Open-Source Intelligence (OSINT)
Open-Source Intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the intelligence community, "open" refers to overt, publicly available sources — as opposed to covert or clandestine sources.
In application security and bug bounty hunting, OSINT is the foundation of effective reconnaissance. Before testing a single endpoint, researchers use OSINT techniques to map an organization's attack surface: discovering subdomains through certificate transparency logs, finding exposed credentials in paste sites and code repositories, identifying employee information through social media and job postings, and locating forgotten assets through historical web archives.
OSINT tools and techniques span a broad range — from passive DNS enumeration and search engine dorking to analyzing metadata in public documents and monitoring data breach repositories. Platforms like Shodan and Censys provide internet-wide scan data that reveals exposed services, default configurations, and unpatched systems. GitHub and GitLab searches frequently surface API keys, internal URLs, and configuration files accidentally committed to public repositories.
Effective OSINT requires both technical skills and analytical thinking. The challenge is not just collecting data but correlating information from multiple sources to build actionable intelligence about a target's infrastructure, technology stack, and potential weaknesses.
This page collects OSINT tools, methodologies, and resources for security researchers and bug bounty hunters.
From Wikipedia
| Date Added | Link | Excerpt |
|---|---|---|
| 2026-05-06 NEW 2026 | Best OSINT Tools for Investigations and Threat Intelligence in 2026 beginner | Library for OSINT investigations, offering tools like Maltego for relationship mapping, ShadowDragon for social media analysis, VenariX for cyber threat monitoring and ransomware tracking, Arrests.org for public records, Telegago for Telegram monitoring, Shodan for internet-connected device discovery, OSINT Framework for tool discovery, and SpiderFoot for automated data collection. → hackread.com |
| 2026-05-05 NEW 2026 | GhostTrack Explained: Track IPs Phones and Usernames Easily beginner Recon | Tool for OSINT reconnaissance, GhostTrack consolidates IP, phone, and username lookup into a single Python script. Version 2.2 on GitHub boasts 8.1k stars and 1.1k forks but shows limited development with only 23 commits and 2 contributors. It targets Debian-based Linux and Termux, pulling data from public APIs for country, ISP, and carrier information. While a useful learning aid, it falls short compared to professional tools like PhoneInfoga and Sherlock, offering less depth on phone details and fewer username targets. Installation issues often stem from urllib3 version conflicts. |
| 2026-04-29 2026 | The Top 10 OSINT Software Tools for Research and Investigation (2026) beginner | This article lists the top 10 Open Source Intelligence (OSINT) software tools for research and investigation in 2026. OSINT involves gathering information from publicly available sources. The tools discussed are essential for professionals in cybersecurity, journalism, and law enforcement to conduct effective investigations. While the article provides a comprehensive overview of these tools, it does not mention any specific bug bounty payout amounts. |
| 2026-04-27 2026 | OSINT Tools for Cybersecurity: A Practical Guide for Security Teams intermediate | Library of OSINT tools for cybersecurity teams, categorized by function: Domain and IP Intelligence (Shodan, DNSDumpster), Email and Credential Exposure (Have I Been Pwned, Holehe), People and Social Media Intelligence (Maltego, Sherlock), Dark Web and Paste Site Monitoring (SOCRadar, IntelligenceX), and Metadata and Search Engine Intelligence (Google Hacking Database, ExifTool). It also highlights key websites like osintframework.com and crt.sh, and details a practical investigation workflow emphasizing initial question framing and passive reconnaissance. |
| 2026-04-22 2026 | Master Google Dorking: Advanced Techniques for OSINT and Ethical Hacking intermediate | Reference listing techniques for Google Dorking, including `site:`, `-` operator for exclusion, exact phrase searching with quotes, `intitle:` for page titles, and `intext:` for body content. These methods are applicable for bug bounty hunting, OSINT, and cybersecurity audits to uncover vulnerabilities like open directories, misconfigured settings, and publicly accessible sensitive information. |
| 2026-04-22 2026 | Lessons from Building an Online Toolkit to Aid Open-Source Investigations intermediate | Toolkit for open-source investigations, built collaboratively by Bellingcat volunteers, offers detailed guides, limitations, and pricing for research tools. This resource addresses challenges faced by journalists, such as navigating tool discovery and ensuring information remains current, even after tools like Twint and Crowdtangle were discontinued. The toolkit emphasizes clear, accurate documentation, identifies potential weaknesses alongside usefulness, and fosters iterative development based on user feedback, highlighting the success of a collaborative, user-focused approach in the field of investigative journalism. |
| 2026-04-22 2026 | IntelTechniques Books (Michael Bazzell) beginner | Book detailing OSINT techniques and self-reliance, updated for 2024. The 11th edition focuses on creating local investigative resources, including custom search tools and a Debian Linux OSINT virtual machine. It covers 47 chapters on virtual machine setup, search engines, social networks (Facebook, Instagram, TikTok, LinkedIn, YouTube), data leaks, breaches, and methodology. Digital purchases include downloadable scripts, cheat sheets, and a command to build a complete OSINT VM. |
| 2026-04-22 2026 | Epieos: The Ultimate OSINT Tool beginner | Epieos: The Ultimate OSINT Tool |
| 2026-04-22 2026 | Bellingcat's Online Investigation Toolkit beginner | Bellingcat's Online Investigation Toolkit |
| 2026-04-22 2026 | Automating Google Dorking: From Manual OSINT Technique to Continuous Monitoring intermediate | Library for automating Google dorking, transforming this manual OSINT technique into a continuous exposure monitoring process. It maintains a query library, schedules regular runs, compares results against a baseline, and alerts on new findings. This approach focuses on content discoverable through search engines, complementing other monitoring methods like social media, domain registration, dark web, and credential breach checks. |
| 2026-04-22 2026 | mosint: An automated e-mail OSINT tool beginner | Library for automated email OSINT, Mosint, written in Go, consolidates numerous services to provide fast and efficient investigation of target emails. It supports email verification, social media account checking, data breach scanning, finding related emails and domains, Pastebin dump scanning, Google searches, DNS/IP lookups, and JSON output. Mosint requires API keys and configuration via a YAML file. |
