Home / Threat Intelligence and Detection / Open Source Intelligence (OSINT)

Open Source Intelligence (OSINT)

Unlock insights with OSINT. Discover open-source data for threat intelligence and detection.

Try these 202 AI Open Source Intelligence (OSINT) Tools

Security Weekly
Free

Security Weekly View Security Weekly

Security Weekly is a premier source for in-depth IT security news, vulnerability analysis, hacking techniques, and cutting-edge research. Leveraging innovative technologies, we aim to educate and empower a global audience of aspiring and established security professionals. With 11 years of experience and recognized by RSA as a 5-time winner for Best Security Podcast, we deliver critical security intelligence through our comprehensive blog, engaging podcasts, informative webcasts, and dynamic Internet TV.

Expert-led IT security news and analysis
In-depth coverage of vulnerabilities and hacking
Original cybersecurity research and insights
SecurityLoophole
Free

SecurityLoophole View SecurityLoophole

SecurityLoophole is a premier global cybersecurity news platform dedicated to keeping you informed about the rapidly evolving threat landscape. Our international team of editors provides real-time coverage of critical updates, emerging threats, significant data breaches, vulnerabilities, and innovative security technologies. Stay ahead of the curve with expert insights and comprehensive reporting on all aspects of digital security.

Global Cybersecurity News Coverage
Real-time Updates on Threats and Breaches
In-depth Reporting on Vulnerabilities
Sentryc
Free

Sentryc View Sentryc

Sentryc offers an advanced, automated solution for comprehensive online brand protection across marketplaces and social media platforms. Designed for efficiency and clarity, our software empowers businesses to monitor their brands globally, identify infringing products, and combat online piracy with precision. Benefit from unparalleled transparency into suspicious online offers, ensuring cost-effective, 24/7 protection and maintaining your brand's integrity in the digital landscape.

Automated Marketplace Monitoring
Social Media Brand Tracking
Product Piracy Detection
ShadowDragon
Free

ShadowDragon View ShadowDragon

ShadowDragon delivers advanced digital investigation tools designed by experienced cyber investigators to streamline complex inquiries across the open, deep, and dark web. Our solutions empower in-house teams by enabling the secure and efficient collection, correlation, and verification of diverse online artifacts, significantly enhancing investigative capabilities. Trusted by hundreds of Fortune 500 companies, law enforcement, government, military, and intelligence agencies globally, ShadowDragon simplifies multi-environment investigations.

Streamlined digital investigation workflows
Secure collection of online artifacts
AI-powered data correlation and analysis
Shadowserver Foundation
Free

Shadowserver Foundation View Shadowserver Foundation

The Shadowserver Foundation is a dedicated, volunteer-driven organization comprised of seasoned cybersecurity professionals. We actively collect, track, and report on global malware, botnet operations, and computer fraud to enhance internet security. By providing timely intelligence and raising awareness about compromised systems and malicious activities, Shadowserver empowers the security community to proactively defend against emerging threats.

Malware and Botnet Tracking
Computer Fraud Reporting
Compromised Server Awareness
Siren
Free

Siren View Siren

Siren empowers leading Law Enforcement, National Security, and Cyber Threat investigators with its advanced Investigative Intelligence Platform. By seamlessly integrating search, business intelligence, and link analysis with big data operational logging and alerting, Siren enables rapid identification of cyber threats within vast datasets. Its unique capability for large-scale data joins via Elasticsearch technology provides unprecedented insights, allowing users to distinguish urgent threats from important ones, prioritize actions, and proactively neutralize threats by identifying bad actors before they can cause damage.

Investigative Intelligence Platform
Advanced Search and Link Analysis
Big Data Operational Logging and Alerting
SITE Intelligence Group
Free

SITE Intelligence Group View SITE Intelligence Group

For over 20 years, SITE Intelligence Group has been a premier provider of actionable intelligence on terrorist and violent extremist online networks. Leveraging unparalleled expertise in open-source intelligence, SITE delivers critical insights for attack mitigation, threat actor identification, investigation, and prosecution. Their extensive, human-verified archive of specialized data covers cyber threats and the technological use by extremist organizations, offering early warning and proven results in combating global threats.

Actionable intelligence on terrorist and violent extremist online networks
Support for attack mitigation, identification, investigation, and prosecution
Early warning analysis and intelligence gathering
Sixteenth Air Force (Air Forces Cyber) - USA
Free

Sixteenth Air Force (Air Forces Cyber) - USA View Sixteenth Air Force (Air Forces Cyber) - USA

The Sixteenth Air Force (Air Forces Cyber) is the U.S. Air Force's designated Information Warfare Numbered Air Force, integrating critical cyber, ISR, electronic warfare, and information operations capabilities. This command champions the strategic use of information across all conflict phases, ensuring dominance in competition and warfare by creating decisive dilemmas for adversaries. As the Service Cryptologic Component, Sixteenth Air Force actively collaborates with the NSA/CSS, leading Air Force cryptologic activities for both tactical warfighting and national-level operations.

