OSINT - spinningideas/resources GitHub Wiki
OSINT Framework
- Search Engine Operators & Google Dorking
- Social Media OSINT
- Image & Video Analysis (Reverse Image Search, Metadata Extraction)
- Geospatial Intelligence (GEOINT)
- Data Correlation & Verification
Introduction to OSINT
What is OSINT? – Public data → Intelligence
The OSINT Process: Define target, Gather info, Analyze, Verify Ethics & Legality: Use only on authorized targets, follow all laws
https://osintframework.com/
OSINT Framework: A map of free OSINT resources -See osintframework.com. This interactive interface, which lists many resources by categories (people search, social media, domain research, etc.). Click through a category (e.g., "Domain Name" → "Whois" or "Email Search") to reveal specific tools.
Search Engine Operators & Google Dorking
- site:, filetype:, intitle:, inurl:, etc. • Example: site:example.com filetype:pdf "confidential"
- Google Dorking Example
Select a target domain and perform a simple Google search that uses advanced operators – for example, search for site:domain.com "password" to show how one might find exposed information on a target domain. (Use a benign target like site:github.com "password" for demo to retrieve some public results.) Explain how Google dorks can uncover pages that are not immediately obvious.
Social Media OSI
- Profiling targets on LinkedIn, Twitter, Facebook, etc.
- Tools: sherlock (CLI, Python) can check multiple platforms for the same username across Windows/macOS/Linux.
Image & Video Analysis
- Reverse Image Search: Google Images, TinEye, Yandex
- Metadata Extraction: ExifTool (cross-platform) reveals camera model, GPS, software.
- Geolocation from background clues or EXIF coordinates.
Geospatial Intelligence (GEOINT)
- Using Google Earth, Bing Maps, or open satellite data for location-based investigations.
- Matching landmarks, analyzing timelines with historical imagery.
Data Correlation & Verification
- Cross-reference multiple sources to confirm authenticity.
- Differentiate facts from assumptions.
OSINT Framework Techniques
Search Engine Operators & Google Dorking
- site:, filetype:, intitle:, inurl:, etc.
Example: site:example.com filetype:pdf "confidential"
Social Media OSINT
- Profiling targets on LinkedIn, Twitter, Facebook, etc.
- Tools like sherlock (CLI, Python) can check multiple platforms for the same username across Windows/macOS/Linux.
Image & Video Analysis (Reverse Image Search, Metadata Extraction)
- Reverse Image Search: Google Images, TinEye, Yandex
- Metadata Extraction: ExifTool (cross-platform) reveals camera model, GPS, software.
Geospatial Intelligence (GEOINT)
Tool Setup (Cross-Platform)
Tools: theHarvester, Shodan, Maltego
Tool Install
Windows: pip install theHarvester (or from GitHub)
macOS: brew install theharvester or pip3 install theHarvester
Linux: sudo apt install theharvester (if available) or pip3 install theHarvester
Tool Use
- Verify with theHarvester --help
- Use theHarvester to gather domain info
- Choose a target domain (with permission!). (eg example.org - Run: theHarvester -d example.org -l 100 -b bing)
- Look for any discovered emails, subdomains, possibly IP addresses.
Notes:
- Use -b to different data sources (google, yahoo, etc.).
- If you have Shodan or Hunter.io API keys, you can integrate them.
- Use option -f to save results (-f example_report.html)