OSINT Investigator

Version License Status Commands Files

The most comprehensive, accessible, and powerful OSINT skill for AI agents.
Investigate people, domains, and organizations using only publicly available information.

πŸš€ Quick Start β€’ ✨ Features β€’ πŸ“š Commands β€’ πŸ“– Docs β€’ 🎯 Examples

---

🌟 What Makes This Special

πŸ‘΄ Senior-Friendly πŸŽ“ Beginner-Approved πŸ’Ό Professional-Grade
Your 65-year-old dad can use it Step-by-step wizards guide you 40+ commands, risk scoring, reports
### 🎯 Three Ways to Investigate ```bash # 🟒 THE EASY BUTTON - Run everything automatically /full example.com # 🟑 GUIDED MODE - Step-by-step wizard /wizard person # πŸ”΅ POWER MODE - Granular control /recon target β†’ /pivot data β†’ /risk-assessment ``` ---

πŸš€ Quick Start

### Installation ```bash # Clone or download # Extract to your AI agent's skills directory # Start investigating immediately - no API keys needed! ``` ### Your First Investigation ```bash # πŸ”₯ The fastest way - everything at once /full example.com # πŸŽ“ The easiest way - guided wizard /wizard person # πŸ“Š Get a simple, easy-to-understand report /simple-report ``` ---

✨ Features

### πŸ—οΈ Core Infrastructure | Feature | Description | Command | |---------|-------------|---------| | πŸ’Ύ **Session Management** | Save/load investigations | `/save`, `/load`, `/list-saves` | | πŸ”— **Entity Tracking** | Versioned entities with relationships | Automatic | | πŸ“‹ **Evidence Chains** | Track how you know what you know | Automatic | | ⚠️ **Contradiction Detection** | Auto-flag conflicting info | Automatic | ### 🧠 Intelligence Engine | Feature | Description | Command | |---------|-------------|---------| | πŸ” **Pattern Recognition** | Detect username obfuscation, temp emails | Automatic | | 🎯 **Auto-Correlation** | Smart pivot suggestions | `/pivot` | | πŸ“Š **Risk Scoring** | 1-100 automated risk assessment | `/risk-assessment` | | πŸ• **Historical Analysis** | Archive.org integration | `/history` | ### πŸ“Š Visualization & Reports | Feature | Description | Command | |---------|-------------|---------| | 🎨 **ASCII Graphics** | Entity graphs, timelines, heatmaps | `/visualize` | | πŸ“± **Dashboard** | Real-time investigation overview | `/dashboard` | | πŸ“„ **7 Report Formats** | Executive, Technical, Simple, Legal, etc. | `/report` | | πŸ’Ύ **Multi-Format Export** | JSON, CSV, IOC, GraphML | `/report json` | ### πŸ”§ Specialized Modules | Module | Capabilities | Command | |--------|--------------|---------| | πŸ“„ **Document Intel** | EXIF, PDF metadata, redaction check | `/analyze-doc` | | 🌍 **Geolocation** | GPS extraction, timezone analysis | Location detection | | πŸ” **Breach Intel** | HaveIBeenPwned, paste site monitoring | `/breach-check` | | πŸ•ΈοΈ **Network Analysis** | Social graphs, connection mapping | `/visualize network` | | πŸ“§ **Email Forensics** | Header analysis, SPF/DKIM check | `/analyze-email` | ### 🎯 UX & Accessibility | Feature | Description | Command | |---------|-------------|---------| | 🎚️ **Progressive Disclosure** | Beginner/Intermediate/Expert modes | `/mode` | | πŸ“‹ **Templates** | Due diligence, background check, security audit | `/template` | | πŸ§™ **Wizards** | Step-by-step guided workflows | `/wizard` | | πŸ“– **Glossary** | 100+ OSINT terms explained | `/glossary` | | β™Ώ **Senior-Friendly** | Large text, patient explanations | `/accessibility` | ### βœ… Quality Assurance | Feature | Description | Command | |---------|-------------|---------| | πŸ” **Coverage Analysis** | What you haven't checked yet | `/coverage` | | 🎯 **Gap Detection** | Missing investigation vectors | `/gaps` | | βœ… **Source Verification** | Check if sources are still valid | `/verify-sources` | | πŸ“Š **QA Scoring** | Investigation quality metrics | `/qa-check` | ---