Integrated Information Warfare capabilities
Multisource Intelligence, Surveillance, and Reconnaissance (ISR)
Cyber Warfare operations and integration
Skurio
Free

Skurio

Skurio, formerly RepKnight, delivered powerful, cloud-based solutions designed to proactively identify external threats and detect data breaches beyond the corporate network. By automating responses, Skurio empowered organizations to effectively mitigate risks and minimize financial losses, offering security professionals unparalleled visibility into surface, social, deep, and Dark Web risks from an 'outside-in' perspective. Although Skurio ceased operations in 2024, their legacy includes extensive experience in digital risk intelligence.

Cloud-based threat identification and data breach detection
Automated response capabilities for risk mitigation
External visibility across surface, social, deep, and Dark Web
Social-Engineer
Free

Social-Engineer View Social-Engineer

Social-Engineer is a premier global leader in human-to-human social engineering, specializing in uncovering and mitigating security vulnerabilities through scientifically proven methodologies. We empower organizations by educating their employees, the primary target of cyber threats, through interactive training and managed service programs like Vishing, Phishing, and SMiShing assessments to foster a robust security posture. Our expertise in the attacker mindset equips your team to proactively protect critical assets and navigate the evolving threat landscape.

Expert-led social engineering services
Vishing, Phishing, and SMiShing assessments
Interactive security awareness training
SpecterOps
Free

SpecterOps View SpecterOps

SpecterOps leverages deep adversary intelligence to deliver elite-level cybersecurity assessments and solutions, safeguarding organizations against sophisticated threats. Our seasoned experts provide comprehensive technical assessments, independent testing, and operational support, enhancing your security posture and resilience. We are dedicated to advancing defensive strategies through cutting-edge training in Adversary Tactics, Techniques, and Procedures, actively shaping industry standards in threat simulation and hardening.

Expert Adversary Simulation and Analysis
Comprehensive Defensive Posture Assessment
Attack Path Identification and Remediation
SpoofGuard
Free

SpoofGuard View SpoofGuard

SpoofGuard is an automated solution protecting organizations against sophisticated online threats like phishing, typosquatting, and brand impersonation. Our platform delivers high-accuracy threat detection by continuously monitoring for newly registered lookalike domains and analyzing suspicious patterns, encompassing brand and logo spoofing, WHOIS data, SMTP servers, and web port activity. Spoofguard streamlines the entire defense lifecycle, from proactive monitoring to swift takedown enforcement, integrating seamlessly via a robust REST API for MSSPs and cybersecurity vendors seeking to expand their threat defense capabilities.

Automated Domain Monitoring
Phishing & Typosquatting Detection
Brand & Logo Spoofing Analysis
SpyCloud
Free

SpyCloud View SpyCloud

SpyCloud is the global leader in preventing account takeover (ATO) and data breaches, safeguarding billions of consumer and employee accounts. Our award-winning solutions leverage the world's largest repository of compromised credentials and PII, recovered from third-party breaches, to proactively detect and neutralize fraud attempts before they impact your organization. By enabling proactive password resets and offering deep visibility into data exposures, SpyCloud empowers enterprises to disrupt criminal profit motives and fortify their digital defenses.

Account takeover (ATO) prevention
Protection of consumer and employee accounts
Largest repository of compromised credentials and PII
StealthMole
Free

StealthMole View StealthMole

Exploit unparalleled deep and dark web intelligence with StealthMole's unified cloud platform. Our elite team of white hackers, forensic experts, and OSINT specialists leverage AI-driven insights for digital investigation, risk assessment, and proactive threat monitoring. We empower governments, law enforcement, and enterprises to uncover hidden threats and neutralize cybercrime with precision.

AI-Powered Threat Intelligence
Deep & Dark Web Monitoring
Digital Investigation Platform
Styx Intelligence
Free

Styx Intelligence View Styx Intelligence

Styx Intelligence offers a comprehensive platform for proactive threat defense and risk management across your digital ecosystem. Gain unparalleled visibility into your public attack surface and monitor digital assets across the surface, deep, and dark web, including social media, news, forums, and online marketplaces. Our solution empowers you to identify exposures, support swift remediation, and effectively manage risks associated with cyber, privacy, regulatory compliance, third-party dependencies, and brand reputation.

Comprehensive Public Attack Surface Monitoring
Deep & Dark Web Asset Discovery
Multi-Channel Threat Intelligence (Social, News, Forums, Marketplaces)
Techmeme
Free

Techmeme View Techmeme

Techmeme is the premier online news aggregation service exclusively dedicated to cutting-edge technology. We deliver a concise, daily digest of the most critical reports and expert analysis across the tech landscape, including cybersecurity, making us the definitive source for technology news.

