The OSINT Newsletter - Issue #52
The latest and greatest in OSINT news, tools, tactics, and techniques
👋 Welcome to the 52nd issue of The OSINT Newsletter. This edition features the latest in OSINT developments, community contributions, tactics, techniques, and tools designed to enhance your investigative skills. This newsletter aims to foster growth within the OSINT industry, cultivate proficient investigators, and increase awareness of the ethical applications of open source intelligence.
🚨 Last week was the first OSINT Ask Me Anything (AMA). There were some interesting questions asked. Here’s a summary.
There are so many ways and tools for investigating something, whether it is a person or a business. Do you have a routine way that you approach an investigation?
Are you finding that AI is useful in your investigations or are there too many pitfalls in using AI at the moment?
Which OSINT tools do you recommend for investigating IPs?
🪃 If you missed the last newsletter, here’s a link to catch up.
⚡ Learn how to use Zen for OSINT investigations
⚡ The OSINT Newsletter - Issue #51
Let’s get started. ⬇️
OSINT News
📰 How to detect a fake account
Dmitry shares a step-by-step process for how you can detect a sock puppet. This is part of an ongoing OSINT framework project he’s working on, similar to MITRE ATT&CK.
🎩 H/T: Soxoj
📰 OSINT Industries is now integrated into OSINT Tracker
OSINT Tracker is similar to Maltego but is completely free to use. In their latest 2.7 update, they’ve added an integration to OSINT Industries.
🎩 H/T: Matthieu Amiot
📰 Reddit OSINT: user investigations
This post by RoddyT3ch is a complete breakdown of Reddit for OSINT investigations. It’s similar to the social media deconstruction webinars I used to do at Skopenow but in written form. Learn how to extract every piece of relevant information from Reddit.
🎩 H/T: RoddyT3ch
OSINT Tools
🌟 Sponsor: UserSearch.org
UserSearch Premium: No Nonsense, No Sales Calls—Unified Access to all Leading OSINT Data Providers.
UserSearch powers advanced digital investigations across usernames, emails, phone numbers, images, vehicles, wireless networks, Bluetooth devices, and threat intelligence. With integration across all major OSINT data providers, our platform offers unmatched tools for uncovering and analyzing digital footprints. Manage complex cases, track online activities, and protect against digital threats.
🔎 LM Studio
LM Studio allows you to download LLMs locally and use them for your projects. This includes Llama, Mistral, etc. It’s an easy-to-use desktop application you can get set up in minutes.
🎩 H/T: Yagil Burowski
🔎 skytrack
skytrack is a Python script that allows you to collect publicly available information about aircraft. It even generates a PDF report for you as an option.
🎩 H/T: Angelina Tsuboi
🔎 GReverse
GReverse is another facial recognition search option if you’re a bit more technical and have access to Google APIs. It allows you to leverage custom search engines and Vision API to build your own reverse image search tool.
🎩 H/T: Adrian Tarver
🔎 Return YouTube Comment Username
When looking through comments on YouTube, you’ll notice that the channel username appears under comments instead of the display name. You might see something like user-129798123879 instead of “John Smith”. Using this browser extension, you see the display name automatically.
🎩 H/T: Yaki Sovavava
✅ That’s it for the free version of The OSINT Newsletter. Consider upgrading to a paid subscription to support this publication and independent research.
By upgrading to paid, you’ll get access to the following:
No email header ads
Ask Me Anything OSINT threads
👀 All paid posts in the archive. Go back and see what you’ve missed!
🚀 If you don’t have a paid subscription already, don’t worry there’s a 7-day free trial. If you like what you’re reading, upgrade your subscription. If you can’t, I totally understand. Be on the lookout for promotions throughout the year.