0% found this document useful (0 votes)
435 views

OSINT Cheat Sheets Collection

Uploaded by

fgemdd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
435 views

OSINT Cheat Sheets Collection

Uploaded by

fgemdd
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 28

OSINT

Cheat Sheets
The Ultimate OSINT
Cheat Sheet PAR
THE FOU T 1:
NDATION
S

The Intelligence Cycle


1 2 3 4 5
Planning & Direction Collection Processing Analysis & Production Dissemination

Plan, strategize, research, Gather intelligence overtly Analyze data, determine Deliver analysis to
and covertly, utilizing Compile collected data into relevance, anticipate policymaker, await
discuss, gather intelligence,
various technological intelligence reports. outcomes, evaluate impact feedback, restart cycle as
execute task efficiently.
resources. on interests. necessary.

Top Sources OSINT Purposes


Security and Threat Intelligence: Investigations:
People identifiers Identifying security risks through analyzing Conducting investigations into various matters
Such as names, aliases, email addresses, phone public information on individuals and by gathering relevant information.
numbers, employment history or education. organizations.

Competitive Intelligence: Reputation Management:


Social media platforms
Gathering information about competitors, Monitoring and managing the online reputation
Gather information from Facebook, Twitter, market trends, consumer preferences, etc. of individuals, organizations and brands.
Instagram, LinkedIn, TikTok, and others.

News articles Journalism and Research: Disaster Response and Crises:


Supporting research by gathering data to Assess the impact of natural disasters, conflicts
This can include traditional news websites, or crises to facilitate effective response.
online newspapers, and other sources where uncover facts, verify claims, and provide context.
news and current events are reported.

Reports
Documents, publications, white papers,
statistical data, and other information published ¿What is OSINT?
by government agencies.

Websites OSINT stands for Open Source Intelligence. It refers to the practice of
Text, images, videos, documents, metadata, and
other multimedia content.
collecting and analyzing information from publicly available sources to
gather insights, identify trends, or generate intelligence.
Blogs & Forums
Valuable insights, opinions, discussions, and
user-generated content on a wide range of
topics.
Main Users
Community sentiment
Top Free Tools
Trending activities
Governments Risk & threats to public safety Critical information
Weather & natural disaster

Personel protection & screening Supply chain risk


Corporations Due diligence Asset protection
Fraud investigations Brand monitoring

Web Archive Epieos Inteltechniques Forensic OSINT Crisis response Public safety
Law Enforcement Counter violent extremism Deep investigations
Agencies Situational awareness

Verification of information Uncover facts


Investigators & Investigative journalism Access to data
HaveIBeenPwned Namechk FOCA OpenCorporates Journalists Private investigation

www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
PART 2:
THE FOUNDATIONS
Cheat Sheet
Intelligence Analyst Key Skills
1 2 3 4 5
Critical Thinking Research & Analysis Technical Skills Problem-Solving Communication Skills

Evaluate information Gathering information from Proficiency in using Provide creative and Convey their findings
critically, considering its a variety of sources and analytical tools, databases, strategic solutions to clearly, both in written
reliability, relevance, and ability to analyze data sets and software for data complex problems. reports and oral briefings.
implications. and draw conclusions. collection and analysis.

Intelligence Disciplines Internet Categories


OSINT - Open Source Intelligence Normal web visible for all users
Surface Web Websites are indexed by search engines
Encompasses accessible information found in various mediums such as Represents only 4% of the entire internet
printed materials, electronic platforms, broadcast media, and online
sources.
Web not indexed by search engines.
SOCMINT - Social Media Intelligence Deep Web Access is restricted to authorized users.
A branch of OSINT that focuses specifically on gathering and analyzing Databases, cloud storage, sensitive data, etc.
information from social media platforms (posts, images, videos, public
conversations, etc.)
Access through software like Tor Browser.
HUMINT - Human Intelligence Dark Web Anonymous browsing is sought by users.
Ilegal activities are promoted.
HUMINT involves direct interaction with individuals to collect valuable
knowledge or access to sensitive information.

GEOINT - Geospatial Intelligence


Involves the analysis of geospatial data to understand and interpret
activities and events occurring on Earth's surface. It combines imagery,
Computer Optimization
mapping, and geographic information systems (GIS), among others.

IMINT - Imagery Intelligence Antivirus


The collection, analysis, and interpretation of visual images obtained from
various sources such as satellites, reconnaissance aircraft, drones, and Antivirus software is a type of program designed to detect, prevent,
other imaging systems. and remove malicious software, commonly known as malware, from
computers and networks (Windows Defender, ClamAV, Avast, etc.)
SIGINT - Signals Intelligence
The interception and analysis of electronic signals (radio transmissions,
VPN (Virtual Private Network)
signals, radar emissions, telecommunications data, etc.) and A technology that allows you to create a secure connection over the
communications for intelligence purposes
internet between your device and a remote server. VPNs encrypt your
internet traffic (ProtonVPN, NordVPN, CyberGhost, etc.)

Virtual Machines (VM)


Top Browser Extensions Software-based emulations of physical computers that allow multiple
operating systems (OS) to run concurrently on a single physical
machine (Kali Linux, Trace Labs, Silo, Tsurugi, etc.)

Web Browsers
Web browsers are the primary tool for conducting searches and play
uBlock Exif Wayback Shodan
a crucial role in conducting OSINT investigations by providing access
Cookie Forensic Google
Origin Viewer Machine AutoDelete OSINT Translate to a wide range of online sources and tools (Brave, Firefox, Tor, etc.)

Sock Puppets
Sock puppets refer to fake online identities or personas created and
operated by individuals or groups for investigation purposes
RevEye User-Agent FireShot Privacy Vortimo Sputnik DownThemAll (FakePersonGenerator, ThisPersonDoesNotExist, ChatGPT, AI, etc.)
Switcher Badger

www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
Cheat Sheet PART 3:
SEARCH
ENGINES

General Search Engines

Google Bing Yandex Baidu Yahoo

Search Operators Key Factors


Quotation Marks “ ” 1. Use multiple search engines to improve and maximize results.
Search for the exact word or phrase within quotation marks. Ex.: “Joe Doe” 2. Use search operators and the “Advanced Search” function.
3. Use international search engines (Baidu in China, Yandex in Russia).
Operator AND
4. Use different names (United States, US, USA, America, etc.).
Find information related to both X and Y. Ex.: “OSINT” AND “Training”
5. Use different spellings (München, Munich, etc.).
Operator OR 6. Perform searches in multiple languages and locations.
Find information to either X or Y. Ex.: “Apple” OR “Microsoft” 7. Use multiple types of data (names, phones, emails, addresses, etc.).
Hyphen (-)
Exclude words from the search. Ex.: Jaguar Speed -Car

