Skip to content

OSINT that doesn’t leak your queries

Seventy-plus tools, investigation profiles, cross-tool pivots, dark-themed PDF export. Runs entirely on your machine — your queries don’t route through somebody else’s API.

Who actually uses this

Four jobs the toolkit was built for

Not a generic OSINT category page. The brand floor (no logs, no leaked queries) is what makes the tool defensible across all four.

Investigative journalists

Tracing networks, verifying sources, building profiles that survive editorial review and source-protection scrutiny.

Brand-protection & fraud teams

Mapping adversarial infrastructure, surfacing impersonation, building evidence packages for takedown requests.

Threat intel & IR analysts

Pivoting from one indicator to the full picture without leaking the pivot to upstream APIs.

Authorized investigators

Lawful work where chain of custody and procedural correctness matter as much as the finding itself.

The shape of an investigation

Four steps, one profile

Tools are inputs to a profile; the profile is the deliverable. Treating it that way is what separates a finished investigation from a folder of screenshots.

01

Open a profile

Each investigation starts as an empty profile. Findings get pinned as you go — entities, sources, screenshots, notes — all on your machine.

02

Run a tool, pivot to the next

Username → email permutator → breach checker → leaked-credential cross-reference. The Command Palette makes the pivots feel like one tool, not 70.

03

Build the case in the profile

Pin findings as you go. Add notes, link entities, mark provenance. The profile is the source of truth — not a folder of screenshots.

04

Export to PDF

Dark-themed, structured, citations intact. The PDF is the deliverable — the thing that goes to a client, an editor, a court, or a takedown attorney.

The floor that matters

What other OSINT setups quietly compromise on

Three things every other stack negotiates away. Investigators pick this toolkit because we don’t.

Your queries don’t leak

Local-first by design. No third-party API silently logging the searches you run on a sensitive case.

Free public sources only

Every tool runs against free and public sources. No API keys to manage, no premium-feed contracts.

Profiles, not Slack threads

Cases are first-class citizens, not collections of tabs. Future-you (or your editor) can pick the case up cold.

Open your first investigation

One toolkit, lifetime updates, no cloud account, no leaked queries.

Command Palette

Search for a command to run...