| 2026-04-22 2026 | Telegram-OSINT: In-depth repository of Telegram OSINT resources beginner | Library of Telegram OSINT resources, including blogs detailing techniques like VM builds and chat analysis, browser extensions for scraping and searching, and tools for geolocalization, data analysis, and phone number checking, alongside a comprehensive list of Telegram bots for various investigative purposes. |
| 2026-04-22 2026 | Email-Username-OSINT Toolbox beginner | Library of OSINT tools and techniques for discovering email addresses and usernames. It details numerous resources like Any Mail Finder, GHunt, Haveibeenpwned, Hunter.io, Maigret, Sherlock, and WhatsMyName, alongside methods like manipulating URLs, altering usernames (e.g., O to 0), and leveraging Google advanced search for effective data aggregation. |
| 2026-04-22 2026 | Awesome OSINT for Everything beginner | Library of OSINT tools and resources for penetration testing, bug bounty, and red team operations. It encompasses categories such as AI, breaches, recon, social media enumeration, domain analysis, and data leak analysis, featuring tools like GreyNoise for IP and CVE searching, Dehashed for breach data, and WhatsMyName for username enumeration. The collection also includes AI-specific tools like AnonChatGPT for anonymous interaction, Decktopus for presentation creation, and Perplexity AI for sourced answers. |
| 2026-04-19 2026 | OSINT Framework: How to Build a Custom Maltego Transform intermediate | Library for creating custom Maltego transforms, integrating the Sherlock OSINT tool to discover social media accounts by username. This library utilizes the `maltego-trx` Python package, allowing developers to define input and output entities, process search results, and provide logging directly within the Maltego interface. The guide details setting up the project, writing the transform logic, and containerizing the solution with Docker for reproducible execution. |
| 2026-04-19 2026 | Top 10 OSINT Tools, Products & Solutions — SocialLinks beginner | Library of top OSINT tools for 2025, including SL Crimewall for comprehensive data extraction across 500+ sources, i2 for advanced data visualization and risk mitigation, Sayari Graph for supply chain and counterparty due diligence, Logically Intelligence for AI-driven data reliability and cross-platform analysis, and Spokeo for researching individuals across billions of records. |
| 2026-04-19 2026 | OSINT Industries — Online Investigations Platform beginner | Platform for online investigations that aggregates data from 1500+ sources, including social media, messaging apps like WhatsApp and Telegram, and lifestyle apps like Strava and Airbnb. It offers real-time data retrieval, geospatial visualization of digital footprints, and an interactive timeline of online activity. The platform can identify linked accounts for email addresses or phone numbers, flags data breached from services like haveibeenpwned.com, and allows data export in PDF, DOC, EXCEL, or JSON formats, with API access for integration into existing workflows. |
| 2026-04-19 2026 | OSINT Tools Security Analysts Should Know for 2025 beginner | Library for OSINT analysts, detailing tools and techniques for 2025. It covers metadata extraction with Metagoofil and ExifTool, advanced Google Dorking for uncovering exposed information, and people/social media intelligence platforms like Liferaft, AlertMedia, and Skopenow for operationalizing data. The library also addresses misinformation detection, including deepfake analysis using HyperVerge and Intel's FakeCatcher, alongside AI-driven tools for audio and video synthesis. |
| 2026-04-17 2026 | Geolocation 101: image-based OSINT tips beginner | Reference listing OSINT image geolocation techniques and tools such as Google Images, TinEye, and EXIF analysis. It details how to verify image authenticity by checking for manipulation, identifying original sources through reverse image searching, and analyzing visual cues like landmarks, shadows, and metadata. The entry also highlights tools like SunCalc, Google Maps, Forensically, FotoForensics, and Silo Image Metadata Viewer for geolocation and manipulation detection. |
| 2026-04-17 2026 | Image Analysis and Geolocation with OSINT (OSINT Combine) intermediate | Writeup on OSINT techniques for image geolocation, detailing how visual clues from traffic, buildings, pedestrian attire, and signage, alongside reverse image searching with tools like Google Lens and AI assistance via ChatGPT, can pinpoint an image's location. The analysis highlights identifying distinctive vehicles, architectural styles, national flags, and even police uniforms to confirm a subject's whereabouts, demonstrating a methodical approach to drawing intelligence from visual data. |
| 2026-04-17 2026 | spiderfoot: OSINT automation for threat intel (GitHub) intermediate | spiderfoot: OSINT automation for threat intel (GitHub) |
| 2026-04-17 2026 | OSINT Framework: The Ultimate Guide for Ethical Hackers beginner | OSINT Framework: The Ultimate Guide for Ethical Hackers |
| 2026-04-17 2026 | Spiderfoot vs Maltego for OSINT Research Cases intermediate | Spiderfoot vs Maltego for OSINT Research Cases → osintteam.blog |
| 2026-04-17 2026 | Operational Technology Discovery: ICS OSINT intermediate | Operational Technology Discovery: ICS OSINT |
| 2026-04-17 2026 | Beyond Google: Navigating the Hidden Internet with Shodan and Censys beginner | Beyond Google: Navigating the Hidden Internet with Shodan and Censys |
| 2026-04-17 2026 | OSINT Gathering Using Censys (Hackers Arise) intermediate | Tool for OSINT gathering on internet-connected systems, Censys leverages Zmap to provide near real-time data. It allows granular searches using keywords, IP addresses, Boolean operators, and regular expressions within parsed fields like certificate issuers. Censys also employs heuristic "tags" to categorize hosts, enabling specific searches for targets like SCADA systems, as demonstrated with queries for Siemens manufacturers and the modbus protocol, even utilizing boosting to prioritize search terms. |
| 2026-04-17 2026 | Top 5 OSINT Sources for Pentesting and Bug Bounties (Intel 471) beginner | Library for OSINT reconnaissance, detailing top sources like SecurityTrails, Shodan, and Spyse for penetration testing and bug bounties. These tools provide extensive data on external assets, including DNS history, historical WHOIS, ports, subdomains, and website technologies. Specific features highlighted include SecurityTrails' SurfaceBrowser for attack surface mapping and Shodan's device-centric search engine with SSL certificate filtering. Spyse offers a "one-stop-shop" with detailed domain information and various pricing tiers for its services. |
| 2026-04-17 2026 | sarenka: OSINT tool (Shodan/Censys) (GitHub) intermediate | Tool for OSINT and attack surface discovery, SARENKA gathers information from Shodan, Censys, and Criminal IP, mapping CVEs to CWEs. It also retrieves local machine data, including installed software and network information, alongside utilities for hash calculation, Shannon entropy, and port scanning. Future plans include more cryptography tools and reconnaissance scripts. |
