OSINT that doesn’t leak your queries
Seventy-plus tools, investigation profiles, cross-tool pivots, dark-themed PDF export. Runs entirely on your machine — your queries don’t route through somebody else’s API.
Four jobs the toolkit was built for
Not a generic OSINT category page. The brand floor (no logs, no leaked queries) is what makes the tool defensible across all four.
Investigative journalists
Tracing networks, verifying sources, building profiles that survive editorial review and source-protection scrutiny.
Brand-protection & fraud teams
Mapping adversarial infrastructure, surfacing impersonation, building evidence packages for takedown requests.
Threat intel & IR analysts
Pivoting from one indicator to the full picture without leaking the pivot to upstream APIs.
Authorized investigators
Lawful work where chain of custody and procedural correctness matter as much as the finding itself.
Four steps, one profile
Tools are inputs to a profile; the profile is the deliverable. Treating it that way is what separates a finished investigation from a folder of screenshots.
Open a profile
Each investigation starts as an empty profile. Findings get pinned as you go — entities, sources, screenshots, notes — all on your machine.
Run a tool, pivot to the next
Username → email permutator → breach checker → leaked-credential cross-reference. The Command Palette makes the pivots feel like one tool, not 70.
Build the case in the profile
Pin findings as you go. Add notes, link entities, mark provenance. The profile is the source of truth — not a folder of screenshots.
Export to PDF
Dark-themed, structured, citations intact. The PDF is the deliverable — the thing that goes to a client, an editor, a court, or a takedown attorney.
What other OSINT setups quietly compromise on
Three things every other stack negotiates away. Investigators pick this toolkit because we don’t.
Your queries don’t leak
Local-first by design. No third-party API silently logging the searches you run on a sensitive case.
Free public sources only
Every tool runs against free and public sources. No API keys to manage, no premium-feed contracts.
Profiles, not Slack threads
Cases are first-class citizens, not collections of tabs. Future-you (or your editor) can pick the case up cold.
Open your first investigation
One toolkit, lifetime updates, no cloud account, no leaked queries.