πŸ“š Command Reference

### 🎯 Core Investigation ``` /full [target] # πŸš€ Run EVERYTHING automatically /recon [target] # Full reconnaissance pass /dork [domain] # Security analysis with Google dorks /pivot [data] # Follow a lead (email, username, phone) /timeline [subject] # Build chronological history ``` ### πŸ“Š Reporting ``` /report # Technical intelligence summary /simple-report # Plain-language (8th grade level) /report brief # One-page executive brief /report json # JSON export /report csv # CSV export /report legal # Evidence-focused format /report journalist # Source-citation heavy ``` ### 🧠 Intelligence & Analysis ``` /risk-assessment # Generate risk profile (1-100) /risk-trend # Show risk changes over time /history [url] # View historical snapshots /what-changed [url] # Compare versions /breach-check [email]# Check breach databases /leak-search [term] # Search paste sites ``` ### πŸ“ˆ Visualization ``` /visualize entities # ASCII relationship graph /visualize timeline # Gantt-style timeline /visualize risk # Risk heatmap /visualize network # Connection topology /dashboard # Interactive overview /stats # Investigation statistics ``` ### πŸ” Specialized Analysis ``` /analyze-doc # Document metadata analysis /compare-docs [f1] [f2] # Find differences /redaction-check [pdf] # Verify redactions /analyze-email # Email header analysis ``` ### πŸ’Ύ Session Management ``` /save [name] # Save investigation /load [name] # Load investigation /list-saves # Show saved investigations /compare [s1] [s2] # Compare sessions /status # Check operation status /cancel # Stop current operation ``` ### πŸŽ“ UX & Accessibility ``` /mode beginner|expert # Set complexity level /template list|run|create # Investigation templates /wizard photo|domain|person # Guided workflows /tutorial # First-time guide /glossary # Term definitions /accessibility # Accessibility options /explain [finding] # Explain specific finding ``` ### βœ… Quality Assurance ``` /qa-check # Quality assurance scoring /coverage # Show investigation coverage /gaps # Identify missing areas /verify-sources # Check source validity ``` ---

πŸ“– Documentation

70+ files β€’ 15,000+ lines β€’ Complete coverage

### πŸ“š Essential Reading | πŸ“„ Document | πŸ“ Description | πŸ‘€ For | |-------------|----------------|--------| | [docs/OSINT-BEGINNER-GUIDE.md](docs/OSINT-BEGINNER-GUIDE.md) | Step-by-step tutorial | 🟒 Beginners | | [docs/OSINT-v2.0-RELEASE-NOTES.md](docs/OSINT-v2.0-RELEASE-NOTES.md) | What's new in v2.0 | πŸ”΅ Everyone | | [SKILL.md](SKILL.md) | Complete command reference | πŸ”΅ Everyone | | [docs/advanced-user-guide.md](docs/advanced-user-guide.md) | Power user workflows | πŸ”΄ Experts | | [docs/troubleshooting.md](docs/troubleshooting.md) | FAQ & solutions | 🟒 Beginners | ### πŸ—‚οΈ By Category
πŸ—οΈ Core Systems - [core/entity-schema.json](core/entity-schema.json) - Entity data structure - [core/entity-manager.md](core/entity-manager.md) - Entity management guide - [core/state-manager.md](core/state-manager.md) - Session persistence - [core/evidence-system.md](core/evidence-system.md) - Evidence tracking - [core/contradiction-detection.md](core/contradiction-detection.md) - Conflict detection
🧠 Intelligence Engine - [intelligence/pattern-library.md](intelligence/pattern-library.md) - Pattern definitions - [intelligence/anomaly-detector.md](intelligence/anomaly-detector.md) - Anomaly detection - [intelligence/risk-framework.md](intelligence/risk-framework.md) - Risk assessment - [intelligence/scoring-algorithm.md](intelligence/scoring-algorithm.md) - Scoring formulas - [intelligence/correlation-engine.md](intelligence/correlation-engine.md) - Auto-correlation
πŸ“Š Visualization & Reports - [visualization/ascii-engine.md](visualization/ascii-engine.md) - ASCII graphics - [visualization/dashboard.md](visualization/dashboard.md) - Dashboard design - [reports/template-library.md](reports/template-library.md) - Report templates - [reports/export-formats.md](reports/export-formats.md) - Export specifications - [reports/citation-styles.md](reports/citation-styles.md) - Academic citations
πŸ”§ Specialized Modules - [modules/document-intel.md](modules/document-intel.md) - Document forensics - [modules/breach-intel.md](modules/breach-intel.md) - Breach detection - [modules/geolocation.md](modules/geolocation.md) - Location analysis - [modules/email-forensics.md](modules/email-forensics.md) - Email analysis - [modules/network-analysis.md](modules/network-analysis.md) - Social graphs
🎯 UX & Accessibility - [ux/complexity-levels.md](ux/complexity-levels.md) - Mode specifications - [ux/templates/library.md](ux/templates/library.md) - Investigation templates - [ux/wizards/person-investigation.md](ux/wizards/person-investigation.md) - Guided workflows - [ux/accessibility/glossary.md](ux/accessibility/glossary.md) - 100+ term definitions - [ux/accessibility/senior-friendly.md](ux/accessibility/senior-friendly.md) - Senior features
πŸ‘” Professional Playbooks - [playbooks/journalist-source-verification.md](playbooks/journalist-source-verification.md) - For journalists - [playbooks/hr-background-check.md](playbooks/hr-background-check.md) - For HR professionals - [playbooks/cyber-threat-intel.md](playbooks/cyber-threat-intel.md) - For security analysts - [playbooks/private-investigator.md](playbooks/private-investigator.md) - For PIs
---

