Part of amritesh-sec research hub

OSINT &
Social Engineering

Open source intelligence techniques, social engineering attack patterns, and human vulnerability research — documented with precision, ethical boundaries, and official references.

OSINT Target
Social Media
Domain & DNS
Email Footprint
Public Records
Image Metadata
Breach Data
Dark Web Intel
Geolocation

Latest Publications

All research includes official tool references, ethical boundaries, and real-world context.

What This Repo Covers

01 //

Passive OSINT Reconnaissance

Footprinting targets using entirely open sources — without touching the target. DNS, WHOIS, Shodan, Maltego, and more.

ShodanMaltego WHOIStheHarvester

02 //

Social Media Intelligence (SOCMINT)

Extracting intelligence from social platforms — metadata, geolocation signals, network mapping, and behavioural analysis.

Twitter/XLinkedIn InstagramMetadata

03 //

Social Engineering Attack Patterns

Phishing, vishing, pretexting, and spear phishing — how attackers build and execute human-targeted campaigns.

PhishingVishing PretextingBEC

04 //

Human Risk & Defensive Awareness

Why humans remain the most exploited attack vector — and what organisations can do to build genuine security culture.

Human RiskSecurity Culture AwarenessISO 27001