Cyber security

Social Media OSINT Tools – A Comprehensive Guide

Here are some tools that you can use for Social Media OSINT. In the ever-evolving landscape of digital investigations, Open Source Intelligence (OSINT) tools are crucial for gathering information from social media platforms.

This article provides a detailed overview of various OSINT tools designed specifically for platforms like Facebook, Twitter, Instagram, Snapchat, and TikTok.

Whether you’re a cybersecurity professional or just curious about OSINT, these tools will enhance your ability to gather and analyze data from social networks.

Facebook

  • Search is Back : Find people and events on Facebook.
  • Facebook Graph Searcher : Search for people, location, keywords (you need login).
  • Maltego : Graphical link analyses (free and paid version).
  • LookUp Id : Search for Facebook ID for your profile or a group.
  • Who Posted What : Non public Facebook keyword search on specific dates.
  • Ultimate Facebook Scraper : Automates social media interactions(paid version).
  • GraphTips : Search for people, posts, pages, events etc.

Twitter

  • Followerwonk : Search, compare and analyze people on Twitter (free and paid version).
  • Sparktoro : Audience research (free and paid version).
  • Twexplorer : Search the most common terms, hashtags, and links (you need login).
  • Real Top Tweeps : Shows an interaction overview on Twitter.
  • TweetBeaver : Shows different type data on Twitter (you need login).
  • Twitter Advanced Search : Advanced Search on Twitter.
  • Account Analysis : Evaluate and analyse Twitter profiles (free and paid version).
  • Spoonbill : See profile changes on Twitter (you need login).
  • Twint : Twitter Intelligence Tool.

Instagram

  • Search my bio : Search Instagram user bios.
  • Followerwonk for Instagram : Search for Instagram influencers and users.
  • Instadp : Downloader Tool for Instagram.
  • Instahunter : Fetch data from Instagram’s Web API without login.
  • Osintgram : Perform analysis on Instagram account of any users by its nickname.
  • Instaloctrack : scrape geotagged locations – output in JSON & interactive map.
  • Instagram Scraperk : scrapes and downloads an instagram user’s photos and videos.
  • Instaloader : downloads photos, videos, hashtags, stories.
  • Sterraxcyl : informations on an instagram account from its following & followers.

Snapchat

  • Snapchat : Search for hotspots around the world.
  • Dizkover : Full-featured social media platform that helps you discover people on Snapchat.
  • Ghostdex : Search for Snapchat users.
  • Ghostcodes : Browse through Snapchat categories and users.
  • Add me contacts : Search Snapchat usernames.
  • Snapmap Archiver : download Snapmaps from a specific location.
Varshini

Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

Recent Posts

The Strength Of Signed App Control Policies

Before delving into the topic, let's first clarify the role of an Administrator within the…

3 hours ago

Embassy : Revolutionizing Embedded Systems With Rust And Asynchronous Programming

Embassy is the next-generation framework for embedded applications. Write safe, correct and energy-efficient embedded code…

3 hours ago

AttackRuleMap : Bridging Adversary Simulations And Detection Rules For Enhanced Cybersecurity

This repository provides a mapping of Atomic Red Team attack simulations to open-source detection rules,…

5 hours ago

Qdrant : A High-Performance Vector Similarity Search Engine

Qdrant (read: quadrant) is a vector similarity search engine and vector database. It provides a…

5 hours ago

ShadowHound : Leveraging PowerShell For Stealthy Active Directory Enumeration

ShadowHound is a set of PowerShell scripts for Active Directory enumeration without the need for…

7 hours ago

Awesome EDR Bypass : A Comprehensive Guide For Ethical Hackers

EDR bypass technology is not just for attackers. Many malware now have EDR bypass capabilities,…

1 day ago