OSINT Cheat Sheets Collection
OSINT Cheat Sheets Collection
Cheat Sheets
The Ultimate OSINT
Cheat Sheet PAR
THE FOU T 1:
NDATION
S
Plan, strategize, research, Gather intelligence overtly Analyze data, determine Deliver analysis to
and covertly, utilizing Compile collected data into relevance, anticipate policymaker, await
discuss, gather intelligence,
various technological intelligence reports. outcomes, evaluate impact feedback, restart cycle as
execute task efficiently.
resources. on interests. necessary.
Reports
Documents, publications, white papers,
statistical data, and other information published ¿What is OSINT?
by government agencies.
Websites OSINT stands for Open Source Intelligence. It refers to the practice of
Text, images, videos, documents, metadata, and
other multimedia content.
collecting and analyzing information from publicly available sources to
gather insights, identify trends, or generate intelligence.
Blogs & Forums
Valuable insights, opinions, discussions, and
user-generated content on a wide range of
topics.
Main Users
Community sentiment
Top Free Tools
Trending activities
Governments Risk & threats to public safety Critical information
Weather & natural disaster
Web Archive Epieos Inteltechniques Forensic OSINT Crisis response Public safety
Law Enforcement Counter violent extremism Deep investigations
Agencies Situational awareness
www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
PART 2:
THE FOUNDATIONS
Cheat Sheet
Intelligence Analyst Key Skills
1 2 3 4 5
Critical Thinking Research & Analysis Technical Skills Problem-Solving Communication Skills
Evaluate information Gathering information from Proficiency in using Provide creative and Convey their findings
critically, considering its a variety of sources and analytical tools, databases, strategic solutions to clearly, both in written
reliability, relevance, and ability to analyze data sets and software for data complex problems. reports and oral briefings.
implications. and draw conclusions. collection and analysis.
Web Browsers
Web browsers are the primary tool for conducting searches and play
uBlock Exif Wayback Shodan
a crucial role in conducting OSINT investigations by providing access
Cookie Forensic Google
Origin Viewer Machine AutoDelete OSINT Translate to a wide range of online sources and tools (Brave, Firefox, Tor, etc.)
Sock Puppets
Sock puppets refer to fake online identities or personas created and
operated by individuals or groups for investigation purposes
RevEye User-Agent FireShot Privacy Vortimo Sputnik DownThemAll (FakePersonGenerator, ThisPersonDoesNotExist, ChatGPT, AI, etc.)
Switcher Badger
www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
Cheat Sheet PART 3:
SEARCH
ENGINES
Asterisk (*)
Use * as a wildcard matching any word or phrase. Ex.: OSINT * Cheat Sheets Filetype Extensions
Range (..)
Search between two identifiers. Ex.: Crime rate “2000..2024” TXT - Text File 7Z - Compressed File
DOC - Microsoft Word RAR - Compressed File
site: DOCX - Microsoft Word RTF - Rich Text Format
Find for results and for pages located on a specific domain. Ex.: site:linkedin.com PDF - Portable Document Format BMP - Bitmap Image
XLSX - Microsoft Excel DWF - Autodesk
filetype: XLS - Microsoft Excel HTM - Web Page
Search for files with the specified extension. Ex.: “OSINT” filetype:pdf PPT - Microsoft PowerPoint HTML - Web Page
PPTX - Microsoft PowerPoint KML - Google Earth
related: JPG - Image KMZ - Google Earth
Find pages and results related to a given domain. Ex.: related:osintframework.com JPEG - Image PS - Academic Papers
PNG - Image ODP - OpenOffice Present
inurl: GIF - Animated Image ODS - OpenOffice Spreadsheet
Locate pages that include a particular word in their URL. Ex.: inurl:OSINT ZIP - Compressed File ODT - OpenOffice Text
intitle:
intext:
Locate pages that include a particular word in their content. Ex.: intext:OSINT
Dark Web Search Engines Ask Aol Brave Search Engine Qwant OCCRP Intelx.io
Colossus Aleph
THW
