Cybersecurity background

OSINT Intelligence

Gathering intelligence from open sources

The Journey

6+ Years of Experience

OSINT became a critical skill in 2018 when I needed to investigate a threat actor's online presence. I discovered how much information is publicly available if you know where to look.

I developed systematic approaches to gather intelligence from social media, forums, code repositories, and public databases. The ability to connect dots across platforms became invaluable.

I've used OSINT to identify threat actors, track their activities, and help organizations understand their digital footprint and exposure.

Today, OSINT is integrated into every investigation and assessment I conduct, providing context and intelligence that technical tools alone cannot reveal.

OSINT Intelligence
101010
010101
101010
010101
101010
010101
101010
010101
101010
010101
101010
010101
101010
010101
101010

Experience Timeline

2018

First OSINT investigation

2019

Social media intelligence

2020

Dark web monitoring

2022

Automated OSINT pipelines

2023

Threat actor profiling

2024

Advanced OSINT techniques

OSINT Collection Process

01

Target Identification

Define investigation objectives and identify targets, including individuals, organizations, domains, or threat actors.

02

Source Discovery

Identify relevant OSINT sources including social media, forums, code repositories, public records, and databases.

03

Data Collection

Systematically collect information using automated tools and manual techniques, ensuring legal and ethical compliance.

04

Analysis & Correlation

Analyze collected data, identify patterns, and correlate information across multiple sources to build comprehensive profiles.

05

Intelligence Reporting

Compile actionable intelligence reports with verified findings, sources, and recommendations for further investigation.

Tools & Technologies

Reconnaissance

MaltegotheHarvesterSpiderFootRecon-ng

Social Media

OSINT FrameworkSocial SearcherCustom Scripts

Search Engines

ShodanCensysGoogle DorksBing

Analysis

GephiMaltegoPythonJupyter

Ready to Work Together?

Let's discuss how OSINT Intelligence can strengthen your security posture.