Skip to main content
The OSINT Bible 2026 is a curated reference for investigators, journalists, security researchers, and threat intelligence professionals who need to gather intelligence from public sources. This guide covers the full spectrum of open-source intelligence — from fundamental concepts to advanced automation — with a focus on responsible and ethical practice.
All information, tools, and methodologies in this guide are intended solely for educational, research, and lawful investigative purposes. You must respect privacy rights, comply with applicable laws, and obtain necessary permissions before conducting any investigation. Misuse for illegal activities, harassment, or privacy violations is strictly prohibited.

What’s inside

Methodology

Learn the 4-step OSINT investigation process and the professional 5-phase intelligence cycle used by practitioners worldwide.

Search & Discovery

Master Google Dorks, alternative search engines, social network investigation tools, and username enumeration techniques.

Technical Intelligence

Explore domain/IP/DNS analysis, network scanning, metadata extraction, and web scraping methodologies.

Specialized OSINT

Deep dives into geolocation, people investigations, company research, email/phone tracing, and data breach analysis.

Advanced Topics

AI-powered OSINT, blockchain tracing, transport tracking, dark web research, WiFi wardriving, and content verification.

Frameworks & Automation

All-in-one OSINT frameworks, Python automation scripts, and Maltego workflows for professional investigations.

Legal & Ethics

International legal frameworks, GDPR compliance, and the ethical checklist every OSINT practitioner needs.

Learning Resources

Books, certifications, courses, and communities to deepen your OSINT knowledge.

Core concepts

ConceptDefinition
OSINTIntelligence obtained from public sources without violating logical or physical access
OPSECMinimize footprint: VPN → VM → alias → metadata strip
Intelligence CycleDirection → Collection → Processing → Analysis → Dissemination
PIIInformation that identifies: email, phone, RFC, CURP, IP, IMEI, MAC
Primary SourceOriginal publication (tweet, official PDF, photo EXIF)
Secondary SourceArticle citing the primary — always validate

Quick reference: data types and star tools

Data TypeUsual LocationStar Tool
NameLinkedIn, FacebookMaigret
EmailData breaches, newslettersHIBP
PhoneWhatsApp Business, TrueCallerInfobel
UsernameForums, gaming, GitHubSnoop
PhotoGeolocation, EXIFExifTool
DomainWHOIS, certificatesAmass
IPScanning, ShodanShodan
Crypto walletBlockchain explorersBlockCypher
Start with the Methodology page to understand the structured approach before diving into specific tools.

Build docs developers (and LLMs) love