@aegis-scan/skills 0.1.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (69) hide show
  1. package/ATTRIBUTION.md +75 -0
  2. package/CHANGELOG.md +129 -0
  3. package/LICENSE +21 -0
  4. package/README.md +123 -0
  5. package/dist/bin.d.ts +3 -0
  6. package/dist/bin.d.ts.map +1 -0
  7. package/dist/bin.js +122 -0
  8. package/dist/bin.js.map +1 -0
  9. package/dist/commands/info.d.ts +5 -0
  10. package/dist/commands/info.d.ts.map +1 -0
  11. package/dist/commands/info.js +75 -0
  12. package/dist/commands/info.js.map +1 -0
  13. package/dist/commands/install.d.ts +7 -0
  14. package/dist/commands/install.d.ts.map +1 -0
  15. package/dist/commands/install.js +87 -0
  16. package/dist/commands/install.js.map +1 -0
  17. package/dist/commands/list.d.ts +7 -0
  18. package/dist/commands/list.d.ts.map +1 -0
  19. package/dist/commands/list.js +82 -0
  20. package/dist/commands/list.js.map +1 -0
  21. package/dist/index.d.ts +13 -0
  22. package/dist/index.d.ts.map +1 -0
  23. package/dist/index.js +13 -0
  24. package/dist/index.js.map +1 -0
  25. package/dist/skills-loader.d.ts +23 -0
  26. package/dist/skills-loader.d.ts.map +1 -0
  27. package/dist/skills-loader.js +213 -0
  28. package/dist/skills-loader.js.map +1 -0
  29. package/package.json +63 -0
  30. package/skills/defensive/README.md +9 -0
  31. package/skills/mitre-mapped/README.md +10 -0
  32. package/skills/offensive/snailsploit-fork/advanced-redteam/SKILL.md +148 -0
  33. package/skills/offensive/snailsploit-fork/ai-security/SKILL.md +592 -0
  34. package/skills/offensive/snailsploit-fork/basic-exploitation/SKILL.md +10783 -0
  35. package/skills/offensive/snailsploit-fork/bug-identification/SKILL.md +1256 -0
  36. package/skills/offensive/snailsploit-fork/crash-analysis/SKILL.md +12466 -0
  37. package/skills/offensive/snailsploit-fork/deserialization/SKILL.md +185 -0
  38. package/skills/offensive/snailsploit-fork/edr-evasion/SKILL.md +1806 -0
  39. package/skills/offensive/snailsploit-fork/exploit-dev-course/SKILL.md +428 -0
  40. package/skills/offensive/snailsploit-fork/exploit-development/SKILL.md +699 -0
  41. package/skills/offensive/snailsploit-fork/fast-checking/SKILL.md +487 -0
  42. package/skills/offensive/snailsploit-fork/file-upload/SKILL.md +822 -0
  43. package/skills/offensive/snailsploit-fork/fuzzing/SKILL.md +340 -0
  44. package/skills/offensive/snailsploit-fork/fuzzing-course/SKILL.md +2105 -0
  45. package/skills/offensive/snailsploit-fork/graphql/SKILL.md +209 -0
  46. package/skills/offensive/snailsploit-fork/idor/SKILL.md +608 -0
  47. package/skills/offensive/snailsploit-fork/initial-access/SKILL.md +1528 -0
  48. package/skills/offensive/snailsploit-fork/jwt/SKILL.md +276 -0
  49. package/skills/offensive/snailsploit-fork/keylogger-arch/SKILL.md +197 -0
  50. package/skills/offensive/snailsploit-fork/mitigations/SKILL.md +1351 -0
  51. package/skills/offensive/snailsploit-fork/oauth/SKILL.md +366 -0
  52. package/skills/offensive/snailsploit-fork/open-redirect/SKILL.md +487 -0
  53. package/skills/offensive/snailsploit-fork/osint/SKILL.md +399 -0
  54. package/skills/offensive/snailsploit-fork/osint-methodology/SKILL.md +434 -0
  55. package/skills/offensive/snailsploit-fork/parameter-pollution/SKILL.md +595 -0
  56. package/skills/offensive/snailsploit-fork/race-condition/SKILL.md +881 -0
  57. package/skills/offensive/snailsploit-fork/rce/SKILL.md +1069 -0
  58. package/skills/offensive/snailsploit-fork/request-smuggling/SKILL.md +773 -0
