Back to tools

OSINT Tools Toolkit

68+ investigation tools organized in 17 categories: emails, threats, people, companies, images, web, social media, OpSec, darkweb and more

68 Tools17 Categories

Epieos

Reverse email lookup and retrieve associated information.

Features:

  • Social media identification
  • Google Maps reviews linked
  • Email address investigation
Access Tool →

Have I Been Pwned

Verifies if an email address has been compromised.

Features:

  • Data breach verification
  • Compromise history
  • Email alerts
Access Tool →

Holehe

Search for information linked to an email address.

Features:

  • 150+ sites verified
  • Service discovery
  • Detailed overview
Access Tool →

h8mail

Email investigation tool.

Features:

  • Breach search
  • Compromised password identification
  • Public databases
Access Tool →

Any.run

Online malware analysis.

Features:

  • Interactive sandbox
  • Real-time analysis
  • Behavioral detection
Access Tool →

CRT.sh

SSL/TLS certificate verification.

Features:

  • SSL/TLS analysis
  • Domain detection
  • Infrastructure monitoring
Access Tool →

Onyphe

OSINT search engine for IP addresses.

Features:

  • IP indexing
  • Data from varied sources
  • Exposed services
Access Tool →

Shodan

Scanner for open services and ports.

Features:

  • IP discovery
  • Exposed services
  • Connected devices
Access Tool →

VirusTotal

Malware analysis and detection.

Features:

  • Multi-engine analysis
  • File verification
  • Link analysis
Access Tool →

Hunter.io

Search for professional email addresses.

Features:

  • Professional emails
  • Business prospecting
  • Identity verification
Access Tool →

Lusha

Access to contact information.

Features:

  • Phone numbers
  • Associated emails
  • Social media profiles
Access Tool →

Pipl

Specialized search engine for people.

Features:

  • Detailed information
  • Cross-referenced databases
  • Social media profiles
Access Tool →

OCCRP Aleph

Access to public databases about companies.

Features:

  • Official documents
  • Data leaks
  • Global companies
Access Tool →

Offshore Leaks Database

Information about offshore companies.

Features:

  • 785,000+ companies
  • Identified owners
  • Tax havens
Access Tool →

OpenCorporates

The world's largest company database.

Features:

  • Millions of companies
  • Official data
  • Company verification
Access Tool →

Societe.ninja

Data on French companies.

Features:

  • French companies
  • Legal information
  • Financial data
Access Tool →

Invid

Image analysis and extraction from videos.

Features:

  • Image extraction
  • Authentication verification
  • Provenance analysis
Access Tool →

PimEyes

Reverse facial image search.

Features:

  • Facial search
  • Web and social media
  • Similar images
Access Tool →

Forensically

Image analysis tool.

Features:

  • Manipulation detection
  • Metadata analysis
  • Forgery verification
Access Tool →

Rapid DNS

Search for subdomains and associated IP addresses.

Features:

  • DNS search
  • Subdomain enumeration
  • IP history
Access Tool →

Spiderfoot

Attack surface analysis tool.

Features:

  • 200+ modules
  • Data collection
  • Risk analysis
Access Tool →

Wayback Machine

Web page archives.

Features:

  • Web history
  • Old versions
  • Annual archives
Access Tool →

Tweets Analyzer

Analysis of Twitter messages.

Features:

  • Data correlation
  • Tweet analysis
  • User trends
Access Tool →

Twint

OSINT scraping on Twitter.

Features:

  • Tweet extraction
  • No API authentication
  • Platform monitoring
Access Tool →

InstaLocTrack

Search for geolocations on Instagram.

Features:

  • Photo geolocation
  • Post localization
  • Instagram analysis
Access Tool →

FakeNameGenerator

Creation of fake identities.

Features:

  • Fictional identities
  • Fake addresses
  • Fictitious banking information
Access Tool →

ThisPersonDoesNotExist

Generation of fictional facial images.

Features:

  • Generative AI
  • Realistic faces
  • Non-existent images
Access Tool →

TinyCheck

Detection of tracking on mobile devices.

Features:

  • Network analysis
  • Tracking detection
  • Suspicious communications
Access Tool →

OnionSearch

Search on the darknet.

Features:

  • Darknet queries
  • Multiple engines
  • Hidden content
Access Tool →

Epieos - Phone number reverse lookup

Reverse phone number lookup.

Features:

  • Reverse search
  • Associated accounts
  • Related information
Access Tool →

PhoneInfoga

Phone number analysis.

Features:

  • Number analysis
  • Origin detected
  • Usage identified
Access Tool →

TrueCaller

Identification of suspicious calls.

Features:

  • Call identification
  • Blocking unwanted calls
  • Number recognition
Access Tool →

Maigret

Search for usernames.

Features:

  • Scan multiple platforms
  • Pseudonym verification
  • Social recognition
Access Tool →

WhatsMyName

Online pseudonym search.

Features:

  • Pseudonym database
  • Multi-site search
  • Retrieve pseudonyms
Access Tool →

GeoInt Localisator

Calculation of distances between locations.

Features:

  • Distance calculation
  • Geographic analysis
  • Location comparison
Access Tool →

Overpass Turbo

Filtering of OpenStreetMap data.