Asterisk (*)
Use * as a wildcard matching any word or phrase. Ex.: OSINT * Cheat Sheets Filetype Extensions
Range (..)
Search between two identifiers. Ex.: Crime rate “2000..2024” TXT - Text File 7Z - Compressed File
DOC - Microsoft Word RAR - Compressed File
site: DOCX - Microsoft Word RTF - Rich Text Format
Find for results and for pages located on a specific domain. Ex.: site:linkedin.com PDF - Portable Document Format BMP - Bitmap Image
XLSX - Microsoft Excel DWF - Autodesk
filetype: XLS - Microsoft Excel HTM - Web Page
Search for files with the specified extension. Ex.: “OSINT” filetype:pdf PPT - Microsoft PowerPoint HTML - Web Page
PPTX - Microsoft PowerPoint KML - Google Earth
related: JPG - Image KMZ - Google Earth
Find pages and results related to a given domain. Ex.: related:osintframework.com JPEG - Image PS - Academic Papers
PNG - Image ODP - OpenOffice Present
inurl: GIF - Animated Image ODS - OpenOffice Spreadsheet
Locate pages that include a particular word in their URL. Ex.: inurl:OSINT ZIP - Compressed File ODT - OpenOffice Text

intitle:

Specialized Search Engines


Locate pages that include a particular word in their title. Ex.: intitle:OSINT

intext:
Locate pages that include a particular word in their content. Ex.: intext:OSINT

Dark Web Search Engines Ask Aol Brave Search Engine Qwant OCCRP Intelx.io
Colossus Aleph

THW
Ahmia.fi Torch Haystak Not Evil DuckDuckGo Tor.link The Shodan Carrot2 Isearchfrom 2lingual Academia Internet Newspaper
Hidden Wiki Archive Archive

www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
PART 4:
OSINT RESOURCES Cheat Sheet

Books Podcasts
1. OSINT Techniques - Michael Bazzell
2. Deep Dive - Rae Baker
3. Hunting Cyber Criminals - Vinny Troia
4. OSINT Methods and Tools - Nihad A. Hassan & Rami Hijazi
Darknet NeedleStack Shadow The Pivot The OSINT Layer 8 The World
5. We are bellingcat: An Intelligence Agency for the People - Eliot Higgins Diaries Dragon Bunker of Intelligence
News Snapshots
6. How to Find Out Anything - Don MacLeod
7. Operator Handbook - Joshua Picolet
8. OSINT: The Art of Collecting Open Information - David Anderson

Youtube Channels
News & Blogs
David Authentic8 Gary Gralhix Bendobrown Cody Social
Bombal Ruddell Sofia Santos Bernardy Links

Cyber Secjuice Sector035 Intel hatless1der Maltego Skopenow


Detective Techniques Blog Blog

OSINT Dojo Forensic SANS LISA Intelcon Manuel Alvaro


OSINT Institute Institute Bot Chirou

Nixintel Offensive OSINT VEEXH SocialLinks WebBreacher TraceLabs


OSINT Combine Medium Blog Blog

Virtual Machines & More


Inteltechniques VM OSINTUX VM
CQcore SANS LISA OSINTME OSINT Blackdot Dutch
Institute Institute Curious Solutions Blog OSINT Guy Sherlock Linux VM Silo (platform for isolated
Kali Linux VM online investigations)
Trace Labs OSINT VM Kasm (remote desktop)
CSI Linux VM Debian (optimal Linux OS)
Authentic8
Blog
Bellingcat
Blog
Knowmad OH SHINT
Blog
The SEINT Shadow
Dragon
ESPY
Blog
Tsurugi VM Tails (privacy centered OS)

Telegram Groups Newsletters

Cyber OSIntOps Bellingcat Brigada Soxoj Osint OSINT Cyber Sector035 The Sunday Digital My OSINT OSINT The OSINT
Detective News EN OSINT Insides Losena Anatomy Detective Download Investigations News Ambition Newsletter

OSINT OsintTV Cyber Hunter OSINT GINSEG Ciberpatrulla OSINT Digital OSINT Forensic Cyber Hunter OSINT Keynorth OSINT
Teame Israel Español Digging Jobs OSINT Academy Team Excellence

www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
Cheat Sheet PART 5:
TOOLS COLLECTIONS

OSINT Collections Spreadsheets


Bellingcat’s Investigation Toolkit
https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ

OSINT
Framework
OSINT
Essentials
UK
OSINT
IntelTechniques Aware
Search Tools Online Tools
Toddington Andy Black
Associates
OSINT For Finding People
https://docs.google.com/spreadsheets/d/1JxBbMt4JvGr--G0Pkl3jP9VDTBunR2uD3_faZXDvhxc

Aaron CTI’s OSINT Collection


https://docs.google.com/spreadsheets/d/1klugQqw6POlBtuzon8S0b18-gpsDwX-5OYRrB7TyNEw

OSINT Dojo OSINT Reuser’s Malfrat’s IntelligenceX Achirou Meta


Resources Toolkit Repertorium OSINT Map Tools OSINT Tools OSINT

Handbooks
The OSINTion OH SHINT! SPJ OSINT Combine OSINT OSINT OSINT
Wiki Web Resources Toolbox Free Tools Geek Tools Techniques Map 1. Toddington - https://www.toddington.com/resources/cheat-sheets/
Tools

2. I-Intelligence OSINT Handbook - https://i-intelligence.eu/uploads/public-


documents/OSINT_Handbook_2020.pdf

Start.me 3. Aljazeera Media Institute -


https://institute.aljazeera.net/sites/default/files/2023/Open%20Source%20Investi
gation%20Handbook.pdf

4. Blackdot Solutions - https://blackdotsolutions.com/wp-


content/uploads/2021/11/The-OSINT-Handbook_.pdf
The Ultimate Verification V3nari Intel0logist Hun-OSINT Digintel Bruno Mortier
OSINT Toolset Bookmarks USA
Collection 5. The Intelligence Handbook - https://go.recordedfuture.com/the-
intelligence-handbook-fourth-edition

DFIRDetective CSE
Utopia
Emmanuelle
Welch
AML
Toolbox
BBC Eye
Forensics
The Coins Paranoid Ch1ck
of Charon CTI Resources
Bookmarks
OSINT Stack
https://www.osintcombine.com/free-osint-tools/osint-bookmark-stack
OSINT
Nixintel’s Osintia Resources World AsINT_Collection Combine
OSINT List
Lorand Bodo OSINT
OSINT Tools International Zoekslag By Country Resources Dark Web OSINT Stack
https://www.osintcombine.com/free-osint-tools/darkweb-bookmark-stack

Github

Cyber Daniel Durnea OSINT Awesome OSINT OhShINT Sinwindie OSINT Ph055a Datajournalism Non Typical Soxoj Offensive Awesome
Detective FBI Tools Team Links OSINT Encyclopedia OSINT Dojo For Countries OSINT Resources OSINT Guide OSINT Tools Social
Engineering

www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate OSINT
PART 6:
Operational Security
Cheat Sheet

¿What is OPSEC? Key Considerations


OPSEC should always be practiced, regardless of how
Operational Security (OPSEC) is a systematic process trivial an investigation might seem.
(sequence of steps) that identifies and protects sensitive
information from adversaries to prevent exploitation, OPSEC needs to be tailored to the activity or
maintain anonymity, and keep activities undetected. investigation.