  59. package/skills/offensive/snailsploit-fork/shellcode/SKILL.md +477 -0
  60. package/skills/offensive/snailsploit-fork/sqli/SKILL.md +372 -0
  61. package/skills/offensive/snailsploit-fork/ssrf/SKILL.md +830 -0
  62. package/skills/offensive/snailsploit-fork/ssti/SKILL.md +349 -0
  63. package/skills/offensive/snailsploit-fork/vuln-classes/SKILL.md +1229 -0
  64. package/skills/offensive/snailsploit-fork/waf-bypass/SKILL.md +820 -0
  65. package/skills/offensive/snailsploit-fork/windows-boundaries/SKILL.md +15153 -0
  66. package/skills/offensive/snailsploit-fork/windows-mitigations/SKILL.md +14546 -0
  67. package/skills/offensive/snailsploit-fork/xss/SKILL.md +784 -0
  68. package/skills/offensive/snailsploit-fork/xxe/SKILL.md +996 -0
  69. package/skills/ops/README.md +6 -0
@@ -0,0 +1,399 @@
1
+ <!-- aegis-local: forked 2026-04-23 from SnailSploit/Claude-Red@c74d53e2938b59f111572e0819265a1e73029393; attribution preserved, see ATTRIBUTION.md -->
2
+
3
+ ---
4
+ name: offensive-osint
5
+ description: "Comprehensive OSINT methodology skill for offensive security, red team intelligence gathering, and bug bounty reconnaissance. Covers domain recon, email harvesting, social media profiling, GitHub/code leaks, Shodan/Censys enumeration, breach data lookup, employee profiling, infrastructure mapping, cryptocurrency tracing, geospatial intelligence, and AI-assisted analysis workflows. Use when performing reconnaissance against a target domain or organization, investigating a person or entity, tracing cryptocurrency flows, geolocating images or events, or building an attack-surface map."
6
+ ---
7
+
8
+ # Offensive OSINT Methodology
9
+
10
+ ## Workflow
11
+
12
+ 1. Define target scope (domain, org, person, crypto address, or geo subject)
13
+ 2. Select applicable categories below based on scope
14
+ 3. Work top-down within each category; pivot on discovered artifacts
15
+ 4. Archive every key artifact: URL + timestamp + screenshot (PNG) + hash (SHA-256)
16
+ 5. Log findings in JSONL with a `run_id` and tool versions for reproducibility
17
+ 6. Suggest next steps based on what each tool returns
18
+
19
+ ---
20
+
21
+ ## General OSINT
22
+
23
+ - [Bookmarks](https://tools.myosint.training/) — Comprehensive OSINT bookmarks
24
+ - [OSINT Framework](https://osintframework.com/) — Tool/resource directory
25
+ - [IntelTechniques Tools](https://inteltechniques.com/tools/) — Suite of investigative tools
26
+ - [Bellingcat Toolkit](https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit/) — Investigative journalism tools
27
+ - [CyberSudo OSINT Toolkit](https://docs.google.com/spreadsheets/d/1EC0sKA_W9znzsxUt0wye9UYtyATXw5m8) — OSINT websites list
28
+ - [Google Dorks](https://dorksearch.com/) — Efficient Google searching
29
+ - [Distributed Denial of Secrets](https://ddosecrets.com/) — Leaked data
30
+ - [Country-Specific Resources](https://digitaldigging.org/osint/) — Country-targeted OSINT
31
+
32
+ ### Search Engines
33
+
34
+ | Tool | Notes |
35
+ |------|-------|
36
+ | [Carrot2](https://search.carrot2.org/#/search/web) | Clusters results by topic |
37
+ | [etools](https://www.etools.ch/) | Metasearch engine |
38
+ | [Kagi](https://kagi.com/) | Privacy-first, non-personalized results |
39
+ | [Brave Search](https://search.brave.com/) | Independent index; Goggles for custom ranking |
40
+ | [PDF Search](https://www.pdfsearch.io/) | Search PDF files and view table of contents |
41
+ | [Google Fact Check Explorer](https://toolbox.google.com/factcheck/explorer) | Cross-site fact-check search |
