
Open-source intelligence (OSINT) is essential for investigators, cybersecurity professionals, and researchers. Whether you're tracking digital footprints, verifying leaked data, or conducting security assessments, having the right tools is crucial.
After testing various OSINT tools, hereβs a **practical list of the top 10 tools** to help with **data collection, online investigations, and security research.**
π΅οΈ 1. SpiderFoot β Automated OSINT Collection

SpiderFoot automates data collection from over 100 sources, including WHOIS records, DNS, social media, and dark web forums. Itβs a useful tool for gathering intelligence on domains, IPs, emails, and usernames.
Installation and usage:
Run it locally and access the web interface via https://127.0.0.1:5001.
2. Sherlock β Finding Social Media Accounts

Sherlock scans multiple social networks to find accounts linked to a given username. Itβs a great tool for investigating online identities.
Usage example:
This will generate a list of matching accounts across various platforms.git clone https://github.com/sherlock-project/sherlock.git
cd sherlock
python3 sherlock.py target_username
3. Scylla β Searching for Leaked Data

Scylla searches through publicly available breach databases to check if an email or username has been exposed in data leaks.
How to use:
python3 scylla.py --email target@email.com
4. Maltego β Visualizing OSINT Data

Maltego is a powerful tool for mapping relationships between domains, people, email addresses, and organizations. Itβs widely used in threat intelligence and digital forensics.

β Extracts and connects information from multiple sources.
β Provides interactive visualizations.
β Supports integrations with external services like Shodan and HaveIBeenPwned.
5. Shodan β Internet-Wide Scanning

Shodan functions as a search engine for discovering internet-connected devices, including servers, webcams, and industrial control systems.
Example queries:
- org:"Tesla" country:"US" β Find Teslaβs publicly accessible servers.
- port:3389 β Locate open RDP ports worldwide.
6. Holehe β Checking Email Associations

Holehe determines whether an email is linked to accounts on major platforms like Facebook, Netflix, and Amazon.
How to use:
pip3 install holehe
holehe -e example@email.com
7. GHunt β Google Account Intelligence

GHunt extracts metadata from Google services, including YouTube, Google Photos, and Drive, to gather intelligence on active Google accounts.
8. TinEye β Reverse Image Search

TinEye is a reverse image search tool that helps trace the origins of images and identify where they have been used online.

β Detecting fake profiles that use stolen images.
β Finding modified versions of an image.
π 9. Recon-ng β OSINT Framework for Advanced Investigations

Recon-ng is a modular OSINT framework that automates data collection from multiple sources, making it highly useful for reconnaissance.
Installation:
10. TheHarvester β Collecting Emails, Domains, and IPs

TheHarvester is a tool for gathering emails, domain names, and IP addresses from public sources. Itβs widely used for security assessments.
Basic usage:
theharvester -d example.com -b all
Conclusion
These ten OSINT tools provide a solid foundation for online investigations, intelligence gathering, and security research. Each has unique strengths, and combining multiple tools often yields the best results.