The Playbook
A practical OSINT methodology handbook for offensive and defensive security professionals — pentesters, bug bounty hunters, SOC analysts, threat intel, and blue teamers.
What's inside (preview)
- Tool inventory: 50+ tools across investigation hubs, search and infrastructure, social/mobile, media forensics, and commercial platforms.
- The modern OSINT operating model: requirement → seed → collection → normalization → enrichment → verification → analysis → evidence package.
- Practical workflows: identity OSINT for security investigations, offensive security recon, defensive threat-actor attribution, brand monitoring, geolocation, deepfake/synthetic media triage.
- Jurisdictional and legal constraints: CFAA, GDPR, FCRA, platform-contract patterns.
- Templates: evidence log, chain-of-custody, reporting format, query library, automation control sheet.
- Three case studies on safe synthetic targets — no real engagement material.
Pre-launch waitlist
Subscribers get a launch discount and a free excerpt: the OSINT tool comparison matrix and query library.