OPSEC = software + hardware + practices Assume online activities are being monitored.

OPSEC is a continuous practice that should become


second nature to individuals.
Virtual Machines & More Continuously adapt as new threats/techniques emerge.

Inteltechniques VM OSINTUX VM Continuously assess the potential risks before sharing


Sherlock Linux VM Silo (platform for isolated any information, whether online or offline.
Kali Linux VM online investigations)
Keep research separate from personal/professional
Trace Labs OSINT VM Kasm (remote desktop)
activities.
CSI Linux VM Debian (optimal Linux OS)
Tsurugi VM Tails (privacy centered OS) Research OSINT tools thoroughly before use.

Web Browsers Password Management


Browser Addons: Tool for secure password management.
Encrypted database to protect
HTTPS Everywhere passwords.
uBlock Origin Generates strong, unique passwords.
Privacy Badger
Improves security and simplifies
User-Agent-Switcher
Firefox Brave TOR Canvas Defender KeepassXC management.

Phones & Emails VPNs Sock Puppets


Prevents traceability to your real Useful to mask your true IP address Protects real identity during
identity. location. investigations.
Reduces risk of account linkage Prevents tracking by websites and Avoids detection by target entities.
detection. services. Gathers information without raising
Enhances security from potential Enhances privacy when conducting suspicion.
breaches. research. Fake Name Generation, This Person
Hushed, Protonmail, Tutanota, etc. ProtonVPN, NordVPN, etc. Does Not Exist, ChatGPT, etc.

www.cibergy.com
Alex Lozano
@Cibergy
9 Top OSINT Webinars
ABOUT LATEST TRENDS AND USE CASES

1 2 3
OSINT AND AI: A NEW EXPLORING EMERGING OSINT WORKFLOWS
DAWN OF DATA ANALYSIS TRENDS IN CYBERSECURITY
60 min
FOR EVENT SECURITY
51 min 30 min

By Social Links By DarkOwl & Socialgist By Skopenow


Discover the power of AI in open-source Staying ahead of cyber adversaries requires a Learn how to enhance ​event security with
intelligence work, spanning threat intelligence, deep understanding of the latest trends and OSINT for pre-event assessment, venue
sentiment analysis, entity profiling, and more. innovations in the cybersecurity space. profiling, and real-time threat detection.

4 5 6 INVESTIGATING SERIOUS
THE EVOLVING ROLE TOP TRENDS AND
AND ORGANIZED CRIME
OF OSINT PREDICTIONS IN OSINT WITH OSINT
56 min 53 min 60 min

By Fivecast By Skopenow & DarkOwl By Blackdot & ShadowDragon


OSINT is not merely keeping pace with change Insights on emerging threats and the latest How OSINT can be used to counter serious and
but also leading the charge in revolutionizing OSINT tools and techniques to detect and organised crime, stopping criminal networks in
intelligence. prevent them. their tracks.

7 8 9 REAL WORLD OSINT ADVICE


THE PRIVATE INVESTIGATOR’S
THE FUTURE OF OSINT OSINT TOOLKIT
FOR THE CURRENT CHANGING
122 min 44 min 57 min LANDSCAPE

By Blackdot Solutions By Social Links By SANS Institute


Explore how OSINT is evolving, best practices Practical look at some essential techniques that How the OSINT landscape is changing, and
for its use in every sector and how new every private investigator needs to know to decisions organizations can make that can
technologies can support investigators. maximize their investigative scope. severely hinder their OSINT operations'
effectiveness.

www.cibergy.com
Alex Lozano
@Cibergy
OSINT Cheat Sheet
Executive Protection
OSINT For Executive Protection VIP Individuals
Executives & CEOs Dignitaries
Integrating OSINT into Executive Protection strategies can provide
Political Figures Professional Athletes
security teams with valuable intelligence and insights to proactively Celebrities Musicians & Actors
mitigate risks and ensure the safety and security of the executive. High Net Worth Individuals Other VIPs

Identify Online Information Find Primary Risks


Identify personal information and media of the executive, relatives and close Personal Data Exposure
associates. Check for home, vehicle, email address, phone, and password exposure.
Social media accounts often contain a wealth of personal
information, including photos, locations, activities, and
Monitor online chatter, social media conversations, and forums for any threats, connections.
harassment, or hostile sentiment directed towards the executive.
Exposed Home Address
Executive’s and family social media profiles, online activity, and posts to assess
their interests, habits, and potential vulnerabilities. Check privacy settings. It allows malicious individuals to locate and
potentially harm them in their own residence.
Assess the potential security risks associated with the executive's travel
destinations, transportation arrangements, and accommodations. Exposed Email or Phone
This can lead to harassment, unsolicited communication,
Monitor online mentions, reviews, and news coverage related to the executive's phishing attempts, or even more serious threats such as
reputation, brand image, and professional activities. extortion or blackmail.

Identify any compromised accounts, leaked credentials, or other indicators of Predictable Location or Routine
cyber threats targeting the executive's personal information or digital assets. Knowing their daily activities or travel patterns allows
malicious individuals to anticipate their movements and
Recognize potential security vulnerabilities, access points, and emergency exits exploit vulnerabilities in their security.
for relevant locations to inform security planning and risk mitigation efforts.
Exposed Credentials or Passwords
Unauthorized access to sensitive information,
financial accounts, or even critical systems.

Detect Threat Category Direct or Indirect Threats


Threats against the executive or their family members
pose an immediate danger to their safety and well-being

Vulnerability to assault, kidnapping, burglaries or harassment.


Physical Threat Risks posed by environmental factors or civil unrest in regions.
Corporate espionage or sabotage by competitors or insiders.

Monitoring of data breaches and other vulnerabilities. Know The Right Tool
Digital Threat Cyber threats targeting the executive’s digital assets / accounts.
Reputational damage if sensitive information is leaked online.

POIs investigation
Threats against family members or personal relationships. Skopenow Social media intelligence
Indirect Threat Indirect threats made against business or employees. Situational awareness
Mishandling of crisis and inadequate response to controversies.

