SkillAgentSearch skills...

OSINTMachineGuide

Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening process, Tor browser setup, firewall installation, rotating proxy configuration, and advanced attack prevention measures.

Install / Use

/learn @Minotaur-OPSEC/OSINTMachineGuide
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

If you like this Repo, Please click the ⭐<br><br>

<h1 align="center">OSINT MACHINE GUIDE</h1> <p align="center"><i>Step-by-step guide to building a custom machine for OSINT activities. The Basic Package includes a robust LINUX system strengthening process, Tor browser setup, firewall installation, rotating proxy configuration, and advanced attack prevention measures. </i></p> <p align="center"><i>Do you want to read the article in full?? Please visit our <a href="https://amazonialeaks.medium.com/resilient-osint-environment-system-for-resisting-powerful-adversaries-0294a54eed7a" target="_blank">Article</a></i></p> <br>

Welcome to our repository dedicated to enhancing the security of your journalistic investigations and open-source intelligence (OSINT) sources. In a scenario where powerful adversaries are constantly undermining our investigations, the implementation of appropriate security measures becomes crucial. Many investigators overlook the dangers associated with the use of vulnerable machines (computers/notebooks), exposing themselves to significant risks.

When investigating opponents with extensive resources, vast knowledge, and unlimited time, the vulnerability of your machine is an imminent threat. Invasion can result in devastating losses, from the destruction or alteration of your research to obtaining confidential data from sources, putting lives at risk. Additionally, your work and reputation can be destroyed in an instant.

In this repository, you will also find a basic security approach for your team. We then delve into digital security with a comprehensive guide that includes enhanced protection measures. We avoid the use of vulnerable machines by implementing advanced system strengthening techniques, configuring firewalls, installing rotating proxies, and system hardening to prevent major attacks.

Protect the integrity of your research and the security of your sources at no cost. Don't risk it with standard solutions; choose the unparalleled security we offer. Maintain the confidentiality of your investigations with our step-by-step guide and expertise in digital security.

<Strong> If you like this Repo, Please click the </strong>:star:

Help me build our non-profit investigative journalism association by accessing the link below and (buy me a coffee).

Link : https://www.buymeacoffee.com/amazonialeaks

Optional Contents

OPTIONAL READING (BUT RECOMMENDED): <br><br>The 8 items below are not part of the tutorial but are fundamental concepts that need to be understood before proceeding to the tutorial content.

  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/01%20-%20INTRODUCTION.md#-building-a-robust-osint-framework-for-investigations-against-powerful-adversaries" target="_blank">1. INTRODUCTION - (About building a Robust (OSINT) Framework for Investigations Against Powerful Adversaries</a> <br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/02%20-%20Protecting%20People.md#protecting-people" target="_blank">2. Protecting People - (crucial risk aspects for the investigators)</a><br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/03%20-%20Technical%20Environment%20Issues.md#technical-environment-issues" target="_blank">3. Technical Environment Issues</a><br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/04%20-%20Host%20Operating%20System.md#host-operating-system" target="_blank">4. Host Operating System</a><br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/05%20-%20About%20Operating%20System.md#important-considerations-about-the-operating-system" target="_blank">5. Important Considerations About the Operating System</a><br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/06%20-%20Initial%20System%20Setup.md#initial-system-setup" target="_blank">6. Initial System Setup</a><br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/07%20-%20Creating%20a%20Bootable%20USB.md#creating-a-bootable-usb-drive-using-ventoy" target="_blank">7. Creating a Bootable USB Drive (Using Ventoy)</a><br>
  • <a href="https://github.com/AmazoniaLeaksOficial/OSINTMachineGuide/blob/main/08%20-%20Reflection%20About%20Disks.md#required-reflection" target="_blank">8. Reflection About Disks</a><br>

<br><br>From now on, you will find the tutorial content. Good luck!

Tutorial Content

  • <a href="#post-debian-instalation">Initial Preparation After Debian Installation</a><br />
  • <a href="#instalacao-tor">Tor Browser Installation and Configuration</a><br />
  • <a href="#instalacao-maquina-virtual"> Virtual Machine Installation</a><br />
  • <a href="#instalacao-aplicativos">Installation of Additional Applications</a><br />
  • <a href="#procedimentos-morfing1">Morphing Installation/Procedure (Linux Hardening)</a><br />
  • <a href="#configurando-firewall">Firewall Installation and Configuration</a><br />
  • <a href="#tor-e-privoxy">Tor Service and Rotating Proxy Configuration</a><br />
  • <a href="#gerenciador-de-senhas">Password Manager</a><br />
  • <a href="#suporte">NOTE ON TECHNICAL ISSUES</a><br />
  • <a href="#fontes">Sources</a><br />
<h2 id="">Important Note: </h2>

To follow along with this tutorial, we assume that you have already installed Debian on your computer (the machine you will use for your investigations or the machine/HD where you will test this tutorial).

