⭐ Awesome Lists Intermediate

Awesome-osint

by jivoi

Comprehensive OSINT Resource Hub for Security Researchers

Extensive collection of open-source intelligence tools, techniques, and resources for security professionals and investigators.

24,479 Stars
3,390 Forks
24,479 Watchers
1 Issues

About This Project

This repository serves as a centralized knowledge base for Open Source Intelligence (OSINT) practitioners, compiling hundreds of tools, frameworks, and methodologies used in digital investigations. Whether you're tracking down information across social media platforms, analyzing network infrastructure, or conducting background research, this curated collection provides direct access to the most effective resources in the field.

The project organizes OSINT capabilities into logical categories including search engines, social media intelligence, domain research, image analysis, and geolocation tools. Each resource is carefully selected to ensure it provides genuine value to investigators, penetration testers, and security researchers conducting reconnaissance and information gathering operations.

What distinguishes this collection is its comprehensive scope and active maintenance by the security community. Rather than simply listing tools, it provides context for when and how different OSINT techniques should be applied, making it an invaluable reference for both learning OSINT fundamentals and discovering specialized tools for advanced investigations.

The repository has become a go-to reference in the cybersecurity community, regularly updated with emerging tools and techniques as the OSINT landscape evolves. It's particularly valuable for professionals who need to stay current with the latest intelligence gathering capabilities.

Key Features

  • Categorized collection of 500+ OSINT tools and resources
  • Coverage of social media, domain, network, and geospatial intelligence
  • Regularly updated with emerging tools and techniques
  • Community-vetted resources with proven effectiveness
  • Organized by investigation type for quick reference

How You Can Use It

1

Conducting digital forensics investigations and tracking online threats

2

Performing reconnaissance during penetration testing engagements

3

Researching individuals, organizations, or infrastructure for due diligence

4

Training security teams on information gathering techniques and tools

Who Is This For?

Security researchers, penetration testers, digital forensics investigators, threat intelligence analysts, and cybersecurity professionals