Social media intelligence


Social Links Online monitoring
Crimewall POIs investigation

Take Actions to Minimize Risks NexusXplore


POIs investigation
Situational awareness
Social network analysis
Lock down executive and family Regular monitoring of online chatter,
members personal social media. social media, and news reports. Situational awareness
Samdesk Real-time crisis alerts
Employee safety
Background check services to vet Change breached passwords. Create
individuals and organizations. unique passwords for all accounts.
InGrav Social media intelligence
Network analysis
PeopleMon POIs investigation
Request “right to erasure” for Search for information about travel
platforms sharing PII. plans, itineraries, and future events.
Social media intelligence
ShadowDragon Online monitoring
Conduct a comprehensive search of Share with law enforcement direct Horizon Geolocation analysis
the executive's digital footprint. and credible threats.

www.cibergy.com
Alex Lozano
@Cibergy
OSINT Cheat Sheet
Brand Intelligence
OSINT For Brand Intelligence Negative Effects
Competitive Disadvantage Loss of Trust
By leveraging OSINT, brands can proactively manage their reputation, Decreased Sales Legal Scrutiny
respond swiftly to potential issues, and continuously align their Brand Devaluation Lower Profitability
Negative Media Coverage Social Media Blacklash
strategies with customer expectations and market dynamics. Employee Turnover Increased Costs

Main Strategies Why is It Essential?


Customer Trust & Loyalty
Real-Time Monitoring
A strong reputation fosters trust and encourages
OSINT tools can continuously scan social media, forums, news sites, and other customer loyalty.
online platforms to track what is being said about a brand.
Competitive Advantage
Sentiment Analysis It can be a deciding factor for consumers when
Advanced OSINT tools often include sentiment analysis features, which help in choosing between similar products or services.
categorizing mentions of the brand as positive, negative, or neutral.
Crisis Resilience
Crisis Management Brands with strong reputations are better able to
withstand negative events or crises.
Early detection of negative mentions or potential crises can help brands respond
promptly before issues escalate.
Attracting Talent
Competitor Insights Companies with good reputations are more
attractive to top talent.
By monitoring competitors, OSINT provides valuable information about their
activities, strategies, and public perception.
Customer Acquisition & Retention
Influencer Engagement A good reputation makes it easier to acquire new
customers and retain existing ones.
OSINT can identify key influencers, bloggers, and thought leaders who have
significant influence over public opinion.
Financial Performance
Command higher prices, achieve better market
Customer Feedback Collection positions, and attract more investment.
This feedback can be used to improve products, services, and customer support,
thereby enhancing overall brand reputation. Stakeholder Relationships
Positive reputation helps in building strong
Market and Trend Analysis relationships with stakeholders, including
investors, partners, and suppliers.
Understanding what customers want and predicting future trends helps in making
strategic decisions that positively influence brand perception.

Internal Monitoring
OSINT ensures employees represent the brand well online and identifies internal Know The Right Tool
issues to prevent damage to the brand’s reputation.

Social listening
Talkwalker Brand awareness
Sentiment analysis

Actions to Enhance Reputation Brandwatch


Social listening
Brand awareness
Sentiment analysis

Monitor and respond to Build and maintain positive Alto Risk & Threat detection
Crisis management
online feedback online media relations Intelligence Monitoring & alerts

Engage with your online Ensure excellent online Twitter monitoring


TweetDeck List management
audience customer service Advanced search features

Social media intelligence


Promote online Corporate Encourage and showcase ShadowDragon Online monitoring
Social Responsibility (CSR) positive online reviews Horizon POIs investigation

SocialLinks Social media intelligence


Create and share high-quality Leverage influencer and brand Online monitoring
Crimewall
content ambassadors partnerships POIs investigation

www.cibergy.com
Alex Lozano
@Cibergy
Intelligence Quotes
BY RENOWNED PERSONALITIES

Albert Einstein

Stephen Hawking The measure of


intelligence is the Henry Mintzberg
ability to change.
Intelligence is the Intelligence is the
ability to adapt to Maria Konnikova Sadhguru
ability to recognize
change. Intelligence is the patterns.
Intelligence is the
ability to see ability to make
patterns, connect sense of things,
dots, and extract rather than simply
meaning from knowing a lot of
complexity. things.

Edward de Bono
Anaïs Nin
John F. Kennedy Helen Keller Simone de Beauvoir
Intelligence is the
Intelligence is the
Intelligence is the Intelligence is not the Intelligence is the ability to find and
ability to see
ability to take in ability to store ability to think solve problems and
possibilities where
information and use information, but to independently and create products of
others see closed
it to make decisions. know where to find it. to understand things value in the world.
doors.
deeply.

www.cibergy.com
Alex Lozano
@Cibergy
OSINT Tips
Cheat Sheet
OPSEC: Your Essential Shield The Golden Rule of Verification
Lower adversary exploitation risk. The accuracy of information is paramount.
Stay anonymous by hiding who you are. Trustworthiness. Not all sources are reliable.
Keep activities hard to trace and follow. Verified data is crucial for effective decisions.

Develop Technical Customer Focus


Skills By understanding the customer's goals
Become acquainted with and priorities, analysts can prioritize their
essential OSINT tools and efforts to focus on gathering the most
master advanced search valuable information.
strategies.

Pivot, Pivot & Pivot


Become flexible in transitioning between
data points and sources.

It's crucial to gather extensive, confirmed data


to aid in solving the case.

Stay Up-To-Date Think Creatively


Join an OSINT community; Be creative in your approach
monitor social media, listen to to finding information, and
podcasts, attend workshops, consider unconventional
and read books and blogs. sources or methods.

Documenting Your Way to Intelligence


Keep thorough documentation of your findings, including
the sources you used and the methodologies employed.
This helps ensure transparency and reproducibility.

www.cibergy.com
Alex Lozano
@Cibergy
Alex Lozano

Technical skills can secure you a job.

But interpersonal skills will advance your career.

10 soft skills to accelerate your OSINT career:

1. Analytical Thinking 6. Curiosity

Identify relevant information. Dig deeper.


Spot patterns. Learn new tools.
Evaluate data credibility. Stay updated.

2. Attention to Detail 7. Adaptability

Ensure accuracy. Adjust to changes.


Avoid missing details. Use new tools effectively.
Prevent incorrect conclusions. Stay relevant.

3. Critical Thinking 8. Ethical Judgment

Question assumptions. Handle sensitive info responsibly.


Assess source validity. Maintain integrity.
Make sound judgments. Make ethical decisions.

4. Communication Skills 9. Collaboration

Convey findings clearly. Work well in teams.


Ensure understanding. Share insights.
Present complex info simply. Achieve common goals.

