The first #OSINT tool is a bookmarklet I built called Forage and is meant to expand your search across popular social media sites. It takes the username from FB/IG, Twitter, and LinkedIn and expands your search across the web. Expect updates!
The second #OSINT tool is a browser extension called TabTrum that takes a snapshot of your active tabs and saves them so you can reopen that same combination again with one click. It's saved me SO much time with work and OSINT investigations.
The third #OSINT tool is a search engine for OnlyFans. Use responsibly. If you're working on a catfish case, investigating benefits fraud, etc. it can be very useful. The index isn't great, but it's a decent starting point.
Remember #OSINT != tools. Tools help you plan and collect data, but the end result of that tool is not OSINT. You have to analyze, receive feedback, refine, and produce a final, actionable product of value before you can call it intelligence.
Thanks for reading!
☝️(5/5)
• • •
Missing some Tweet in this thread? You can try to
force a refresh
I think I'm going to stick with 2 tools a week. One web-based, the other script-based. This week it's about archives and scaling your work in search engines.
👇 (1/4)
The first tool is from @ODU and it's a web-based tool that will tell you the date a website started and show the earliest archive from multiple sources.
The next tool I found through @s0md3v and it's called degoogle which lets you extract results directly. The reason why I included this is that the author claimed to not have run into a captcha for weeks and Somdev said he had 0 with 120+ requests.
In addition to OSINT Tool Tuesday, I'm going to start doing Workflow Wednesday where I unpack a process, instead of a tool, for open source intelligence. This week I'm going to talk about how to deconstruct a new social media platform.
👇 (1/9)
Step 1: Map the platform without an account.
You want to see what you can access without registering. Explore the platform from the website but also check out what's indexed by Google and other search engines using site:, -site:, inurl:, intext:, and other operators.
👇 (2/9)
Step 2: Understand the platform's privacy policies and other fine print.
You want to see what the risks are for registering an account including what information is collected and shared. You also want to know what other users can view once you've registered.
[#OSINT] You can use Twint to find indirect relationships between users. By matching the “conversation_id” to multiple queries, you can discover more insight.
For example, let’s say you’re trying to find violent users on Twitter that are threatening an influencer. Twitter only limits you to search for “influencer name” + “violent keyword”. Using Twint, you can search for all “violent keywords” and then match it to influencer mentions
You can also mine replies within Twint. It’s not in the Wiki, but adding “c.To =“ to your python module will allow you to pull tweets sent “to” someone. By finding the accounts that most mention said influencer, you can take this a a step further