Cyber security

Cyber Detective’s OSINT Tools Collection – A Comprehensive Guide For Digital Investigation

Hello! On my Twitter account @cyb_detective I post different services, techniques, tricks and notes about OSINT and more.

I collect all the links from my tweets in this collection (already 1000+ services for a wide variety of purposes).

Thank you for following me! @cyb_detective

Don’t forget that OSINT’s main strength is in automation. Read the Netlas Cookbook for details and examples.

Most Important Categories

SectionLink
Maps, Geolocation and TransportExplore
Social MediaExplore
Domain/IP/LinksExplore
Image Search and IdentificationExplore
CryptocurrenciesExplore
MessengersExplore
CodeExplore
Search enginesExplore
IOTExplore
ArchivesExplore
PasswordsExplore
EmailsExplore
NicknamesExplore

Table Of Contents

  • Maps, Geolocation and Transport
    • Social media and photos
    • Nature
    • Aviation
    • Maritime
    • Railway
    • Routes
    • Politics, conflicts and crisis
    • Urban and industrial infrastructure
    • Culture
    • Worldwide street webcams
    • Tools
    • Transport
    • Communications

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

Chrome Browser Exploitation, Part 3: Analyzing and Exploiting CVE-2018-17463

The exploitation of CVE-2018-17463, a type confusion vulnerability in Chrome’s V8 JavaScript engine, relies on…

17 minutes ago

Full Spectrum Event Tracing For Windows Detection In The kernel Against Rootkits

Sanctum EDR demonstrates a multi-layered approach to detecting and preventing Event Tracing for Windows (ETW)…

17 minutes ago

SpyAI : Intelligent Malware With Advanced Capabilities

SpyAI is a sophisticated form of malware that leverages advanced technologies to capture and analyze…

3 days ago

Proxmark3 : The Ultimate Tool For RFID Security And Analysis

The Proxmark3 is a versatile, open-source tool designed for radio-frequency identification (RFID) security analysis, research,…

3 days ago

Awesome Solana Security : Enhancing Program Development

The "Awesome Solana Security" collection is a comprehensive resource designed to help developers build more…

3 days ago

IngressNightmare-POCs : Understanding The Vulnerability Exploitation Flow

The "IngressNightmare" vulnerabilities, disclosed in March 2025, represent a critical set of security issues affecting…

3 days ago