Curated leading-edge technology news
Daily summary of essential reports
In-depth analysis from industry experts
Technisanct
Free

Technisanct View Technisanct

Technisanct empowers government agencies, including Law Enforcement and Defence, by providing advanced solutions for threat monitoring, data management, and forensic analysis. Leveraging big data and artificial intelligence, we combat cyber threats, misinformation, privacy violations, and data breaches. Our core offering, Integrite, is a powerful breach detection engine integrated with automated global crawlers and data funnels, delivering actionable intelligence for critical decision-making.

Advanced threat monitoring and intelligence
Comprehensive data management solutions
Specialized forensic analysis capabilities
ThaiCERT
Free

ThaiCERT View ThaiCERT

ThaiCERT serves as Thailand's national Computer Security Incident Response Team (CSIRT), acting as the primary official contact for addressing cyber security incidents within the Thai internet community. As the nation's sole non-profit CSIRT, ThaiCERT operates under the Electronic Transactions Development Agency (ETDA) and collaborates extensively with government bodies, academic institutions, ISPs, and other key organizations nationwide to effectively mitigate security threats. By actively participating in global and regional networks like FIRST and APCERT, ThaiCERT ensures seamless coordination with international CSIRTs for comprehensive incident response capabilities.

National CSIRT for Thailand
Official point of contact for cyber incidents
Non-profit operational status
The Hacker News (THN)
Free

The Hacker News (THN) View The Hacker News (THN)

The Hacker News (THN) is a premier, globally recognized cybersecurity news platform serving over 8 million monthly readers, including IT professionals, researchers, hackers, and technologists. THN delivers breaking cybersecurity news, in-depth analyses of emerging Infosec trends, and forward-looking insights shaping the cyber landscape. Beyond digital content, THN fosters community and knowledge exchange through impactful in-person meetups, conferences, and events.

Daily cybersecurity news updates
In-depth analysis of cyber trends
Expert insights from industry leaders
The Security Bulldog
Free

The Security Bulldog View The Security Bulldog

The Security Bulldog empowers security professionals to proactively manage their attack surfaces with an advanced machine learning platform. It intelligently synthesizes vast open-source cyber intelligence, tailored to your specific role, team, and industry. By bridging information gaps with curated, relevant data, Security Bulldog enables faster threat comprehension, informed decision-making, and accelerated detection and response capabilities, transforming how organizations secure their web presence.

Proprietary Machine Learning Engine
Comprehensive Open-Source Intelligence Aggregation
Role, Team, and Industry Customization
ThingsRecon
Free

ThingsRecon View ThingsRecon

ThingsRecon provides comprehensive visibility into an organization's digital footprint, offering deep contextual data and proximity insights for effective attack surface management. Empowering security teams to identify, prioritize, and mitigate cyber risks, ThingsRecon enables threat-informed decision-making by mapping asset significance and supplier risk. Continuously discover and manage your external attack surface, uncover vulnerabilities, and assess third-party cyber hygiene to enhance resilience and meet evolving compliance demands.

Comprehensive Digital Ecosystem Mapping
Context-Rich Asset Data and Proximity Insights
Cyber Risk Identification and Prioritization
Threat Intelligence
Free

Threat Intelligence View Threat Intelligence

Threat Intelligence is a premier security firm renowned for its cutting-edge penetration testing, incident response, and comprehensive training services. Our elite team of experts, with a proven track record of developing custom attack techniques for leading security companies and significant contributions to OWASP projects like the OWASP Top 10 and Application Security Verification Standard, delivers innovative and high-quality security solutions tailored to your specific needs. We are committed to achieving your security objectives through a streamlined engagement process and unparalleled expertise in offensive security and cybersecurity law.

Advanced Penetration Testing Services
Custom Attack Technique Development
Expert Incident Response
ThreatNG Security
Free

ThreatNG Security View ThreatNG Security

ThreatNG Security offers a transformative External Attack Surface Management (EASM) and Digital Risk Protection platform designed to proactively identify and neutralize both technical and business threats across the open, deep, and dark web. By comprehensively harvesting and analyzing diverse data sources including technical, financial, administrative, personnel, news, and chatter, ThreatNG provides an unparalleled, holistic view of an organization's complete external attack surface. This enables businesses to move beyond traditional perimeters and secure their digital footprint against evolving cyber threats.

Comprehensive External Attack Surface Management (EASM)
Proactive Digital Risk Protection
Dark, Deep, and Open Web Threat Intelligence
Tracer
Free

Tracer View Tracer

Tracer delivers next-generation brand protection across Web2 and Web3, proactively identifying and neutralizing brand abuse. Our proprietary Human-in-the-Loop AI platform accelerates enforcement timelines by automating review workflows and providing intelligent recommendations via the TracerAI Engine and expert data analysts. This powerful hybrid approach, combining AI-driven detection with human expertise, ensures rapid and effective brand integrity management.

End-to-end brand abuse detection and enforcement
Web2 and Web3 channel coverage
Human-in-the-Loop AI for accelerated workflows