42
+
43
+ ---
44
+
45
+ ## Username & Email Investigation
46
+
47
+ | Tool | Purpose |
48
+ |------|---------|
49
+ | [Sherlock](https://github.com/sherlock-project/sherlock) | Username search across social networks |
50
+ | [Maigret](https://github.com/soxoj/maigret) | Collect profiles by username from many sites |
51
+ | [What's My Name](https://whatsmyname.app/) | Username search across platforms |
52
+ | [Holehe](https://github.com/megadose/holehe) | Check if email is registered on platforms |
53
+ | [Epieos](https://epieos.com/) | Email address pivots and metadata |
54
+ | [OSINT Industries](https://osint.industries/) | Email/username/phone lookups |
55
+ | [Hunter.io](https://hunter.io/) | Find email addresses for a domain |
56
+ | [EmailRep](https://emailrep.io/) | Email reputation and associated data |
57
+ | [Emailable](https://emailable.com/) | Verify email existence |
58
+ | [Mugetsu](https://mugetsu.io/) | X/Twitter username history |
59
+ | [RocketReach](https://rocketreach.co/) / [Apollo](https://www.apollo.io/) | Email enrichment and pattern guessing |
60
+ | [PhoneInfoga](https://github.com/sundowndev/phoneinfoga) | Phone number intelligence framework |
61
+
62
+ **Browser extensions:** [GetProspect](https://chromewebstore.google.com/detail/email-finder-getprospect/bhbcbkonalnjkflmdkdodieehnmmeknp), [SignalHire](https://chrome.google.com/webstore/detail/signalhire-find-email-or/aeidadjdhppdffggfgjpanbafaedankd)
63
+
64
+ ---
65
+
66
+ ## People Search
67
+
68
+ - [TruePeopleSearch](https://www.truepeoplesearch.com/) — Free U.S. people search
69
+ - [WhitePages](https://www.whitepages.com/) — Contact information
70
+ - [Spokeo](https://www.spokeo.com/) — People search engine
71
+ - [Webmii](https://webmii.com/) — People search
72
+ - [Pipl](https://pipl.com/) — Deep web people search (paid)
73
+ - [Clearbit](https://clearbit.com/) — Company/individual data enrichment
74
+ - [FaceCheck](https://facecheck.id/) / [FaceSeek](https://faceseek.online/) — Reverse face search
75
+
76
+ ---
77
+
78
+ ## Phone Number OSINT
79
+
80
+ - [TrueCaller](https://www.truecaller.com/) — Caller ID and spam blocking
81
+ - [ThatsThem](https://thatsthem.com/) — Reverse phone search
82
+ - [Infobel](https://infobel.com/) — Phone search outside USA
83
+ - [FreeCarrierLookup](https://freecarrierlookup.com/) — Carrier/type lookup (US)
84
+ - [NumlookupAPI](https://numlookupapi.com/) [Freemium] — Programmatic carrier/line-type checks
85
+ - [CallerIDTest](https://calleridtest.com/) — Phone search
86
+ - [Advanced Background Checks](https://www.advancedbackgroundchecks.com/) — All people linked to a number
87
+
88
+ ---
89
+
90
+ ## Social Media
91
+
92
+ | Platform | Tool |
93
+ |----------|------|
94
+ | Instagram | [Picuki](https://www.picuki.com/) — view profiles without account |
95
+ | X/Twitter | [snscrape](https://github.com/snscrape/snscrape) — preferred CLI scraper; use Twint only as fallback |
96
+ | Facebook | [Graph Search](https://inteltechniques.com/tools/Facebook.html), [sowsearch.info](https://sowsearch.info/), [lookup-id.com](https://lookup-id.com/), [whopostedwhat.com](https://whopostedwhat.com/) |
97
+ | Facebook (research) | [Meta Content Library](https://transparency.meta.com/researcher) — CrowdTangle successor (researcher-gated) |
98
+ | YouTube/Twitch | [Social Blade](https://socialblade.com/) — analytics |
99
+ | TikTok | [Tokboard](https://tokboard.com/) — trend and profile analytics |
100
