OSINT Guides

Username Enumeration: How to Find Hidden Social Media Accounts

In the world of Open-Source Intelligence (OSINT), a single username is often the thread that unravels an entire digital identity. When investigating a target-whether you...

Social Media OSINT: The Investigator’s Guide to Digital Footprints

The average internet user leaves a massive, highly visible trail of data across the web. They use the same username on Reddit that they...

How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

You keep getting harassing messages on Instagram from a blank profile. Or a scammer is texting your phone, pretending to be the IRS. You cannot...

How to Investigate Cash App & Venmo Accounts (Financial OSINT)

You are trying to buy concert tickets or a piece of furniture on Facebook Marketplace. The seller seems friendly, but when it is time...

How to Find Hidden Data in PDFs & Word Docs (Free Document OSINT)

You just received an email with a PDF attached. It looks like an official invoice from "PayPal" or "Geek Squad" saying you owe $499....

How to Trace an Email to its Source IP (Email Header Analysis)

You received a threatening email from an anonymous account. Or maybe a highly convincing phishing attempt from someone claiming to be your boss. The...

How to Investigate a Used Car (Free VIN OSINT)

You found the perfect used car on Craigslist or Facebook Marketplace. The price is great, the photos look clean, and the seller says, "No...

How to Find a Location Using WiFi Networks (WiGLE OSINT Guide)

You see a screenshot of a phone screen. In the status bar or the WiFi menu, you see a network name: "Hotel_California_Guest". Most people ignore...

Don't miss

Username Enumeration: How to Find Hidden Social Media Accounts

In the world of Open-Source Intelligence (OSINT), a single...

Social Media OSINT: The Investigator’s Guide to Digital Footprints

The average internet user leaves a massive, highly visible...

Hardware Security Keys vs. Authenticator Apps (The Ultimate 2FA Defense)

If you read our breakdown on Why SMS 2FA...

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...