O que é OSINT? O Guia Completo para Inteligência de Fontes Abertas em 2026
OSINT representa 80-90% da inteligência coletada por agências ocidentais. Aprenda o que é, quem usa e como começar neste guia completo.
Guias, análises e tutoriais sobre inteligência de fontes abertas, investigações digitais e segurança cibernética.
OSINT representa 80-90% da inteligência coletada por agências ocidentais. Aprenda o que é, quem usa e como começar neste guia completo.
3.322 violações de dados só nos EUA em 2025. Aprenda 5 formas gratuitas de verificar se seu email foi comprometido e o que fazer.
Descubra como investigadores usam fontes abertas para cruzar dados de CPF e CNPJ, os limites da LGPD e as ferramentas disponíveis.
Um endereço de email pode revelar contas sociais, vazamentos, dados de domínio e muito mais. Veja o passo a passo completo.
Usernames são o pivot mais subestimado em OSINT. Aprenda a usar Sherlock, Maigret e plataformas automatizadas para rastrear perfis.
Fontes públicas brasileiras, workflows de investigação e ferramentas recomendadas para o cenário OSINT no Brasil.
Estrutura, coleta, preservação de evidências e erros comuns ao montar dossiês de investigação com inteligência de fontes abertas.
Busca reversa, cruzamento com redes sociais e peculiaridades do Brasil com WhatsApp, DDDs e ferramentas especializadas.
Sinais de alerta, fontes de dados e um caso prático de como investigar empresas suspeitas usando inteligência de fontes abertas.
WHOIS, DNS, certificados SSL, Shodan e técnicas para identificar domínios de phishing e mapear infraestrutura.
12 pontos de verificação, KYC/AML, e como montar relatórios de due diligence com inteligência de fontes abertas.
De Sherlock a Shodan: as melhores ferramentas gratuitas para email, username, domínio e vazamentos, organizadas por categoria.
Espectro vs OSINT Industries, Maltego e SpiderFoot. Tabela comparativa completa com preços, fontes e recursos.
42 guides on OSINT techniques, AI + OSINT, investigations, compliance, and tools.
OSINT drives 80-90% of Western intelligence work in a $12.7B market. Learn what open source intelligence is, who uses it, and how to start.
OSINT is legal when you collect publicly available information. Learn the bright lines, gray zones, and GDPR/CFAA/LGPD boundaries.
Maltego, Shodan, theHarvester, Sherlock, and 10 more tools ranked by effectiveness for email, username, domain, and breach monitoring.
5 methods to trace an email address—name, social accounts, breaches, domain registration, and IP headers—with tools and case study.
Sherlock, Maigret, SpiderFoot, and Espectro: how to pivot usernames across Discord, Twitch, Reddit, Instagram, and 400+ platforms.
Reverse phone lookup methods, social media correlation, breach databases, and CallerId APIs to unmask unknown callers.
3,322 data breaches in 2025. Learn 5 ways to check if your email, phone, or username has been compromised and remediation steps.
5.66B social media users. Your digital footprint is larger than you think—audit yours and reduce OSINT attack surface.
Account verification, geolocation from posts, fake profile detection, and OSINT across Facebook, Instagram, TikTok, LinkedIn.
Private accounts, deleted profiles, archived posts, and behavioral analysis to uncover hidden social media presence.
Attribution, pattern recognition, payment linkage, and device fingerprinting to trace inauthentic accounts and coordinated networks.
WHOIS parsing, DNS enumeration, SSL certificate analysis, Shodan queries, and infrastructure mapping for threat hunting.
GPS metadata, device fingerprinting, timestamp verification, and image manipulation detection using open source tools.
Shell company detection, beneficial ownership verification, fraud economics, and $12M case study of corporate fraud via OSINT.
12-point verification, KYC/AML workflow, beneficial owner verification, and compliance framework for due diligence investigations.
Background checks, expertise verification, board memberships, and legal compliance framework for hiring with open source intelligence.
Know Your Customer workflow, PEP screening, sanctions matching, and AML (Anti-Money Laundering) integration with open source data.
Source verification, archive resources, geolocation in conflict reporting, and fact-checking via open source intelligence.
7 domains of background checks (identity, employment, education, criminal, credit, social, digital) using open source methods.
Offensive OSINT flipped: protect yourself. Audit privacy settings, remove inactive accounts, monitor breaches, and harden your digital presence.
Tor circuit analysis, marketplace monitoring, stylometric attribution, and OpSec protocols for dark web intelligence gathering.
Satellite imagery, sun angle calculations, metadata extraction, IP geolocation, and confidence assessment for location verification.
SSL certificate clustering, passive DNS, WHOIS history, and shodan queries to map infrastructure and identify threat actors.
Passive DNS queries, DNS history, SSL fingerprinting, and registrant correlation for infrastructure security intelligence.
LLMs for analysis vs. human context, prompt engineering, verification, and the future of human-AI OSINT teams.
R.O.C.E. framework, model comparisons (GPT-4, Claude, Gemini), API integration, and ethical considerations for LLM-powered OSINT.
Video analysis, audio transcription, sentiment detection, and speaker identification using Claude, GPT-4V, and Gemini 2.0.
Deepfake detection tools, facial analysis, forensics, and real-world case studies of synthetic media in investigations.
Linguistic markers, statistical anomalies, origin forensics, and training datasets to identify AI-generated text, images, video.
Google's AI Overviews, citability strategy, snippet optimization, and how OSINT adapts to LLM-driven search.
Perplexity AI for investigative synthesis, source prioritization, real-time research, and integrating with manual OSINT.
LLM hallucination risk, source traceability, red-teaming, and the "Trust but Verify" framework for AI investigative output.
Cost modeling, parallel processing, API automation, jurisdictional compliance, and fintech case study of OSINT automation.
Agent orchestration, vector databases, LLM workflows, and infrastructure cost analysis for distributed OSINT systems.
Schema design, normalization, deduplication, and JSON pipelines to prepare OSINT data for LLM ingestion and analysis.
Report template design, JSON extraction, two-step automation, and Python pseudocode for LLM-powered report generation.
API integration, tools-first architecture, LangChain patterns, and practical domain investigator agent example.
Ethical frameworks, privacy, bias detection, accountability, and regulatory compliance for AI-powered open source intelligence.
Maltego CE, Shodan, theHarvester, Sherlock, and WHOIS—the essential free tools for starting your OSINT journey.
Learning path, skill progression, Docker isolation, Python scripting, and data normalization pipeline from zero to competency.
OSINT investigation lifecycle, methodology phases, technical workflow, and case study of investigative process from start to closure.
Using synthetic datasets to train OSINT investigators without real personal data, privacy-first learning, and simulation frameworks.