+ | Reddit | [Reveddit](https://www.reveddit.com/) — removed content; [RedTrack.social](https://redtrack.social/) — user history |
101
+ | Bluesky | [Firesky](https://firesky.tv/) — real-time firehose; [SkyView](https://bsky.jazco.dev/) — follower graphs |
102
+ | Mastodon | [FediSearch](https://fedisearch.skorpil.cz/) — cross-instance search; [Fedifinder](https://fedifinder.glitch.me/) — find Twitter users on Mastodon |
103
+ | Faces | [Search4Faces](https://search4faces.com/) |
104
+
105
+ ---
106
+
107
+ ## Public Records & Company Information
108
+
109
+ - [OpenCorporates](https://opencorporates.com/) — World's largest open company database
110
+ - [SEC EDGAR](https://www.sec.gov/edgar.shtml) — U.S. company filings
111
+ - [OpenOwnership Register](https://register.openownership.org/) — Beneficial ownership datasets
112
+ - [MuckRock](https://www.muckrock.com/) — FOIA repository and request tracking
113
+ - [EU Tenders (TED)](https://ted.europa.eu/) — EU procurement notices
114
+ - [World Bank Projects](https://projects.worldbank.org/) — Project and procurement records
115
+
116
+ ### RU/CN Registries
117
+
118
+ **Russia:** [Rusprofile](https://www.rusprofile.ru/), [Kontur.Focus](https://focus.kontur.ru/) (freemium), [zakupki.gov.ru](https://zakupki.gov.ru/) (procurement), EGRUL/EGRIP (official, captcha-gated)
119
+
120
+ **China:** [GSXT](https://www.gsxt.gov.cn/) (National Enterprise Credit), [Qichacha](https://www.qcc.com/)/[Tianyancha](https://www.tianyancha.com/) (freemium), [MIIT ICP/Beian](https://beian.miit.gov.cn/) (ICP filings)
121
+
122
+ ### Sanctions & Compliance
123
+
124
+ - [OFAC SDN List](https://sanctionssearch.ofac.treas.gov/)
125
+ - [EU Sanctions Map](https://www.sanctionsmap.eu/)
126
+ - [OpenSanctions](https://www.opensanctions.org/) — Aggregated persons/entities datasets
127
+ - [OCCRP Aleph](https://aleph.occrp.org/) — Investigative documents, leaks, company records
128
+
129
+ ---
130
+
131
+ ## Breach & Leak Data
132
+
133
+ - [Have I Been Pwned](https://haveibeenpwned.com/) — Breach lookup; Pwned Passwords API (k-anonymity)
134
+ - [Dehashed](https://dehashed.com/) — Credential search
135
+ - [IntelX](https://intelx.io/) — Data intelligence
136
+ - [LeakCheck](https://leakcheck.io/) — Breach lookups
137
+ - [Snusbase](https://snusbase.com/) — Database breach lookups
138
+ - [BreachDirectory](https://breachdirectory.org/) — Recent breach credentials
139
+ - [Scattered Secrets](https://scatteredsecrets.com/)
140
+ - [Cavalier (Hudson Rock)](https://cavalier.hudsonrock.com/) — Infostealer lookups
141
+ - [Phonebook](https://phonebook.cz/)
142
+ - [LeakPeek](https://leakpeek.com/)
143
+
144
+ ---
145
+
146
+ ## Infrastructure & Attack-Surface OSINT
147
+
148
+ - [Shodan](https://www.shodan.io/) — Internet-connected device/service search
149
+ - [Censys](https://search.censys.io/) — Host and certificate enumeration
150
+ - [GreyNoise](https://viz.greynoise.io/) — Distinguish background noise from targeted scans
151
+ - [SecurityTrails](https://securitytrails.com/) — Passive DNS and asset discovery
152
+ - [SpiderFoot](https://www.spiderfoot.net/) — Automated recon and correlation
153
+ - [theHarvester](https://github.com/laramies/theHarvester) — Subdomain, email, metadata harvesting
154
+ - [Recon-ng](https://github.com/lanmaster53/recon-ng) — Web recon framework
155
+ - [Amass](https://github.com/owasp-amass/amass) / [Subfinder](https://github.com/projectdiscovery/subfinder) — Passive subdomain discovery
156
+ - [BuiltWith](https://builtwith.com/) — Tech stack enumeration
