Open Source Intelligence

OSINT INTEL HUB Complete Toolkit Guide

The definitive guide to open-source intelligence tools β€” from surface web recon to deep digital forensics. Every tool. Every use case. Zero fluff.

0 Tools Covered
0 Categories
0 Use Cases
Scroll

The Complete OSINT Toolkit

Every tool you need, organized by category. Click any card to expand usage details.

πŸ” Search & General Intelligence
3 tools
01 / 20
Google Dorks
Search

Advanced Google search operators to surface hidden content, exposed files, and sensitive data that normal searches miss.

How to Use
site:example.com filetype:pdf inurl:admin login intitle:"index of" passwords "@company.com" filetype:xls

Use Case: Finding exposed documents, login pages, sensitive data, open directories, and email lists.

02 / 20
Shodan
Cyber

The world's first search engine for internet-connected devices. Finds servers, webcams, routers, and industrial systems.

How to Use
Search by IP, hostname, or keyword. Use filters:
port:22 country:IN os:"Windows Server 2019" product:"Apache httpd"

Use Case: Exposed device discovery, vulnerability research, network mapping, attack surface analysis.

03 / 20
Maltego
Cyber

Visual intelligence platform that maps relationships between people, domains, IPs, and organizations using graph-based analysis.

How to Use
Start with any entity (email/domain) β†’ Run "Transforms" β†’ Visualize linked data as a graph. Available as desktop app.

Use Case: Cyber investigations, mapping criminal networks, corporate intelligence, digital footprint tracking.

πŸ‘€ People & Identity
3 tools
04 / 20
Pipl / BeenVerified
People

People search engines aggregating public records, social profiles, contact info, and background data in one place.

How to Use
Enter name, email, phone number, or username. Apply location/age filters. Review aggregated results from public databases.

Use Case: Background checks, identity verification, finding contact info, locating individuals.

05 / 20
Namechk
People

Instantly checks username availability across 100+ platforms. Green = available, Red = taken (someone is there).

How to Use
Go to namechk.com β†’ Enter a username β†’ See all platforms where it's registered with direct links.

Use Case: Finding all social media accounts tied to a username, tracking online presence.

06 / 20
Sherlock
People

Open-source CLI tool that hunts for a username across 300+ social networks simultaneously. Fast and reliable.

How to Use
pip install sherlock-project sherlock username sherlock username --timeout 10

Use Case: Username tracking, digital footprint mapping, social media investigation across platforms.

πŸ“§ Email & Domain Intelligence
4 tools
07 / 20
Hunter.io
Email

Finds and verifies professional email addresses for any company domain. Also reveals the email format pattern used.

How to Use
Enter domain (e.g., apple.com) β†’ Get list of known emails + pattern (firstname@company.com) β†’ Verify with Email Verifier.

Use Case: Corporate email discovery, sales prospecting, journalist outreach, email verification.

08 / 20
MXToolbox
Email

Complete suite for DNS diagnostics, email server analysis, blacklist checks, and email header tracing.

How to Use
Enter domain β†’ Check MX records, SPF, DKIM, DMARC. Use "Header Analyzer" to trace email origin. Check IP blacklists.

Use Case: Email header forensics, verifying authenticity, domain recon, spam investigation.

09 / 20
WHOIS Lookup
Domain

Reveals domain registration info β€” owner, organization, registrar, dates, and name servers. Historical lookups via DomainTools.

How to Use
Visit whois.domaintools.com β†’ Enter domain β†’ View registrant details, creation/expiry dates, hosting info. Use historical tab for past data.

Use Case: Identifying website owners, domain history, investigating suspicious sites, legal research.

10 / 20
theHarvester
Domain

CLI tool for gathering emails, subdomains, IPs, and URLs from multiple public sources in one command.

How to Use
pip install theHarvester theHarvester -d example.com -b google theHarvester -d target.com -b all

Use Case: Pre-engagement recon, email harvesting, subdomain enumeration, penetration testing prep.

πŸ–ΌοΈ Image & Video Analysis
3 tools
11 / 20
Google Reverse Image / TinEye
Image

Search engines that find where an image appears online and identify visually similar images across the web.

How to Use
Go to images.google.com β†’ Click camera icon β†’ Upload or paste URL. TinEye (tineye.com) gives exact match history with dates.

Use Case: Fake profile detection, tracing image origin, verifying photo authenticity, finding original sources.

12 / 20
InVID / WeVerify
Image

Browser plugin and web tool for verifying images and videos. Extracts keyframes, checks metadata, runs reverse searches.

How to Use
Install InVID Chrome/Firefox extension β†’ Right-click any image or paste video URL β†’ Analyze keyframes, metadata, and reverse search results.