5. Problem-Solving 10. Time Management

Tackle unique challenges. Prioritize tasks.


Develop innovative strategies. Meet deadlines.
Find effective solutions. Manage workload efficiently.

Thanks for reading! If you found this interesting, follow for more
insights on OSINT!

www.cibergy.com
@Cibergy
Alex Lozano

7 Essential OSINT Steps for Executive & VIP Security.

Use these steps as a checklist:

1. Personal Information and Media Analysis

Identify personal information and media of the executive, relatives and associates.
Check for home, vehicle, email address, phone, and password exposure.

2. Threat Detection and Risk Monitoring

Monitor online chatter, social media conversations, and forums for any threats,
harassment, or hostile sentiment directed towards the executive.

3. Social Media Vulnerability Assessment

Explore executive’s and family social media profiles, online activity, and posts to assess
their interests, habits, and potential vulnerabilities. Check privacy settings.

4. Travel and Accommodation Risk Assessment

Assess the potential security risks associated with the executive's travel destinations,
transportation arrangements, and accommodations.

5. Reputation Management and Media Monitoring

Monitor online mentions, reviews, and news coverage related to the executive's
reputation, brand image, and professional activities.

6. Cybersecurity Threat Identification

Identify any compromised accounts, leaked credentials, or other indicators of cyber


threats targeting the executive's personal information or digital assets.

7. Physical Security and Vulnerability Mapping

Recognize potential security vulnerabilities, access points, and emergency exits for
relevant locations to inform security planning and risk mitigation efforts.

Thanks for reading! If you found this interesting, follow for more
insights on OSINT!

www.cibergy.com
@Cibergy
The Intelligence Cycle
For Open Source Intelligence (OSINT) Professionals

The Intelligence Cycle


d
an Co Da
i ng on lle ta
Plan, strategize, research, discuss,
n ti gather intelligence, execute task
lan rec ct
io efficiently.
P
Di n
Gather intelligence overtly and
covertly, utilizing various
technological resources.
ck

Pro
tion

Ex
a

p
b

c
Compile collected data into
loi g and
a
d

e intelligence reports.
n

s
Fee

t
i

sin
a
em

tion
and
Diss

Analyze data, determine


relevance, anticipate outcomes,
evaluate impact on interests.
Analysis and
Production Deliver analysis to policymaker,
await feedback, restart cycle as
necessary.

General Aspects
Step by Step Tips
Strive for precision and correctness
Planning & Data Processing & Cross-check information with multiple
Direction Collection Exploitaition sources
OSINT - Open Source
Maintain a sense of urgency
Define Objectives Use Diverse Sources Organize Data Intelligence
Identify Requirements Automate If Possible Remove Redundancies Ensure timely delivery
Select Sources Verify Credibility Normalize Formats
Encompasses accessible
Use credible sources and methods
Develop a Plan Stay Ethical and Legal Document Sources information found in various
Continuously evaluate the reliability
mediums such as printed
Adhere to legal and moral guidelines
materials
Analysis & Dissemination Comply with ethical standards
Production & Feedback Stay flexible and ready to adjust
Be prepared to pivot quickly
Identify Patterns Create Reports
Assess Reliability Tailor to Audience Ensure OPSEC thorough all phases
Contextualize Data Solicit Feedback Implement measures to safeguard
Generate Insights Update Methods

www.cibergy.com
Alex Lozano
@Cibergy
21 BROWSER EXTENSIONS
For Open Source Intelligence (OSINT) Professionals

uBlock Origin Cookie Google Translate


AutoDelete
Blocks ads and Translate text
trackers Control cookies

RevEye Privacy Badger DownThemAll

Reverse image Block tracking Bulk download files


search scripts from websites

Exif Viewer Vortimo Instant Data


Scraper
View metadata Analyze web
content Data scraper

Wayback Fireshot Context Search


Machine
Screen capture Quickly search
Web archive for text

User-Agent Sputnik Video


Switcher DownloadHelper
Search digital
Modify your U-A Download videos
identifiers

Shodan Forensic OSINT ESUIT

Retrieve website Screen capture Facebook content


information downloader

Hunchly Bot Sentinel Hive AI Detector

Capture web Detect bots on Detect AI-


pages X (Twitter) generated media

www.cibergy.com
Alex Lozano
@Cibergy
21 BLOGS & NEWS SITES
For Open Source Intelligence (OSINT) Professionals

Cyber OSINT SocialLinks


Detective Combine Blog

Secjuice Bellingcat Nixintel


Blog

Skopenow Blackdot
Sector035
Blog Solutions Blog

Authentic8 ShadowDragon Offensive


Blog Blog OSINT

Rae Baker Maltego ESPY


Blog Blog Blog

VEEXH OSINT
hatless1der
Medium Team

OH SHINT
OSINTME CQcore
Blog

www.cibergy.com
Alex Lozano
@Cibergy
21 OSINT COLLECTIONS
For Intelligence Analysts and Investigators

OSINT OSINT UK
Framework Essentials OSINT

Inteltechniques Aware Online Toddington


Search Tools Tools

The Ultimate OSINT Dojo Reuser’s


OSINT Collection Resources Repertorium

Malfrat’s IntelligenceX Achirou OSINT


OSINT Map Tools Tools

Bellingcat’s OH SHINT!
Meta
Online OSINT Web Resources
OSINT
Toolkit

SPJ OSINT Combine The OSINTion


Toolbox Free Tools Wiki

OSINT
Techniques OSINT Toolkit OSINT Map
Tools

www.cibergy.com
Alex Lozano
@Cibergy
60 High-Demand Jobs in Open
Source Intelligence (OSINT)

Government Private Sector


1. OSINT Analyst - Conduct open source intelligence for national security. 11. Corporate Security Analyst - Use OSINT to protect corporate assets.

2. Cyber Intelligence Analyst - Monitor and analyze cyber threats. 12. Fraud Investigator - Investigate fraud using open source data.

3. Intelligence Officer - Use OSINT to support defense and security operations. 13. Cyber Threat Analyst - Monitor and mitigate cyber threats.

4. Counterterrorism Analyst - Analyze open-source information to prevent terrorism. 14. SOC (Security Operations Center) Analyst - Monitor and analyze security events.

5. Law Enforcement Intelligence Analyst - Support law enforcement operations. 15. Brand Protection Specialist - Monitor and protect brand reputation.

6. Border Security Analyst - Utilize OSINT for monitoring and securing borders. 16. Due Diligence Investigator - Conduct background checks and investigations.

7. Public Health Intelligence Officer - Use OSINT to track public health threats. 17. Incident Response Analyst - Utilize OSINT during cyber incident investigations.

