A comprehensive web-based OSINT (Open Source Intelligence) search tool with 450+ integrated tools across 16 specialized categories for advanced digital investigations.
-
Social Media Intelligence
- Facebook (20+ engines: Direct, Graph Search, Google, Bing, Advanced)
- Twitter/X (15+ engines: Direct, Nitter, Advanced Search, Google, Bing)
- Instagram (12+ engines: Direct, Picuki, Google, Story Search)
- LinkedIn (25+ engines: People, Companies, Jobs, Sales Navigator, Advanced)
-
Person Search & Investigation
- Username Analysis (40+ platforms: Social media, forums, gaming, professional)
- Full Name Investigation (30+ engines: People search, background checks, public records)
-
Contact Information Intelligence
- Email Analysis (35+ tools: Verification, breach checks, reputation, OSINT)
- Phone Investigation (50+ services: Caller ID, reverse lookup, carrier info, SMS services)
- Address Research (Geographic and property lookups)
-
Media Analysis & Forensics
- Image Analysis (40+ tools: Reverse search, EXIF, enhancement, geolocation)
- Video Investigation (Search and analysis tools)
-
Technical Intelligence
- Domain Investigation (85+ tools: WHOIS, DNS, subdomain discovery, security analysis)
- IP Address Analysis (Geolocation, reputation, network analysis)
-
Specialized OSINT Categories
- Breaches & Leaks (35+ databases: Password dumps, data breaches, leaked credentials)
- Documents (30+ engines: PDF search, document analysis, academic papers)
- Phishing/Suspicious Email (45+ tools: Analysis, sandboxes, reputation checks, malware detection)
- Threat Hunting (15+ platforms: Threat intelligence, IOC analysis, security research)
- Hashes (3+ services: Malware analysis, file reputation, hash lookup)
- Sandbox Analysis (8+ platforms: Malware analysis, file detonation, behavior analysis)
- OSINT Frameworks (40+ resources: Tools, methodologies, training, communities)
- Photos (40+ tools: Analysis, enhancement, forensics, geolocation, EXIF extraction)
- Faces (17+ tools: Recognition, analysis, comparison, deepfake detection, AI generation)
- Geolocation (5+ AI tools: Image location analysis, coordinate verification, mapping)
- Paste Sites (25+ platforms: Code repositories, paste bins, leak monitoring)
- Centralized Custom Engine Management: Add custom search engines to any category with a unified interface
- Master Search Fields: Each section includes master search with "Populate All" functionality
- Bulk Search Execution: "Search All" buttons open all engines in a category simultaneously
- Staggered Launch System: Prevents popup blocking with intelligent timing delays
- LocalStorage Persistence: Custom engines saved locally across browser sessions
- Professional UI/UX: Modern gradient design with responsive layout
- 16 Specialized Categories: Purpose-built sections for different investigation types
- 450+ Integrated Tools: Comprehensive coverage of OSINT platforms and services
- Real-time Error Handling: User-friendly feedback and validation systems
- Install Python dependencies:
pip install -r requirements.txt- Run the Flask application:
python app.py- Open your browser and navigate to:
http://localhost:5000
- Select Category: Choose from 16 specialized OSINT categories via tab navigation
- Master Search: Enter your search term in the master field at the top of each section
- Populate All: Click to automatically fill all search fields in that category
- Search All: Execute searches across all engines simultaneously with staggered timing
- Individual Tools: Use specific engines for targeted investigations
- Access Manager: Click "Add Custom Search Engine" at the top of the interface
- Add Engine: Enter name, select category, and provide URL with
{QUERY}placeholder - Example:
https://example.com/search?q={QUERY}becomeshttps://example.com/search?q=john_doe - Manage: View and remove custom engines organized by category
- Person Investigation: Start with Username → Name → Email → Phone → Social Media
- Technical Analysis: Domain/IP → WHOIS → Threat Intelligence → Sandbox Analysis
- Media Forensics: Photos → EXIF → Reverse Search → Geolocation → Face Analysis
- Threat Research: Hashes → Sandbox → Threat Hunting → Phishing Analysis
This tool is intended for legitimate security research, investigative journalism, and defensive security purposes only. Users are responsible for:
- Complying with all applicable laws and regulations
- Respecting privacy rights
- Obtaining proper authorization before conducting investigations
- Using the tool ethically and responsibly
This implementation opens searches in new browser tabs, performing queries directly on respective platforms. Key architectural decisions:
- No API Dependencies: Works immediately without API keys or rate limits
- Client-Side Processing: JavaScript handles search orchestration and timing
- LocalStorage Integration: Persistent custom engine management
- Responsive Design: Mobile-friendly interface with CSS Grid/Flexbox
For enterprise deployment, consider:
- API Integration: Direct platform APIs for automated data collection
- Rate Limiting: Intelligent throttling and request management
- Result Aggregation: Centralized data collection and analysis
- Export Capabilities: PDF reports, CSV exports, data visualization
- Authentication: User management and access controls
- Database: Search history and investigation case management
- Backend: Flask (Python 3.7+)
- Frontend: HTML5, CSS3 (Grid/Flexbox), Vanilla JavaScript
- Icons: Font Awesome 6.4.0
- Storage: Browser LocalStorage for custom engines
- Architecture: Single Page Application (SPA) with tab-based navigation
- Total Tools: 450+ integrated OSINT platforms
- Categories: 16 specialized investigation areas
- Custom Engines: Unlimited user-defined search engines
- Browser Support: Modern browsers with ES6+ support
- Mobile Ready: Responsive design for tablet/mobile investigations
Intended Use: Educational, security research, investigative journalism, and defensive security only.
User Responsibilities:
- Comply with applicable laws and regulations
- Respect privacy rights and platform terms of service
- Obtain proper authorization before investigations
- Use ethically and responsibly for legitimate purposes
- Follow responsible disclosure for security vulnerabilities
Disclaimer: Users assume full responsibility for legal and ethical use of this tool.
Educational and defensive security purposes only. Not for malicious use.