157
+ - [Netlas](https://netlas.io/) — Large-scale HTTP/DNS/certificate pivots
158
+ - [BinaryEdge](https://www.binaryedge.io/) / [FOFA](https://fofa.so/) / [ZoomEye](https://www.zoomeye.org/) — Infra pivots complementing Shodan/Censys
159
+ - [RiskIQ PassiveTotal](https://community.riskiq.com/) — Passive DNS/cert/host pivots
160
+ - [Spur](https://spur.us/) — IP lookups and tracking
161
+ - [Robtex](https://www.robtex.com/) — Passive DNS and infrastructure pivots
162
+
163
+ ### ASN/BGP & Internet Measurement
164
+
165
+ - [Hurricane Electric BGP Toolkit](https://bgp.he.net/) — ASN, prefix, peers, IRR data
166
+ - [RIPEstat](https://stat.ripe.net/) — IP/ASN history, routing, geolocation, abuse contacts
167
+ - [BGPView](https://bgpview.io/) — ASN and prefix explorer
168
+ - [bgp.tools](https://bgp.tools/) — Clean ASN/IX views, routing details
169
+ - [PeeringDB](https://www.peeringdb.com/) — Facility and peering info
170
+
171
+ ### Certificates & CT Monitoring
172
+
173
+ - [crt.sh](https://crt.sh/) — Search Certificate Transparency logs
174
+ - [Censys Certificates](https://search.censys.io/certificates) — CT and x509 attribute pivots
175
+ - [CertStream](https://certstream.calidog.io/) — Real-time CT feed via WebSocket
176
+ - [Rapid7 Open Data](https://opendata.rapid7.com/) — Sonar DNS/HTTP/SSL datasets
177
+ - [Cert Spotter](https://sslmate.com/certspotter) [Freemium] — CT monitoring and alerts
178
+ - Favicon hash (mmh3): cluster infrastructure; pair with Shodan/Censys favicon search
179
+
180
+ ---
181
+
182
+ ## Threat Intel & IOCs
183
+
184
+ - Vendor/CERT advisories: CISA/NSA/CSA joint advisories, CERT-EU, NCSC-UK, JPCERT/CC, CERT-UA
185
+ - [MISP Project](https://www.misp-project.org/) and public MISP feeds
186
+ - [OpenCTI](https://www.opencti.io/) — CTI knowledge graph
187
+ - [Malpedia](https://malpedia.caad.fkie.fraunhofer.de/) — Malware families, YARA, references
188
+ - [ThreatFox](https://threatfox.abuse.ch/) / [URLHaus](https://urlhaus.abuse.ch/) / [SSLBL](https://sslbl.abuse.ch/)
189
+ - [MalwareBazaar](https://bazaar.abuse.ch/) — Hash-based sample sharing
190
+ - [PhishTank](https://www.phishtank.com/) / [OpenPhish](https://openphish.com/)
191
+
192
+ ### Malware Analysis & Sandboxes
193
+
194
+ - Static analysis: [pefile](https://github.com/erocarrera/pefile), [FLOSS](https://github.com/mandiant/flare-floss), [capa](https://github.com/mandiant/capa)
195
+ - Similarity: SSDEEP, TLSH
196
+ - Sandboxes: [ANY.RUN](https://any.run/), [Hybrid Analysis](https://www.hybrid-analysis.com/), [CAPE](https://capesandbox.com/), [Tria.ge](https://tria.ge/)
197
+ - Intelligence: [Intezer](https://analyze.intezer.com/) (code reuse), [VirusTotal](https://www.virustotal.com/) (**caution**: uploads become public)
198
+ - TLS fingerprints: [JA3](https://github.com/salesforce/ja3), [JA4](https://github.com/FingerprinTLS/ja4)
199
+
200
+ ---
201
+
202
+ ## Cryptocurrency OSINT
203
+
204
+ ### Blockchain Explorers
205
+
206
+ | Chain | Explorer |
207
+ |-------|---------|
208
+ | Bitcoin | [Blockchain.com](https://www.blockchain.com/explorer), [Blockchair](https://blockchair.com/) |
209
+ | Ethereum | [Etherscan](https://etherscan.io/) |
210
+ | BNB Chain | [BSCScan](https://bscscan.com/) |
211
+ | Polygon PoS | [PolygonScan](https://polygonscan.com/) |
212
+ | Solana | [Solscan](https://solscan.io/) |
213
+ | Multi-chain | [OKLink](https://www.oklink.com/) [Freemium], [Cielo](https://cielo.io/) |
214
+
215