| 2026-04-17 2026 | Domain and IP Investigation with OSINT: Complete Guide (OSINTBench) beginner | Library for domain and IP investigation using OSINT, covering WHOIS, DNS history, IP geolocation, and ASN analysis. This guide details practical workflows for tracking threat actors, scrutinizing suspicious sites, and mapping infrastructure. Techniques include using tools like `whois`, `dig`, `nslookup`, Security Trails, DomainTools, and scanning databases such as Shodan and Censys to pivot between domains, IPs, and name servers for comprehensive intelligence gathering. |
| 2026-04-17 2026 | OSINT Techniques & Tools (Imperva) beginner | Library for open-source intelligence (OSINT) techniques and tools, detailing how both defenders and attackers leverage publicly available information for security purposes. It covers passive, semi-passive, and active collection methods, highlighting popular tools like Maltego and Spiderfoot. The library also touches on the role of artificial intelligence in enhancing OSINT capabilities and its use in identifying risks such as unpatched software, open ports, and leaked credentials on platforms like GitHub and LinkedIn. → imperva.com |
| 2026-04-17 2026 | Top OSINT Tools For Dark Web (Brandefense) beginner | Top OSINT Tools For Dark Web (Brandefense) |
| 2026-04-17 2026 | OSINT Basics: What is Dark Web Intelligence (DARKInt)? beginner | Library for dark web intelligence (DARKInt) gathering, complementing open source intelligence (OSINT) by focusing on encrypted and hidden networks. It enables investigators to monitor hacker forums, marketplaces, and other dark web hubs for illicit activity, stolen datasets, and cyber-attack plans, aiding threat intelligence and fraud prevention through techniques like data scraping, deanonymization, content analysis, and cryptocurrency tracking. |
| 2026-04-17 2026 | Top 15 OSINT Tools in 2025 (OSINT BYLE) beginner | Top 15 OSINT Tools in 2025 (OSINT BYLE) |
| 2026-04-17 2026 | OSINT 2025: New and updated digital investigative tools beginner | Survey of over 45 new and updated digital investigative tools for 2025, categorized by AI, Social Media, and Websites. This resource highlights contributions from developers and companies like Cyber Detective and Logan Woodward, and acknowledges insightful newsletters from Jake Creps, Henk van Ess, and Ritu Gill, among others. It also recognizes the efforts of Niko Dekens, Griffin Glynn, Micah Hoffman, Alicja Pawlowska, and Benjamin Strick for their work in the OSINT community. |
| 2026-04-17 2026 | How to Use the OSINT Framework: Sources, Tools, Steps (BitSight) beginner | Library cataloging an OSINT framework that categorizes tools for gathering and organizing open-source intelligence. It details sources like social media and public records, and highlights specific tools such as Maltego, Shodan, theHarvester, and SpiderFoot. The entry also outlines the five core steps of the OSINT process: planning, data collection, processing, analysis, and reporting, while acknowledging how cybercriminals leverage OSINT for phishing, credential harvesting, and reconnaissance. |
| 2026-04-17 2026 | OSINT Tools And Techniques (Neotas) beginner | Guide to Open Source Intelligence (OSINT) for risk and compliance investigations, detailing how publicly available data from diverse sources like websites, social media, and dark web content can uncover hidden threats, support due diligence, and streamline risk management. It emphasizes OSINT's legal and ethical application, its critical role in regulated industries for demonstrating compliance, and its real-world use cases in financial crime, vendor vetting, reputation monitoring, and AML. The guide highlights the importance of a structured workflow and effective techniques, such as Boolean search operators, to transform raw information into actionable, evidence-grade intelligence. |
| 2026-04-17 2026 | Complete OSINT Guide 2025: Find Anyone Online beginner | Guide outlining Open Source Intelligence (OSINT) techniques for individuals and professionals, detailing the five phases of an OSINT investigation: defining requirements, source discovery (including layers like personal websites, public records, and digital residue), processing and correlation using timeline construction and network mapping with tools like Maltego, analysis and interpretation of behavioral patterns, and reporting. It also lists essential tools such as Google Dorking, Maltego, SpiderFoot, Social Searcher, Twint, BeenVerified, Spokeo, Pipl, and Dehashed for effective data collection and analysis. |
| 2026-04-16 2026 | I Participated in a Trace Labs CTF - Now I'm Hooked on OSINT beginner | Library of OSINT resources compiled from participation in Trace Labs CTFs and other OSINT challenges. Includes links to training from Trace Labs, SANS (SEC487, SEC537), OSINT Combine, Aware Online, and McAfee Institute, alongside practice platforms like TryHackMe, GeoGuessr, and Europol Trace an Object. Also lists notable OSINT conferences, YouTube channels, books, blogs, and Twitter accounts for further learning and community engagement. |
| 2026-04-16 2026 | Recon Village - OSINT and Reconnaissance Village at DEF CON 33 beginner | Talks from DEF CON 33's Recon Village cover autonomous video analysis with AI agents to extract OSINT from live streams, building offline OSINT repositories using Knowledge Graphs and RDF to bypass API throttling, and automating cyber threat intelligence extraction from reports into battlecards using LLM agents and ReAct frameworks. Additional topics include Discord OSINT techniques beyond basic searches and profile analysis, and practical challenges of scaling and reducing false positives in AI-driven intelligence gathering. |
| 2026-04-16 2026 | A Beginner's Guide to OSINT Investigation with Maltego beginner | A Beginner's Guide to OSINT Investigation with Maltego |
| 2026-04-16 2026 | Social Media Intelligence (SOCMINT) in Modern Investigations beginner | Analysis of Social Media Intelligence (SOCMINT) details its definition as the process of gathering and interpreting data from social media platforms for actionable insights, highlighting its applications in threat analysis, cybersecurity, and crisis management. It distinguishes SOCMINT from broader Open Source Intelligence (OSINT) by its exclusive focus on social media and online communications, and addresses legal frameworks such as GDPR, Canada's Privacy Act, CALEA, and the UK Investigatory Powers Act, alongside ethical considerations regarding public versus private information and data scraping. |
| 2026-04-16 2026 | OSINT Challenge in 30: Social Media Geolocation intermediate | OSINT Challenge in 30: Social Media Geolocation |
