OSINT Guides

Username Enumeration: How to Find Hidden Social Media Accounts

In the world of Open-Source Intelligence (OSINT), a single username is often the thread that unravels an entire digital identity. When investigating a target-whether you...

Social Media OSINT: The Investigator’s Guide to Digital Footprints

The average internet user leaves a massive, highly visible trail of data across the web. They use the same username on Reddit that they...

How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

You keep getting harassing messages on Instagram from a blank profile. Or a scammer is texting your phone, pretending to be the IRS. You cannot...

How to View Deleted Websites & Tweets (Free OSINT Tools)

You are investigating a scam, and suddenly-poof. The website goes offline. The Twitter account is suspended. The incriminating Facebook post is deleted.Most people think...

How to Find Who Owns a Website (Even If It’s “Private”)

You found a suspicious website. Maybe it's a crypto investment platform, a fake news blog, or an online store with "too good to be...

How to Find the Location of a Photo (Free Geolocation Tools)

You have a photo. Maybe it's a vacation picture from a person you are investigating, or a suspicious image sent by a scammer claiming...

How to Find the Owner of a Phone Number (Free OSINT Tools)

You have a missed call from a number you don't recognize. Or maybe a suspicious text message. Your first instinct is to Google the number....

How to Find the Person Behind an Email Address (Free OSINT Tools)

You have an email address. Maybe it's from a Craigslist seller, a potential hire, or a suspicious sender.Most people think an email is just...

Don't miss

Username Enumeration: How to Find Hidden Social Media Accounts

In the world of Open-Source Intelligence (OSINT), a single...

Social Media OSINT: The Investigator’s Guide to Digital Footprints

The average internet user leaves a massive, highly visible...

Hardware Security Keys vs. Authenticator Apps (The Ultimate 2FA Defense)

If you read our breakdown on Why SMS 2FA...

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...