TraceLabs OSINT VM

TraceLabs maintains an OSINT-oriented virtual machine built on top of Kali Linux that anyone can download.

The Trace Labs team has set out to create a specialized OSINT VM specifically to bring together the most effective OSINT tools and customized scripts we saw being used during our Search Party CTF’s. Inspired by the infamous Buscador VM, the Trace Labs OSINT VM was built in a similar way, to enable OSINT investigators participating in the Trace Labs Search Party CTF’s a quick way to get started and have access to the most popular OSINT tools and scripts all neatly packaged under one roof.

They maintain a GitHub repository for the VM that outlines the changes they’ve made to the Kali Linux distro, and provide instructions on creating their build from within a fresh Kali install if you don’t want to download their VM image.

Vortimo–OSINT Recording/Organizing Software

Vortimo is,

…software that organizes information on webpages that you’ve visited. It records pages you go to, extracts data from it and enrich the data that was extracted. It augments the pages in your browser by allowing you to tag objects as well as decorating objects it deems important. It then arranges the data in an UI. Vortimo support switching between cases/projects seamlessly. You can also generate PDF reports based on the aggregated information and meta information.

Currently in beta, this seems to be in the same space as Hunchly, using a browser and local server combination to record and manage web pages related to an investigation.

WiGILE.Net is

a submission-based catalog of wireless networks. Submissions are not paired with actual people; rather name/password identities which people use to associate their data. It’s basically a “gee isn’t this neat” engine for learning about the spread of wireless computer usage.

WiGLE concerns itself with 802.11a/b/g/n and cellular networks right now, which can be collected via the WiGLE WiFi Wardriving tool on android. We also have a bluetooth stumbling client for Android, but we do not maintain a catalog of bluetooth networks.

The blog has a thorough look at how this data could be used for OSINT purposes.