| 2026-04-16 2026 | Trace Labs OSINT Educational Series beginner | Series on Open-Source Intelligence (OSINT) covering three progressive levels of training. Level 1 focuses on fundamental data collection, introducing Google Dorking, metadata extraction, and social media footprint scraping. Level 2 builds upon these skills for real-world investigations, emphasizing clear documentation, data verification, and structured workflow execution. Level 3 delves into advanced cybersecurity applications, including geolocation workflows, GEOINT techniques, Personally Identifiable Behavior analysis, OPSEC, and the Berkeley Protocol for high-integrity investigations. |
| 2026-04-16 2026 | OSINT Investigation Techniques for Missing Person Cases (Trace Labs) beginner | OSINT Investigation Techniques for Missing Person Cases (Trace Labs) |
| 2026-04-16 2026 | Automated OSINT Techniques for Digital Asset Discovery and Cyber Risk Assessment intermediate | Automated OSINT Techniques for Digital Asset Discovery and Cyber Risk Assessment |
| 2026-04-16 2026 | Awesome OSINT - A Curated List of OSINT Resources beginner | Library: A curated list of open-source intelligence (OSINT) tools and resources for cyber threat intelligence, threat hunting, and OSINT practitioners of all levels. It organizes resources into categories like General Search, Google Dorks, Privacy Focused Search Engines, Data Breach Search Engines, Visual Search, Document Search, Social Networks, Domain and IP Research, and Threat Intelligence. Specific tools mentioned include DorkEye, DorkGenius, DorkGPT, and the Google Hacking Database (GHDB) for Google Dorking, alongside various national and privacy-focused search engines. |
| 2026-04-16 2026 | OSINT Techniques: Complete List for Investigators beginner | Techniques enumerate 100+ methods for gathering, verifying, and analyzing publicly available information from diverse sources like social media, public records, and multimedia. These passive, non-intrusive OSINT approaches include social media analysis, network mapping, hashtag tracking, profile analysis, and geolocation, focusing on legality, ethics, and transforming raw data into actionable intelligence through verification and cross-referencing. |
| 2026-04-10 2026 | OWASP OSINT Resources beginner | Library of OSINT tools and techniques for cybersecurity professionals, journalists, and researchers. It details resources like Shodan, Censys, Maltego, TheHarvester, Recon-ng, SpiderFoot, OSINT Framework, and Google Dorking for reconnaissance, threat monitoring, and uncovering exposed assets. The entry also covers metadata analysis and social media intelligence tools, offering a structured approach to defining goals, identifying sources, collecting and analyzing data, and documenting findings. |
| 2026-04-10 2026 | OSINT Framework - GeeksforGeeks beginner | Library for Open Source Intelligence (OSINT) techniques, detailing methods like search engine reconnaissance, social media monitoring, and metadata analysis. It highlights tools such as Have I Been Pwned for breach detection, BeenVerified for background checks, Censys and Shodan for internet-scanning and device discovery, Maltego for link analysis, SpiderFoot for automated reconnaissance, and Recon-ng for reconnaissance operations. This resource aids cybersecurity professionals, investigators, and researchers in gathering and analyzing publicly available information. → geeksforgeeks.org |
| 2026-04-10 2026 | Top 10 OSINT Tools and Software for 2026 beginner | Top 10 OSINT Tools and Software for 2026 |
| 2026-04-10 2026 | How to Conduct Investigations Using OSINT & Maltego intermediate | Tutorial on using OSINT and Maltego for person of interest investigations. This resource demonstrates how to link disparate leads by building a comprehensive map of a target's digital footprint, integrating data from OSINT, social intelligence, and identity sources. It covers steps like discovering official information, tracing digital trails through website analysis to find email addresses and phone numbers, mapping social media profiles with SOCMINT, and exploring affiliated companies. The tutorial uses specific examples like public individuals Aina and Marc Clotet to illustrate techniques for uncovering aliases and potential private connections. |
| 2026-04-10 2026 | 8 Best OSINT Tools (Paid & Free) in 2025 beginner | Library of OSINT tools for cybersecurity professionals, including Maltego for link analysis, OSINT Framework for resource discovery, Babel Street Insights for multilingual monitoring, Google Dorks for advanced search queries, Shodan for device insights, Metasploit for penetration testing, Recon-ng for web reconnaissance, and Aircrack-ng for Wi-Fi security. These tools automate data collection, streamline analysis, and help mitigate information overload for threat intelligence and investigative work. |
| 2026-04-10 2026 | Best Open Source Windows OSINT Tools 2026 beginner | Guide to Open Source OSINT Tools, this collection highlights free, collaborative software for intelligence gathering. It details capabilities like web searching, live monitoring, geolocation tracking, image analysis, reverse image searching, and automated scanning. The guide categorizes tools including search engines, social media platforms, databases, mapping platforms, metadata analysis tools, Maltego Transforms, and visualization software, emphasizing benefits like cost savings, customization, collaboration, security, and accessibility for users such as journalists. |
| 2026-04-10 2026 | Top 10 OSINT Tools 2026 - DevOpsSchool beginner | Library of 10 top Open Source Intelligence (OSINT) tools for 2026, including Maltego for link analysis, Shodan for internet-connected device searching, Spycloud for data breach monitoring, Social-Searcher for social media tracking, Hunchly for automated web data collection, and Recorded Future for threat intelligence. This collection aids cybersecurity professionals, investigators, and researchers in leveraging public data for informed decision-making. |
| 2026-04-10 2026 | Open Source Intelligence GitHub Topics beginner | Open Source Intelligence GitHub Topics |
| 2026-04-10 2026 | 13 Best OSINT Tools for 2025 beginner | Library for OSINT investigations, this resource provides a curated list of top tools for 2025, including Talkwalker and Hootsuite for AI-powered social media monitoring, Maltego for visualizing connections in cybercrime investigations, OSINT Industries for tracking online identities, Intelligence X for deep searches of darknet and data leaks, and Crimewall by Social Links for comprehensive cybercrime analysis. |
| 2026-04-10 2026 | 9 Top OSINT Tools & How to Evaluate Them beginner | Library for OSINT that streamlines threat intelligence gathering by processing publicly available information from various sources. It aids in identifying exposed assets, leaked credentials, and risky domains, offering features like multilingual analysis, dark web monitoring via DarkSearch.io, and metadata extraction from documents with FOCA. Tools like BuiltWith help map attack surfaces, while Intelligence X and Babel X focus on discovering sensitive data and threat actor activity across deep and dark web platforms. → wiz.io |
