appsec.fyi

Open-Source Intelligence (OSINT) Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Open-Source Intelligence (OSINT)

Open-Source Intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, "open" refers to overt, publicly available sources — as opposed to covert or clandestine sources.

In application security and bug bounty hunting, OSINT is the foundation of effective reconnaissance. Before testing a single endpoint, researchers use OSINT techniques to map an organization's attack surface: discovering subdomains through certificate transparency logs, finding exposed credentials in paste sites and code repositories, identifying employee information through social media and job postings, and locating forgotten assets through historical web archives.

OSINT tools and techniques span a broad range — from passive DNS enumeration and search engine dorking to analyzing metadata in public documents and monitoring data breach repositories. Platforms like Shodan and Censys provide internet-wide scan data that reveals exposed services, default configurations, and unpatched systems. GitHub and GitLab searches frequently surface API keys, internal URLs, and configuration files accidentally committed to public repositories.

Effective OSINT requires both technical skills and analytical thinking. The challenge is not just collecting data but correlating information from multiple sources to build actionable intelligence about a target's infrastructure, technology stack, and potential weaknesses.

This page collects OSINT tools, methodologies, and resources for security researchers and bug bounty hunters.

From Wikipedia

Date Added Link Excerpt
2026-04-19 NEW 2026OSINT Framework: How to Build a Custom Maltego TransformOSINT Framework: How to Build a Custom Maltego Transform
2026-04-19 NEW 2026Top 10 OSINT Tools, Products & Solutions — SocialLinksTop 10 OSINT Tools, Products & Solutions — SocialLinks
2026-04-19 NEW 2026How to Use OSINT for Investigations — Moody'sHow to Use OSINT for Investigations — Moody's
2026-04-19 NEW 2026OSINT Industries — Online Investigations PlatformOSINT Industries — Online Investigations Platform
2026-04-19 NEW 2026OSINT Tools Security Analysts Should Know for 2025OSINT Tools Security Analysts Should Know for 2025
2026-04-17 NEW 2026Geolocation 101: image-based OSINT tipsGeolocation 101: image-based OSINT tips
2026-04-17 NEW 2026Image Analysis and Geolocation with OSINT (OSINT Combine)Image Analysis and Geolocation with OSINT (OSINT Combine)
2026-04-17 NEW 2026spiderfoot: OSINT automation for threat intel (GitHub)spiderfoot: OSINT automation for threat intel (GitHub)
2026-04-17 NEW 2026OSINT Framework: The Ultimate Guide for Ethical HackersOSINT Framework: The Ultimate Guide for Ethical Hackers
2026-04-17 NEW 2026Spiderfoot vs Maltego for OSINT Research CasesSpiderfoot vs Maltego for OSINT Research Cases
2026-04-17 NEW 2026Operational Technology Discovery: ICS OSINTOperational Technology Discovery: ICS OSINT
2026-04-17 NEW 2026Beyond Google: Navigating the Hidden Internet with Shodan and CensysBeyond Google: Navigating the Hidden Internet with Shodan and Censys
2026-04-17 NEW 2026Comparative review: Shodan, ZoomEye, Netlas, Censys, FOFAComparative review: Shodan, ZoomEye, Netlas, Censys, FOFA
2026-04-17 NEW 2026OSINT Gathering Using Censys (Hackers Arise)OSINT Gathering Using Censys (Hackers Arise)
2026-04-17 NEW 2026Top 5 OSINT Sources for Pentesting and Bug Bounties (Intel 471)Top 5 OSINT Sources for Pentesting and Bug Bounties (Intel 471)
2026-04-17 NEW 2026sarenka: OSINT tool (Shodan/Censys) (GitHub)sarenka: OSINT tool (Shodan/Censys) (GitHub)
2026-04-17 NEW 2026Domain and IP Investigation with OSINT: Complete Guide (OSINTBench)Domain and IP Investigation with OSINT: Complete Guide (OSINTBench)
2026-04-17 NEW 2026OSINT Techniques & Tools (Imperva)OSINT Techniques & Tools (Imperva)
2026-04-17 NEW 2026Top OSINT Tools For Dark Web (Brandefense)Top OSINT Tools For Dark Web (Brandefense)
2026-04-17 NEW 2026OSINT Basics: What is Dark Web Intelligence (DARKInt)?OSINT Basics: What is Dark Web Intelligence (DARKInt)?
2026-04-17 NEW 2026Top 15 OSINT Tools in 2025 (OSINT BYLE)Top 15 OSINT Tools in 2025 (OSINT BYLE)