Features:

  • Geographic data
  • OpenStreetMap
  • Spatial analysis
Access Tool →

SunCalc

Tool for calculating solar cycles.

Features:

  • Sunlight phases
  • Sun position
  • Solar forecasts
Access Tool →

ExifTool

Complete extraction of EXIF metadata from multimedia files

Features:

  • Support 100+ formats
  • GPS extraction
  • Device metadata
Access Tool →

TinEye

Reverse image search using visual recognition

Features:

  • Base of 50 billion+ images
  • Modified image detection
  • Upload/URL search
Access Tool →

Google Lens

Visual recognition and identification of objects/places

Features:

  • Object recognition
  • Multilingual OCR
  • Monument identification
Access Tool →

FotoForensics

Forensic image analysis to detect manipulations

Features:

  • Error Level Analysis
  • Manipulation detection
  • Metadata analysis
Access Tool →

InVID/WeVerify

Video verification and deepfake detection

Features:

  • Frame extraction
  • Reverse search
  • Metadata analysis
Access Tool →

Yandex Images

Reverse image search with Eastern Europe coverage

Features:

  • Powerful reverse search
  • Russia coverage
  • Face recognition
Access Tool →

Wireshark

Real-time network protocol analyzer

Features:

  • Real-time capture
  • Support 2000+ protocols
  • Powerful filters
Access Tool →

Nmap

Port scanner and network service discovery

Features:

  • Fast scan
  • OS detection
  • NSE scripts
Access Tool →

Censys

Internet infrastructure search engine

Features:

  • IPv4 scan
  • Certificate base
  • Subdomain search
Access Tool →

Masscan

Ultra-fast scanner for entire Internet

Features:

  • Extreme speed
  • Complete IPv4 scan
  • Nmap compatible
Access Tool →

ZoomEye

Cyberspace search engine with Asia focus

Features:

  • Service search
  • Component detection
  • Asia coverage
Access Tool →

Rapid7 Sonar

Public dataset of Internet scans

Features:

  • Public data
  • IPv4 scans
  • Certificates
Access Tool →

Shodan Filters

Advanced queries for Shodan

Features:

  • Advanced filters
  • Complex queries
  • Monitoring
Access Tool →

theHarvester

Collection of emails, subdomains and public information

Features:

  • Email collection
  • Subdomain enumeration
  • 20+ sources
Access Tool →

Recon-ng

Modular framework inspired by Metasploit

Features:

  • Modular architecture
  • Marketplace
  • Database
Access Tool →

OSINT Framework

Organized directory of 500+ OSINT tools

Features:

  • 500+ tools
  • Category organization
  • Interactive interface
Access Tool →

Metagoofil

Metadata extraction from public documents

Features:

  • Metadata extraction
  • PDF/DOC support
  • User identification
Access Tool →

Bellingcat Toolkit

Toolkit and methodologies for journalistic investigations

Features:

  • Methodological guides
  • Custom tools
  • Case studies
Access Tool →

Sherlock

Search for user accounts on 300+ social platforms

Features:

  • 300+ platforms
  • Parallel search
  • Result export
Access Tool →

Social Analyzer

Advanced analysis with variation detection

Features:

  • Variation detection
  • Multi-platforms
  • Report export
Access Tool →

VirusTotal Advanced

Advanced analysis with 70+ antivirus

Features:

  • 70+ AV engines
  • URL analysis
  • Hash base
Access Tool →

AlienVault OTX

Collaborative threat intelligence platform

Features:

  • IOC base
  • Threat pulses
  • Free API
Access Tool →

Hybrid Analysis

Free malware analysis sandbox

Features:

  • Free sandbox
  • Behavioral analysis
  • IOC extraction
Access Tool →

URLScan.io

Analysis and screenshot of suspicious sites

Features:

  • URL scan
  • Screenshots
  • Phishing detection
Access Tool →

ThreatCrowd

Threat intelligence search engine

Features:

  • IOC search
  • Relationship graph
  • Threat history
Access Tool →

MITRE ATT&CK

Knowledge base of adversarial tactics

Features:

  • Documented TTPs
  • Platform matrices
  • APT groups
Access Tool →

Google Earth Pro

Satellite imagery and 3D mapping for geospatial analysis

Features:

  • Satellite imagery
  • Image history
  • 3D models
Access Tool →

Sentinel Hub

Access to Sentinel and Landsat satellite images

Features:

  • Multi-spectral images
  • Real-time analysis
  • Automation API
Access Tool →

Wigle

Global database of WiFi access points

Features:

  • 1 billion+ networks
  • SSID search
  • Mapping
Access Tool →

GeoGuessr

Training in geolocation through recognition

Features:

  • Location recognition
  • Geographic clues
  • Competition mode
Access Tool →

Maltego

Platform for visualizing relational graphs

Features:

  • Relationship visualization
  • Multiple transforms
  • Network integration
Access Tool →

About this collection

This complete collection of 68 OSINT tools allows you to:

  • Search and verify information from open sources
  • Investigate potential threats and vulnerabilities
  • Analyze public data for security and compliance
  • Conduct legal and compliant investigations