| 2026-04-10 2026 | Best OSINT Tools for Intelligence Gathering (2026) beginner | Library of 24 OSINT tools for advanced intelligence gathering, covering both free and paid options. This resource assesses tools based on their integration into real-world OSINT workflows, considering specific use cases for digital investigations and threat intelligence. Featured tools include ShadowDragon® Horizon®, ExifTool, DNSDumpster, VirusTotal, Google Earth Pro, Recorded Future, DeHashed, SpiderFoot, Shodan, Censys, X-Ray Contact, and IRBIS Pro OSINT Profiler. |
| 2026-04-10 2026 | OSINT Bible: Comprehensive 2026 Guide beginner | Library for responsible OSINT practices, offering a structured 4-step methodology, a tools mind map, and detailed sections on internet search, social networks, geoINT, domain/IP/DNS, and deep/dark web investigations. It covers automation with Python, report templates, legal considerations, and specific tools like Twint-fork, Maigret, Amass, Recon-ng, and SpiderFoot, alongside crucial techniques such as advanced Google Dorking. The resource also includes sections on AI intelligence, facial recognition, data breaches, and cryptocurrency OSINT, with a notable tip to explore Abster Intelligence for local-first evidence organization. |
| 2026-04-06 2026 | AI-enabled Workflows and Deeper Intelligence beginner | Library of AI-driven blockchain investigation tools featuring Co-Case Agent for natural-language fund tracing and exposure analysis, real-time adverse media summaries synthesized from OSINT, customizable risk monitoring segments for transaction analysis, proactive entity risk alerts, expanded Wallet Screening API for indirect exposure visibility, and a Super Fast Scan mode in Seed Analysis for rapid seed phrase triage, countering the 500% rise in AI-enabled crypto scam activity. |
| 2026-04-06 2026 | 10 Best Threat Intelligence Tools In 2026 beginner | Library of threat intelligence tools for 2026, including CloudSEK, Recorded Future, CrowdStrike, Mandiant, and Microsoft, were evaluated for their predictive depth, contextual accuracy, and integration with operational security workflows. These platforms collect, analyze, and contextualize information about emerging cyber threats from various sources, including dark web communities and malware repositories. Key features reviewed include external attack surface monitoring, brand impersonation detection, infrastructure exposure tracking, and integration with SIEM, SOAR, and XDR systems for improved detection and response. |
| 2026-04-06 2026 | Open Source Intelligence (OSINT): AI-Powered Image Geo-Location intermediate | Tool for AI-powered image geolocation using ChatGPT's custom GeoGuessr GPT. This tool synthesizes visual objects from uploaded images, offering probabilistic guesses about locations and providing a framework for reasoning. While not a replacement for traditional OSINT techniques like shadow analysis, it significantly speeds up the initial sorting process by leveraging a vast training dataset of geotagged images and city descriptions. The custom GPT acts as a wrapper around base models, directing general intelligence towards the specific task of image analysis and location estimation. |
| 2026-04-06 2026 | Top 15 OSINT Tools For Cybersecurity In 2026 beginner | Tools offering open-source intelligence (OSINT) aid cybersecurity professionals in gathering data from public sources. These tools are vital for threat detection, vulnerability assessment, and incident response, with applications extending to brand monitoring, law enforcement, and competitive analysis. Specific tools like Maltego facilitate visual data mapping, Shodan discovers internet-connected devices, and Cyble ODIN scans internet assets for vulnerabilities and exposed information. The evolution of OSINT includes advanced web scraping, social media analytics, and geospatial intelligence, emphasizing the importance of balancing intelligence gathering with operational security (OPSEC) and adhering to legal and ethical guidelines like GDPR and CCPA. |
| 2026-04-03 2026 | Bug Bounty 101: Top 10 Reconnaissance Tools | Netlas beginner Recon | Reference of top reconnaissance tools for bug bounty hunters, detailing passive and active techniques. Highlights include Netlas.io for mapping internet infrastructure, discovering domains, subdomains, and open ports, and Waybackurls for extracting historical URLs from the Wayback Machine, uncovering past pages, login panels, and APIs. |
| 2026-04-03 2026 | Top 10 OSINT Tools Everyone Should Know | SMIIT CyberAI beginner | Tools for Open Source Intelligence (OSINT) gathering are detailed, including Maltego for link analysis, Shodan for internet-connected device discovery, Recon-ng for web reconnaissance, SpiderFoot for automating data collection from over 100 sources, theHarvester for domain information, FOCA and Metagoofil for metadata extraction from documents, Datasploit as an automated OSINT framework, the OSINT Framework as a categorized resource collection, and Google Dorks for advanced search queries. |
| 2026-04-03 2026 | Top 10 OSINT Tools in 2025 Cyber Analysts Trust beginner | Library of OSINT tools for 2025 cybersecurity analysis, including SpiderFoot HX for automated reconnaissance, Maltego for link analysis, Shodan for IoT indexing, Intelligence X for data leaks, Recon-ng for modular web reconnaissance, OSINT Dojo Toolkit for skill-building, TheHarvester for data gathering, Mitaka with SecurityTrails for rapid pivoting, DarkSearch.io for dark web indexing, and Sherlock for username tracking. These tools are essential for analysts, red teamers, and investigators seeking precision and speed in uncovering public data. |
| 2026-04-03 2026 | 10 Best Open Source Intelligence (OSINT) Tools Of 2025 beginner | Tools providing Open Source Intelligence (OSINT) such as Maltego, Shodan, theHarvester, SpiderFoot, Recon-ng, FOCA, BinGoo, Datasploit, OSINT Framework, and Metagoofil aid web professionals in security assessment, digital footprint mapping, and vulnerability identification by aggregating and analyzing data from public sources like domain registrations, DNS records, and social media. These instruments help reveal an organization's attack surface, identify exposed assets, and understand the threat landscape for WordPress sites. |
| 2026-04-03 2026 | What is OSINT? Tools, Techniques and Framework Explained beginner | What is OSINT? Tools, Techniques and Framework Explained |
| 2026-04-03 2026 | 15 Best OSINT Tools in 2026 | Lampyre beginner | Reference list detailing 15 essential OSINT tools for 2026, including Lampyre, Maltego, Shodan, Intelligence X, and SpiderFoot. These tools aid in gathering and analyzing publicly available data for cybersecurity, threat intelligence, and investigative research. The entry highlights their features, pros, and cons, emphasizing their roles in network reconnaissance, data leakage detection, and uncovering digital intelligence. |
