OSINT logo

OSINT

Atlas

DocsReferans + Wiki

OSINT Docs

OSINT kavramları, kategoriler, araçlar ve örnek iş akışları için hızlı başvuru merkezi.


title: Introduction description: Purpose and scope of the OSINT Atlas documentation.

Introduction

OSINT Atlas Docs gathers concepts, categories, tools, and sample workflows about open-source intelligence (OSINT) in one place.
It is not a training course; it is a quick reference and concept explainer.

Use this documentation when:

  • You need a quick definition of a term
  • You wonder what Username OSINT covers and its limits
  • You want to decide what a tool does and when to use it
  • You need a reference while designing your own OSINT workflow

OSINT Atlas focuses only on public and legal sources.
Unauthorized access, intrusion, or account takeover is outside of scope.


Audience

Designed for:

  • Newcomers to OSINT
  • Readers who know basics but want categories organized
  • Security/IT folks strengthening OSINT skills
  • Researchers, journalists, enthusiasts

Expectation: respect ethics and legal boundaries.


What you will find

  • Concept pages → basics like “What is OSINT?”, “Intelligence types”
  • Category pages → Username, email, domain/IP, social, images/video, geo, archives
  • Tool pages → What each tool does, when to use it, limitations
  • Workflow pages → Example OSINT flows (“first this, then that”)
  • Wiki / notes → Glossary, patterns, thinking models

Next page explains the site structure:
How this site is organized


title: How this site is organized description: Main sections of OSINT Atlas docs and how to find what you need.

How this site is organized

OSINT Atlas Docs has several main sections. The left sidebar lists them.


Concepts

Concepts explain core OSINT terminology.

You will find:

These are the “theory” pages—skim them first so the rest makes sense.


Categories

Categories describe common data types in OSINT:

Each category answers:

  • What is this data type for?
  • What questions can it answer?
  • What are its limits?
  • Example usage scenarios?
  • Which tools pair with it?

Tools

Tools are per-tool explanations.

  • Tool index
  • Example tool pages (e.g., Sherlock, ExifTool, Shodan…)

Each tool page covers:

  • What it does
  • Which categories it relates to
  • Strengths and weaknesses
  • When to use it

Focus is on concept/usage, not install steps.


Workflows

Workflows are “first this, then that” example flows.

They show the thinking order rather than copying a real-world case.


Reference

Reference contains supporting topics:

Focuses on “is it doable?” and “should it be done?”


Wiki / Notes

Wiki / Notes are free-form, Obsidian-style pages:

Terms, recurring patterns, and quick notes live here.


Next step

Now that you know the structure, continue with basics:


title: What is OSINT? description: Basic definition and scope of open-source intelligence (OSINT).

What is OSINT?

OSINT (Open Source Intelligence) is the practice of collecting, analyzing, and making sense of information from publicly accessible sources.
Here “open source” means information anyone can access, not open-source code.

Examples:

  • Public social media profiles
  • News sites, blogs, forums
  • Official reports and statistics
  • Open archives and historical pages
  • Satellite imagery and maps

OSINT is not about intruding or stealing secrets; it’s about making sense of data already in the open.


Key characteristics

  • Public data only
    OSINT works with data anyone can reach. Password cracking or intrusion is not OSINT.

  • Analysis-driven
    Value comes from asking the right questions and connecting dots, not hoarding the most data.

  • Contextual thinking
    Single pieces may be meaningless; context makes the picture powerful.


What OSINT is NOT

To avoid confusion, OSINT is not:

  • Account hacking
  • Breaching closed databases
  • Unauthorized system scans to gather internal data
  • Social engineering for secret information

These are different disciplines and often illegal.


When OSINT helps

Example scenarios:

  • Verifying if an account matches a real person
  • Estimating where and roughly when a photo was taken
  • Mapping a company’s domain/infrastructure using open sources
  • Checking claims by validating sources and visuals

OSINT is not magic; with the right questions it’s a powerful magnifier.


Related pages


title: Intelligence types description: Intelligence types including OSINT and their key differences.

Intelligence types

OSINT is one of several intelligence disciplines. Common abbreviations:

  • HUMINT – Human Intelligence
  • SIGINT – Signals Intelligence
  • IMINT / GEOINT – Imagery / Geospatial Intelligence
  • TECHINT – Technical Intelligence
  • OSINT – Open Source Intelligence

They complement rather than replace each other.


HUMINT

People-centric collection (interviews, field observation). OSINT is mostly desk-based; HUMINT is in the field.

