Best Free OSINT Tools for Investigations & Cybersecurity:
- Maltego (Community Edition)
- theHarvester
- Shodan (Free Tier)
- SpiderFoot
- Recon-ng
- OSINT Framework
- Google Dorks
- Have I Been Pwned
- Social Searcher
- Wayback Machine
Maltego is a powerful link analysis tool that helps visualize relationships between people, domains, IP addresses, and organizations. The community edition offers essential OSINT features for free.
Used in: Cyber investigations, digital forensics, threat intelligence.
theHarvester is a popular reconnaissance tool used to gather emails, subdomains, IPs, and usernames from public sources and search engines.
Used in: Penetration testing, domain reconnaissance, bug bounty research.
Shodan is known as the search engine for internet-connected devices. The free tier allows limited searches to identify exposed servers, cameras, and IoT devices.
Used in: Network security research, vulnerability assessment.
SpiderFoot automates OSINT collection by scanning IPs, domains, emails, and usernames across hundreds of data sources.
Used in: Threat intelligence, attack surface analysis.
Recon-ng is a full-featured reconnaissance framework written in Python. It offers modular OSINT data gathering similar to Metasploit.
Used in: Penetration testing, cybersecurity research.
OSINT Framework is a web-based collection of free OSINT tools and resources categorized for easy investigation.
Used in: Research, journalism, cyber investigations.
Google Dorking uses advanced search operators to uncover sensitive files, exposed directories, and indexed information.
Used in: Security research, information discovery.
This free tool allows users to check whether emails or domains have been exposed in data breaches.
Used in: Breach monitoring, personal security checks.
Social Searcher enables real-time monitoring of social media content and user mentions across platforms.
Used in: Social media investigations, brand monitoring.
The Wayback Machine allows users to view archived versions of websites, which is useful for tracking deleted or modified content.
Used in: Historical website analysis, investigative journalism.