| 2026-04-03 2026 | Open Source Intelligence Tools and Resources Collection beginner | Collection of Open Source Intelligence tools and resources designed for gathering and analyzing publicly available information. It includes a comprehensive meta-resource, the OSINT Framework, linking to various free tools such as MISP for threat intelligence sharing, SpiderFoot for automating OSINT, Shodan for internet-connected device discovery, urlscan.io for website analysis, Maltego for link analysis, Recon-ng for web reconnaissance, IntelOwl for threat intelligence management, DNS Twister for anti-phishing, Insecam for surveillance camera directories, IP Logger for IP tracking, That's Them for people search, and ImgOps for image analysis. |
| 2026-04-03 2026 | OSINT for Threat Enrichment: Deep Dive with Maltego, SpiderFoot, IntelX, Recon-ng intermediate | OSINT for Threat Enrichment: Deep Dive with Maltego, SpiderFoot, IntelX, Recon-ng |
| 2026-04-03 2026 | Top 15 Free OSINT Tools To Collect Data From Open Sources beginner | Library of 15 free OSINT tools aids in intelligence gathering, covering areas like web scraping, social media analytics, and network scanning. Tools such as OSINT Framework, Google Dorks, and theharvester facilitate efficient data collection. Recorded Future's Vulnerability Database and Triage Malware Sandbox offer specific insights into CVEs and malware analysis, respectively, supporting cybersecurity investigations and threat intelligence. Mitaka and Recorded Future's Browser Extension provide browser-based reconnaissance capabilities. |
| 2026-04-02 2026 | Build Your Own OSINT APIs for Pen Testers intermediate | Library for building custom OSINT APIs using NodeJS and MongoDB. This resource demonstrates indexing large datasets from Rapid7's Project Sonar for efficient domain and subdomain searches, bypassing limitations of existing tools like Whoxy and HackerTarget. It details processing raw DNS records, utilizing MongoDB's multikey indexing, and exposing data via a simple API, enabling custom searches similar to Shodan's core features without rate limits. |
| 2026-04-02 2026 | AI vs dirty money: Using opensource intelligence to expose illicit financial flows beginner | Analysis of AI-powered open-source intelligence (OSINT) techniques for exposing illicit financial flows, including money laundering and sanctions evasion. The article highlights the increasing scale of financial crime penalties imposed by regulators like the FCA, FinCEN, and INTERPOL, and details how AI OSINT can analyze vast datasets from social media, dark web, and cryptocurrency exchanges to identify criminal networks and suspicious activities, aiding financial institutions in compliance and risk management against threats like romance fraud. |
| 2026-04-02 2026 | Agentic OSINT: The Next Evolution Of Intelligence Gathering beginner | Walkthrough of Agentic OSINT, an evolution in intelligence gathering where goal-driven AI agents autonomously plan, execute, adapt, and collaborate to achieve specific intelligence objectives. This paradigm shift, contrasting with traditional Generative AI's pattern identification, multiplies analytical capabilities by orchestrating multiple agents for tasks like data collection, verification, and threat mapping, enabling proactive, mission-oriented workflows for cybersecurity professionals. |
| 2026-03-18 2026 | ljagiello/ctf-skills: Claude Code skills for solving CTF challenges - web exploitation, binary pwn, crypto, reverse engineering, forensics, OSINT, and more beginner | Claude Code skills for solving CTF challenges - web exploitation, binary pwn, crypto, reverse engineering, forensics, OSINT, and more - ljagiello/ctf-skills |
| 2025-12-01 2025 | GitHub - kaifcodec/user-scanner: Scan a username across multiple social, developer, and creator platforms to see if it’s available. Perfect for finding a unique username across GitHub, Twitter, Reddit, Instagram, Telegram and more, all in one command. beginner | Tool for OSINT reconnaissance, the user-scanner identifies digital footprints by checking email registrations and username availability across over 195 platforms, including social media, developer sites, and creator networks like GitHub, X, and Reddit. It supports single and bulk scanning, modular platform additions, proxy rotation, and outputs results in console, JSON, or CSV formats. Advanced features include wildcard username permutations and checking for exposure in infostealer malware logs via the `--hudson` flag. |
| 2025-11-21 2025 | WebRecon from @D4rk_Intel is another OSINT multi-tool worth knowing about. 🧠 intermediate Recon | It automates web crawling, tech stack detection, DNS & WHOIS intel, email harvesting, Wayback lookups, and exports clean JSON reports. Try it here: https://t.co/6inbXMqnsZ |
| 2025-11-12 2025 | reconurge/flowsint: A graph manager to help you save time in your cyber investigations. beginner | Tool for OSINT graph exploration, Flowsint aids cybersecurity researchers, journalists, and investigators by visualizing relationships between entities. It supports numerous automated enrichers for domains, IPs, social media (including Maigret), cryptocurrency, websites, and individuals, enhancing reconnaissance and transparency. The application emphasizes local data storage for privacy and follows a modular structure for extensibility. |
| 2025-08-14 2025 | IVMachiavelli/OSINT_Team_Links: Links for the OSINT Team beginner | Library of curated links for OSINT practitioners, covering diverse categories such as intel techniques, media verification, mapping, video search, image metadata analysis, translation, web archiving, keyword tools, IP intelligence, domain research, professional networking, business directories, expert sourcing, email verification, phone lookup, people search, and social media analysis. The collection emphasizes usability, requiring full URLs to search features and excluding paid services or software requiring downloads. Updates to the repository are encouraged. |
| 2025-08-14 2025 | DataSploit/datasploit: An #OSINT Framework to perform various recon techniq beginner | Framework for performing automated OSINT on domains, emails, usernames, and phone numbers. It gathers information from various sources, correlating and consolidating results to identify credentials, API keys, tokens, subdomains, domain history, and legacy portals. The tool supports active scans on collected data and generates reports in HTML, JSON, and text formats, with options for processing single targets or lists. |
| 2025-08-14 2025 | OSINT Framework beginner | Framework categorizing over 1000 OSINT tools and resources, marked with indicators for local installation (T), Google Dorking (D), registration requirements (R), or manual URL editing (M). Originally for information security, it now encompasses diverse disciplines, welcoming community contributions for comprehensive coverage. |
| 2025-08-14 2025 | Hunchly - Better Online Investigations beginner | Tool for collecting and storing web page data during online investigations. Hunchly automatically captures URLs, timestamps, and page content, offering secure, offline access to research findings. It integrates with Kasm Workspaces for cloud storage, empowering investigators to preserve information effectively. |