2026-04-17 NEW 2026OSINT 2025: New and updated digital investigative toolsOSINT 2025: New and updated digital investigative tools
2026-04-17 NEW 2026How to Use the OSINT Framework: Sources, Tools, Steps (BitSight)How to Use the OSINT Framework: Sources, Tools, Steps (BitSight)
2026-04-17 NEW 2026OSINT Tools And Techniques (Neotas)OSINT Tools And Techniques (Neotas)
2026-04-17 NEW 2026Complete OSINT Guide 2025: Find Anyone OnlineComplete OSINT Guide 2025: Find Anyone Online
2026-04-16 NEW 2026I Participated in a Trace Labs CTF - Now I'm Hooked on OSINTI Participated in a Trace Labs CTF - Now I'm Hooked on OSINT
2026-04-16 NEW 2026Recon Village - OSINT and Reconnaissance Village at DEF CON 33Recon Village - OSINT and Reconnaissance Village at DEF CON 33
2026-04-16 NEW 2026A Beginner's Guide to OSINT Investigation with MaltegoA Beginner's Guide to OSINT Investigation with Maltego
2026-04-16 NEW 2026Social Media Intelligence (SOCMINT) in Modern InvestigationsSocial Media Intelligence (SOCMINT) in Modern Investigations
2026-04-16 NEW 2026OSINT Challenge in 30: Social Media GeolocationOSINT Challenge in 30: Social Media Geolocation
2026-04-16 NEW 2026Trace Labs OSINT Educational SeriesTrace Labs OSINT Educational Series
2026-04-16 NEW 2026OSINT Investigation Techniques for Missing Person Cases (Trace Labs)OSINT Investigation Techniques for Missing Person Cases (Trace Labs)
2026-04-16 NEW 2026Automated OSINT Techniques for Digital Asset Discovery and Cyber Risk AssessmentAutomated OSINT Techniques for Digital Asset Discovery and Cyber Risk Assessment
2026-04-16 NEW 2026Awesome OSINT - A Curated List of OSINT ResourcesAwesome OSINT - A Curated List of OSINT Resources
2026-04-16 NEW 2026OSINT Techniques: Complete List for InvestigatorsOSINT Techniques: Complete List for Investigators
2026-04-10 2026OWASP OSINT ResourcesOWASP OSINT Resources
2026-04-10 2026OSINT Framework - GeeksforGeeksOSINT Framework - GeeksforGeeks
2026-04-10 2026Top 10 OSINT Tools and Software for 2026Top 10 OSINT Tools and Software for 2026
2026-04-10 2026How to Conduct Investigations Using OSINT & MaltegoHow to Conduct Investigations Using OSINT & Maltego
2026-04-10 20268 Best OSINT Tools (Paid & Free) in 20258 Best OSINT Tools (Paid & Free) in 2025
2026-04-10 2026AI-Driven Reconnaissance Tools You Should KnowAI-Driven Reconnaissance Tools You Should Know
2026-04-10 2026Best OSINT Tools for Cybersecurity and Investigations 2026Best OSINT Tools for Cybersecurity and Investigations 2026
2026-04-10 2026Best Open Source Windows OSINT Tools 2026Best Open Source Windows OSINT Tools 2026
2026-04-10 2026Top 10 OSINT Tools 2026 - DevOpsSchoolTop 10 OSINT Tools 2026 - DevOpsSchool
2026-04-10 2026Open Source Intelligence GitHub TopicsOpen Source Intelligence GitHub Topics
2026-04-10 202613 Best OSINT Tools for 202513 Best OSINT Tools for 2025
2026-04-10 2026Top 10 Open Source Intelligence Tools 2026Top 10 Open Source Intelligence Tools 2026
2026-04-10 20269 Top OSINT Tools & How to Evaluate Them9 Top OSINT Tools & How to Evaluate Them
2026-04-10 2026Best OSINT Tools for Intelligence Gathering (2026)Best OSINT Tools for Intelligence Gathering (2026)
2026-04-10 2026OSINT Bible: Comprehensive 2026 GuideOSINT Bible: Comprehensive 2026 Guide
2026-04-06 2026AI-enabled Workflows and Deeper IntelligenceAI-enabled Workflows and Deeper Intelligence
2026-04-06 202610 Best Threat Intelligence Tools In 202610 Best Threat Intelligence Tools In 2026
2026-04-06 2026OSINT Intelligence Briefing - March 31, 2026OSINT Intelligence Briefing - March 31, 2026
2026-04-06 2026Open Source Intelligence (OSINT): AI-Powered Image Geo-LocationOpen Source Intelligence (OSINT): AI-Powered Image Geo-Location
2026-04-06 2026Top 15 OSINT Tools For Cybersecurity In 2026Top 15 OSINT Tools For Cybersecurity In 2026
2026-04-03 2026Bug Bounty 101: Top 10 Reconnaissance Tools | NetlasBug Bounty 101: Top 10 Reconnaissance Tools | Netlas
2026-04-03 2026Top 10 OSINT Tools Everyone Should Know | SMIIT CyberAITop 10 OSINT Tools Everyone Should Know | SMIIT CyberAI
2026-04-03 2026Top 10 OSINT Tools in 2025 Cyber Analysts TrustTop 10 OSINT Tools in 2025 Cyber Analysts Trust
2026-04-03 202610 Best Open Source Intelligence (OSINT) Tools Of 202510 Best Open Source Intelligence (OSINT) Tools Of 2025
