> offensive-osint

offensive-osint skill from SnailSploit/Claude-Red

fetch
$curl "https://skillshub.wtf/SnailSploit/Claude-Red/offensive-osint?format=md"
SKILL.mdoffensive-osint

SKILL: OSINT Tools

Metadata

Description

Practical OSINT checklist: domain recon, email harvesting, social media profiling, GitHub/code leaks, Shodan/Censys enumeration, breach data lookup, employee profiling, and infrastructure mapping. Use for bug bounty recon, red team intelligence gathering, or corporate OSINT.

Trigger Phrases

Use this skill when the conversation involves any of: OSINT, reconnaissance, domain recon, email harvesting, Shodan, Censys, GitHub recon, breach data, employee profiling, infrastructure mapping, corporate OSINT

Instructions for Claude

When this skill is active:

  1. Load and apply the full methodology below as your operational checklist
  2. Follow steps in order unless the user specifies otherwise
  3. For each technique, consider applicability to the current target/context
  4. Track which checklist items have been completed
  5. Suggest next steps based on findings

Full Methodology

OSINT Tools

  • Bookmarks: Comprehensive list of various OSINT bookmarks.
  • OSINT Framework: A comprehensive collection of OSINT tools and resources.

General OSINT

Search Engines

Username and Email Investigation

People Search

  • WhitePages: Find people and contact information
  • TruePeopleSearch: Free people search in the U.S.
  • Pipl: Deep web people search (Note: primarily a paid service).
  • Spokeo: People search engine.
  • Webmii: People search engine
  • Clearbit: Data enrichment for companies and individuals.
  • FaceCheck: Find people by their picture
  • FaceSeek: another reverse search for faces

Social Media

  • Search4Faces: search for a face in social media.
  • Picuki: View Instagram profiles and posts without an account.
  • snscrape: Actively‑maintained CLI scraper for X/Twitter, Reddit, Telegram, and more. Prefer this over Twint.
  • Twint (unstable; breaks when APIs change) — use only if snscrape cannot cover a need.
  • Social Blade: Analytics for YouTube, Twitch, Instagram, and more.
  • Facebook Graph Search: Advanced Facebook search techniques.
  • Facebook Friends: graph search alternative
  • Facebook ID Lookup: to find ID of a user on Facebook
  • Facebook Search: searching for posts
  • Meta Content Library: Researcher‑gated content search (CrowdTangle successor)
  • Tokboard: TikTok trend and profile analytics (APIs change frequently)
  • Reveddit: View removed Reddit content for context
  • RedTrack.social: Reddit user analysis and post history tracking
  • Threads by Instagram: Use Instagram OSINT tools; Threads shares Instagram account infrastructure
  • Bluesky/AT Protocol:
    • Firesky: Real-time firehose monitoring for keywords/hashtags
    • SkyView: Follower graphs and network analysis
    • Bluesky Directory: User directory and starter pack discovery
  • Mastodon/Fediverse:

Phone Number

Public Records and Company Information

Leaks

Cryptocurrency OSINT

Blockchain Analysis

  • Blockchain.com Explorer: Bitcoin and crypto search engine
  • Etherscan: Ethereum blockchain explorer
  • BSCScan: BNB Smart Chain explorer
  • PolygonScan: Polygon PoS blockchain explorer
  • OKLink [Freemium]: Multichain explorer and analytics
  • Cielo: Multi-chain wallet tracking (EVM, Bitcoin, Solana, Tron, etc)
  • Blockchair: Bitcoin block explorer
  • Solscan: Solana blockchain explorer
  • Dune: Analytics platform to query blockchain data
  • MetaSuites: Chrome extension for additional data on block explorers
  • Impersonator: Chrome extension to spoof login to dApps

Layer 2 / Rollup Explorers

Wallet Investigation

Transaction Tracking

  • Whale Alert: Track large crypto transactions
  • BitQuery: Blockchain data analysis and APIs
  • GraphSense: Cryptocurrency analytics platform
  • CipherTrace: Cryptocurrency intelligence
  • TRM: Create graphs for addresses/transactions
  • Arkham: Multichain block explorer, entity labels, graphs, alerts
  • MetaSleuth: Similar to TRM but intended for retail users
  • CryptoTaxCalculator: Track PNL for an address
  • Breadcrumbs [Freemium]: Visual graphing and labeling for crypto flows
  • Bubblemaps: Holder concentration visualization; identify whale clusters
  • Token Sniffer: Honeypot and scam token detection
  • Dextools: DEX trading analysis and charts
  • Nansen: On-chain analytics with Smart Money labels (paid; expensive)

Bridge Monitoring

NFT Analysis

  • OpenSea: NFT marketplace explorer
  • NFTScan: Multi-chain NFT explorer
  • Nansen: NFT analytics platform
  • DappRadar: Track NFT sales and marketplace activity
  • Reservoir [Freemium]: Unified NFT metadata and market data API
  • Alchemy NFT API [Freemium]: NFT metadata and ownership APIs

Exchange Intelligence

Media Intelligence

Image Analysis

Browser Extensions

Video Analysis

Metadata Extraction

GeoSpatial Intelligence

Satellite Imagery and Mapping

Tools and Applications

Street View

Flight OSINT

Maritime OSINT

AI‑Assisted OSINT Platforms

Commercial/Enterprise AI Tools

  • Cylect: AI‑powered entity extraction and link‑analysis workspace
  • Fivecast Matrix: Generative‑AI triage and risk scoring for large social‑media datasets
  • Recorded Future: AI-driven threat intelligence and entity tracking
  • DarkOwl Vision: AI-powered darknet data collection and analysis

AI-Powered Analysis

[!WARNING] Never paste PII, sensitive IOCs, or unique pivots into cloud LLMs; they log inputs and may use for training. Prefer local models (Ollama, LM Studio) for sensitive analysis.