It is crucial to note that if you are not familiar with installing Debian on your own, you may not be ready to proceed with this tutorial. I'm not saying you won't be able to do it, especially because, after the installation, the subsequent steps involve simply copying from my tutorial and pasting into your terminal, making the process easier. In my understanding, the installation is the most complex part, as you can't just copy and paste like in the other steps of this article. <br><br>

THE GOOD NEWS IS, IF YOU CAN INSTALL DEBIAN, THE REST IS SIMPLE - JUST COPY AND PASTE INTO YOUR TERMINAL... <br><br>

<h2 id="post-debian-instalation">Initial Preparation After Debian Installation</h2>

Open a terminal and execute the following command:

su

Install the sudo and adduser packages:

apt update

Note: It’s possible the terminal may generate an error and not update; if this happens, follow the next 2 steps below.

sudo nano /etc/apt/sources.list

Erase whatever is there and paste the code below:

deb http://deb.debian.org/debian bookworm main non-free-firmware
deb-src http://deb.debian.org/debian bookworm main non-free-firmware

deb http://deb.debian.org/debian-security/ bookworm-security main non-free-firmware
deb-src http://deb.debian.org/debian-security/ bookworm-security main non-free-firmware

deb http://deb.debian.org/debian bookworm-updates main non-free-firmware
deb-src http://deb.debian.org/debian bookworm-updates main non-free-firmwar

Press ctrl + O to save Press Enter Press ctrl + X to exit

Note: If the update error doesn’t occur, ignore the above procedure and continue to the command below:

apt full-upgrade

apt install --no-install-recommends sudo adduser

Create a group called ‘console’:

/usr/sbin/addgroup --system console

Add your Linux username to the ‘console’ group. Be sure to replace ‘user’ with your actual username (or your sock puppet’s):

/usr/sbin/adduser user console

Add the user ‘user’ to the ‘sudo’ group. Depending on your level of experience, follow the appropriate instructions:

/usr/sbin/adduser user sudo

Restart the system:

/sbin/reboot
<h2 id="instalacao-tor">Installing and Configuring the Tor Browser</h2>

Open the terminal and type:

sudo apt update

After the update, enter the following command:

Download the APT Signing Key: (necessary wget install)

wget https://www.kicksecure.com/keys/derivative.asc

Users can check the Signing Key for better security.

Add the APT Signing Key:

sudo cp ~/derivative.asc /usr/share/keyrings/derivative.asc

Add the derivative repository:

echo "deb [signed-by=/usr/share/keyrings/derivative.asc] https://deb.kicksecure.com bookworm main contrib non-free" | sudo tee /etc/apt/sources.list.d/derivative.list

Update your package lists:

sudo apt-get update

sudo apt-get install tb-updater

confirme-down-tb-updater

Choose YES

<h2 id="reflexao-necessaria">Important Section</h2>

Configuring the Tor Browser

Once the terminal completes, it may be necessary to go to “Applications -> Internet and click Tor Browser (AnonDist)”

confirme-down-tb-updater

Choose YES

tor-version-confirm

Choose YES

Now just wait……

It will do all the work for you (Stay alert, it will display some windows with warnings ‘READ ALL,’ you will understand, and when it re-verifies the signature, it will print something like: ‘Good Signature.’ If it doesn’t show this, abort the installation.

good-signature

Ok, Good signature.. Choose YES

Once the installation is complete, open the Tor browser

  • Open the Tor Browser: Launch the Tor Browser on your device.
  • Access settings: In the upper right corner, click on the icon to open the menu and select “Settings” or “Preferences.”
  • Select “Connection”: Within the settings, you will see the available configuration options.
  • Bridge Configuration: Go to the “Select a Built-In Bridge…” button and click on it.
  • Choose obfs4: Within the bridge options, choose “obfs4.”

![1-iava5ILHX0Tzh68eNoKtYA](https://miro.medium.com/v2/resize:fit:720/format:w

View on GitHub
GitHub Stars129
CategoryDevelopment
Updated4d ago
Forks12

Security Score

95/100

Audited on Mar 24, 2026

No findings