OSINT
Companion repo for A Complete Guide to Mastering OSINT (2025). Includes free templates ($5,000 value), latest 2025 OSINT tools, and resources for ethical intelligence gathering. Supports book chapters on social media, cryptocurrency, and more. Ideal for investigators and cybersecurity pros. github.com/JambaAcademy/OSINT
Install / Use
/learn @JambaAcademy/OSINTREADME
🔍 Complete OSINT Mastery Repository
The definitive collection of OSINT templates and tools for modern intelligence gathering and analysis
This repository serves as the official companion to the book "A Complete Guide to Mastering Open-Source Intelligence (OSINT): Methods and Tools to Discover Critical Information, Data Protection, and Online Security" - available on Amazon and major digital stores.
📖 About This Repository
In today's data-driven world, Open-Source Intelligence (OSINT) has become an essential skill for cybersecurity professionals, investigators, journalists, researchers, and business analysts. This repository provides a comprehensive collection of professional-grade templates and cutting-edge tools designed to streamline your OSINT operations and enhance your investigative capabilities.
<div align="center"> <img src="https://github.com/JambaAcademy/OSINT/blob/main/Bok-mockup.jpg" alt="HTML CSS Magic" width="800" /> </div>🎯 Repository Objectives
- Standardize OSINT Reporting: Professional templates for consistent, court-ready documentation
- Accelerate Investigations: Ready-to-use tools and methodologies to reduce analysis time
- Ensure Best Practices: Ethical guidelines and legal compliance frameworks
- Foster Community Learning: Open-source collaboration for continuous improvement
- Bridge Theory to Practice: Practical implementation of academic OSINT principles
📚 Book Overview
"A Complete Guide to Mastering Open-Source Intelligence (OSINT)" is the authoritative resource for modern intelligence gathering, updated for 2025 with the latest AI-driven methodologies and tools.
🌟 Key Features
- 🤖 AI-Enhanced OSINT: Cutting-edge artificial intelligence tools and techniques
- 📊 Comprehensive Coverage: 15+ investigation categories with detailed strategies
- 🔒 Security-First Approach: Data protection and online security best practices
- ⚖️ Ethical Framework: Legal compliance and ethical investigation guidelines
- 🎯 Practical Applications: Real-world case studies and examples
- 🛠️ Tool Mastery: In-depth coverage of 100+ OSINT tools and platforms
🕵️ Investigation Categories Covered
| Category | Focus Areas | Professional Applications | |----------|-------------|--------------------------| | 👥 People Investigation | Identity verification, background checks, social footprints | HR screening, due diligence, security clearance | | 🏢 Business Intelligence | Corporate analysis, competitive research, market insights | Investment research, partnership evaluation | | 🏠 Property Records | Real estate analysis, ownership verification, asset tracking | Legal investigations, financial analysis | | 🚗 Vehicle Intelligence | Registration data, ownership history, location tracking | Insurance fraud, asset recovery | | 💰 Financial Analysis | Asset discovery, transaction patterns, regulatory compliance | Anti-money laundering, fraud detection | | 💍 Personal Records | Marriage/divorce records, family connections, legal proceedings | Background verification, genealogy research | | 📱 Social Media Analysis | Platform intelligence, sentiment analysis, network mapping | Brand monitoring, threat assessment | | 💼 Employment Verification | Career history, professional credentials, workplace intelligence | Recruitment, competitor analysis | | 🌐 Digital Footprints | Online presence analysis, data breach exposure | Cybersecurity assessment, privacy auditing | | 🔍 Deep Web Research | Hidden services, specialized databases, academic resources | Academic research, specialized investigations |
📖 Chapter-by-Chapter Breakdown
Chapter 1: 🏗️ Foundations of Open-Source Intelligence
Building the Core Framework for OSINT Excellence
This foundational chapter establishes the theoretical and practical groundwork for mastering OSINT. It covers the history, evolution, and modern applications of open-source intelligence across various sectors including cybersecurity, journalism, law enforcement, corporate intelligence, and academic research. The chapter introduces core concepts, methodologies, and the intelligence cycle while establishing ethical and legal frameworks.