2026-04-03 2026What is OSINT? Tools, Techniques and Framework ExplainedWhat is OSINT? Tools, Techniques and Framework Explained
2026-04-03 202615 Best OSINT Tools in 2026 | Lampyre15 Best OSINT Tools in 2026 | Lampyre
2026-04-03 2026Open Source Intelligence Tools and Resources CollectionOpen Source Intelligence Tools and Resources Collection
2026-04-03 2026OSINT for Threat Enrichment: Deep Dive with Maltego, SpiderFoot, IntelX, Recon-ngOSINT for Threat Enrichment: Deep Dive with Maltego, SpiderFoot, IntelX, Recon-ng
2026-04-03 2026Top 15 Free OSINT Tools To Collect Data From Open SourcesTop 15 Free OSINT Tools To Collect Data From Open Sources
2025-08-14 2025IVMachiavelli/OSINT_Team_Links: Links for the OSINT TeamThe content is a title indicating a collection of links for an OSINT (Open Source Intelligence) team. The title suggests that there is a repository or list of useful links curated for the team's use in conducting open-source intelligence activities. It implies that the links provided may offer valuable resources, tools, or information relevant to the team's work in gathering intelligence from publicly available sources.
2025-08-14 2025DataSploit/datasploit: An #OSINT Framework to perform various recon techniqThe content is about DataSploit/datasploit, which is an open-source intelligence (OSINT) framework used for conducting reconnaissance techniques. It is designed to assist in gathering information through various reconnaissance methods. The framework likely provides tools and functionalities to aid in data collection and analysis for intelligence purposes.
2025-08-14 2025OSINT FrameworkThe OSINT Framework is a tool used for open-source intelligence gathering. It provides a structured approach to collecting information from publicly available sources. This framework assists in organizing and streamlining the process of gathering data for analysis and investigation purposes. By utilizing the OSINT Framework, users can efficiently access and compile information from various online resources to support decision-making and research efforts.
2025-08-14 2025Hunchly - Better Online InvestigationsThe content provided is a brief mention of Hunchly, a tool that enhances online investigations. Hunchly likely offers features or services that aid in conducting thorough and efficient online research, potentially assisting users in gathering and organizing information from various online sources. The tool may be designed to streamline investigative processes, improve data collection, and enhance the overall quality of online research outcomes.
2025-08-14 2025Terbium LabsTerbium Labs is a company named after the rare earth element "terbium." It specializes in data intelligence and protection services. The company focuses on data security, fraud detection, and dark web monitoring. Terbium Labs helps organizations safeguard their sensitive information by monitoring for data breaches and unauthorized use of data on the dark web.
2025-08-14 2025Automating OSINT BlogThe content provided is a title mentioning an "Automating OSINT Blog." It appears to be a brief reference to a blog focused on automating Open Source Intelligence (OSINT) processes. The blog likely discusses tools, techniques, and strategies for automating the collection and analysis of publicly available information for investigative purposes. It may offer insights into streamlining OSINT workflows and enhancing efficiency in gathering intelligence from various online sources.
2025-08-14 2025Thingful - a search engine for the Internet of ThingsThingful is a search engine designed for the Internet of Things. It serves as a platform to search and discover connected devices and data streams across the IoT landscape. The tool allows users to explore and access a wide range of IoT devices, sensors, and data sources, providing a centralized hub for navigating the interconnected world of smart devices.
2025-08-14 2025https://link.medium.com/DJpY3Ljgz3I'm sorry, but I am unable to access external content such as the one you provided. If you can provide me with the main points or key ideas from the content, I would be happy to help summarize it for you.
