🕵️ OSINT Workflow

Complete open source intelligence workflow for threat analysis

OSINT Investigation Workflow

🎯 Investigation Planning

📊 Intelligence Collection

🌐 Domain & IP Intelligence

DNS Analysis

Passive DNS, historical records, subdomain enumeration

WHOIS Research

Registration data, contact information, historical ownership

Certificate Analysis

SSL certificates, certificate transparency logs

🔍 Search Intelligence

Google Dorking

Advanced search operators for targeted intelligence

Social Media

Profile analysis, post history, connection mapping

Code Repositories

GitHub, GitLab, exposed source code analysis

📱 Technical Intelligence

Shodan Searches

Internet-connected device discovery

Metadata Extraction

Document metadata, EXIF data analysis

Breach Data

Compromised credentials, data leak searches

📝 Collection Notes

🧠 Intelligence Analysis

🎯 Structured Analysis

Diamond Model

Adversary, Infrastructure, Capability, Victim analysis

Cyber Kill Chain

Map attack progression through reconnaissance to actions

MITRE ATT&CK

Tactics, techniques, and procedures mapping

📊 Analysis Workspace

Select an analysis template above to begin structured analysis.

🎯 Confidence Assessment

✅ Verification & Validation

🔍 Verification Checklist

📋 Verification Notes

📄 Intelligence Reporting

📊 Executive Summary

🔍 Key Findings

⚠️ Threat Assessment

💡 Recommendations

🔗 Indicators of Compromise

🎯 Investigation Tracker

1 Planning
2 Collection
3 Analysis
4 Verification
5 Reporting