OSINT Investigation

OSINT Investigations and Threat Intelligence Labs

OSINT Investigation Lab Overview

Hands-on investigative exercises focused on collecting and analyzing open-source intelligence from websites, social media platforms, and publicly accessible infrastructure.

Category Labs
OSINT Research & Investigations 11
Intelligence Demonstration Labs 11
Total Intelligence Labs Documented 22

OSINT Investigations Portfolio

๐Ÿ” Technical Analysis & Platform Mapping

REPORT โ€“ SecurityWeek OSINT Investigation โ€“ v.1.1.0

Investigation comparing current, cached, and archived versions of a target webpage to identify changes and removed content.

Skills: Web Archiving ยท Change Detection ยท Investigative Logic

Available Upon Request

REPORT โ€“ Using Google Translate for OSINT โ€“ v.1.1.0

Demonstrates translating foreign-language communications to support multilingual open-source intelligence investigations.

Skills: Multilingual OSINT ยท Translation Tools ยท Intelligence Analysis

View Report

REPORT โ€“ PE File Analysis Using PEStudio โ€“ v.1.0.0

Analyzing Windows Portable Executable files to identify suspicious indicators, digital signatures, and metadata.

Skills: Static Analysis ยท Malware Triage ยท PEStudio

Available Upon Request

OSINT โ€“ X (Twitter) Mind Map โ€“ v.1.0.0

Mapping publicly accessible data points that can be collected from user profiles and activity on the X platform.

Skills: Social Media Mapping ยท Profile Analysis ยท SOCMINT

Available Upon Request

OSINT โ€“ Telegram Mind Map โ€“ v.1.0.0

Identifying and documenting investigative data points available through Telegram communities and public channels.

Skills: Messaging App OSINT ยท Community Investigation

Available Upon Request

OSINT โ€“ Reddit Mind Map โ€“ v.1.0.0

Mapping investigative artifacts and intelligence opportunities present within Reddit communities and user activity.

Skills: Forum Analysis ยท Metadata Extraction ยท Digital Footprinting

Available Upon Request

OSINT โ€“ LinkedIn Mind Map โ€“ v.1.0.0

Documenting professional intelligence indicators and publicly available data accessible through LinkedIn profiles.

Skills: Corporate Intelligence ยท Professional Profile Analysis

Available Upon Request

OSINT โ€“ Instagram Mind Map โ€“ v.1.0.0

Mapping investigative data points and metadata accessible through public Instagram profiles.

Skills: Visual Intelligence ยท Asset Mapping ยท Metadata

Available Upon Request

OSINT โ€“ Facebook Mind Map โ€“ v.1.0.0

Identifying open-source intelligence artifacts available through Facebook profiles and social interactions.

Skills: Social Interaction Mapping ยท Digital Footprinting

Available Upon Request

OSINT โ€“ Discord Mind Map โ€“ v.1.0.0

Documenting potential investigative intelligence sources within Discord servers and user activity.

Skills: Volatile Platform OSINT ยท Infrastructure Mapping

Available Upon Request

TEMPLATE โ€“ OSINT Investigation Corroborated Intelligence โ€“ v.1.0.0

Structured investigation template used to document and validate intelligence findings from multiple sources.

Skills: Intelligence Corroboration ยท Professional Reporting

Available Upon Request


Intelligence Demonstration Videos

Practical demonstrations showing investigative OSINT techniques used to discover information, identify infrastructure, and analyze publicly available data sources.

Intelligence Demonstration Portfolio

๐Ÿ—๏ธ Advanced Search & Reconnaissance

LAB โ€“ Reverse Image Search for OSINT Analysis โ€“ v.1.0.0

Demonstrates using reverse image search to identify related images and verify online sources during investigations.

Available Upon Request

LAB โ€“ Identifying and Verifying Email Addresses โ€“ v.1.0.0

Generating and validating potential email addresses using naming conventions and publicly available documents.

Available Upon Request

LAB โ€“ Translating Foreign Language Content โ€“ v.1.0.0

Demonstrates translating foreign-language communications to support intelligence analysis and reporting.

Available Upon Request

LAB โ€“ Creating Covert Social Media Accounts โ€“ v.1.0.0

Demonstrates creating operational social media accounts for gathering intelligence while maintaining anonymity.

Available Upon Request

LAB โ€“ Advanced Google Dork Queries for OSINT โ€“ v.1.0.0

Demonstrates using advanced search operators to identify publicly accessible sensitive data and documents.

Available Upon Request

LAB โ€“ Information Leaks in Public Code Repositories โ€“ v.1.0.0

Investigating GitHub and similar repositories to identify exposed credentials or sensitive internal data.

Available Upon Request

LAB โ€“ Passive Mapping of Assets Using Shodan โ€“ v.1.0.0

Demonstrates passive reconnaissance techniques to identify internet-facing infrastructure associated with an organization.

Available Upon Request

LAB โ€“ Passive Mapping of Assets Using DNSDumpster โ€“ v.1.0.0

Using DNSDumpster to identify domains, subdomains, and related infrastructure during passive reconnaissance.

Available Upon Request

LAB โ€“ Targeted Search Queries for Documents โ€“ v.1.0.0

Demonstrates using targeted search queries to locate exposed internal documents and sensitive information online.

Available Upon Request

LAB โ€“ Analyzing Webpage Changes with Archives โ€“ v.1.0.0

Techniques for identifying modified or deleted web content through cached and archived page analysis.

Available Upon Request

LAB โ€“ Finding Cybersecurity Feeds by Language โ€“ v.1.0.0

Demonstrates using search filters to locate cybersecurity news and threat intelligence feeds in a specific language.

Available Upon Request


Portfolio Documentation

This section summarizes investigative intelligence and OSINT exercises performed as part of cybersecurity research and threat analysis training.

While representative reports, mind maps, and demonstrations are presented here, additional investigative documentation, research notes, and supporting analysis are maintained within a private research archive.

Complete documentation and supporting investigative materials are available upon request for professional or technical review.