+ **L2 Explorers:** [Arbiscan](https://arbiscan.io/), [Optimistic Etherscan](https://optimistic.etherscan.io/), [BaseScan](https://basescan.org/), [zkSync Era](https://explorer.zksync.io/), [L2Beat](https://l2beat.com/) (risk/TVL comparison)
216
+
217
+ ### Transaction Tracking & Analytics
218
+
219
+ - [Arkham](https://www.arkhamintelligence.com/) — Multichain explorer, entity labels, graphs, alerts
220
+ - [TRM](https://www.trmlabs.com/) — Address/transaction graphs
221
+ - [MetaSleuth](https://metasleuth.io/) — Visual crypto flow analysis
222
+ - [Breadcrumbs](https://www.breadcrumbs.app/) [Freemium] — Visual graphing and labeling
223
+ - [Bubblemaps](https://bubblemaps.io/) — Holder concentration visualization
224
+ - [Whale Alert](https://whale-alert.io/) — Large transaction monitoring
225
+ - [Chainalysis](https://www.chainalysis.com/) / [Crystal Blockchain](https://crystalblockchain.com/) — Professional analytics
226
+ - [GraphSense](https://graphsense.info/) — Cryptocurrency analytics platform
227
+ - [Nansen](https://www.nansen.ai/) — Smart Money labels (paid)
228
+ - [Dune](https://dune.com/) — Custom blockchain data queries
229
+ - [Token Sniffer](https://tokensniffer.com/) — Honeypot and scam token detection
230
+
231
+ ### NFT & Exchange Intelligence
232
+
233
+ - [OpenSea](https://opensea.io/) / [NFTScan](https://www.nftscan.com/) — NFT marketplace/explorer
234
+ - [DappRadar](https://dappradar.com/) — NFT sales and marketplace activity
235
+ - [CoinGecko](https://www.coingecko.com/) / [CoinMarketCap](https://coinmarketcap.com/) — Market data
236
+ - [Glassnode](https://glassnode.com/) — On-chain market intelligence
237
+
238
+ ### Bridge Monitoring
239
+
240
+ - [Socketscan](https://socketscan.io/) — EVM bridge explorer
241
+ - [L2Beat Bridges](https://l2beat.com/bridges) — Bridge risk analysis
242
+ - [Pulsy](https://pulsy.io/) — Bridge explorer aggregator
243
+
244
+ ---
245
+
246
+ ## Media Intelligence
247
+
248
+ ### Reverse Image & Facial Search
249
+
250
+ - [Google Images](https://images.google.com/) — General reverse image search
251
+ - [TinEye](https://tineye.com/) — Reverse image search
252
+ - [Yandex Images](https://yandex.com/images/) — Effective for Russian/Eastern European content
253
+ - [PimEyes](https://pimeyes.com/en) — Face-based image search
254
+ - [FaceCheck](https://facecheck.id/) — Find people by photo
255
+
256
+ ### Image Forensics
257
+
258
+ - [Forensically](https://29a.ch/photo-forensics/) — Digital image forensics toolkit
259
+ - [ExifTool](https://exiftool.org/) — Read/write/edit metadata
260
+ - [Jimpl](https://jimpl.com/) — Online EXIF viewer
261
+ - [Jeffrey's EXIF viewer](http://exif.regex.info/exif.cgi) — Online metadata viewer
262
+ - [FOCA](https://www.elevenpaths.com/labstools/foca) — Metadata in documents
263
+ - [Metagoofil](https://www.edge-security.com/metagoofil.php) — Extract metadata from public documents
264
+ - [C2PA Verify](https://verify.contentauthenticity.org/) — Verify content credentials and AI provenance
265
+
266
+ ### Video Analysis
267
+
268
+ - [YouTube Data Viewer](https://citizenevidence.amnestyusa.org/) — Extract YouTube metadata
269
+ - [InVID & WeVerify](https://www.invid-project.eu/tools-and-services/invid-verification-plugin/) — Video verification browser extension
270
+ - [YouTube Geo Tag](https://mattw.io/youtube-geofind/location) — Video geolocation via geo tags
271
+ - [MediaInfo](https://mediaarea.net/en/MediaInfo) — Technical/tag info for video/audio
272
+ - Snap Map (public stories) — Area/event context