Ahmia.fi Torch Haystak Not Evil DuckDuckGo Tor.link The Shodan Carrot2 Isearchfrom 2lingual Academia Internet Newspaper
Hidden Wiki Archive Archive
www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
PART 4:
OSINT RESOURCES Cheat Sheet
Books Podcasts
1. OSINT Techniques - Michael Bazzell
2. Deep Dive - Rae Baker
3. Hunting Cyber Criminals - Vinny Troia
4. OSINT Methods and Tools - Nihad A. Hassan & Rami Hijazi
Darknet NeedleStack Shadow The Pivot The OSINT Layer 8 The World
5. We are bellingcat: An Intelligence Agency for the People - Eliot Higgins Diaries Dragon Bunker of Intelligence
News Snapshots
6. How to Find Out Anything - Don MacLeod
7. Operator Handbook - Joshua Picolet
8. OSINT: The Art of Collecting Open Information - David Anderson
Youtube Channels
News & Blogs
David Authentic8 Gary Gralhix Bendobrown Cody Social
Bombal Ruddell Sofia Santos Bernardy Links
Cyber OSIntOps Bellingcat Brigada Soxoj Osint OSINT Cyber Sector035 The Sunday Digital My OSINT OSINT The OSINT
Detective News EN OSINT Insides Losena Anatomy Detective Download Investigations News Ambition Newsletter
OSINT OsintTV Cyber Hunter OSINT GINSEG Ciberpatrulla OSINT Digital OSINT Forensic Cyber Hunter OSINT Keynorth OSINT
Teame Israel Español Digging Jobs OSINT Academy Team Excellence
www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
Cheat Sheet PART 5:
TOOLS COLLECTIONS
OSINT
Framework
OSINT
Essentials
UK
OSINT
IntelTechniques Aware
Search Tools Online Tools
Toddington Andy Black
Associates
OSINT For Finding People
https://docs.google.com/spreadsheets/d/1JxBbMt4JvGr--G0Pkl3jP9VDTBunR2uD3_faZXDvhxc
Handbooks
The OSINTion OH SHINT! SPJ OSINT Combine OSINT OSINT OSINT
Wiki Web Resources Toolbox Free Tools Geek Tools Techniques Map 1. Toddington - https://www.toddington.com/resources/cheat-sheets/
Tools
DFIRDetective CSE
Utopia
Emmanuelle
Welch
AML
Toolbox
BBC Eye
Forensics
The Coins Paranoid Ch1ck
of Charon CTI Resources
Bookmarks
OSINT Stack
https://www.osintcombine.com/free-osint-tools/osint-bookmark-stack
OSINT
Nixintel’s Osintia Resources World AsINT_Collection Combine
OSINT List
Lorand Bodo OSINT
OSINT Tools International Zoekslag By Country Resources Dark Web OSINT Stack
https://www.osintcombine.com/free-osint-tools/darkweb-bookmark-stack
Github
Cyber Daniel Durnea OSINT Awesome OSINT OhShINT Sinwindie OSINT Ph055a Datajournalism Non Typical Soxoj Offensive Awesome
Detective FBI Tools Team Links OSINT Encyclopedia OSINT Dojo For Countries OSINT Resources OSINT Guide OSINT Tools Social
Engineering
www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
PART 6:
Operational Security
Cheat Sheet
OPSEC = software + hardware + practices Assume online activities are being monitored.
www.cibergy.com
Alex Lozano
@Cibergy
9 Top OSINT Webinars
ABOUT LATEST TRENDS AND USE CASES
1 2 3
OSINT AND AI: A NEW EXPLORING EMERGING OSINT WORKFLOWS
DAWN OF DATA ANALYSIS TRENDS IN CYBERSECURITY
60 min
FOR EVENT SECURITY
51 min 30 min
4 5 6 INVESTIGATING SERIOUS
THE EVOLVING ROLE TOP TRENDS AND
AND ORGANIZED CRIME
OF OSINT PREDICTIONS IN OSINT WITH OSINT
56 min 53 min 60 min
www.cibergy.com
Alex Lozano
@Cibergy
OSINT Cheat Sheet
Executive Protection
OSINT For Executive Protection VIP Individuals
Executives & CEOs Dignitaries
Integrating OSINT into Executive Protection strategies can provide
Political Figures Professional Athletes
security teams with valuable intelligence and insights to proactively Celebrities Musicians & Actors
mitigate risks and ensure the safety and security of the executive. High Net Worth Individuals Other VIPs
Identify any compromised accounts, leaked credentials, or other indicators of Predictable Location or Routine
cyber threats targeting the executive's personal information or digital assets. Knowing their daily activities or travel patterns allows
malicious individuals to anticipate their movements and
Recognize potential security vulnerabilities, access points, and emergency exits exploit vulnerabilities in their security.
for relevant locations to inform security planning and risk mitigation efforts.