🎯 Examples

### Example 1: Quick Investigation (2 minutes) ```bash # Investigate a domain automatically /full example.com # Results: # - Risk score: 65/100 # - 12 entities discovered # - 2 reports generated (technical + simple) # - Investigation saved ``` ### Example 2: Person Investigation (5 minutes) ```bash # Use the guided wizard /wizard person # Or step-by-step: /recon "John Smith" /pivot "johnsmith123" /pivot "john.smith@example.com" /timeline "John Smith" /risk-assessment /simple-report ``` ### Example 3: Security Audit (10 minutes) ```bash # Run security audit template /template run security-audit # Or manual: /dork example.com /visualize risk /qa-check /report brief ``` ### Example 4: For Your 65-Year-Old Dad ```bash # Switch to beginner mode /mode beginner # Use the wizard /wizard person # Look up any confusing terms /glossary # Get simple results /simple-report ``` ---

πŸ“Š Confidence & Risk System

### Confidence Ratings | Icon | Level | Meaning | Trust Level | |------|-------|---------|-------------| | 🟒 | **HIGH** | Verified from authoritative source | βœ… Verified | | 🟑 | **MEDIUM** | Multiple sources agree | βœ… Likely true | | πŸ”΄ | **LOW** | Single source, unverified | ⚠️ Needs verification | | βšͺ | **SPECULATIVE** | Analyst inference | ❌ Don't act on alone | ### Risk Scoring | Score | Level | Action Required | |-------|-------|-----------------| | 0-25 | 🟒 **LOW** | Monitor only | | 26-50 | 🟑 **MODERATE** | Review recommended | | 51-75 | 🟠 **HIGH** | Address within 30 days | | 76-100 | πŸ”΄ **CRITICAL** | Immediate action required | ---

βœ… Success Metrics

Built for everyone. Professional-grade power.

πŸ‘΄ Accessibility
65+ user completes investigation
in < 10 minutes
βœ… Achieved
πŸ’Ό Professional Depth
Full due diligence in < 30 min
βœ… Achieved
🌍 Universal Compatibility
Works on Claude, ChatGPT, all AI CLIs
βœ… Achieved
πŸ“š Documentation
15,000+ lines of docs
βœ… Achieved
πŸ”Œ 100% API-Free
Web search only, no keys needed
βœ… Achieved
---

βš–οΈ Ethics & Legal

### βœ… Appropriate Use - πŸ‘¨β€πŸ’Ό Journalists investigating public figures - πŸ”’ Security researchers auditing infrastructure - πŸ‘€ Individuals checking their digital footprint - 🏒 Due diligence research on businesses - πŸŽ“ Academic and educational purposes ### ❌ Prohibited Use - 🚫 Harassment, stalking, or doxing - 🚫 Unauthorized access to private accounts - 🚫 Social engineering attacks - 🚫 Any illegal activities

Remember: With great search power comes great responsibility.

---

🀝 Contributing

We welcome contributions! See CONTRIBUTING.md for guidelines.

**Priority Areas:** - πŸ†• New dork patterns for emerging platforms - 🌍 Additional language translations - πŸ“‹ More specialized playbooks - 🧠 Community pattern contributions ---

πŸ“œ License

MIT License - See LICENSE file for details.

---

πŸ†˜ Support

πŸ“– Beginner's Guide β€’ πŸ“‹ Release Notes β€’ πŸ”§ Troubleshooting β€’ πŸ› Open an Issue

---

OSINT Investigator

Ready to investigate anything, anywhere, accessible to everyone.
Built with ❀️ for the OSINT community.

⬆️ Back to Top