273
+
274
+ ### Browser Extensions for Media
275
+
276
+ - [Fake News Debunker by InVID & WeVerify](https://chrome.google.com/webstore/detail/fake-news-debunker-by-inv/mhccpoafgdgbhnjfhkcmgknndkeenfhe)
277
+ - [RevEye Reverse Image Search](https://chrome.google.com/webstore/detail/reveye-reverse-image-sear/kejaocbebojdmebagkjghljkeefgimdj)
278
+ - [EXIF Viewer Pro](https://chrome.google.com/webstore/detail/exif-viewer-pro/mmbhfeiddhndihdjeganjggkmjapkffm)
279
+ - [Wayback Machine Extension](https://chrome.google.com/webstore/detail/wayback-machine/fpnmgdkabkmnadcjpehmlllkndpkmiak)
280
+ - [Search by Image](https://chromewebstore.google.com/detail/search-by-image/cnojnbdhbhnkbcieeekonklommdnndci)
281
+
282
+ ---
283
+
284
+ ## Geospatial Intelligence
285
+
286
+ ### Satellite Imagery & Mapping
287
+
288
+ - [Google Maps](https://www.google.com/maps) / [Bing Maps](https://www.bing.com/maps/) — General mapping
289
+ - [Sentinel Hub EO Browser](https://apps.sentinel-hub.com/eo-browser/) — Sentinel/Landsat satellite imagery
290
+ - [NASA Worldview](https://worldview.earthdata.nasa.gov/) — NASA satellite imagery
291
+ - [Zoom Earth](https://zoom.earth/) — Live satellite images and weather
292
+ - [Wayback Imagery](https://livingatlas.arcgis.com/wayback/) — Historical satellite images
293
+ - [NASA FIRMS](https://firms.modaps.eosdis.nasa.gov/map/) — Fire/hotspot data
294
+ - [Open Infrastructure Map](https://openinframap.org/) — Global infrastructure networks
295
+ - [Windy](https://www.windy.com/) — Live weather map
296
+
297
+ ### Geolocation Tools
298
+
299
+ - [Mapillary](https://www.mapillary.com/app) — Crowdsourced street-level imagery
300
+ - [KartaView](https://kartaview.org/) — Open-source street-level imagery
301
+ - [Overpass Turbo](https://overpass-turbo.eu/) — Advanced OpenStreetMap queries
302
+ - [SunCalc](https://www.suncalc.org/) — Sun position for chronolocation
303
+ - [GeoNames](https://www.geonames.org/) — Geographical database
304
+ - [PeakVisor](https://peakvisor.com/) — Identify mountain peaks
305
+ - [GeoGuesser tips](https://somerandomstuff1.wordpress.com/2019/02/08/geoguessr-the-top-tips-tricks-and-techniques/) — Geolocation methodology
306
+
307
+ **Street View:** Google Street View, [Apple Maps](https://maps.apple.com/), [Yandex Maps](https://yandex.com/maps/), [Baidu Maps](https://map.baidu.com/)
308
+
309
+ ### Flight OSINT
310
+
311
+ - [FlightRadar24](https://www.flightradar24.com/) / [FlightAware](https://www.flightaware.com/) / [RadarBox](https://www.radarbox.com/)
312
+ - [ADSBExchange](https://www.adsbexchange.com/) — Unfiltered community ADS-B feed
313
+ - [Planespotters](https://www.planespotters.net/) — Fleet/airframe history by tail number
314
+ - [AirFrames](https://www.airframes.org/) / [JetPhotos](https://www.jetphotos.com/) — Visual confirmation
315
+
316
+ ### Maritime OSINT
317
+
318
+ - [MarineTraffic](https://www.marinetraffic.com/) — Live AIS vessel tracking
319
+ - [VesselFinder](https://www.vesselfinder.com/) — Global ship movements and port calls
320
+ - [FleetMon](https://www.fleetmon.com/) — Historical AIS data and analytics
321
+ - [Global Fishing Watch](https://globalfishingwatch.org/map/) — Fishing vessel behavior and AIS gap analysis
322
+
323
+ ---
324
+
325
+ ## AI-Assisted OSINT
326
+
327
+ > **Warning:** Never paste PII, sensitive IOCs, or unique pivots into cloud LLMs. They log inputs and may use them for training. Use local models (Ollama, LM Studio) for sensitive analysis.