Exposed Credentials or Passwords
Unauthorized access to sensitive information,
financial accounts, or even critical systems.
Monitoring of data breaches and other vulnerabilities. Know The Right Tool
Digital Threat Cyber threats targeting the executive’s digital assets / accounts.
Reputational damage if sensitive information is leaked online.
POIs investigation
Threats against family members or personal relationships. Skopenow Social media intelligence
Indirect Threat Indirect threats made against business or employees. Situational awareness
Mishandling of crisis and inadequate response to controversies.
www.cibergy.com
Alex Lozano
@Cibergy
OSINT Cheat Sheet
Brand Intelligence
OSINT For Brand Intelligence Negative Effects
Competitive Disadvantage Loss of Trust
By leveraging OSINT, brands can proactively manage their reputation, Decreased Sales Legal Scrutiny
respond swiftly to potential issues, and continuously align their Brand Devaluation Lower Profitability
Negative Media Coverage Social Media Blacklash
strategies with customer expectations and market dynamics. Employee Turnover Increased Costs
Internal Monitoring
OSINT ensures employees represent the brand well online and identifies internal Know The Right Tool
issues to prevent damage to the brand’s reputation.
Social listening
Talkwalker Brand awareness
Sentiment analysis
Monitor and respond to Build and maintain positive Alto Risk & Threat detection
Crisis management
online feedback online media relations Intelligence Monitoring & alerts
www.cibergy.com
Alex Lozano
@Cibergy
Intelligence Quotes
BY RENOWNED PERSONALITIES
Albert Einstein
Edward de Bono
Anaïs Nin
John F. Kennedy Helen Keller Simone de Beauvoir
Intelligence is the
Intelligence is the
Intelligence is the Intelligence is not the Intelligence is the ability to find and
ability to see
ability to take in ability to store ability to think solve problems and
possibilities where
information and use information, but to independently and create products of
others see closed
it to make decisions. know where to find it. to understand things value in the world.
doors.
deeply.
www.cibergy.com
Alex Lozano
@Cibergy
OSINT Tips
Cheat Sheet
OPSEC: Your Essential Shield The Golden Rule of Verification
Lower adversary exploitation risk. The accuracy of information is paramount.
Stay anonymous by hiding who you are. Trustworthiness. Not all sources are reliable.
Keep activities hard to trace and follow. Verified data is crucial for effective decisions.
www.cibergy.com
Alex Lozano
@Cibergy
Alex Lozano
Thanks for reading! If you found this interesting, follow for more
insights on OSINT!
www.cibergy.com
@Cibergy
Alex Lozano
Identify personal information and media of the executive, relatives and associates.
Check for home, vehicle, email address, phone, and password exposure.
Monitor online chatter, social media conversations, and forums for any threats,
harassment, or hostile sentiment directed towards the executive.
Explore executive’s and family social media profiles, online activity, and posts to assess
their interests, habits, and potential vulnerabilities. Check privacy settings.
Assess the potential security risks associated with the executive's travel destinations,
transportation arrangements, and accommodations.
Monitor online mentions, reviews, and news coverage related to the executive's
reputation, brand image, and professional activities.
Recognize potential security vulnerabilities, access points, and emergency exits for
relevant locations to inform security planning and risk mitigation efforts.
Thanks for reading! If you found this interesting, follow for more
insights on OSINT!
www.cibergy.com
@Cibergy
The Intelligence Cycle
For Open Source Intelligence (OSINT) Professionals
Pro
tion
Ex
a
p
b
c
Compile collected data into
loi g and
a
d
e intelligence reports.
