Home / Threat Intelligence and Detection / Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT)

Unlock insights with OSINT. Discover open-source data for threat intelligence and detection.

Try these 202 AI Open Source Intelligence (OSINT) Tools

Octopus Cybercrime Community
Free

Octopus Cybercrime Community View Octopus Cybercrime Community

The Octopus Cybercrime Community is a collaborative online platform dedicated to fostering information exchange and cooperation in combating cybercrime and handling electronic evidence. It serves as a central hub for experts, law enforcement officials, academics, and professionals, offering specialized tools like country-specific cybercrime legislation profiles, comprehensive training materials, and an informative blog to advance global efforts against cyber threats.

Information sharing on cybercrime and electronic evidence
Country Wiki profiles on cybercrime legislation and policies
Comprehensive training materials for professionals
Onsist
Free

Onsist View Onsist

Onsist delivers comprehensive brand protection services, proactively defending your brand's equity, reputation, and online presence from diverse threats including counterfeits, impersonation, and unauthorized sales channels. Our advanced solutions ensure uninterrupted web traffic and safeguard your business against high-intensity online abuse, empowering sustained growth and consumer trust.

Proactive online brand defense
Safeguards brand equity and reputation
Combats counterfeit products and unauthorized channels
Open Information Security Foundation (OISF)
Free

Open Information Security Foundation (OISF) View Open Information Security Foundation (OISF)

The Open Information Security Foundation (OISF) is a non-profit organization spearheaded by leading security experts and developers committed to advancing open-source security technologies. We foster a vibrant community dedicated to building and maintaining robust security solutions, offering structured engagement through working groups, mailing lists, training, and annual conferences. OISF actively supports the growth and sustainability of critical open-source security projects that are essential for modern digital defense.

Non-profit organization led by security experts
Dedicated to open-source security technologies
Fosters active community participation
OSIRIS Lab - NYU Tandon
Free

OSIRIS Lab - NYU Tandon View OSIRIS Lab - NYU Tandon

The OSIRIS Lab at NYU Tandon provides a cutting-edge security research environment for students and faculty to investigate and deconstruct offensive security tactics and real-world attack vectors. Through hands-on experimentation and analysis of live threat actors, participants gain invaluable practical skills and a deep understanding of both attacker methodologies and defensive strategies. This immersive experience equips individuals with a robust foundation to excel in any domain of information security.

Real-world attack vector analysis
Practical offensive security training
Hands-on experimentation environment
Overwatch
Free

Overwatch View Overwatch

Overwatch Data empowers your fraud, security, and strategic insights teams with real-time, actionable intelligence. Our advanced platform delivers a comprehensive, contextualized view of emerging opportunities and critical risks by integrating data from the surface, social, and deep web. Drive faster, more informed decisions and fortify your organization against evolving threats with Overwatch Data.

Real-time threat intelligence across surface, social, and deep web
Actionable insights for fraud, security, and strategic planning
Comprehensive and contextualized risk and opportunity assessment
Oxygen Forensics
Free

Oxygen Forensics View Oxygen Forensics

Oxygen Forensics empowers digital investigators with the most advanced suite of forensic data examination tools for mobile devices and cloud services. Leveraging over two decades of expertise in mobile device communication protocols, built from its origins as a PC-to-Mobile Communication software company, Oxygen Forensic® Detective provides unparalleled access to critical data, surpassing competing forensic analysis solutions. Our universal forensic solution ensures comprehensive coverage for the widest range of mobile operating systems, including iOS, Android, Windows Phone, and BlackBerry.

Advanced mobile device data extraction
Comprehensive cloud service forensics
Support for a wide range of mobile OS (iOS, Android, WP, BB & more)
Oxylabs
Free

Oxylabs View Oxylabs

Oxylabs empowers businesses and governments with its advanced, patented web scraping technology, leveraging the world's largest ethically sourced proxy network for seamless public web data extraction. Their comprehensive solutions are also instrumental for global cybersecurity firms, offering robust tools for threat intelligence, digital risk mitigation, and brand protection. Experience unparalleled performance and anonymity for critical data gathering and cybersecurity initiatives.

World's largest ethically sourced proxy network
Patented web scraping technology
High-traffic, fast web data gathering
Packet Ninjas
Free

Packet Ninjas View Packet Ninjas

Packet Ninjas is a premier cyber security agency specializing in the strategic application of digital intelligence. We leverage extensive offensive, investigative, and real-world threat response expertise to identify, deter, contain, and attribute malicious actors, significantly strengthening enterprise cyber defenses. Our services empower organizations by providing actionable guidance on harnessing digital intelligence for effective investigations and robust cyber security strategies.

