OSINT Guides

How to Trace an Anonymous Troll or Scammer (IP Tracking Links)

You keep getting harassing messages on Instagram from a blank profile. Or a scammer is texting your phone, pretending to be the IRS. You cannot...

How to Investigate Cash App & Venmo Accounts (Financial OSINT)

You are trying to buy concert tickets or a piece of furniture on Facebook Marketplace. The seller seems friendly, but when it is time...

How to Find Hidden Data in PDFs & Word Docs (Free Document OSINT)

You just received an email with a PDF attached. It looks like an official invoice from "PayPal" or "Geek Squad" saying you owe $499....

How to Find the Location of a Photo (Free Geolocation Tools)

You have a photo. Maybe it's a vacation picture from a person you are investigating, or a suspicious image sent by a scammer claiming...

How to Find the Owner of a Phone Number (Free OSINT Tools)

You have a missed call from a number you don't recognize. Or maybe a suspicious text message. Your first instinct is to Google the number....

How to Find the Person Behind an Email Address (Free OSINT Tools)

You have an email address. Maybe it's from a Craigslist seller, a potential hire, or a suspicious sender.Most people think an email is just...

How to Find a Person Behind a Username (Free OSINT Tools)

You have a username. Maybe it is from a suspicious DM, a Tinder match, or an anonymous troll. Is that the end of the road?...

5 Free Alternatives to PimEyes (Face Search Tools That Actually Work)

PimEyes is the most powerful face search engine on the planet. It is also incredibly expensive. At $29.99 per month for the basic plan, it...

Don't miss

Hardware Security Keys vs. Authenticator Apps (The Ultimate 2FA Defense)

If you read our breakdown on Why SMS 2FA...

Why SMS Two-Factor Authentication (2FA) is Dangerously Insecure (SIM Swapping Explained)

You finally took your digital security seriously. You stopped...

The Best Password Managers for OPSEC (Local vs. Cloud Storage)

As we covered in our breakdown of how credential...

Stop Reusing Passwords: How Credential Stuffing Actually Works

When the average person pictures a cyberattack, they imagine...