Repository Components:
- OSINT methodology frameworks and templates
- Intelligence cycle implementation guides
- Core concept reference materials
- Foundation skill assessment tools
- Basic investigation planning templates
- Ethical guidelines and legal compliance checklists
Key Learning Outcomes:
- Master fundamental OSINT principles and concepts
- Understand the intelligence cycle and its applications
- Establish ethical and legal investigation frameworks
- Develop systematic approach to information gathering
- Build foundation for advanced OSINT techniques
Chapter 2: 🔍 Search Engine Mastery and Advanced Query Techniques
Transforming Search into Precision Intelligence Gathering
This chapter elevates basic search skills to professional-level capabilities. It covers advanced search operators, Google dorking techniques, specialized search engines, query optimization strategies, and automation of search processes. Readers learn to extract maximum value from search engines and develop sophisticated search strategies for complex investigations.
Repository Components:
- Advanced search operator reference guides
- Google dorking automation scripts
- Custom search engine configurations
- Query optimization algorithms
- Specialized search engine integrations
- Search result analysis and filtering tools
Key Learning Outcomes:
- Master advanced search engine operators and techniques
- Develop sophisticated Google dorking capabilities
- Implement automated search strategies
- Utilize specialized search engines effectively
- Create custom search workflows for complex investigations
Chapter 3: 📱 Social Media Intelligence and Digital Footprint Analysis
Comprehensive Digital Presence Investigation
Comprehensive coverage of social media intelligence (SOCMINT) across all major platforms including Facebook, Twitter/X, LinkedIn, Instagram, TikTok, and emerging platforms. The chapter covers platform-specific investigation techniques, social graph analysis, content analysis, digital footprint mapping, and cross-platform correlation while maintaining ethical standards and legal compliance.
Repository Components:
- Platform-specific analysis tools and scripts
- Social graph mapping and visualization utilities
- Digital footprint analysis frameworks
- Cross-platform correlation engines
- Content analysis and sentiment mining tools
- Social media automation and monitoring systems
Key Learning Outcomes:
- Master platform-specific SOCMINT techniques
- Develop advanced social graph analysis skills
- Implement comprehensive digital footprint mapping
- Create cross-platform intelligence correlation
- Deploy automated social media monitoring systems
Chapter 4: 👤 People Investigation and Background Research
Comprehensive Individual Intelligence Analysis
This chapter focuses on thorough, ethical investigation of individuals using multiple sources and methodologies. It covers identity verification, background research, employment history, education verification, family connections, association analysis, and reputation assessment while respecting privacy rights and maintaining legal compliance.
Repository Components:
- Person investigation templates and workflows
- Identity verification automation tools
- Background research methodologies
- Multi-source data correlation scripts
- Relationship mapping and analysis tools
- Privacy-compliant investigation frameworks
Key Learning Outcomes:
- Conduct comprehensive individual investigations
- Master multi-source identity verification techniques
- Develop advanced background research capabilities
- Implement relationship and association analysis
- Maintain ethical standards in personal investigations
Chapter 5: 🏢 Business Intelligence and Corporate Investigation
Enterprise-Level Intelligence Gathering and Analysis
Comprehensive approach to corporate intelligence including company research, competitive analysis, financial investigation, regulatory compliance monitoring, supply chain analysis, merger and acquisition intelligence, and executive background research. Essential for due diligence, investment research, and competitive intelligence operations.
Repository Components:
- Corporate investigation frameworks and templates
- Financial analysis and monitoring tools
- Competitive intelligence gathering systems
- Regulatory compliance monitoring scripts
- Supply chain analysis utilities
- Executive and leadership research tools
Key Learning Outcomes:
- Master comprehensive corporate investigation techniques
- Develop advanced financial intelligence capabilities
- Implement competitive analysis methodologies
- Create regulatory compliance monitoring systems
- Conduct thorough due diligence investigations
Chapter 6: 📋 Public Records and Government Database Navigation
*Mastering Official Information Sourc
Related Skills
bluebubbles
346.4kUse when you need to send or manage iMessages via BlueBubbles (recommended iMessage integration). Calls go through the generic message tool with channel="bluebubbles".
bear-notes
346.4kCreate, search, and manage Bear notes via grizzly CLI.
claude-seo
3.9kUniversal SEO skill for Claude Code. 19 sub-skills, 12 subagents, 3 extensions (DataForSEO, Firecrawl, Banana). Technical SEO, E-E-A-T, schema, GEO/AEO, backlinks, local SEO, maps intelligence, Google APIs, and PDF/Excel reporting.
claude-ads
1.6kComprehensive paid advertising audit & optimization skill for Claude Code. 186 checks across Google, Meta, YouTube, LinkedIn, TikTok & Microsoft Ads with weighted scoring, parallel agents, and industry templates.
Security Score
Audited on Mar 30, 2026