n
s
Fee
t
i
sin
a
em
tion
and
Diss
General Aspects
Step by Step Tips
Strive for precision and correctness
Planning & Data Processing & Cross-check information with multiple
Direction Collection Exploitaition sources
OSINT - Open Source
Maintain a sense of urgency
Define Objectives Use Diverse Sources Organize Data Intelligence
Identify Requirements Automate If Possible Remove Redundancies Ensure timely delivery
Select Sources Verify Credibility Normalize Formats
Encompasses accessible
Use credible sources and methods
Develop a Plan Stay Ethical and Legal Document Sources information found in various
Continuously evaluate the reliability
mediums such as printed
Adhere to legal and moral guidelines
materials
Analysis & Dissemination Comply with ethical standards
Production & Feedback Stay flexible and ready to adjust
Be prepared to pivot quickly
Identify Patterns Create Reports
Assess Reliability Tailor to Audience Ensure OPSEC thorough all phases
Contextualize Data Solicit Feedback Implement measures to safeguard
Generate Insights Update Methods
www.cibergy.com
Alex Lozano
@Cibergy
21 BROWSER EXTENSIONS
For Open Source Intelligence (OSINT) Professionals
www.cibergy.com
Alex Lozano
@Cibergy
21 BLOGS & NEWS SITES
For Open Source Intelligence (OSINT) Professionals
Skopenow Blackdot
Sector035
Blog Solutions Blog
VEEXH OSINT
hatless1der
Medium Team
OH SHINT
OSINTME CQcore
Blog
www.cibergy.com
Alex Lozano
@Cibergy
21 OSINT COLLECTIONS
For Intelligence Analysts and Investigators
OSINT OSINT UK
Framework Essentials OSINT
Bellingcat’s OH SHINT!
Meta
Online OSINT Web Resources
OSINT
Toolkit
OSINT
Techniques OSINT Toolkit OSINT Map
Tools
www.cibergy.com
Alex Lozano
@Cibergy
60 High-Demand Jobs in Open
Source Intelligence (OSINT)
2. Cyber Intelligence Analyst - Monitor and analyze cyber threats. 12. Fraud Investigator - Investigate fraud using open source data.
3. Intelligence Officer - Use OSINT to support defense and security operations. 13. Cyber Threat Analyst - Monitor and mitigate cyber threats.
4. Counterterrorism Analyst - Analyze open-source information to prevent terrorism. 14. SOC (Security Operations Center) Analyst - Monitor and analyze security events.
5. Law Enforcement Intelligence Analyst - Support law enforcement operations. 15. Brand Protection Specialist - Monitor and protect brand reputation.
6. Border Security Analyst - Utilize OSINT for monitoring and securing borders. 16. Due Diligence Investigator - Conduct background checks and investigations.
7. Public Health Intelligence Officer - Use OSINT to track public health threats. 17. Incident Response Analyst - Utilize OSINT during cyber incident investigations.
8. Diplomatic Security Analyst - Provide security analysis for diplomatic missions. 18. Digital Forensics Investigator - Use OSINT in digital forensics investigations.
9. Military Intelligence Analyst - Support military operations with OSINT. 19. Red Team Operator - Use OSINT to plan and execute simulated cyber attacks.
10. Threat Analyst - Identify and analyze threats to national security. 20. Competitive Intelligence Analyst - Analyze market and competitor information.
22. Data Engineer - Design and manage systems that process and analyze OSINT. 32. Security Consultant - Provide security analysis using open-source intelligence.
23. Machine Learning Engineer - Implement ML models to analyze OSINT data. 33. Private Investigator - Use OSINT for private investigations.
24. Software Engineer - Build applications for OSINT analysis and visualization. 34. Risk Consultant - Offer risk assessments using open sources.
25. Data Scientist - Use statistical and computational techniques to extract insights. 35. Social Media Consultant - Analyze social media trends for clients.
26. AI Researcher - Develop AI algorithms to enhance OSINT capabilities. 36. Cybersecurity Consultant - Provide cybersecurity services using OSINT.
27. Web Scraping Specialist - Create scripts / tools to collect data from web sources. 37. Competitive Intelligence Consultant - Advise businesses on market intelligence.
28. Geospatial Analyst - Analyze spatial data from open sources for intel purposes. 38. Crisis Management Consultant - Use OSINT to manage crises.
29. Cybersecurity Software Developer - Develop security software using OSINT. 39. Brand Protection Consultant - Help businesses protect their brand using OSINT.
30. Cloud Architect - Design cloud infrastructure to support OSINT operations. 40. KYC / AML Consultant - Provide KYC / AML services using OSINT.
42. Research Analyst - Conduct open-source research for academic studies. 52. Environmental Research Analyst - Monitor environmental issues using OSINT.
43. Cybersecurity Researcher - Investigate cybersecurity threats using OSINT. 53. Crisis Response Analyst - Use OSINT to respond to humanitarian crises.
44. OSINT Author - Write books and articles on OSINT techniques and applications. 54. NGO Security Analyst - Ensure the security of non-profit operations with OSINT.