8. Diplomatic Security Analyst - Provide security analysis for diplomatic missions. 18. Digital Forensics Investigator - Use OSINT in digital forensics investigations.

9. Military Intelligence Analyst - Support military operations with OSINT. 19. Red Team Operator - Use OSINT to plan and execute simulated cyber attacks.

10. Threat Analyst - Identify and analyze threats to national security. 20. Competitive Intelligence Analyst - Analyze market and competitor information.

Technology & Software Freelance & Consultancy


21. OSINT Tool Developer - Develop software tools for OSINT gathering. 31. Freelance OSINT Investigator - Offer OSINT services on a contract basis.

22. Data Engineer - Design and manage systems that process and analyze OSINT. 32. Security Consultant - Provide security analysis using open-source intelligence.

23. Machine Learning Engineer - Implement ML models to analyze OSINT data. 33. Private Investigator - Use OSINT for private investigations.

24. Software Engineer - Build applications for OSINT analysis and visualization. 34. Risk Consultant - Offer risk assessments using open sources.

25. Data Scientist - Use statistical and computational techniques to extract insights. 35. Social Media Consultant - Analyze social media trends for clients.

26. AI Researcher - Develop AI algorithms to enhance OSINT capabilities. 36. Cybersecurity Consultant - Provide cybersecurity services using OSINT.

27. Web Scraping Specialist - Create scripts / tools to collect data from web sources. 37. Competitive Intelligence Consultant - Advise businesses on market intelligence.

28. Geospatial Analyst - Analyze spatial data from open sources for intel purposes. 38. Crisis Management Consultant - Use OSINT to manage crises.

29. Cybersecurity Software Developer - Develop security software using OSINT. 39. Brand Protection Consultant - Help businesses protect their brand using OSINT.

30. Cloud Architect - Design cloud infrastructure to support OSINT operations. 40. KYC / AML Consultant - Provide KYC / AML services using OSINT.

Journalism & Academia Non-Profit Organizations


41. Investigative Journalist - Use OSINT to uncover stories and investigate issues. 51. Human Rights Researcher - Use OSINT to document human rights abuses.

42. Research Analyst - Conduct open-source research for academic studies. 52. Environmental Research Analyst - Monitor environmental issues using OSINT.

43. Cybersecurity Researcher - Investigate cybersecurity threats using OSINT. 53. Crisis Response Analyst - Use OSINT to respond to humanitarian crises.

44. OSINT Author - Write books and articles on OSINT techniques and applications. 54. NGO Security Analyst - Ensure the security of non-profit operations with OSINT.

45. Fact-Checker - Verify the accuracy of information using open-source data. 55. Transparency Investigator - Investigate corruption and promote transparency.

46. Foreign Correspondent - Use OSINT to report on international news. 56. Social Media Analyst - Monitor social media for advocacy and awareness.

47. Intelligence Studies Professor - Teach and research OSINT methodologies. 57. Policy Analyst - Use OSINT to inform policy recommendations.

48. OSINT Instructor - Provide training and teach courses on open-source intelligence. 58. Public Health Researcher - Track and analyze public health data.

49. Business Reporter - Analyze and report on business trends and market data. 59. Conflict Researcher - Monitor and analyze conflicts using open sources.

50. Data Scientist - Analyze open-source data for academic research. 60. Disaster Response Analyst - Use OSINT for disaster preparedness and response.

www.cibergy.com
Alex Lozano
@Cibergy
60 High-Demand Services in
Open Source Intelligence (OSINT)

Social Media & Online Monitoring Cybersecurity & Threat Intelligence


1. Social Media Monitoring: Track and analyze content across social media platforms. 11. Cyber Threat Intelligence: Identify and mitigate emerging cyber threats.

2. Sentiment Analysis: Analyze public opinions through sentiment on social platforms. 12. Dark Web Monitoring: Monitor dark web for threats and illicit activities.

3. Disinformation Detection: Identify and combat false or misleading information. 13. Threat Actor Profiling: Analyze and understand cyber threat actor behaviors.

4. Brand Protection: Monitor and safeguard corporate reputation and trademarks. 14. Incident Response Support: Provide intelligence during cybersecurity incidents.

5. Social Engineering Awareness: Detect social engineering cyber threats. 15. Digital Forensics Support: Use OSINT to aid digital forensic investigations.

6. Public Sentiment Tracking: Measure public mood and opinions on issues. 16. Online Fraud Investigations: Detect and investigate online fraud activities.

7. Online Reputation Management: Manage and improve online public perception. 17. Counter-Terrorism Intelligence: Analyze threats to prevent terrorist activities.

8. Virtual Event Monitoring: Track and analyze activities in virtual events. 18. Compliance Monitoring: Ensure adherence to legal and regulatory standards.

9. Influencer Analysis: Assess influence and reach of online personalities. 19. Threat Intelligence Fusion: Integrate multiple data sources for analysis.

10. Hashtag / Keyword Analysis: Analyze topics through hashtags and keywords. 20. Vulnerability Assessment: Identify and analyze security vulnerabilities and risks.

Geospatial & Environmental Competitive & Market Intelligence


21. Geolocation Analysis: Determine locations using open-source geospatial data. 31. Competitive Intelligence: Analyze competitors’ strategies and market positions.

22. Geospatial Intelligence: Analyze spatial data to support operational decisions. 32. Due Diligence: Conduct thorough investigations before major business decisions.

23. Environmental Intelligence: Monitor environmental risks and impacts globally. 33. Financial Intelligence: Analyze financial data for fraud and insights.

24. Travel Risk Assessment: Evaluate risks associated with travel and locations. 34. Trade and Market Analysis: Evaluate market trends and trade opportunities.

25. Disaster Preparedness: Analyze data for effective disaster response planning. 35. Recruitment Intelligence: Analyze recruitment trends and practices.

26. Event Monitoring: Track events for real-time situational awareness. 36. Emerging Technology Tracking: Monitor and assess new technologies and trends.

27. Supply Chain Risk Assessment: Assess risks within supply chain operations. 37. Business Intelligence: Extract insights from business data and operations.

28. Geospatial Data Visualization: Visualize spatial data for clearer intelligence insights. 38. Political Intelligence: Assess political risks and opportunities in markets.

29. Border Security Analysis: Use OSINT for monitoring and securing borders. 39. Market Entry Risk Assessment: Evaluate risks in entering new markets.

30. Mapping Humanitarian Crises: Analyze and map crises for humanitarian response. 40. Brand Protection: Safeguard brand from competitive threats and misuse.

Legal, Compliance & Policy Research Research, Analysis & Training


41. Public Records Research: Retrieve information from accessible public records. 51. Research Services: Provide detailed insights through comprehensive research.

42. Background Checks: Verify individuals’ histories for employment or investigations. 52. Academic and Scientific Research: Research in academic and scientific fields.