Digital Intelligence Application
Advanced Threat Identification
Actor Attribution & Deterrence
Paraben
Free

Paraben View Paraben

Paraben offers advanced digital forensics solutions designed to tackle the complexities of modern digital evidence, encompassing mobile devices, smartphones, email, hard drives, and gaming systems. With a pioneering focus on mobility, Paraben has expanded its innovative research into areas like the Internet of Things (IoT) through its Forensics of EverythingTM (FoE) initiative. Their comprehensive software suite supports both logical and physical imaging for virtually all smartphones and mobile devices, while also providing specialized tools for unique data sources such as email servers, local archives, internet activity, and gaming consoles, all integrated within a unified platform and interface.

Comprehensive digital forensics for mobile, email, drives, and gaming systems
Advanced support for logical and physical mobile device imaging
Coverage for 100% of smartphones on the market
Parrot Security (ParrotSec)
Free

Parrot Security (ParrotSec) View Parrot Security (ParrotSec)

Parrot Security OS (ParrotSec) is a specialized operating system engineered for comprehensive penetration testing and advanced Red Team operations. It offers an extensive collection of pre-installed tools, utilities, and libraries, empowering security professionals to conduct reliable, compliant, and reproducible assessments of digital assets. From initial reconnaissance through in-depth analysis to final reporting, ParrotSec provides a highly flexible and potent environment designed to cover the entire security assessment lifecycle.

Comprehensive penetration testing suite
Advanced Red Team capabilities
Extensive library of security tools
PhishFirewall
Free

PhishFirewall View PhishFirewall

PhishFirewall is a cutting-edge, AI-powered Cybersecurity Awareness Education and Human Security Analytics platform designed to combat the persistent threat of phishing. Recognizing that human vulnerability is a key factor in cybersecurity breaches, PhishFirewall™ employs advanced AI to automate threat emulation and behavioral analysis. This SaaS solution significantly reduces user susceptibility to phishing attacks, driving enterprise click rates below 1% while simultaneously alleviating the burden on security teams.

AI-Driven Cybersecurity Awareness Education
Automated Threat Emulation
Advanced Human Security Analytics
PhishFort
Free

PhishFort View PhishFort

PhishFort delivers comprehensive brand protection by proactively identifying and neutralizing sophisticated phishing attacks, counterfeit content, and IP infringements. Our end-to-end service streamlines detection, validation, escalation, and takedown, allowing businesses to fortify their digital presence without the overhead of an in-house security team. Trust PhishFort to safeguard your brand and customers from the escalating threats of online deception at internet scale, ensuring a safer online environment for all.

End-to-end phishing detection and takedown
Counterfeit content and IP infringement monitoring
Automated threat validation and escalation
Prescient
Free

Prescient View Prescient

Prescient’s Cyber solutions fortify your organization's defenses by conducting specialized investigations into unconventional cyber risks, proactively identifying vulnerabilities from human error or malicious actors. Leveraging proprietary technologies and deep expertise, our analysts mitigate internal leaks and external intrusions, protect executive digital identities, and monitor social media for threats. In the event of a breach, Prescient’s experts perform in-depth deep and dark web research to locate compromised data and identify perpetrators, offering a comprehensive response to safeguard your digital assets.

Specialized investigative services for unconventional cyber risks
Proactive vulnerability identification (internal & external)
Protection of executive digital identities
PRODAFT
Free

PRODAFT View PRODAFT

PRODAFT is a leading cyber intelligence and cybersecurity firm dedicated to safeguarding commercial enterprises and government institutions against evolving global threats. Leveraging advanced expertise, PRODAFT delivers comprehensive solutions including cyber intelligence, anti-espionage, robust penetration testing, thorough software code audits, and specialized cybersecurity training. Our extensive global Supplier Directory identifies over 8,000 cybersecurity specialists across 128 countries, empowering organizations to find critical support and enhance their defense posture.

Comprehensive Cyber Intelligence Services
Advanced Anti-Espionage Solutions
Expert Penetration Testing
Red Points
Free

Red Points View Red Points

Red Points offers comprehensive brand and content protection, leveraging proprietary machine learning technology to proactively detect and eliminate digital infringements across the internet. Our expert legal and technical teams ensure swift removal of violating content and provide clients with real-time, actionable intelligence for robust online security. As the chosen partner for leading global brands, we ensure your digital assets are protected in a constantly evolving online landscape.

Proprietary AI-powered infringement detection
Automated content takedown and deindexing
Expert legal and technical enforcement
Red Sift
Free

Red Sift View Red Sift

Red Sift is the sole integrated cloud email and brand protection platform engineered to fortify organizational communications. By automating critical DMARC and BIMI processes, Red Sift empowers businesses to proactively identify and neutralize business email compromise, while robust domain protection safeguards against impersonation attacks. Its suite of SaaS applications, including OnDMARC, OnINBOX, and OnDOMAIN, collectively form a comprehensive defense, blocking outbound phishing, analyzing inbound email security, and defending digital assets.

