A somewhat curated list of links to various topics in application security.

Open-Source Intelligence (OSINT)

LinkExcerptWord Count
OSINTFeel free to add to your own investigative toolkit, however you may NOT sell or host this without obtaining prior permission.52
Gathering Open Source IntelligenceOne constant throughout my career has been my fascination with what can be learned about an organization from basic public records. The aggregation of a multitude of small pieces of information can paint a picture that is sometimes startling in its completeness.4540
OSINT: How to find information on anyoneOpen Source Intelligence (OSINT) — is information gathering from publicly available sources and its analysis to produce an actionable intelligence. The scope of OSINT is not limited to cybersecurity only but corporate, business and military intelligence or other fields where information matters.4749
Overview of the tool:Overview of the tool: Performs OSINT on a domain / email / username / phone and find out information from different sources. Correlate and collaborate the results, show them in a consolidated manner. Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc.177
Mitigate Digital Risks Outside Your Perimeter.Our patented digital fingerprinting and exact matching technology establishes secure data collection and monitoring, minimizes false positives, and ensures compliance with evolving data privacy regulations.150
A Search Engine for the Internet of ThingsImprove your business insights by enhancing operational data with nearby real-time IoT data across dozens of verticals, including weather, environment, smart city, energy and transport. Millions of connected objects & sensors across the planet generate real-time open data.257
OSINT TeamFor the Hackers, Threat Intelligence, Journalists, Private Investigators, Sleuths, Sherlocks, Business Intelligence and everyone in between. Slack Team Signup: Slack Team: https://openosint.slack.com1585
HUNCHLY'S REPUTATIONHunchly automatically collects, documents, and annotates every web page you visit. Online research usually starts with the "search engine shotgun approach" — and before you know it, you've got dozens of tabs open and no idea how you got from A to Z.610
Automating OSINT BlogMore and more investigations are being conducted on Tor and many of them can also include investigating Bitcoin transactions.558
OSINT FrameworkOSINT Framework (T) - Indicates a link to a tool that must be installed and run locally (D) - Google Dork, for more information: Google Hacking (R) - Requires registration (M) - Indicates a URL that contains the search term and the URL itself must be edited manually Notes OSINT framework focused on191