OSINT Tools Directory — Programs, Scripts & GitHub Repos

Last updated:

Curated directory of 80+ open-source intelligence tools, Python scripts, CLI programs, and GitHub repositories for research and investigations. All linked, categorized, and actively maintained.

⚠️
Technical Content — Not for Every Researcher
Most tools listed here require command-line / terminal experience, Python or Go installation, and familiarity with GitHub. If you're new to OSINT, start with the browser-based tools in our Search Engine Directory or the Dork Generator before diving into these. Tools marked WEB or BROWSER are beginner-friendly.

🛠️OSINT Tools0 tools

What Are the Most Important OSINT Tools in 2026?

OSINT tools have evolved from simple scripts into reconnaissance platforms used by 82% of cybersecurity professionals (SANS 2024 OSINT Survey). The global OSINT market is projected to reach $29.19 billion by 2029 (MarketsandMarkets). This directory catalogs the most actively maintained tools by category.

Reconnaissance Frameworks

Full-stack recon frameworks like SpiderFoot, Maltego, and Recon-ng automate the process of gathering intelligence from hundreds of data sources simultaneously. SpiderFoot scans IPs, domains, emails, and usernames across 200+ modules with a web GUI. Maltego provides powerful visual link analysis — mapping relationships between entities that would be invisible when examining data separately. reconFTW chains together 50+ tools to perform comprehensive domain reconnaissance in a single command.

FrameworkSourcesInterfaceBest For
SpiderFoot200+ modulesWeb GUIAutomated broad reconnaissance
MaltegoTransforms + HubDesktop (Java)Visual link analysis, relationship mapping
Recon-ngMarketplace modulesCLI (Python)Modular, scriptable recon workflows
reconFTW50+ chained toolsCLI (Bash)Full-auto domain reconnaissance

Username & Social Media OSINT

Sherlock and Maigret are the two dominant username enumeration tools. Sherlock checks 400+ platforms quickly and simply. Maigret goes deeper — checking 2,500+ sites and extracting profile data to build comprehensive dossiers. WhatsMyName provides a web-based alternative. For platform-specific analysis, Instaloader downloads Instagram content with metadata, Toutatis extracts private Instagram data via API, and Osintgram provides a full Instagram reconnaissance toolkit.

Email & Phone Intelligence

Holehe checks whether an email is registered on 120+ platforms by probing password reset functions. theHarvester gathers emails, subdomains, and hosts from 30+ public sources. GHunt provides offensive Google account investigation. For phone numbers, PhoneInfoga scans international numbers for carrier, location, and VoIP data, while Ignorant checks phone number registration across platforms.

Domain & Infrastructure

OWASP Amass — part of the OWASP (Open Worldwide Application Security Project) suite — performs deep subdomain enumeration using DNS, web scraping, APIs, and machine learning. Subfinder handles passive subdomain discovery. httpx probes discovered hosts for status codes, titles, and technology detection. Nuclei scans for vulnerabilities using community-maintained templates. Shodan and Censys index internet-connected devices globally, revealing exposed servers, webcams, and industrial systems. These tools are often chained together: subfinder | httpx | nuclei.

Metadata, Geolocation & Scraping

ExifTool, created by Phil Harvey, is the industry standard for extracting metadata from over 400 file formats from images, PDFs, and documents — including GPS coordinates, timestamps, and device information. Metagoofil extracts metadata from documents found on target domains. FOCA maps network infrastructure from document metadata. For geolocation, Creepy gathers location data from social media, while GeoSpy uses AI to estimate photo locations. Web scraping frameworks like Scrapy and Playwright enable custom data extraction at scale.

Building an OSINT Workflow

Effective OSINT investigations chain multiple tools together. A typical workflow might begin with email enumeration (Holehe, theHarvester), expand to username discovery (Sherlock, Maigret), map the target's digital infrastructure (Amass, Shodan), extract metadata from discovered content (ExifTool, Metagoofil), and visualize connections (Maltego). Use the Dork Generator for advanced search queries, the Search Engine Directory for multi-engine coverage, and the News & Media Archives for journalistic sources.

OSINT Tools — Frequently Asked Questions

What are the best free OSINT tools for beginners?

Start with web-based tools that require no installation: OSINT Framework (resource directory), Shodan (device search), and Have I Been Pwned (breach checks). Then progress to CLI tools: Sherlock (username search), theHarvester (email/domain recon), and Wappalyzer (browser extension for tech detection). SpiderFoot and Maltego Community Edition offer graphical interfaces for those not comfortable with command lines.

Do I need Python to use these tools?

Many tools require Python 3.8+ and pip. Some (like Amass, Subfinder, httpx) are written in Go and distributed as standalone binaries. Browser extensions (Wappalyzer, Mitaka) need no programming. Web-based tools (Shodan, Censys, Have I Been Pwned) work from any browser. If you're learning, install Python first and start with pip-installable tools like Sherlock and Holehe.

What is the difference between Sherlock and Maigret?

Both search for usernames across social media, but Maigret checks 2,500+ sites (vs Sherlock's 400+) and extracts detailed profile information from web pages. Sherlock is faster and simpler. Maigret builds comprehensive dossiers with extracted data. Many investigators use both — Sherlock for quick checks and Maigret for deep investigations.

Are these OSINT tools legal to use?

OSINT tools that collect publicly available information are generally legal. However, how you use the data may be subject to local privacy laws (GDPR, CCPA, etc.). Some tools access data in gray areas. Always ensure you have proper authorization, follow applicable laws, and use tools responsibly. Never access private systems or data without explicit permission.

How do I chain OSINT tools together?

Most CLI tools accept piped input. A common domain recon chain: subfinder -d target.com | httpx -silent | nuclei. For people investigations: start with Holehe (email → platforms), then Sherlock/Maigret (username → profiles), then ExifTool (image metadata → geolocation). reconFTW automates 50+ tools in a single workflow. Maltego and SpiderFoot provide GUI-based tool chaining with visual output.