Integrated Cloud Email and Brand Protection Platform
Automated DMARC and BIMI Implementation
Business Email Compromise (BEC) Identification and Mitigation
Resemble AI
Free

Resemble AI View Resemble AI

Resemble AI empowers over 1.5 million creators with cutting-edge Generative Voice AI to build deeply engaging and dynamic experiences. Beyond innovation, Resemble AI addresses critical AI safety concerns by offering robust solutions like Resemble Detect for real-time deepfake audio detection and Neural Watermarker for imperceptible content authentication, safeguarding against misuse.

Generative Voice AI for immersive experiences
Real-time deepfake audio detection
Neural Watermarking for content authentication
Revel8
Free

Revel8 View Revel8

Revel8 fortifies organizations against sophisticated GenAI-driven social engineering by delivering real-time, personalized simulations across email, SMS, voice, and video. Our adaptive AI platform transforms your workforce into a dynamic defense layer, mirroring current attack methodologies and tailoring training by analyzing individual OSINT risk profiles. Through engaging, gamified modules and live threat intelligence, Revel8 cultivates a culture of continuous learning, empowering teams to proactively identify and neutralize evolving cyber threats.

Real-time, personalized GenAI social engineering simulations
Multi-channel attack simulation (email, SMS, voice, video)
AI-driven OSINT risk profiling and adaptive training
Ripjar
Free

Ripjar View Ripjar

Ripjar is a leading provider of advanced data and analytic solutions for real-time threat detection and prevention. Leveraging deep expertise from former UK intelligence professionals, Ripjar empowers global organizations to combat escalating risks like money laundering, fraud, cybercrime, and terrorism through intelligent, scalable products.

Real-time threat detection and prevention
Advanced machine learning and AI capabilities
Scalable data and analytic solutions
RiskIQ
Free

RiskIQ View RiskIQ

RiskIQ, now part of Microsoft, is a premier digital threat management solution designed to provide comprehensive discovery, intelligence, and mitigation of threats targeting an organization's digital footprint. The platform empowers enterprises with unified insight and control across their web, social, and mobile channels. By leveraging advanced internet reconnaissance and analytics, RiskIQ expedites threat investigations, maps attack surfaces, quantifies risk, and enables proactive defense against emerging digital threats.

Comprehensive Digital Asset Discovery
External Attack Surface Management (EASM)
Real-time Threat Intelligence
S2T
Free

S2T View S2T

S2T delivers advanced cyber intelligence solutions by integrating deep expertise in intelligence, machine learning, AI, big data processing, linguistics, and web application development. Our solutions empower organizations and analysts to enhance web and cyber collection, collation, analysis, and insight generation. By leveraging powerful collection capabilities across websites, social media, the darknet, and end-user devices, coupled with sophisticated big data analytics, machine learning, and visualization tools, S2T provides actionable intelligence for effective threat defense.

Comprehensive Cyber Intelligence Solutions
Expertise in Machine Learning & AI
Advanced Big Data Processing & Analytics
Secret Intelligence Service (SIS - MI6) - UK
Free

Secret Intelligence Service (SIS - MI6) - UK View Secret Intelligence Service (SIS - MI6) - UK

The Secret Intelligence Service (SIS), also known as MI6, is the United Kingdom's primary foreign intelligence agency dedicated to safeguarding national security and promoting prosperity. For over a century, SIS has leveraged advanced technology and clandestine operations to counteract global threats, including terrorism and hostile state activities, while fostering a crucial cyber advantage for the UK and its allies. Operating with unwavering commitment to legal and ethical standards, SIS works in close partnership with domestic security agencies, military forces, law enforcement, and international allies, all under strict governmental oversight.

Global intelligence gathering and analysis
Counter-terrorism operations
Disruption of hostile state activities
Security & Intelligence Agency (SOA) - Croatia
Free

Security & Intelligence Agency (SOA) - Croatia View Security & Intelligence Agency (SOA) - Croatia

The Security and Intelligence Agency (SOA) of Croatia is the nation's principal security and intelligence service, with a dedicated focus on advancing Cyber Security and Information Security. SOA collaborates extensively with national authorities and international partners to proactively prevent and effectively counter cyber threats. The agency plays a vital role in national cyber defense through active participation in key bodies like the National Council for Cyber Security, ensuring robust monitoring and strategic response to cyber crises.

National Cyber Security Strategy and Implementation
Information Security and Data Protection
International Cooperation on Cyber Threats
Security & Intelligence Division (SID) - Singapore
Free

Security & Intelligence Division (SID) - Singapore View Security & Intelligence Division (SID) - Singapore

The Security & Intelligence Division (SID) of Singapore is the nation's premier agency dedicated to safeguarding its sovereignty and strategic interests from external threats. SID delivers critical, actionable intelligence and in-depth assessments to guide Singaporean government bodies and decision-makers, enabling informed policy formulation and proactive defense strategies.

Protection against external threats
Safeguarding national interests
Providing timely and accurate intelligence