Skip to content
Nixintel Open Source Intelligence & Investigations
  • About Me
  • Contact
  • Schedule
  • SEC497 OSINT Course
  • SEC587 Advanced OSINT Course
  • OSINT Resources
    • LinkedIn
    • Nixintel Twitter

Counting Crowds In Public Spaces

3 Comments / OSINT / Nixintel

This week’s huge protests in Israel drew huge crowds to the streets – but how many people took part? Crowd sizes are often used as evidence to show how widely supported a particular cause is, so being able to determine how many people took part in a demonstration is an important skill for those working […]

Counting Crowds In Public Spaces Read More »

How To Identify A Company’s Domains With Azure AD

Leave a Comment / OSINT Tools / Nixintel

A common challenge for OSINT practitioners and penetration testers alike is to fully identify the range of domains owned and managed by a particular organisation. Identifying the main domain that a company owns is usually fairly easy since it can be found in the second half of a company email ([email protected]) or as part of

How To Identify A Company’s Domains With Azure AD Read More »

Quiztime: How To Clean Pictures For Better Search Results

4 Comments / OSINT / Nixintel

In last week’s Wednesday Quiz Tilman Wagner posted this photo and asked us several questions about it: 1) Who posted it and where? 2) What was the occasion? 3) Did Tilman participate, and if so, how? So where to start? We need to know the location before we can answer any of Tilman’s questions. There

Quiztime: How To Clean Pictures For Better Search Results Read More »

Use Python To Automate Your OSINT Reporting

Leave a Comment / Coding, OSINT Tools / Nixintel

What’s the most boring part of Open Source Intelligence? Most OSINT practitioners (including me) usually enjoy the research phase of an assignment the most. Collecting data and finding new lines of enquiry is fun, but writing it all up at the end is usually dull. Well-written reports are a vital part of the OSINT process,

Use Python To Automate Your OSINT Reporting Read More »

Six Tools To Help With Geolocation

3 Comments / OSINT Tools / Nixintel

If you’ve been interested in geolocation for any length of time, you’ll already be familiar with some of the most common tools that researchers make use of: Google Maps & Street View, Google Earth, reverse image search tools, Suncalc, and so on. There are many lesser-known tools that are also useful and can help to

Six Tools To Help With Geolocation Read More »

Post pagination
← Previous 1 2 3 … 20 Next →

Tags

aircraft archives Cloudflare data Digital Forensics DIY Buscador DNS domains email Facebook fingerprinting gap analysis geolocation Google Google Earth H8mail images Instagram interviews Investigation Linux opsec OSINT OSINT Tools Overpass Turbo privacy Python Quiztime resources reverse ip security Sherlock Snapchat Spiderfoot Techniques theHarvester Tools Training Tutorials & Guides Twitter usernames website attribution whois Wordpress YouTube

Recent Posts

  • Using SSL Certificates To Find Threat Actor Infrastructure
  • Telegram For Cyber Investigators
  • Digging Into Russian Disinfo Infrastructure
  • Verify Your Online Identities With Keybase
  • Geolocation: At The Retail Park

Recent Comments

  • Cookies for Capture: Using ArchiveBox’s –cookie Option for Authenticated Web Content in OSINT – Argelius Labs on Make Your Own Internet Archive With ArchiveBox
  • clollins on Getting Started With Spiderfoot – A Beginner’s Guide
  • How to Tell if an Image Is High Resolution - Markt Value on The Secret Life Of JPEGs
  • Cyber Intelligence – jagadee.online on Using Gap Analysis To Keep OSINT Investigations On Track
  • araaaa on Make Your Own Internet Archive With ArchiveBox

Categories

  • Coding
  • Linux
  • OSINT
  • OSINT Tools
  • Security
  • Tech

Copyright

© Steven Harris and nixintel.info, 2019-2023. Unauthorized use and/or duplication of this material without express and written permission from this site’s author/owner is strictly prohibited.

Small excerpts and links may be used, provided that full and clear credit is given to Steven Harris and nixintel.info with appropriate and specific direction to the original content.

You may NOT reuse or duplicate any content from this website as part of any training programme (whether private or public) or any commercial activity of any kind without the express written authorisation of the site owner.

  • Copyright
  • Contact
  • About
  • Twitter
  • LinkedIn
  • Linktr.ee
  • BlueSky
Copyright © 2025 Steven Harris and Nixintel Open Source Intelligence & Investigations