2021-08-30 2021OSINTOSINT stands for Open Source Intelligence. It refers to the practice of collecting and analyzing information from publicly available sources to gather insights and intelligence. OSINT sources include social media, websites, news articles, and government reports. This information can be used for various purposes such as threat assessment, competitive intelligence, and research. OSINT is valuable for both individuals and organizations to stay informed and make informed decisions based on publicly accessible data.
2021-01-20 2021Gathering Open Source IntelligenceThe content discusses gathering open source intelligence through techniques, automation, and visualization. It likely covers methods for collecting information from publicly available sources, utilizing automation tools to streamline the process, and visualizing data for better analysis. The focus is on leveraging open source intelligence effectively by employing various strategies and technologies.
2017-06-13 2017Terbium LabsTerbium Labs offers digital risk monitoring through Matchlight®. Their service helps monitor the open, deep, and dark web, as well as social media and mobile app stores, to detect instances of brand misuse and sensitive data exposure. This proactive approach aims to protect organizations from potential threats and data breaches by identifying and addressing risks in the digital landscape.
2017-06-13 2017Thingful - a search engine for the Internet of ThingsThingful is a search engine designed for the Internet of Things. It serves as a platform to search and discover connected devices, sensors, and data sources across the IoT landscape. By providing a centralized hub for accessing IoT information, Thingful aims to simplify the process of finding and utilizing IoT resources for various applications and industries.
2017-06-13 2017Hunchly - Better Online InvestigationsThe content is brief and only mentions the title "Hunchly - Better Online Investigations." It suggests that Hunchly is a tool or service that aims to improve online investigations. The focus seems to be on enhancing the quality and efficiency of investigations conducted on the internet.
2017-06-13 2017Automating OSINT BlogThe content provided is simply the title "Automating OSINT Blog." It appears to be a reference to a blog or website focused on automating Open Source Intelligence (OSINT) processes. The blog likely covers topics related to using automation tools and techniques to enhance the efficiency and effectiveness of gathering intelligence from publicly available sources.
2017-06-13 2017OSINT FrameworkThe OSINT Framework is a tool that provides resources and tools for open-source intelligence gathering. It offers a collection of various online resources, search engines, and tools to assist in conducting research and investigations. The framework aims to streamline the process of gathering information from publicly available sources to aid in intelligence analysis. It serves as a valuable resource for individuals and organizations looking to enhance their open-source intelligence capabilities.

Frequently Asked Questions

What is OSINT in cybersecurity?
In cybersecurity, OSINT (Open-Source Intelligence) refers to gathering information from publicly available sources to assess an organization's security posture. This includes discovering subdomains, exposed credentials, employee information, technology stacks, and forgotten assets — all without directly interacting with the target's systems.
What are the best OSINT tools for bug bounty?
Key tools include Shodan and Censys for internet-wide scanning, theHarvester for email and subdomain discovery, SpiderFoot for automated reconnaissance, Maltego for relationship mapping, and Google Dorking for finding exposed files and admin panels. Certificate Transparency logs and GitHub search are also essential.
How is passive recon different from active recon?
Passive recon gathers information without sending any traffic to the target — using public databases, search engines, DNS records, and archived content. Active recon directly interacts with the target through port scanning, directory brute-forcing, and fingerprinting. Passive recon is undetectable; active recon may trigger security alerts.

Weekly AppSec Digest

Get new resources delivered every Monday.