Relation to OSINT:

  • OSINT can prepare HUMINT (pre-briefing)
  • HUMINT findings can be verified/supported via OSINT

SIGINT

Covers communications/signal data (telephony, radio, network traffic). Usually closed and permissioned.

Difference vs OSINT:

  • SIGINT → closed, often secret, requires authorization
  • OSINT → open and publicly accessible

IMINT / GEOINT

Imagery and geospatial analysis (satellite, aerial, maps). Common in defense; open imagery also exists.

Intersection with OSINT:

  • Using open satellite/map data is Geo-OSINT
  • Private/closed imagery is outside OSINT

OSINT

This documentation’s focus.

  • Source: open, publicly accessible data
  • Method: search, collect, verify, contextualize
  • Role: support other intel types, early analysis, validation

Why the distinction matters

These distinctions:

  • Clarify which data is legally accessible
  • Define whether a task is truly “OSINT”
  • Show which discipline applies in a situation

This documentation focuses only on OSINT and supporting open-data concepts.


Related pages


title: OSINT vs. pentest vs. hacking description: Clarifies the differences between OSINT, pentest, and hacking.

OSINT vs. pentest vs. hacking

Terms often get mixed up. Someone saying “I’m doing OSINT” might actually be doing pentest or attacking.

This page separates three key concepts:

  • OSINT
  • Pentest (penetration testing)
  • Hacking / attack activities

OSINT

  • Goal: Collect and analyze open-source data
  • Access: Public, visible to everyone
  • Example: Public profiles, news, official reports, open archives, open satellite imagery

OSINT does not push access boundaries; it interprets existing open data.


Pentest (penetration testing)

  • Goal: Find system vulnerabilities in a controlled manner
  • Access: With prior written permission and defined scope
  • Example: Authorized scanning, exploit simulation, security testing

Pentest is a professional service governed by ethics and contracts.

Overlap with OSINT:

  • Uses OSINT during reconnaissance
  • Goes deeper afterward with active testing

Hacking / attack activities

  • Goal: Unauthorized access, data theft, disruption
  • Access: Against systems without permission
  • Example: Account takeover, database breach, malware distribution

Often illegal and outside this documentation’s scope.


Why the distinction matters

  • Knowing boundaries is critical ethically and legally
  • Understand the context when using a tool
  • “I’m only collecting info” is not always a safe defense; data nature matters

In this documentation:

OSINT = public, legal data + analysis
Pentest and attack details are out of scope.


Related pages

Categories

OSINT Categories

Username

Hesap eşleştirme, takma ad varyasyonları.

Email

Açık veride e-posta izi, breach kontrolü (yasal).

Domain / IP

Whois, DNS, pasif DNS, sertifika analizleri.

Social Networks

X/Instagram/LinkedIn vb. içerik ve ağ analizi.

Images / Videos

Ters görsel arama, metadata, keyframe analizi.

Geolocation

Harita/uydu, ışık-gölge, POI ve koordinat eşleştirme.

Archives

Wayback ve diğer arşivler, sürüm karşılaştırma.

Tools

Tool index

Her araç için kısa “ne işe yarar / ne zaman kullanılır” anlatımı: Sherlock, EXIF, Shodan, Wayback.

Workflows

Örnek iş akışları

  • Basic investigation → Sinyal toplama → doğrulama → raporlama
  • Social media → username → profil → ağ → içerik zamanı → arşiv
  • Image + geo → ters görsel → EXIF → keyframe → harita/POI

OPSEC basics

Araştırmacı kimliğini koru: izole tarayıcı, VPN/proxy politikası, kişisel hesapları kullanmama, log ve iz yönetimi.

Data sources

Kamu açık veri setleri, arşivler, medya arşivleri, akademik depolar, resmi kayıtlar; her biri için lisans ve kullanım koşullarını kontrol et.

Wiki / Notes

Glossary (A–Z)

Kısa tanımlar ve örnekler; Obsidian benzeri serbest not alanı.

Patterns & techniques

Pivoting, time correlation, link analizi gibi tekrar eden düşünme kalıpları ve uygulama notları.

FAQ

Sık sorulanlar

  • OSINT yasal mı? → Evet, açık ve izinli verilerle, platform kurallarına uyarak.
  • OSINT ve pentest farkı? → OSINT’te yetkisiz erişim yok; bilgi toplama/analiz var.
  • Neden çok araç? → Farklı veri düzlemleri ve hız/başarı için çeşitlilik gerekir.