328
+
329
+ | Tool | Strength |
330
+ |------|---------|
331
+ | [ChatGPT](https://chat.openai.com/) (paid) | Log parsing, dataset analysis, Code Interpreter for CSVs/JSON, GPT-4 Vision for image OCR |
332
+ | [Claude](https://claude.ai/) (paid) | 200K token context for large document dumps and report synthesis |
333
+ | [Gemini 1.5 Pro](https://gemini.google.com/) | 2M token context; Deep Research mode with citations |
334
+ | [Perplexity Pro](https://www.perplexity.ai/) (paid) | Real-time web search + reasoning; multi-query synthesis |
335
+
336
+ **Local/privacy-preserving:** [Ollama](https://ollama.com/) (Llama 3, Mistral), [LM Studio](https://lmstudio.ai/), [GPT4All](https://gpt4all.io/)
337
+
338
+ ### Commercial AI OSINT Platforms
339
+
340
+ - [Cylect](https://www.cylect.io/) — AI entity extraction and link-analysis
341
+ - [Fivecast Matrix](https://www.fivecast.com/products/matrix/) — Generative-AI triage for social-media datasets
342
+ - [Recorded Future](https://www.recordedfuture.com/) — AI-driven threat intelligence
343
+ - [DarkOwl Vision](https://www.darkowl.com/) — AI-powered darknet data analysis
344
+
345
+ ### Deepfake & Synthetic Media Detection
346
+
347
+ - [Sensity AI](https://sensity.ai/) — Deepfake detection
348
+ - [Reality Defender](https://realitydefender.com/) — AI-generated content detection
349
+ - [Adobe Content Credentials Verify](https://contentcredentials.org/verify) — C2PA verifier
350
+ - [CarNet](https://carnet.ai/) — AI car model identification (useful for geolocation)
351
+
352
+ ---
353
+
354
+ ## Archiving & Evidence Preservation
355
+
356
+ - [archive.today](https://archive.today/) — One-page content archiver with screenshot
357
+ - [URLScan.io](https://urlscan.io/) — On-demand webpage scan with resource map
358
+ - [ArchiveBox](https://archivebox.io/) — Self-hosted archiving (HTML, PDF, screenshots, media)
359
+ - [Hunchly](https://www.hunch.ly/) — Evidence capture for investigators (paid)
360
+ - Wayback SavePageNow API v3 — On-demand archiving with job IDs
361
+ - [SingleFileZ](https://github.com/gildas-lormeau/SingleFileZ) — Browser extension for offline HTML archives
362
+ - [Kasm Workspaces](https://kasmweb.com/) — Containerized OSINT workspace/browser isolation
363
+
364
+ **Evidence handling:**
365
+ - Capture: URL + timestamp + PNG screenshot + WARC/SingleFileZ archive
366
+ - Hash all downloaded files (SHA-256) and record in case notes
367
+ - Separate work profiles/containers per case; store evidence read-only
368
+ - Use JSONL (NDJSON) logs with `run_id` and tool versions for reproducibility
369
+
370
+ ---
371
+
372
+ ## Automation & Workflows
373
+
374
+ - [n8n](https://n8n.io/) — Self-hosted workflow automation (e.g., RSS → scrape → alert pipelines)
375
+ - [Huginn](https://github.com/huginn/huginn) — Agent-based monitoring, scraping, alerting
376
+ - [Playwright](https://playwright.dev/) — Headless browser automation with stealth plugins
377
+ - [Browsertrix Crawler](https://github.com/webrecorder/browsertrix-crawler) — Archival crawling with WARC export
378
+ - [Prefect](https://www.prefect.io/) / [Apache Airflow](https://airflow.apache.org/) — Workflow orchestration for data pipelines
379
+
380
+ ---
381
+
382
+ ## Regional Search Engines
383
+
384
+ - Russia/CIS: [Yandex](https://yandex.com/), [Mail.ru Search](https://go.mail.ru/)
385
+ - China: [Baidu](https://www.baidu.com/), [Sogou](https://www.sogou.com/), [360 Search](https://www.so.com/)
386
+ - Russia social: [VK](https://vk.com/), [OK.ru](https://ok.ru/)
387
+ - China social: [Weibo](https://weibo.com/), [Bilibili](https://www.bilibili.com/), [Zhihu](https://www.zhihu.com/), [Douyin](https://www.douyin.com/)
388
+
389
+ ---
390
+
391
+ ## Telegram & Messaging Intelligence
392
+
393
+ - [TGStat](https://tgstat.com/) — Channel analytics and search
394
+ - [Telemetr](https://telemetr.io/) — Channel growth, overlaps, forwards
395
+ - [Combot](https://combot.org/) — Group analytics (partially paid)
396
+ - [TelegramDB Search Bot](https://t.me/TGdb_bot) — Basic Telegram OSINT
397
+ - [Discord ID](https://discord.id/) — Basic Discord account information
398
+ - Sogou Weixin search — WeChat Official Accounts content search
399
+ - View public Telegram channels: `https://t.me/s/<channel>`