| 2025-08-14 2025 | Automating OSINT Blog beginner | The content provided is a title mentioning an "Automating OSINT Blog." It appears to be a brief reference to a blog focused on automating Open Source Intelligence (OSINT) processes. The blog likely discusses tools, techniques, and strategies for automating the collection and analysis of publicly available information for investigative purposes. It may offer insights into streamlining OSINT workflows and enhancing efficiency in gathering intelligence from various online sources. |
| 2025-08-14 2025 | Thingful - a search engine for the Internet of Things beginner | Library: Thingful indexed thousands of IoT platforms, infrastructures, and resources, enabling users to search for devices, datasets, and real-time data by geolocation. It facilitated discovery of connected objects like energy monitors, seismographs, and animal trackers, and enabled data permissions management for connected car infrastructure. Thingful was a key component in H2020 projects such as DECODE and GROW Observatory, and sunsetted in 2022. |
| 2025-04-04 2025 | 10 Rare and Worthy Websites and Services for Security Professionals beginner | While platforms like Shodan, OWASP, and VirusTotal are staples for security professionals, there are many lesser-known websites and services that offer equally valuable tools and resources. These… → osintteam.blog |
| 2025-03-18 2025 | ‘Dogequest’ Site Claims to Dox Tesla Owners Across the U.S. news | Writeup detailing the "DOGEQUEST" website, which purports to dox Tesla owners across the U.S. by displaying their names, addresses, phone numbers, and email addresses on a searchable map. The site offers data removal upon proof of vehicle sale and also lists Tesla dealership addresses and employee information. While some data points were verified by 404 Media, the overall veracity remains uncertain. |
| 2024-12-29 2024 | Python for Dark Web OSINT: Automate Threat Monitoring intermediate Python | Learn how to use Python to automate monitoring of dark web forums, leak sites, and marketplaces for actionable threat intelligence. |
| 2024-12-29 2024 | Dark Web Monitoring Using Python - Code With C intermediate | Library for dark web monitoring in Python, demonstrating how to use libraries like Beautiful Soup, Scrapy, Pandas, and Matplotlib for web scraping and data analysis. It includes code examples for setting up a Python environment, implementing web scraping, and leveraging cybersecurity measures like encryption and secure communication protocols for proactive threat identification and monitoring. |
| 2024-08-27 2024 | Thousands of Corporate Secrets Were Left Exposed. This Guy Found Them All news Secrets | Library for automating the discovery of hard-coded secrets and dangling subdomain vulnerabilities. This research leverages unconventional datasets like VirusTotal's Retrohunt feature and passive DNS replication data to systematically identify thousands of exposed API keys, passwords, and authentication tokens, as well as vulnerable websites. The library aims to find trivial vulnerability classes at scale, enabling proactive security measures against potential data breaches and system compromises. → wired.com |
| 2024-08-23 2024 | IntelTechniques Books beginner | IntelTechniques Books |
| 2023-08-14 2023 | Nyxgeek%20 %20 track%20the%20 planet%20 mapping%20 identities%20 monitoring%20 presence%20and%20 decoding%20 business%20 alliances%20in%20the%20 azure%20 ecosystem intermediate | Nyxgeek%20 %20 track%20the%20 planet%20 mapping%20 identities%20 monitoring%20 presence%20and%20 decoding%20 business%20 alliances%20in%20the%20 azure%20 ecosystem |
| 2023-07-11 2023 | Using SpiderFoot to Investigate a Public Bug Bounty Program intermediate | Using SpiderFoot to Investigate a Public Bug Bounty Program https://ift.tt/OklK085 |
| 2023-06-08 2023 | Google dork cheatsheet beginner Recon | Cheatsheet of Google Dorking techniques, including operators like `intext:"index of /"`, `intitle:`, `filetype:`, `inurl:`, `ext:`, `~`, and `*`. The examples demonstrate effective searches for specific file types, sensitive information like salaries and budgets, and even locating unauthorized access points within websites. |
| 2023-06-08 2023 | kargisimos/offensive-bookmarks beginner Bug Bounty Recon | Collection of browser bookmarks for penetration testers and bug bounty hunters, categorized into OSINT, cheat sheets, malware development and analysis, shells, obfuscation, privilege escalation, password tools, practice labs, blogs, and forums. |
| 2022-04-25 2022 | Favorite tweet by @JasonFord beginner Python Recon | Favorite tweet: I'm continuing to work on my python skills to gather data using threat intel APIs. I've shared this script on GitHub that you can use (with your own API key) to query @EmergingThreats... |
| 2022-03-26 2022 | Favorite tweet by @0xAsm0d3us news | Favorite tweet: ALL IN ONE Hacking Tool For Hackers https://t.co/sz38nhsZXS #cybersecurity #hacking #osint #bughunting https://t.co/xRAhG6yZDJ — Devansh (⚡, 🥷) (@0xAsm0d3us) Mar 25, 2022 |
| 2022-03-14 2022 | Favorite tweet by @harshbothra_ beginner Recon | Favorite tweet: 17 Search Engines every Security Professional Must Know 🧵 — Harsh Bothra (@harshbothra_) Mar 14, 2022 |
| 2022-02-24 2022 | Favorite tweet by @Insharamin beginner | Favorite tweet: Forget not being able to find things on google. Use these tricks and tips to master google like a pro. 🔥 A Thread 👇 — Insha (@Insharamin) Feb 23, 2022 |
| 2022-01-17 2022 | Dorks collections list beginner | List of GitHub repositories and articles curating search engine dorks for various platforms including Netlas, Github, Shodan, Censys, and DuckDuckGo. This collection covers dorks for sensitive data, hidden files, admin panels, SQL injection, and CMS vulnerabilities, offering tools and browser extensions to automate dork usage. It also includes specific dorks for searching .onion sites, CCTV cameras, and cloud instances like AWS, Google Cloud, and Azure. |
| 2022-01-11 2022 | Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT! beginner Talks | Open-Source Intelligence (OSINT) in 5 Hours - Full Course - Learn OSINT! |
| 2022-01-10 2022 | 6 Ways to Delete Yourself From the Internet beginner | Reference to techniques for reducing your online footprint, covering data broker opt-outs, account deletion using services like Justdelete.me and Have I Been Pwned?, and cleaning up old social media posts via tools like TweetDelete. This also touches on using Google's tools to remove outdated or harmful content and the implications of third-party services accessing your data, referencing GDPR and CCPA. → wired.com |
| 2022-01-03 2022 | hashlookup-forensic-analyser version 0.8 released including a report functionality news | Tool for forensic analysis of files; version 0.8 introduces a new `--report` option that generates a markdown summary and a JSON export of discovered files. This release includes bug fixes for report generation and variable handling, along with documentation updates and a sample report gist. |