  • OpenAI ChatGPT [Paid for Advanced Data Analysis]: Parse logs, analyze datasets, geo-inference, timeline reconstruction
    • Code Interpreter: Upload CSVs, logs, JSON for automated analysis
    • GPT-4 Vision: Image analysis, OCR, visual geolocation hints
    • Warning: OpenAI logs all inputs; do not use for sensitive cases
  • Anthropic Claude [Paid for Claude 3.5 Sonnet]: Long context (200K tokens) for processing large document dumps, report synthesis
    • Claude Artifacts: Generate interactive visualizations and tools
    • Warning: Anthropic logs prompts; sanitize before use
  • Google Gemini:
    • Gemini 1.5 Pro: 2M token context (largest available); good for massive log analysis
    • Deep Research mode: Multi-step research automation with citations
    • Warning: Google integration risk; assume correlation with search/Gmail data
  • Perplexity Pro [Paid]: Real-time web search + reasoning; excellent for context pivots and background research
    • Focus mode: Academic, Reddit, YouTube, or general web
    • Pro search: Deep research with multi-query synthesis
  • Microsoft Copilot: Bing-integrated search; good for generic queries
  • Local LLM alternatives (privacy-preserving):
    • Ollama: Run Llama 3, Mistral, Qwen locally
    • LM Studio: GUI for local model inference
    • GPT4All: Privacy-focused local LLM runner

Specialized AI OSINT Tools

Archiving & Snapshots

  • archive.today: One‑page content archiver with screenshot capability
  • Memento Timemap: Aggregate index of web archives for any URL
  • URLScan.io: On‑demand webpage scan with full resource map and screenshot
  • Wayback SavePageNow API v3: On‑demand archiving with submission status and job IDs
  • WACZ packaging (Webrecorder): Portable, verifiable web archives for replay
  • ArchiveBox: Self-hosted web archiving; captures HTML, PDF, screenshots, media
  • SingleFileZ: Browser extension for offline single-file HTML archives
  • Hunchly: Evidence capture tool for investigators (paid)
  • Kasm Workspaces: Containerized OSINT workspace images (browser isolation)

Automation & Workflows

  • n8n: Self-hosted workflow automation for OSINT pipelines (e.g., monitor RSS → scrape → alert)
  • Huginn: Agent-based automation for monitoring, scraping, alerting
  • Cronicle: Distributed task scheduler for recurring OSINT jobs
  • Apache Airflow: Workflow orchestration for complex data pipelines
  • Prefect: Modern workflow orchestration; easier than Airflow

Additional Tools

IP and Network Analysis

ASN/BGP & Internet Measurement

Certificates & CT Monitoring

Social Media Intelligence

  • Discord ID: Basic Discord account information
  • TelegramDB Search Bot: Basic Telegram OSINT
  • TGStat: Channel statistics and message search
  • Bluesky explorers (e.g., SkyView), Mastodon handle/instance resolvers

Telegram & Messaging Analytics

  • TGStat: Channel analytics and search
  • Telemetr: Channel growth, overlaps, forwards
  • Combot: Group analytics (partially paid)
  • t.me/s/<channel>: Public channel feed view (replace with channel name)
  • WeChat OA search via Sogou Weixin: Search WeChat Official Accounts content

Infrastructure & Attack‑Surface OSINT

  • Shodan: Search engine for internet‑connected devices and services
  • Censys: Enumerate hosts and digital certificates across the internet
  • GreyNoise: Distinguish background internet noise from targeted scans
  • SecurityTrails: Passive DNS records and asset discovery
  • SpiderFoot: Automated OSINT reconnaissance and correlation (self‑host or SaaS)
  • theHarvester: Subdomain, email, and metadata harvesting
  • Recon‑ng: Web‑based recon framework
  • BuiltWith: Tech stack enumeration; useful for pivoting to third‑party assets
  • Netlas: Large‑scale HTTP/DNS/certificates pivots
  • Amass / Subfinder [Free]: Passive subdomain discovery (use responsibly)
  • RiskIQ PassiveTotal: Passive DNS/cert/host pivots

Threat Intel & IOCs

Malware Analysis & Sandboxes

RU/CN Corporate & Registries

Regional Search Engines

Sanctions & Compliance

Automation & Headless Browsing

Evidence Handling

  • Capture URLs, timestamps, and page snapshots (PNG + WARC/SingleFileZ) for every key artifact.
  • Hash downloaded files (SHA‑256) and record in your case notes.
  • Avoid cross‑contamination: separate work profiles/containers per case; store evidence read‑only.
  • Prefer JSONL (NDJSON) logs with a run_id and tool versions for reproducibility.

┌ stats

installs/wk0
░░░░░░░░░░
github stars12
██░░░░░░░░
first seenMar 18, 2026
└────────────

┌ repo

SnailSploit/Claude-Red
by SnailSploit
└────────────