These are the tools and methods I use in OSINT CTFs, academic research, and threat‑monitoring practice. I’m sharing them with examples so fellow beginners can learn.
OSINT & Investigation Tools
-
How I use them:
Build precise queries to surface relevant activity fast. Reverse image/entity searches to validate sources
Usage Example:
Used site: and filetype: operators to solve OSINT CTF challenges
Tools: Google Dorks
-
How I use them:
Verify images and identify source context
Usage Example:
Matched building shapes & street layout with Google Street View to geolocate a photo
Tools: Google Images, Yandex
-
How I use them:
Extract metadata to validate authenticity and timelines
Usage Example:
Analyzed EXIF data to confirm image timestamps
Tools: ExifTool, FotoForensics
-
How I use them:
Geolocate using landmarks, shadows, and satellite imagery
Usage Example:
Used Mappillary + Google Earth to match building angles and road layout to confirm a photo’s location
Tools: Google Earth, Street View, Yandex Maps
-
How I use them:
Map digital infrastructure and hosting networks
Usage Example:
Traced the domain registration to identify ownership
Tools: WHOIS, DNS lookup
-
How I use them:
Map digital footprints and connection patterns across platforms
Usage Example:
Filtered X w/ advanced search. Not all platforms allow that
Tools: Instagram, Reddit (X allows advanced search filters) -
How I use them:
Safely access dark web environments for projects
Usage Example:
Evaluated dark web site accessibility and OPSEC risks in capstone project
Research & Verification Methods
-
How I use them:
Evaluate credibility through corroboration, consistency, and origin
Usage Example:
Cross‑referenced claims with primary social media posts and official records. Can find a lot of information if you get specific enough
-
How I use them:
Validate using metadata, shadows, platform data, and cross‑checks
Usage Example:
Checked platform‑generated metadata (upload time, EXIF remnants, post history) to confirm whether a social‑media timestamp matched the content
-
How I use them:
Track usernames and identity patterns across platforms
Usage example:
Mapped a single username across five platforms to build a digital footprint. Some people use similar usernames across platforms
-
How I use them:
Produce concise, actionable summaries for stakeholders
Usage example:
Wrote reports for the practical exams (Project 1591), summarizing my methodology and findings.