These are the tools and methods I use in OSINT CTFs, academic research, and threat‑monitoring practice. I’m sharing them with examples so fellow beginners can learn.

OSINT & Investigation Tools

  • How I use them:

    Build precise queries to surface relevant activity fast. Reverse image/entity searches to validate sources

    Usage Example:

    Used site: and filetype: operators to solve OSINT CTF challenges

    Tools: Google Dorks

  • How I use them:

    Verify images and identify source context

    Usage Example:

    Matched building shapes & street layout with Google Street View to geolocate a photo

    Tools: Google Images, Yandex

  • How I use them:

    Extract metadata to validate authenticity and timelines

    Usage Example:

    Analyzed EXIF data to confirm image timestamps

    Tools: ExifTool, FotoForensics

  • How I use them:

    Geolocate using landmarks, shadows, and satellite imagery

    Usage Example:

    Used Mappillary + Google Earth to match building angles and road layout to confirm a photo’s location

    Tools: Google Earth, Street View, Yandex Maps

  • How I use them:

    Map digital infrastructure and hosting networks

    Usage Example:

    Traced the domain registration to identify ownership

    Tools: WHOIS, DNS lookup

  • How I use them:

    Map digital footprints and connection patterns across platforms

    Usage Example:

    Filtered X w/ advanced search. Not all platforms allow that

    Tools: Instagram, Reddit (X allows advanced search filters)

  • How I use them:

    Safely access dark web environments for projects

    Usage Example:

    Evaluated dark web site accessibility and OPSEC risks in capstone project

Research & Verification Methods

  • How I use them:

    Evaluate credibility through corroboration, consistency, and origin

    Usage Example:

    Cross‑referenced claims with primary social media posts and official records. Can find a lot of information if you get specific enough

  • How I use them:

    Validate using metadata, shadows, platform data, and cross‑checks

    Usage Example:

    Checked platform‑generated metadata (upload time, EXIF remnants, post history) to confirm whether a social‑media timestamp matched the content

  • How I use them:

    Track usernames and identity patterns across platforms

    Usage example:

    Mapped a single username across five platforms to build a digital footprint. Some people use similar usernames across platforms

  • How I use them:

    Produce concise, actionable summaries for stakeholders

    Usage example:

    Wrote reports for the practical exams (Project 1591), summarizing my methodology and findings.