45. Fact-Checker - Verify the accuracy of information using open-source data. 55. Transparency Investigator - Investigate corruption and promote transparency.
46. Foreign Correspondent - Use OSINT to report on international news. 56. Social Media Analyst - Monitor social media for advocacy and awareness.
47. Intelligence Studies Professor - Teach and research OSINT methodologies. 57. Policy Analyst - Use OSINT to inform policy recommendations.
48. OSINT Instructor - Provide training and teach courses on open-source intelligence. 58. Public Health Researcher - Track and analyze public health data.
49. Business Reporter - Analyze and report on business trends and market data. 59. Conflict Researcher - Monitor and analyze conflicts using open sources.
50. Data Scientist - Analyze open-source data for academic research. 60. Disaster Response Analyst - Use OSINT for disaster preparedness and response.
www.cibergy.com
Alex Lozano
@Cibergy
60 High-Demand Services in
Open Source Intelligence (OSINT)
2. Sentiment Analysis: Analyze public opinions through sentiment on social platforms. 12. Dark Web Monitoring: Monitor dark web for threats and illicit activities.
3. Disinformation Detection: Identify and combat false or misleading information. 13. Threat Actor Profiling: Analyze and understand cyber threat actor behaviors.
4. Brand Protection: Monitor and safeguard corporate reputation and trademarks. 14. Incident Response Support: Provide intelligence during cybersecurity incidents.
5. Social Engineering Awareness: Detect social engineering cyber threats. 15. Digital Forensics Support: Use OSINT to aid digital forensic investigations.
6. Public Sentiment Tracking: Measure public mood and opinions on issues. 16. Online Fraud Investigations: Detect and investigate online fraud activities.
7. Online Reputation Management: Manage and improve online public perception. 17. Counter-Terrorism Intelligence: Analyze threats to prevent terrorist activities.
8. Virtual Event Monitoring: Track and analyze activities in virtual events. 18. Compliance Monitoring: Ensure adherence to legal and regulatory standards.
9. Influencer Analysis: Assess influence and reach of online personalities. 19. Threat Intelligence Fusion: Integrate multiple data sources for analysis.
10. Hashtag / Keyword Analysis: Analyze topics through hashtags and keywords. 20. Vulnerability Assessment: Identify and analyze security vulnerabilities and risks.
22. Geospatial Intelligence: Analyze spatial data to support operational decisions. 32. Due Diligence: Conduct thorough investigations before major business decisions.
23. Environmental Intelligence: Monitor environmental risks and impacts globally. 33. Financial Intelligence: Analyze financial data for fraud and insights.
24. Travel Risk Assessment: Evaluate risks associated with travel and locations. 34. Trade and Market Analysis: Evaluate market trends and trade opportunities.
25. Disaster Preparedness: Analyze data for effective disaster response planning. 35. Recruitment Intelligence: Analyze recruitment trends and practices.
26. Event Monitoring: Track events for real-time situational awareness. 36. Emerging Technology Tracking: Monitor and assess new technologies and trends.
27. Supply Chain Risk Assessment: Assess risks within supply chain operations. 37. Business Intelligence: Extract insights from business data and operations.
28. Geospatial Data Visualization: Visualize spatial data for clearer intelligence insights. 38. Political Intelligence: Assess political risks and opportunities in markets.
29. Border Security Analysis: Use OSINT for monitoring and securing borders. 39. Market Entry Risk Assessment: Evaluate risks in entering new markets.
30. Mapping Humanitarian Crises: Analyze and map crises for humanitarian response. 40. Brand Protection: Safeguard brand from competitive threats and misuse.
42. Background Checks: Verify individuals’ histories for employment or investigations. 52. Academic and Scientific Research: Research in academic and scientific fields.
43. Regulatory and Policy Analysis: Analyze laws and policies affecting operations. 53. Education and Training: Develop and deliver OSINT training programs.
44. Legal and Ethical Compliance: Ensure adherence to legal and ethical guidelines. 54. Cultural Sensitivity Training: Train on cultural awareness for international ops.
45. Government and Policy Analysis: Study governmental actions and policy impacts. 55. Public Health Surveillance: Monitor health data to track disease spread.
46. Document Analysis: Review documents for legal and regulatory compliance. 56. Humanitarian Assistance Research: Support humanitarian efforts through OSINT.
47. Law Enforcement Support: Provide intelligence support to LEAs. 57. Crisis Simulation and Exercises: Prepare for crises through simulated scenarios.
