Intelligence & Investigation

Investigative Intelligence, OSINT, and Threat Research Labs

Intelligence & Investigation Lab Overview

Category Labs
Investigative Intelligence & OSINT 11
Intelligence Demonstration Videos 10
Total Intelligence Labs Documented 21

Intelligence and investigative analysis are essential components of modern cybersecurity operations. The labs and research in this section demonstrate hands-on experience gathering open-source intelligence (OSINT), analyzing publicly available information, performing malware triage, and identifying potential security threats using investigative techniques.

These exercises demonstrate practical intelligence gathering techniques including social media analysis, digital artifact investigation, malware triage, and passive reconnaissance used in threat intelligence and cybersecurity investigations.


Investigative Intelligence & OSINT

Hands-on investigative exercises focused on collecting and analyzing open-source intelligence from websites, social media platforms, and publicly accessible infrastructure.

Lab Index

  • REPORT – SecurityWeek OSINT Investigation – v1.1.0
    Investigation comparing current, cached, and archived versions of a target webpage to identify changes, removed content, and investigative insights.

  • REPORT – Using Google Translate for OSINT – v1.1.0
    Demonstrates translating foreign-language communications to support multilingual open-source intelligence investigations.

  • REPORT – Portable Executable (PE) File Analysis Using PEStudio – v1.0.0
    Demonstrates analyzing Windows Portable Executable files using PEStudio to identify suspicious indicators, digital signatures, and embedded file metadata.

  • OSINT – X (Twitter) Mind Map – v1.0.0
    Mapping publicly accessible data points that can be collected from user profiles and activity on the X (Twitter) platform.

  • OSINT – Telegram Mind Map – v1.0.0
    Identifying and documenting investigative data points available through Telegram communities and public channels.

  • OSINT – Reddit Mind Map – v1.0.0
    Mapping investigative artifacts and intelligence opportunities present within Reddit communities and user activity.

  • OSINT – LinkedIn Mind Map – v1.0.0
    Documenting professional intelligence indicators and publicly available data accessible through LinkedIn profiles.

  • OSINT – Instagram Mind Map – v1.0.0
    Mapping investigative data points and metadata accessible through public Instagram profiles.

  • OSINT – Facebook Mind Map – v1.0.0
    Identifying open-source intelligence artifacts available through Facebook profiles and social interactions.

  • OSINT – Discord Mind Map – v1.0.0
    Documenting potential investigative intelligence sources within Discord servers and user activity.

  • TEMPLATE – OSINT Investigation Corroborated Intelligence – v1.0.0
    Structured investigation template used to document and validate intelligence findings from multiple open-source sources.


Intelligence Demonstration Videos

Practical demonstrations showing investigative OSINT techniques used to discover information, identify infrastructure, and analyze publicly available data sources.

Lab Index

  • VIDEO – Using Reverse Image Search for OSINT Analysis
    Demonstrates using reverse image search techniques to identify related images and verify online sources during investigations.

  • VIDEO – Guess the Email Addresses of a Target User
    Demonstrates generating and validating potential email addresses using naming conventions and publicly available documents.

  • VIDEO – Use Google Translate to Analyze Foreign Language Messages
    Demonstrates translating foreign-language communications to support intelligence analysis.

  • VIDEO – Create Covert Social Media Accounts
    Demonstrates creating operational social media accounts used for investigative intelligence gathering while maintaining anonymity.

  • VIDEO – Construct Complex Google Search Queries to Identify Sensitive Information
    Demonstrates using advanced search operators and Google dorking techniques to identify publicly accessible sensitive data.

  • VIDEO – Search Public Code Repositories for Information Leaks
    Demonstrates investigating GitHub and similar repositories to identify exposed credentials or sensitive information.

  • VIDEO – Use Shodan to Passively Map External-Facing Assets
    Demonstrates passive reconnaissance techniques to identify internet-facing infrastructure associated with an organization.

  • VIDEO – Use DNSDumpster to Map External-Facing Infrastructure
    Demonstrates using DNSDumpster to identify domains, subdomains, and related infrastructure during passive reconnaissance.

  • VIDEO – Create Google Search Queries to Discover Public Documents
    Demonstrates using targeted search queries to locate exposed documents and sensitive information online.

  • VIDEO – Analyze Changes to a Webpage Using Cached and Archived Versions
    Demonstrates investigative techniques for identifying modified or deleted web content through cached and archived page analysis.


Portfolio Documentation

This section summarizes investigative intelligence and OSINT exercises performed as part of cybersecurity research and threat analysis training.

While representative reports, mind maps, and demonstrations are presented here, additional investigative documentation, research notes, and supporting analysis are maintained within a private research archive.

Complete documentation and supporting investigative materials are available upon request for professional or technical review.