There are 25 repositories under investigation topic.
Information gathering framework for phone numbers
Maintained collection of OSINT related resources. (All Free & Actionable)
Free hands-on digital forensics labs for students and faculty
Here we discuss how one can investigate crypto hacks and security incidents, and collect all the possible tools and manuals! PRs are welcome! If any tool is missing - please open PR!
The most unusual OSINT guide you've ever seen. The repository is intended for bored professionals only. PRs are welcome!
operative framework is a rust investigation OSINT framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules.
StalkPhish - The Phishing kits stalker, harvesting phishing kits for investigations.
A tool to quickly identify relevant, publicly-available open source intelligence ("OSINT") tools and resources, saving valuable time during investigations, research, and analysis.
A modular Python application to collect intelligence for malicious hosts.
Incident Response - Fast suspicious file finder
👀Sagemode: Track and Unveil Online identities across social media platforms🕵️♂️
Python tool that automates the process of Twitter OSiNT investigation using twint.
A Python library and command line tools to provide interactive log visualization.
A modular Python application to pull intelligence about malicious files
Intelligence tramite - Immagini - Video - Strumenti - Mappe
:mag: An investigation into Jacob Appelbaum leaving the Tor Project
Digital Forensics with Kali Linux, published by Packt
System Management RAM analysis tool
Our research work and publications produced by the Ocean Protocol team
Command Line Sock Puppet Creator for Investigators.
A branch of the original PhoneInfoga to keep using python
A curated list of digital forensic tools.
:feet: Miscellanious projects during 2014-2018 in Dept. of Electronic Engineering, Tsinghua University
:iphone: An overview of the important facts in the Apple vs. FBI case
Conduct forensic investigation of suspicious domains, websites and other dangerous thing without the fear of being infected! A Live operating system and docker image for hiding yourself by routing all your traffic through TOR