r/osinttools

Image 1 — Monitory - Monitor any social media profile or website anonymously, get alerted on every change
Image 2 — Monitory - Monitor any social media profile or website anonymously, get alerted on every change
Image 3 — Monitory - Monitor any social media profile or website anonymously, get alerted on every change

Monitory - Monitor any social media profile or website anonymously, get alerted on every change

Hey guys!

Today I am releasing Monitory, which is an online monitoring platform. It allows you to log or get alerted about any change or post on a social media profile, a website, and more.

Monitory has a set of prebuilt modules (including X, Reddit, Github, TikTok, Steam, and any website), and thanks to our partnership with scraping.industries, modules are added on request and accessible to everyone.

You can create multiple scanners on multiple platforms for the same user, group these scanners inside a profile to get the whole picture of any user's behaviour and changes. Get alerted by email, webhooks, or Discord of any change when it happens.

Why this is useful for OSINT:

  • Fully anonymous. No login, no follow, no interaction. Completely passive.
  • Track a person across X, Reddit, GitHub, TikTok, and Steam from one dashboard.
  • Detect bio changes, new posts, follower shifts, SSH key additions, and more.
  • Visual timeline with field-by-field diffs.
  • Webhooks support to pipe into your existing tooling.

Your first scanner is free for 24 hours, no card needed, so you can test the full flow before committing.

Would love feedback from the community. Happy to answer any questions.

monitory.me

u/Silent-Brilliant7036 — 7 hours ago

Can anyone suggest OSINT/SOCMINT experience opportunities?

Hi, can anyone suggest any OSINT/SOCMINT jobs, internships, or volunteer opportunities? I want to gain real experience and I’m willing to help with research or small tasks. Thanks!

reddit.com
u/cobraosint — 2 hours ago
▲ 21 r/claude+2 crossposts

Claude Sleuth

## Claude Sleuth

6 phase, 56 task workflow for Claude, consisting of; Operational Direction, Intelligence Collection, Collation & Entity Resolution, Chronological & Relational Processing, Hypothesis & Reasoning, concluding with the Final Report. Templates for every step, reference files for each task are output by task_runner.py upon completion of the gate.

### Not just for CLI, works on all Claude platforms incl. Mobile.

https://github.com/elb-pr/claude-sleuth

- Remote MCP Persistent investigation state across sessions via Cloudflare D1. Stores entities, relationships, timelines, evidence, grades, and the Investigation Notebook.

- 16-section Cognitive Surrogate Profiling from documentary evidence. Advance the profile whenever subject information is synthesised as well as a 12-technique reasoning framework. Call diagnose at any impasse, competing framing, or stuck point

| Standard | What It Does |

|---|---|

| **Admiralty 6x6** | Grades source reliability (A–F) and credibility (1–6) independently before any claim enters the record |

| **ACH** | Derives conclusions via the Inconsistency Principle — surviving hypotheses have the least evidence against them |

| **ICD 203** | Maps every probabilistic statement to a 7-tier scale. Vague qualifiers are not permitted |

### Conventions applied to all outputs:

Timestamps - ISO 8601, normalised to UTC

Entity records - POLE schema with mandatory source, date_observed, analyst_id, and confidence fields

Network edges - source_node, target_node, relationship_type, evidence_ref; edges are directed (source -> target)

Evidence custody - SHA-256 hash, capture timestamp, analyst ID, storage location

Probability language - ICD 203 7-tier scale

### Scripts Reference

|---|---|

| `task_runner.py` | Drives the 56-task pipeline (`next`, `done`, `status`, `jump`, `peek`, `notebook`, `reset`) |

| `template_builder.py` | Assembles Markdown working documents from `templates/` by phase, step, or task ID |

| `source_grader.py` | Admiralty 6x6 source reliability and credibility grading with action recommendations |

| `entity_resolver.py` | Fellegi-Sunter probabilistic record linkage; deterministic matching on unique identifiers |

| `corporate_intel.py` | Aggregates company data from UK Companies House, SEC EDGAR, GLEIF LEI, and ICIJ Offshore Leaks |

| `domain_intel.py` | Domain reconnaissance via DNS, RDAP, crt.sh, Shodan InternetDB — zero authentication required |

| `username_enum.py` | Async username enumeration across social platforms using Maigret, Sherlock, or WhatsMyName |

| `sanctions_screen.py` | Fuzzy name matching against OFAC SDN, UK HMT, and other public sanctions lists |

| `evidence_preservation.py` | Forensic web capture: screenshots, HTML, WARC, Wayback submission, SHA-256 chain of custody |

| `content_archiver.py` | Async media download and cataloguing via yt-dlp, gallery-dl, and Playwright with manifest generation |

| `chronological_matrix.py` | UTC-normalised timeline construction; gap detection, source conflict flagging, CSV export |

| `network_graph.py` | Directed POLE relationship graph; in/out-degree, PageRank, community detection, HTML/GEXF export |

| `geolocation.py` | EXIF GPS extraction, solar position/shadow analysis, historical weather correlation, reverse geocoding |

| `financial_analysis.py` | SEC EDGAR financial anomaly detection: Benford's Law, YoY variance, Altman Z-Score |

| `report_generator.py` | ICD 203-compliant briefings and findings memos via Jinja2 templates; optional WeasyPrint PDF export |

u/elb-pr — 18 hours ago

Metafaker. A clientside tool that strips and spoofs image EXIF metadata with realism.