| 2021-12-26 2021 | Track any IP Address’s Exact Location like a Pro Hacker intermediate | Track any IP Address’s Exact Location like a Pro Hacker |
| 2021-11-26 2021 | Useful OSINT Browser Extensions beginner | Useful OSINT Browser Extensions |
| 2021-11-17 2021 | Phone Number Lookup beginner | Library for OSINT automation, leveraging custom functions for REST API requests within Google Sheets, specifically for phone number lookup and verification. It includes curl converters to assist in API query code generation. For those new to REST APIs, a linked Netlas API guide is recommended for learning automation in Python and Bash, and processing JSON data. Use of unofficial APIs carries a warning of potential account blocking. |
| 2021-11-06 2021 | OSINT: How to find information on anyone? beginner | Reference on Open-Source Intelligence (OSINT) techniques, detailing its historical development from 1941 and its application in intelligence gathering, background checks, cybersecurity, plagiarism detection, and fraud investigation. The reference emphasizes the importance of asking the right questions and outlines active and passive data collection methods. It mentions tools such as Shodan, UserSearch.org, Maltego, and Google hacking as valuable resources for OSINT professionals, investigators, and cybersecurity experts. |
| 2021-10-26 2021 | Remove Personal Info from Google - DeleteMe beginner | Service that removes personally identifiable information (PII) from data brokers and search engine results. DeleteMe experts locate and remove your information from sites like 123people.com, MyLife.com, Spokeo, US Search, White Pages, and PeopleFinder.com, automating the process to reduce your digital footprint and enhance online privacy. |
| 2021-10-24 2021 | People Search / OSINT Investigations Tool by Bob Brasich @goFindWho beginner | People Search / OSINT Investigations Tool by Bob Brasich @goFindWho |
| 2021-10-19 2021 | OSINT Treasure Trove beginner | OSINT Treasure Trove |
| 2021-09-15 2021 | How To Track Phone Number Location With Python beginner Python | How To Track Phone Number Location With Python → python.plainenglish.io |
| 2021-08-21 2021 | Open-source information gathering tool beginner | Open-source information gathering tool |
| 2021-06-15 2021 | Python Cybersecurity beginner Python | Python is a versatile language widely used in cybersecurity for various tasks, including penetration testing, malware analysis, and vulnerability assessment. Its extensive libraries like Scapy for network packet manipulation, Nmap for network scanning, and Requests for web interactions make it a powerful tool for security professionals. Python's readability and ease of use accelerate the development of custom security scripts and tools, enabling quicker responses to threats and more efficient analysis. The language's adaptability and robust ecosystem contribute significantly to modern cybersecurity practices. |
| 2021-05-17 2021 | How to search URLs exposed by Shortener services intermediate | This content focuses on methods for discovering URLs that have been inadvertently exposed by URL shortener services. It likely details techniques or tools that can be used to identify these exposed links, which could potentially lead to unintended disclosure of original, longer URLs. The main idea is to provide a guide for finding these vulnerabilities within URL shortening platforms. |
| 2021-01-20 2021 | Gathering Open Source Intelligence beginner | The content discusses gathering open source intelligence through techniques, automation, and visualization. It likely covers methods for collecting information from publicly available sources, utilizing automation tools to streamline the process, and visualizing data for better analysis. The focus is on leveraging open source intelligence effectively by employing various strategies and technologies. |
| 2017-06-13 2017 | Thingful - a search engine for the Internet of Things beginner | Library for searching the Internet of Things, Thingful offered a geographical index of real-time data from diverse connected objects globally, including environmental sensors and trackers. It facilitated discovery of devices, datasets, and real-time open data sources by geolocation, supporting applications from autonomous vehicle pilots to environmental monitoring and data permissions management. Thingful's interoperability and discoverability technologies contributed to projects like DECODE and GROW Observatory. |
| 2017-06-13 2017 | Hunchly - Better Online Investigations beginner | Tool for online investigators that automatically captures URLs, timestamps, page content, and hashes of visited sites. Hunchly streamlines evidence preservation by eliminating manual screenshots and tab management, storing data securely on the local machine for offline access. It offers encrypted cloud synchronization via Kasm Workspaces, enabling cross-device work. Since 2016, Hunchly has been empowering researchers in 84 countries to find and preserve digital information. |
| 2017-06-13 2017 | Automating OSINT Blog beginner | The content provided is simply the title "Automating OSINT Blog." It appears to be a reference to a blog or website focused on automating Open Source Intelligence (OSINT) processes. The blog likely covers topics related to using automation tools and techniques to enhance the efficiency and effectiveness of gathering intelligence from publicly available sources. |
| 2017-06-13 2017 | OSINT Framework beginner | Framework that aggregates OSINT tools and resources, categorized by discipline and type (e.g., local installation, Google Dorking, manual URL editing, registration required). Originally built for information security, it has expanded to include contributions from various fields, offering a comprehensive starting point for open-source intelligence gathering. |
Frequently Asked Questions
- What is OSINT in cybersecurity?
- In cybersecurity, OSINT (Open-Source Intelligence) refers to gathering information from publicly available sources to assess an organization's security posture. This includes discovering subdomains, exposed credentials, employee information, technology stacks, and forgotten assets — all without directly interacting with the target's systems.
- What are the best OSINT tools for bug bounty?
- Key tools include Shodan and Censys for internet-wide scanning, theHarvester for email and subdomain discovery, SpiderFoot for automated reconnaissance, Maltego for relationship mapping, and Google Dorking for finding exposed files and admin panels. Certificate Transparency logs and GitHub search are also essential.
- How is passive recon different from active recon?
- Passive recon gathers information without sending any traffic to the target — using public databases, search engines, DNS records, and archived content. Active recon directly interacts with the target through port scanning, directory brute-forcing, and fingerprinting. Passive recon is undetectable; active recon may trigger security alerts.
Weekly AppSec Digest
Get new resources delivered every Monday.