43. Regulatory and Policy Analysis: Analyze laws and policies affecting operations. 53. Education and Training: Develop and deliver OSINT training programs.

44. Legal and Ethical Compliance: Ensure adherence to legal and ethical guidelines. 54. Cultural Sensitivity Training: Train on cultural awareness for international ops.

45. Government and Policy Analysis: Study governmental actions and policy impacts. 55. Public Health Surveillance: Monitor health data to track disease spread.

46. Document Analysis: Review documents for legal and regulatory compliance. 56. Humanitarian Assistance Research: Support humanitarian efforts through OSINT.

47. Law Enforcement Support: Provide intelligence support to LEAs. 57. Crisis Simulation and Exercises: Prepare for crises through simulated scenarios.

48. Crisis Communication: Manage communication during legal crises. 58. Local and Regional Conflict Analysis: Analyze conflicts at local and regional levels.

49. Human Intelligence (HUMINT) Support: Integrate human intelligence with OSINT. 59. OSINT Tool Development and Training: Create and teach OSINT software tools.

50. Corruption Investigations: Investigate corruption and promote transparency. 60. Machine Learning and AI for OSINT: Apply AI to enhance OSINT capabilities.

www.cibergy.com
Alex Lozano
@Cibergy
EUROPEAN BUSINESS DATA
OSINT Cheat Sheet
PART 1

GERMANY UNITED KINGDOM


Handelsregister - https://www.handelsregister.de Companies House -https://www.gov.uk

Bundesanzeiger - https://www.bundesanzeiger.de Opencorporates - https://opencorporates.com

Unternehmensregister - https://www.unternehmensregister.de The Gazette - https://www.thegazette.co.uk

Creditreform - https://firmeneintrag.creditreform.de Company Check - https://www.companycheck.co.uk

North Data - https://www.northdata.de Bizstats - https://bizstats.co.uk

FRANCE ITALY
Infogreffe - https://www.infogreffe.fr Registro delle Imprese - https://www.registroimprese.it

Societe - https://www.societe.com Infocamere - https://www.infocamere.it

Pappers - https://www.pappers.fr Empresite - https://www.empresite.it

Verif - https://www.verif.com Opencorporates - https://opencorporates.com

BODACC - https://www.bodacc.fr Pagine Gialle - https://www.paginegialle.it

RUSSIA SPAIN
EGRUL - https://egrul.nalog.ru Registro Mercantil Central - https://www.rmc.es

Rusprofile - https://www.rusprofile.ru BORME - https://www.boe.es

Zachestnyibiznes - https://zachestnyibiznes.ru Axesor - https://www.axesor.es

List-org - https://www.list-org.com Librebor.me - https://librebor.me

Kontur Focus - https://focus.kontur.ru Datoscif - https://www.datoscif.es

NETHERLANDS SWITZERLAND
Kamer van Koophandel (KvK) - https://www.kvk.nl Zefix - https://www.zefix.ch
OpenKvK - https://openkvk.nl SIX Swiss Exchange - https://www.six-group.com

Drimble - https://drimble.nl SHAB - https://www.shab.ch


DNB Business Register - https://www.dnb.nl/en/public-register Moneyhouse - https://www.moneyhouse.ch

Dun & Bradstreet - https://www.dnb.com Swissreg - https://www.swissreg.ch

www.cibergy.com
Alex Lozano
@Cibergy
The Ultimate
OSINT Cheat Sheet 2024

¿What is Facebook? Key Tips For Investigations


1. Always use sock puppets for Facebook investigations.
Facebook is a social media platform where people can
2. Start POI searches on Facebook as the primary social platform.
connect with friends, share photos and videos, post 3. If unsuccessful, search for relatives, friends, groups or pages.
updates, join groups, follow pages, chat with others, 4. Identify the user’s ID as the first step. Do the same with pages.
5. Tagged pictures can provide extremely valuable information.
and interact with their network. 6. Use three dots on profile’s feed to find related topics and individuals.
7. Leverage Facebook’s advanced search options to narrow down results.
8. Inteltechniques Facebook Search Tool facilitates your searches.

Top Free Tools 9. Marketplace offers unique solutions for investigating fraud.
10. Monitor Facebook Live to analyze live events worldwide.
11. The Facebook data breach helps easily find profiles (+533 accounts).
12. Pivoting from FB to other social media platforms is key for success.
Instant Data Scraper 13. Add friends / click ads / like posts to avoid being blocked.
Extracts data from web pages and exports it as Excel or CSV 14. Document all findings with links and user/pages IDs.
files.

ESUIT
Facebook extension to download photos, videos, comments,
likes, posts, etc.
Main Information Sources
HaveIBeenZuckered Profile Information Events & Activities
Check if your telephone number is present within the
Facebook data breach. Friends & Connections Communication Patterns

FB Sleep Stats Photos & Videos Tags & Mentions


Gather data about Facebook users sleep patterns.
Check-ins & Location Likes & Reactions

Inteltechniques Facebook Search Tool Posts & Comments Timeline Analysis


Search for detailed information on Facebook. Groups & Pages Marketplace & Live

OSINT Investigations & Guidelines Top Paid Tools


Personal POI Identification through personal data: names, locations... Social Links Social media intelligence
Online monitoring
Check interests and preferences through public interactions.
Information Identify habits, routines, and time-based behavior.
Crimewall POI investigations
& Behavior Review timelines for a history of significant events.
POI investigations
Establish social circles and associations through friends lists. Skopenow Social media intelligence
Social Investigate groups and pages to find interests and affiliations. Situational awareness
Connections Identify tags to highlight relationships and key contacts.
Observe public conversations and comment threads.
& Network Use tools to automate searches and visualizing social networks. POI investigations
NexusXplore Situational awareness
Social network analysis
Map movements, routines, and frequently visited places.
Location Reveal locations, dates, and activities from public images. Network analysis
& Movement Gain insights on attended activities and upcoming plans. Maltego Online monitoring
Access historical posts to track movements or behavior changes. POI investigations

Facebook Compare listings to reports to identify stolen goods. InGrav Social media intelligence
Analyze listings to uncover patterns linked to organized crime. Network analysis
Marketplace PeopleMon POIs investigations

Reverse Image Search


Facebook Gather immediate insights into events as they unfold.
Pimeyes POI Identification
Identify key participants and understand public sentiment.
Live Online monitoring

www.cibergy.com
Alex Lozano
@Cibergy
SOCMINT TOOLS
Cheat Sheet
PART 1

Facebook Instagram

Instant Data Scraper Turbo Downloader


Extracts data from web pages and exports it as Download photos, videos and reels from
Excel or CSV files. Instagram.

