Overwatch OSINT Arsenal

FusionDataCo // Security Platform
65 tools live · 16 categories · last built 2026-05-12 03:39 UTC · OPS → · FRAMEWORK →
👤 Username Recon [4/4]
Find every account a username has touched across the web.
📧 Email OSINT [6/6]
From an email address to: registered services, breach exposure, public profile.
📞 Phone OSINT [2/3]
Carrier, region, line type, breach exposure for any phone number.
🖼️ Image OSINT [4/5]
Reverse image search, EXIF metadata, face matching, geolocation from photos.
🐦 Social Media Archaeology [3/4]
Bulk profile scraping, post archives, friend networks, deleted-content recovery.
🌐 Domain / Network [5/7]
DNS, WHOIS, subdomain enumeration, tech fingerprinting.
  • whois registration metadata /recon
  • dig DNS records (any type) /dns-audit
  • dnsenum comprehensive DNS enumeration /dns-audit
  • dnsrecon DNS reconnaissance, zone transfers /dns-audit
  • whatweb tech fingerprint (CMS, framework, server) /recon
  • subfinder passive subdomain discovery
  • amass subdomain + asset map (active + passive)
🗺️ Geolocation [9/9]
Coordinates ↔ address, places near a point, Street View, static maps.
🏛️ Public Records / Breach [7/7]
Court records, business filings, breach databases, paste sites.
🔗 Aggregator Frameworks [1/3]
Heavy-weight OSINT orchestrators that chain many sources.
📚 Archives [2/2]
Capture and recover content before it disappears.
📂 Case Management [5/5]
Drive-backed evidence chain per investigation.
  • Case folder create Subject/Photos/Sources/Notes structure in Drive /case-folder
  • Save evidence archive a URL into the case /save-evidence
  • Upload file push local file into the case /case-upload
  • Evidence note timestamped append to evidence-log.md /case-note
  • List cases show all OSINT-Cases folders /case-list
📨 Self-Search (Gmail) [2/2]
Search your own inbox for prior contact with case subjects.
  • Gmail search full Gmail-syntax query /gmail-search
  • Gmail who recent traffic to/from a person /gmail-who
🛰️ Active Recon (Kali) [2/3]
Port scans, service version, banner grabbing.
🕸️ Web Recon (Kali) [8/8]
Web app fingerprinting, directory brute, parameter discovery.
  • wfuzz web fuzzing for params/dirs/headers
  • dirsearch web path brute-force
  • gobuster dirs/DNS/vhosts brute (Go, fast)
  • ffuf fuzz Faster (Go)
  • wafw00f WAF fingerprinting
  • sslscan TLS configuration + cipher audit /ssl
  • wpscan WordPress vulnerability scan /wp-check
  • zaproxy OWASP ZAP proxy/scanner (GUI)
🎯 Vulnerability Scan [2/3]
Find known vulns + misconfigurations.
  • sqlmap SQL injection automation
  • nikto classic web server vulnerability scanner
  • nuclei template-driven vulnerability scanning (ProjectDiscovery)
📜 Wordlists [3/3]
Pre-installed lists for password / dir / DNS brute-force.