mind to researchers
who venture into the dark web to explore
.onion sites. It also doesn't censor results — so
investigators can find all types of information
and join discussion forums to find out more
about current malware, stolen data for sale or
groups who might be planning a cyberattack.
USE CASE
Tor admins rely on Dark.fail to disseminate
links in the wake of takedowns of sites like
DeepDotWeb. Researchers can use Dark.fail
when exploring sites that correlate with the
hidden service.
10
21 OSINT RESEARCH TOOLS
USE CASE
Users submit suspicious URLs via email, and
PhishTank identifies, verifies, tracks, confirms
and publishes phishing site on its webpage.
USE CASE
A campaign that uses a unique exploit to
commit a wide-spread attack on every system
possible would most likely infect one or more of
the honeypots. A user then accesses detailed
information on the attack to gather information
about its intentions and perpetrators.
11
21 OSINT RESEARCH TOOLS
WHAT IT IS
ThreatMiner is a threat intelligence portal
designed to enable an analyst to research
indicators of compromise (IOCs) under a
single interface. That interface allows for
not only looking up IOCs but also providing
the analyst with contextual information.
With this context, the IOC is not just a data
point but a useful piece of information and
potentially intelligence.
USE CASE
Identify and enrich indicators of
compromise to have a better understanding
of attack origins.
USE CASE
Users can select a file from their computer
using their browser and send it to VirusTotal.
Results are shared with the submitter, and
also between the examining partners, who
use this data to improve their own systems.
12
21 OSINT RESEARCH TOOLS
USE CASE
The Exploit Database is a repository for
publicly available exploits, making it a
valuable resource for those who need
actionable data at their fingertips.
13
21 OSINT RESEARCH TOOLS
WHAT IT IS
Silo for Research is a purpose-built solution for conducting online research without exposing analysts’
digital fingerprint. Safely pursue investigations across the surface, deep or dark web from a cloud-based
browsing interface while controlling how you appear online.
USE CASE
Blend in with the crowd and avoid tipping off your suspect. Manipulate your location, time zone, language
and keyboard settings, device type, browser and much more. Keep investigative browsing completely
segregated from your device to prevent infection, tracking or identification that could spoil your
investigation or make you a target.
Silo for Research is an integrated solution for conducting secure and anonymous web research, evidence +1 877-659-6535
collection and data analysis from the surface, deep and dark web. It’s built on Authentic8’s patented, cloud- www.authentic8.com
based Silo Web Isolation Platform, which executes all web code in a secure, isolated environment that is
managed by policy, providing protection and oversight of all web-based activity.