Security & OSINT Tools
475+ tools across cybersecurity modules, OSINT directories, geospatial intelligence, and curated resource collections.
Cybersecurity Modules
Red Team
Identify open ports and services
Enumerate DNS records and subdomains
Scan web applications for vulnerabilities
Analyze wireless networks and signals
Capture and analyze network packets
Crack password hashes with multiple algorithms
Evaluate password strength and entropy
Audit and validate credentials in systems
Search and analyze CVE vulnerabilities
Access and manage exploitation tools
Fuzz applications to find vulnerabilities
Enumerate Active Directory structures
Analyze SSL/TLS configurations and vulnerabilities
Discover and enumerate subdomains
Brute force web directories and paths
Detect Server-Side Request Forgery vulnerabilities
Blue Team
Comprehensive system security scanning
Monitor network traffic and anomalies
Analyze and parse security logs
Identify and analyze phishing emails
Monitor file integrity and changes
Digital forensics and incident analysis
Gather and analyze threat intelligence
Incident response procedures and playbooks
SIEM detection rules and queries
Analyze malware samples safely
Deploy and monitor honeypot systems
Email security scanning and filtering
Analyze data entropy and randomness
Analyze memory dumps for artifacts
Monitor system baselines and deviations
Extract indicators of compromise
White Hat
Vulnerability assessment and evaluation
Audit compliance with security standards
Encryption and decryption utilities
Security testing for APIs
Cloud infrastructure security scanning
Docker and container security tools
Monitor SSL certificate validity and expiration
Scan for exposed secrets and credentials
OSINT
Open source intelligence reconnaissance
Social media intelligence gathering
Advanced Google search operators
Monitor dark web threats and leaks
Geolocation intelligence and mapping
Imagery intelligence analysis
Blockchain transaction analysis
Business intelligence gathering
Extract metadata from documents and files
Certificate Transparency log monitoring
OSINT Tools
GEOINT & Mapping
Curated Collections
GEOINT
Curated collection of geospatial intelligence tools — satellite imagery, mapping, geolocation, and location analysis resources.
OSINT 500+ Tools
Massive collection of 500+ OSINT tools organized by category — dashboards, cryptocurrency, SMS, WhatsApp, website security, and more.
OSINT Resources
Well-organized OSINT resource page covering investigation tools, social media analysis, and research techniques.
The Ultimate OSINT Collection
One of the most comprehensive OSINT collections online — tools, guides, training resources, and investigation techniques all in one place.
Nixintel's OSINT Resource List
Curated by OSINT expert Nixintel — focused collection of verified, high-quality investigation tools and techniques.
Awesome OSINT
Community-maintained GitHub list of OSINT tools and resources — search engines, social media, domain tools, and threat intelligence.
cipher387's OSINT Tool Collection
Over 1,000 online tools organized in 23+ categories — maps, social media, messengers, crypto, IoT, code search, and much more.
OSINT Framework
Interactive tree-based directory of OSINT tools organized by data type — the classic starting point for any investigation.
IntelTechniques
Tools and search forms from OSINT expert Michael Bazzell — used by investigators, journalists, and privacy advocates worldwide.
Bellingcat's Online Investigation Toolkit
Maintained by the Bellingcat investigative journalism team — spreadsheet of tools used in real-world open-source investigations.
OSINT Combine Free Tools
Free browser-based OSINT tools from OSINT Combine — social media analysis, geolocation, and data transformation utilities.
SMART (Start Me Aggregated Resource Tool)
Aggregates and deduplicates resources from hundreds of start.me pages — one searchable table for all OSINT bookmarks.
These tools are listed for educational and research purposes. External collections are maintained by independent researchers and organizations. Always verify tools before use and follow all applicable laws when conducting research.