#osint

17 posts tagged
One photo. No metadata. No caption. A wall, a strip of road, a sliver of sky. That's the entire case file — and somewhere on Earth there is exactly one spot that matches it. Manual geolocation is the discipline of finding that spot before the news cycle moves on. Forget the marketing copy about "AI that finds anythin…
Open-source intelligence (OSINT) is a discipline of restraint as much as discovery. Anyone can scrape a profile or run a username search, but professional investigators are judged on whether their work is scoped, lawful, repeatable, and safe — for them, for their subjects, and for the integrity of the case. This guid…
Open-Source Intelligence is a field built on acronyms. Whether you are a journalist tracing a sanctioned vessel, a corporate due-diligence analyst chasing a beneficial owner, or a SOC analyst pivoting on indicators, you will encounter a shared vocabulary that spans military doctrine, civilian forensics, and internet pr…
On April 7, 2026, Anthropic announced Project Glasswing alongside a restricted preview of its frontier model Claude Mythos. The accompanying technical blog described what was, in calibrated terms, a threshold event for vulnerability research: Mythos had autonomously discovered thousands of previously unknown security f…
On August 10, 2025, soxoj pushed version 0.5.0 of Maigret to PyPI, bringing the username-investigation tool to its most capable state since the project forked from Sherlock in 2021. By the time Michael Bazzell's IntelTechniques team updated their OSINT virtual machine on April 4, 2026 — modifying user.sh, linux.txt, …
KnowEm is one of the first tools an OSINT beginner encounters when searching for username lookup resources. It is web-based, requires no installation, and returns results across 500+ social platforms in seconds. For a first pass on an unknown username it is fast and genuinely useful — you can open a browser tab, type…
Every OSINT investigation starts with one thing. It might be a username found in a forum post, an email address pulled from a leaked document, a phone number printed on a business card, or a face cropped from a photo. Whatever it is, that first item is a seed identifier — the single point of entry into a subject's di…