ESUIT List More


Facebook extension to download photos, videos, Extensions to export followers, comments, likes,
comments, likes, posts, etc. emails, phones from profiles.

HaveIBeenZuckered Toutatis
Check if your telephone number is present Tool that allows you to extract info from
within the Facebook data breach. such as emails, phones, etc.

FB Sleep Stats Instaloader


Gather data about Facebook users sleep patterns. Scrapes public and private profiles, hashtags,
stories, feeds, media, metadata, etc.

Inteltechniques Facebook Search Tool Inteltechniques IG Search Tool


Search for detailed information on Facebook. Search for detailed information on Instagram.

X (Twitter) Tik Tok


Tweetdeck (X Pro) Bravedown
Interface where users can organize, monitor, and Download videos and stories from top social media
interact with multiple Twitter feeds in real-time. platforms.

Deleted Tweet Finder Tik Tok Scraper


Search for deleted tweets across multiple Scrape TikTok followers from any public profile.
archival services.

Twint Hashtag Analysis


Scraps data from X profiles without relying Download posts and videos from TikTok for
on X’s API. a given set of hashtags over a period of time.

Warble Export Comments


Email Alerts for Twitter. Exports comments from your social media
posts to Excel file.

Inteltechniques Twitter Search Tool OSINT Combine TikTok Quick Search


Search for detailed information on Twitter. Search usernames and hashtags on TikTok via a
browser.

www.cibergy.com
Alex Lozano
@Cibergy
10 Excellent Youtube
Channels On OSINT
Videos on OSINT, maps, and data.
Bendobrown Learn geolocation, satellite imagery, and analysis.
OSINT tutorials for digital investigations.

A collection of solutions to OSINT exercises.


Gralhix - Sofia
Videos about OSINT tools and analysis.
Santos Tips on geolocation techniques and real-life examples.

Explore OSINT with a forensic focus.


Forensic
Learn OSINT tools for investigations.
OSINT Resources for professionals and tech enthusiasts.

OSINT tips and tools for beginners.


The OSINT
10 minute videos on OSINT skills and tools.
Curious Project Quality OSINT blogs, and tutorials.

Short, actionable OSINT video tutorials.


Gary Ruddell Discover new tools and methods easily.
Explore cyber intelligence tools and techniques.

Free OSINT guidance for beginners.


OSINT Dojo Training on OSINT tools and methods.
Skill-building OSINT challenges and tutorials.

Engaging OSINT podcasts for continuous learning.


Authentic8 Motivating deeper exploration of OSINT topics.
Essential tips on OSINT techniques and skills.

Real-life OSINT investigations for practical learning.


Cody Bernardy Step-by-step tutorials on OSINT tools.
Engaging OSINT challenges to test your skills.

www.cibergy.com
Alex Lozano
@Cibergy
6 KEY OSINT STEPS
For Investigating the Dark Web

Define Clear Objectives Maintain OPSEC

Before diving into dark web research, Security is essential when accessing the dark web:
define specific objectives. Knowing exactly
what you're looking for, whether it's: Use virtual machines (VMs) to minimize risks of
malware or tracking.
Tracking illegal activity. Employ Tor Browser or I2P for anonymous browsing.
Consider using VPNs to add an extra layer of privacy.
Identifying cyber threats.
Enable strong firewalls, and use multi-factor
Gathering intelligence on a specific group.
authentication to secure your system.

Identify Relevant Dark Web


Marketplaces and Forums
Gather and Analyze Metadata

You can identify relevant marketplaces, Extracting and analyzing metadata from dark web
forums, or sites through the following resources can provide key insights:
methods:
Analyze site uptime, traffic, and server details using tools
like OnionScan to understand vulnerabilities and identify
Search engines for the dark web like Ahmia.fi. patterns.

OSINT databases that collect and track known Review timestamps, file formats, and server responses to
dark web sites and domains. gather technical information about sites or transactions.

Join dark web forums or communities where Collect Bitcoin transaction metadata if investigating
users exchange information. cryptocurrency payments related to illicit activities.

Monitor Threat Actors and Analyze Cryptocurrency


Activity Transactions
Monitoring individuals or groups is an Many illicit transactions on the dark web are
important part of dark web investigations: conducted using cryptocurrencies, especially
Bitcoin:
Observe chatter in forums, marketplaces, and on
social media platforms (both surface and dark Use blockchain explorers like Blockchair or
web). CipherTrace to trace wallet addresses linked to dark
web markets.
Use automated web crawlers and monitoring
tools to track activity related to the keywords or
Look for patterns of movement or laundering activities.
targets of interest.

Leverage OSINT tools that scrape the dark web for Link crypto wallets to known marketplaces or suspect
information on particular topics, such as threat individuals by tracking addresses and transaction
actors, vendors, or criminal activities. histories.

www.cibergy.com
Alex Lozano
@Cibergy
STAY AHEAD IN OSINT
Must-Follow LinkedIn Profiles for OSINT Insights

Cynthia Ritu Skip


Navarro Gill Schiphorst

Arno Gary Cynthia


Reuser Ruddell Hetherington

Justen Nico Dmitry


Charters Dekens Danilov

Nina Sofia Michael


Maelainine Santos Bazzell

Griffin Manuel Micah


Glynn Travezaño Hoffman

Jezer Rae Nihad


Ferreira Baker Hassan

Steven Benjamin Craig


Harris Strick Silverman

www.cibergy.com
Alex Lozano
@Cibergy
www.cibergy.com
Alex Lozano
@Cibergy

Types of Investigations.
Due Diligence.

Strategic Due Diligence


A comprehensive assessment process used
primarily in mergers and acquisitions (M&A) to
evaluate the strategic fit, value, and potential risks
associated with a target company.

Employee Due Diligence


The process of evaluating and verifying the
background, qualifications, and suitability of
potential or current employees to ensure they meet
the standards for their roles within an organization.

It is essential to use data extraction


Management Due Diligence (MDD)
tools to gather relevant information
Evaluating the capabilities, track record, and about the target organization, asset,
potential of the management team of a target or individuals.
company, in the context of mergers and
acquisitions (M&A), investments, or partnerships.

Customer Due Diligence (CDD)


Verifying the identity of customers and assessing
the potential risks they pose in terms of money
laundering, terrorist financing, and other financial
crimes.

Investment Due Diligence


The process of evaluating an investment opportunity
to ensure that it aligns with the investor’s goals, risk
tolerance, and expected returns.

ESG Due Diligence


Due diligence investigations include
The process of assessing a target company or
investment's environmental, social, and governance the analysis of financial reports, social
(ESG) factors to evaluate its sustainability practices, media, legal documents, news, and
ethical impact, and potential risks. other data sources.
OSINT
Cheat Sheets

You might also like