Use Case: Viral content verification, deepfake detection, news fact-checking, journalistic verification.

13 / 20
ExifTool
Metadata

Reads and writes metadata embedded in images, PDFs, and media files β€” including GPS coordinates, device info, and timestamps.

How to Use
exiftool image.jpg exiftool -GPS* photo.jpg exiftool -all= cleanphoto.jpg

Use Case: Geolocating photos, identifying camera/device, finding timestamps, privacy cleanup.

πŸ—ΊοΈ Geolocation & Mapping
2 tools
14 / 20
Google Earth / Maps
Geo

Satellite and street-level mapping for geolocation analysis. Historical imagery in Google Earth tracks changes over time.

How to Use
Use Street View to match visual clues. Google Earth: click clock icon for historical satellite imagery. Use coordinates from EXIF data for pinpoint location.

Use Case: Photo geolocation, verifying claimed locations, infrastructure change tracking, conflict zone analysis.

15 / 20
GeoSpy / Geoestimation
Geo

AI-powered tools that predict photo locations from visual clues like terrain, architecture, vegetation, and signs.

How to Use
Upload image to geospy.ai or geoestimation.com β†’ AI analyzes visual elements β†’ Returns probable location with confidence score and map pin.

Use Case: Locating photos with no metadata, confirming or disproving claimed locations, journalism verification.

🌐 Network & Cyber Intelligence
3 tools
16 / 20
VirusTotal
Cyber

Free service that scans URLs, files, IPs, and domains using 70+ antivirus engines and security databases simultaneously.

How to Use
Go to virustotal.com β†’ Upload file or paste URL/IP/domain β†’ Review scan results β†’ Check "Relations" and "Behavior" tabs for deep analysis.

Use Case: Malware checking, suspicious link verification, domain reputation, threat intelligence.

17 / 20
Censys
Cyber

Search engine for internet-facing infrastructure, TLS certificates, and open ports. Finds all assets tied to an organization.

How to Use
services.port:443 parsed.subject.organization:"Company" (domain or IP search via censys.io)

Use Case: Attack surface mapping, certificate intelligence, finding shadow IT, security auditing.

18 / 20
Wayback Machine
Archive

Internet Archive's historical web snapshots. View how any website looked at any point in the past going back decades.

How to Use
Go to web.archive.org β†’ Enter URL β†’ Select date from calendar β†’ Browse historical snapshots. Use API for bulk access.

Use Case: Recovering deleted content, tracking site changes, finding old contact info, legal evidence gathering.

πŸ“± Social Media Intelligence
2 tools
19 / 20
Social Searcher
Social

Real-time social media search engine covering Twitter, Facebook, Instagram, YouTube, and more from one interface.

How to Use
Visit social-searcher.com β†’ Enter keyword/hashtag/username β†’ Filter by platform or date β†’ Set up email alerts for monitoring.

Use Case: Brand monitoring, tracking topics in real-time, competitive intelligence, social investigations.

20 / 20
Have I Been Pwned
Breach

Database of billions of credentials from known data breaches. Check if any email/phone has been compromised.

How to Use
Visit haveibeenpwned.com β†’ Enter email or phone β†’ View list of breaches where it appeared and what data was exposed (passwords, usernames, etc.)

Use Case: Credential monitoring, security awareness, corporate breach detection, personal security checks.

Quick Reference Table

All 20 tools at a glance.

# Tool Category Best For Free Tier
01Google DorksSearchHidden web content, exposed filesβœ“ Free
02ShodanCyberExposed devices, IoT reconLimited
03MaltegoCyberRelationship mappingLimited
04Pipl / BeenVerifiedPeopleBackground checksPaid
05NamechkPeopleUsername trackingβœ“ Free
06SherlockPeopleCross-platform username searchβœ“ Free
07Hunter.ioEmailEmail discoveryLimited
08MXToolboxEmailDNS & email forensicsβœ“ Free
09WHOISDomainDomain ownershipβœ“ Free
10theHarvesterDomainDomain recon, email harvestβœ“ Free
11Google Reverse ImageImageImage verificationβœ“ Free
12InVID / WeVerifyImageVideo fact-checkingβœ“ Free
13ExifToolMetadataImage metadata extractionβœ“ Free
14Google EarthGeoGeolocation, historical imageryβœ“ Free
15GeoSpyGeoAI photo geolocationLimited
16VirusTotalCyberMalware & URL scanningβœ“ Free
17CensysCyberInfrastructure mappingLimited
18Wayback MachineArchiveHistorical web contentβœ“ Free
19Social SearcherSocialReal-time social monitoringLimited
20Have I Been PwnedBreachCredential breach checkingβœ“ Free