48. Crisis Communication: Manage communication during legal crises. 58. Local and Regional Conflict Analysis: Analyze conflicts at local and regional levels.
49. Human Intelligence (HUMINT) Support: Integrate human intelligence with OSINT. 59. OSINT Tool Development and Training: Create and teach OSINT software tools.
50. Corruption Investigations: Investigate corruption and promote transparency. 60. Machine Learning and AI for OSINT: Apply AI to enhance OSINT capabilities.
www.cibergy.com
Alex Lozano
@Cibergy
EUROPEAN BUSINESS DATA
OSINT Cheat Sheet
PART 1
FRANCE ITALY
Infogreffe - https://www.infogreffe.fr Registro delle Imprese - https://www.registroimprese.it
RUSSIA SPAIN
EGRUL - https://egrul.nalog.ru Registro Mercantil Central - https://www.rmc.es
NETHERLANDS SWITZERLAND
Kamer van Koophandel (KvK) - https://www.kvk.nl Zefix - https://www.zefix.ch
OpenKvK - https://openkvk.nl SIX Swiss Exchange - https://www.six-group.com
www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate
OSINT Cheat Sheet 2024
Top Free Tools 9. Marketplace offers unique solutions for investigating fraud.
10. Monitor Facebook Live to analyze live events worldwide.
11. The Facebook data breach helps easily find profiles (+533 accounts).
12. Pivoting from FB to other social media platforms is key for success.
Instant Data Scraper 13. Add friends / click ads / like posts to avoid being blocked.
Extracts data from web pages and exports it as Excel or CSV 14. Document all findings with links and user/pages IDs.
files.
ESUIT
Facebook extension to download photos, videos, comments,
likes, posts, etc.
Main Information Sources
HaveIBeenZuckered Profile Information Events & Activities
Check if your telephone number is present within the
Facebook data breach. Friends & Connections Communication Patterns
Facebook Compare listings to reports to identify stolen goods. InGrav Social media intelligence
Analyze listings to uncover patterns linked to organized crime. Network analysis
Marketplace PeopleMon POIs investigations
www.cibergy.com
Alex Lozano
@Cibergy
SOCMINT TOOLS
Cheat Sheet
PART 1
Facebook Instagram
HaveIBeenZuckered Toutatis
Check if your telephone number is present Tool that allows you to extract info from
within the Facebook data breach. such as emails, phones, etc.
www.cibergy.com
Alex Lozano
@Cibergy
10 Excellent Youtube
Channels On OSINT
Videos on OSINT, maps, and data.
Bendobrown Learn geolocation, satellite imagery, and analysis.
OSINT tutorials for digital investigations.
www.cibergy.com
Alex Lozano
@Cibergy
6 KEY OSINT STEPS
For Investigating the Dark Web
Before diving into dark web research, Security is essential when accessing the dark web:
define specific objectives. Knowing exactly
what you're looking for, whether it's: Use virtual machines (VMs) to minimize risks of
malware or tracking.
Tracking illegal activity. Employ Tor Browser or I2P for anonymous browsing.
Consider using VPNs to add an extra layer of privacy.
Identifying cyber threats.
Enable strong firewalls, and use multi-factor
Gathering intelligence on a specific group.
authentication to secure your system.
You can identify relevant marketplaces, Extracting and analyzing metadata from dark web
forums, or sites through the following resources can provide key insights:
methods:
Analyze site uptime, traffic, and server details using tools
like OnionScan to understand vulnerabilities and identify
Search engines for the dark web like Ahmia.fi. patterns.
OSINT databases that collect and track known Review timestamps, file formats, and server responses to
dark web sites and domains. gather technical information about sites or transactions.
Join dark web forums or communities where Collect Bitcoin transaction metadata if investigating
users exchange information. cryptocurrency payments related to illicit activities.
Leverage OSINT tools that scrape the dark web for Link crypto wallets to known marketplaces or suspect
information on particular topics, such as threat individuals by tracking addresses and transaction
actors, vendors, or criminal activities. histories.
www.cibergy.com
Alex Lozano
@Cibergy
STAY AHEAD IN OSINT
Must-Follow LinkedIn Profiles for OSINT Insights
www.cibergy.com
Alex Lozano
@Cibergy
www.cibergy.com
Alex Lozano
@Cibergy
Types of Investigations.
Due Diligence.