LodgeOSINT · Tools

The research toolkit.

Every tool here is free or has a meaningful free tier. Organized by data type. Usage notes focus on when to use each tool and what signals to look for — not just what it does.

Identity & People Research

IntelTechniques Identity

The gold standard for privacy-focused OSINT workflows. Michael Bazzell's comprehensive browser-based tools for pivoting from usernames, emails, phone numbers, or names into public data.

When to use: Start here for any people-research task. The search tools page aggregates dozens of data sources into a single workflow.

Have I Been Pwned Breach

Check if an email has appeared in known data breaches. Essential first step for digital footprint audits — breach exposure often surfaces associated accounts and real names.

When to use: Early in any identity investigation or self-audit. Note the exposure without acting on breach data in ways that could enable harm.

Epieos Identity

Surfaces Google accounts and other services linked to an email address — passively. Does not notify the target. Useful for confirming identity or finding associated usernames.

When to use: After basic breach check. Particularly useful when an email is your only starting point.

Sherlock Social

Command-line tool that searches 300+ platforms for a given username simultaneously. Run it against your own accounts first — you'll find accounts you forgot existed.

When to use: Username pivot. Install: pip install sherlock-project

Blackbird Social

Fast username/email lookup across social platforms. Lighter than Sherlock for quick lookups. Also accepts email addresses for cross-platform account discovery.

When to use: Quick social pivot when you need results in seconds, not minutes.

WhatsMyName Social

Username enumeration across hundreds of sites with a focus on accuracy over speed. The underlying data is open source and well-maintained by the OSINT community.

When to use: When you need high-confidence results and can accept slower enumeration.
Domain & Network Infrastructure

ViewDNS.info Domain

Multi-tool site for reverse WHOIS, DNS records, IP history, and hosting history. A single domain can have years of hosting changes and ownership transfers visible here.

When to use: Every domain investigation. Check reverse WHOIS, IP history, and DNS records together to build infrastructure picture.

DNSDumpster Domain

Discovers and maps a domain's subdomains, DNS records, and host relationships visually. Excellent for understanding the full infrastructure footprint of an organization.

When to use: After initial WHOIS. The visual graph often reveals related infrastructure not obvious from records alone.

Censys Network

Search engine for internet-connected devices and TLS certificates. Identify server configurations, find certificate relationships, and discover infrastructure before it's documented.

When to use: Advanced infrastructure analysis. Particularly powerful for certificate pivoting — finding related domains sharing a TLS certificate.

Shodan Network

Searches for internet-connected devices by banner, port, or software version. Primarily used to understand what's exposed on a network before an authorized assessment.

When to use: Authorized research only. Understanding what infrastructure is publicly visible and potentially vulnerable.

Wayback Machine Archive

The Internet Archive's historical snapshots of web pages. Critical for documentation — evidence degrades. A site's previous content, contact pages, and staff listings may still be accessible here.

When to use: Always. The current version of a site is never the whole story. Historical snapshots often contain information that's been deliberately removed.

ARIN / RIPE WHOIS IP

The regional internet registries (ARIN for North America, RIPE for Europe) provide authoritative IP address and ASN ownership data. More authoritative than third-party WHOIS lookups.

When to use: When you need confirmed IP block ownership rather than inferred attribution. Essential for infrastructure investigations.
Image & Video Verification

InVID / WeVerify Media

Browser extension designed for video and image verification. Pulls metadata, keyframes for reverse searching, and contextual checks in one click. Designed for journalists.

When to use: Any video verification task. Install the browser extension before you need it — it's not useful post-hoc.

FotoForensics Image

Uses Error Level Analysis (ELA) to detect areas of an image that may have been digitally altered. Free, browser-based. Not definitive, but a strong signal when patterns are consistent.

When to use: Suspect image manipulation. Use alongside EXIF data and reverse search — ELA alone is not sufficient for a manipulation conclusion.

Yandex Reverse Image Media

Consistently the most powerful reverse image search for finding manipulated or reused photos. Indexes different content than Google and TinEye — run all three for thoroughness.

When to use: Profile photo verification, stock image detection, tracking image origin and spread. Yandex often finds matches Google misses.
Geolocation & Mapping

Google Earth Pro Geo

Primary desktop tool for 3D terrain analysis and historical satellite imagery. The time slider makes it essential for verifying when a location photograph was taken and what the landscape looked like.

When to use: Any image geolocation involving terrain, buildings, or infrastructure. Free desktop download — significantly more capable than the web version.

PeakVisor Geo

Identifies mountain ranges and peak profiles from photographs. Essential for geolocating images that include mountain skylines — including anywhere along the Colorado Front Range.

When to use: Images with visible mountain or terrain profiles. Boulder-specific: the Flatirons and Longs Peak are distinctive and identifiable from significant distances.

Sentinel Hub Satellite

High-frequency satellite imagery for monitoring environmental and infrastructure changes over time. Free tier provides significant capability for open research and journalism.

When to use: Monitoring changes at a specific location over time. Environmental investigations, construction timelines, infrastructure monitoring.