MetaFaker allows for stripping metadata but also for replacing metadata with realism. It picks from 20 real camera profiles (iPhone 15 Pro, Pixel 8, Canon EOS R5, Nikon Z9, etc.) and generates internally consistent EXIF matching lens models, aperture/ISO/shutter combos that make physical sense for that body, GPS coords near real US cities, sub second timestamps, and all the tags forensic tools actually check for.

Also includes random edge cropping to break PRNU sensor alignment, micro rotation that forces sub pixel interpolation to destroy fixed pattern noise, per pixel RGB noise, randomized dimensions and JPEG quality. About 10^34 unique output combinations per image.

Even the download filename matches the faked camera model. iPhone gets IMG_4523.jpg, Pixel gets PXL_20260402_142958834.jpg, Nikon gets DSC_3847.jpg.

try it here: https://0xs8n.github.io/metafaker/

repo: https://github.com/0xs8n/metafaker

reddit.com
u/Interesting-Honey253 — 2 hours ago
▲ 3 r/osinttools+1 crossposts

I built an automated pivoting tool to speed up breach analysis (Open Source)

Hi everyone, I’ve been working on a project called NOX because I was tired of manually pivoting between breach data and social handles during recon. It’s a Python framework that basically takes a seed (email, username, etc.) and recursively digs through about 120+ sources.

The main thing it does is the "Avalanche" effect: if it finds a new handle in a leak, it automatically starts dorking and scraping for that new handle without you doing anything. It outputs a PDF with a pivot chain so you can actually see the link between the data points.

It’s strictly not-for-profit and open source. If you guys do a lot of collection/analysis, I’d love to know if the recursive logic makes sense or if I should tweak the depth caps.

GitHub: https://github.com/nox-project/nox-framework

u/nox-project — 8 hours ago
▲ 2 r/osinttools+1 crossposts

Built a SaaS for mapping how macro and geopolitical shocks flow into markets

I built Market Ontology because I kept running into the same problem:

the news tells you what happened,
the charts tell you what moved,
but neither gives you a clean way to see what should move next.

So I made a workspace for:

  • macro regime monitoring
  • geopolitical risk mapping
  • cross-asset relationships
  • options / positioning context into catalysts

It’s aimed at macro and event-driven traders.

The core use case is pretty simple:

headline → transmission path → affected assets → confirmation signals

Example:

  • tariff / sanctions / conflict headline
  • does that hit energy, shipping, inflation expectations, FX, or rates first?
  • which assets should confirm the story?
  • is the first move likely real repricing or just flow/noise?

A few things I’d genuinely love feedback on:

  • is the use case clear enough?
  • does “market mapping” resonate or sound too vague?
  • which page or screenshot would make you understand it fastest?

Link: marketontology.com

Happy to answer anything bluntly, including what’s not working.

u/thinq-81 — 7 hours ago

Registered companies by address

I’m new to OSINT and looking for a (ideally free) tool where I can see all registered companies for an address in the UK- any tips?

reddit.com
u/MiltonsKeen — 11 hours ago

Intelx api key?

Sorry for the post, but I run a large OSINT platform and recently I’ve thought about adding some more logs and leaks.

Personally, I can’t pay for a fully fledged IntelX account, but if somebody has an enterprise account and could spare a key I wod be respec with it and be willing to trade for work/another api/an account on my OSINT platform (invite only/law enforcement typically)

You can reach me in PMs

reddit.com
u/jollyMexico — 20 hours ago

Built a GCC airspace monitor that when airspace is closing, indicating inbound air threats. Methodology inside, roast welcome.

I’ll keep the “another Middle East conflict tracker” eye-roll to a minimum.

This isn’t about tracking who fired what at whom. It’s specifically about one problem I kept having as an expat in Saudi Arabia — finding out GCC airports had closed from a WhatsApp message sent by a panicking colleague 20 minutes after it happened.

So I built something that watches the aircraft instead of waiting for the announcement.

The core methodology:

When an airspace closure is imminent, the official announcement is never first. The flight data is. Aircraft already airborne start holding. Inbound clearances stop being issued. Ground queues freeze. Departures begin diverting. This happens before any NOTAM drops and well before any government statement.

Sandstorm OSINT monitors live ADS-B data across 11 GCC airports continuously — Dubai, Abu Dhabi, Doha, Riyadh, Bahrain, Kuwait, Muscat, and others. It’s looking for exactly those behavioural signatures in real time.

It also detects GPS jamming events from positional inconsistencies across multiple aircraft simultaneously — useful given how frequently that’s been happening in the Gulf lately.

Verification pipeline (because single-source garbage is everyone’s problem):

Every item runs through multi-stage AI verification — cross-referenced across flight data, NOTAMs, official government feeds, whitelisted news sources, and regional Telegram channels. Confidence scored 1-10. Under 5 doesn’t publish. Single unverified source doesn’t publish. Whitelisted official accounts like CENTCOM and GCC MODs get a higher floor.

It’s not trying to be a war tracker. It’s trying to answer one specific question — is my airport about to close and do I have time to do something about it.

Free tier at www.sandstormosint.com — no card, hourly feed, airspace overview. Pro gets real-time and Telegram alerts.

Happy to get into the methodology in the comments. Genuine criticism welcome — this community will find the holes faster than anyone.

reddit.com
u/Jammy_Camel — 10 hours ago
Week