OSINT Mastery Guide — Master Index (Jamba Academy)

OSINT Mastery Guide — Master Index

Complete OSINT Mastery Repository de Jamba Academy (~45KB original, 19 secciones).
Mucho contenido es meta del repo upstream (Acknowledgments, Support, Future). Las 3 secciones con valor de conocimiento se han extraido a sub-notas; el resto (About, Architecture, Templates, Legal, Privacy) se preserva aqui como contexto.

Sub-notas por contenido

Doctrina — contenido del libro

osint-mastery-book-overview — la mega-seccion (381 lineas) que describe el contenido completo del libro Jamba.

OSINT-TOOLS — categorias + AI tools

osint-mastery-tools — Tool Categories, AI-Powered OSINT Tools, Repository Statistics.

Doctrina — onboarding y futuro

osint-mastery-learning — Quick Start Guide, Documentation/Learning Resources, Future Development.


📖 About This Repository

In today's data-driven world, Open-Source Intelligence (OSINT) has become an essential skill for cybersecurity professionals, investigators, journalists, researchers, and business analysts. This repository provides a comprehensive collection of professional-grade templates and cutting-edge tools designed to streamline your OSINT operations and enhance your investigative capabilities.

HTML CSS Magic

🎯 Repository Objectives

  • Standardize OSINT Reporting: Professional templates for consistent, court-ready documentation
  • Accelerate Investigations: Ready-to-use tools and methodologies to reduce analysis time
  • Ensure Best Practices: Ethical guidelines and legal compliance frameworks
  • Foster Community Learning: Open-source collaboration for continuous improvement
  • Bridge Theory to Practice: Practical implementation of academic OSINT principles

🗂️ Repository Architecture

Our repository is meticulously organized to provide maximum usability and learning efficiency. Each directory corresponds to specific book chapters and investigation categories.

🗂️ Repository Root

📋 Templates

🛠️ Tools

📊 Scripts

📚 Documentation

🎓 Learning

🤝 Community

Investigation Reports

Technical Assessments

Legal Frameworks

Analysis Templates

Search & Discovery

Social Media Intel

Technical Recon

AI-Powered Tools

Python Scripts

Data Processing

Automation

Visualization

User Guides

API Documentation

Best Practices

Troubleshooting


🗂️ Repository Structure

📦 osint-mastery-guide/
├── 📄 README.md                    # This comprehensive guide
├── 📄 LICENSE                      # MIT License terms
├── 📄 CONTRIBUTING.md               # Contribution guidelines
├── 📄 CODE_OF_CONDUCT.md           # Community standards
├── 📄 CHANGELOG.md                 # Version history
├── 📄 SECURITY.md                  # Security policy
├── 
├── 📁 osint-templates/             # Professional OSINT Templates
│   ├── 📄 README.md               # Templates documentation
│   ├── 📁 investigation-reports/  # Investigation report templates
│   │   ├── 📄 person-investigation-report.md
│   │   ├── 📄 business-intelligence-report.md
│   │   ├── 📄 social-media-analysis-report.md
│   │   ├── 📄 digital-footprint-assessment.md
│   │   ├── 📄 asset-investigation-report.md
│   │   ├── 📄 threat-intelligence-report.md
│   │   ├── 📄 breach-analysis-report.md
│   │   └── 📄 comprehensive-background-check.md
│   ├── 📁 technical-assessments/   # Technical analysis templates
│   │   ├── 📄 network-reconnaissance-report.md
│   │   ├── 📄 domain-website-analysis-report.md
│   │   ├── 📄 infrastructure-assessment.md
│   │   ├── 📄 vulnerability-intelligence-report.md
│   │   ├── 📄 malware-analysis-report.md
│   │   └── 📄 incident-response-template.md
│   ├── 📁 operational-planning/    # Planning and methodology templates
│   │   ├── 📄 osint-collection-plan.md
│   │   ├── 📄 investigation-workflow.md
│   │   ├── 📄 risk-assessment-matrix.md
│   │   ├── 📄 legal-compliance-checklist.md
│   │   ├── 📄 source-verification-framework.md
│   │   └── 📄 evidence-chain-custody.md
│   ├── 📁 specialized-formats/     # Specialized investigation templates
│   │   ├── 📄 court-ready-report.md
│   │   ├── 📄 executive-summary.md
│   │   ├── 📄 regulatory-compliance-report.md
│   │   ├── 📄 insurance-investigation.md
│   │   ├── 📄 academic-research-template.md
│   │   └── 📄 journalism-fact-check.md
│   └── 📁 ai-assisted-templates/   # AI-enhanced investigation templates
│       ├── 📄 ai-pattern-analysis.md
│       ├── 📄 automated-data-correlation.md
│       ├── 📄 sentiment-analysis-report.md
│       ├── 📄 predictive-intelligence.md
│       └── 📄 machine-learning-insights.md
├── 
├── 📁 osint-tools/                 # Modern OSINT Tools & Technologies
│   ├── 📄 README.md               # Tools documentation
│   ├── 📁 search-and-discovery/   # Search engines and discovery tools
│   │   ├── 📁 advanced-search-engines/
│   │   ├── 📁 specialized-databases/
│   │   ├── 📁 academic-resources/
│   │   └── 📁 government-databases/
│   ├── 📁 social-media-intelligence/  # Social media analysis tools
│   │   ├── 📁 platform-specific-tools/
│   │   ├── 📁 cross-platform-analyzers/
│   │   ├── 📁 sentiment-analysis/
│   │   └── 📁 network-mapping/
│   ├── 📁 technical-reconnaissance/   # Technical analysis tools
│   │   ├── 📁 domain-analysis/
│   │   ├── 📁 network-scanning/
│   │   ├── 📁 certificate-analysis/
│   │   └── 📁 infrastructure-mapping/
│   ├── 📁 people-investigation/    # Person-focused investigation tools
│   │   ├── 📁 identity-verification/
│   │   ├── 📁 background-checking/
│   │   ├── 📁 contact-discovery/
│   │   └── 📁 relationship-mapping/
│   ├── 📁 business-intelligence/   # Corporate investigation tools
│   │   ├── 📁 company-research/
│   │   ├── 📁 financial-analysis/
│   │   ├── 📁 regulatory-monitoring/
│   │   └── 📁 competitive-intelligence/
│   ├── 📁 geospatial-intelligence/ # Location-based analysis tools
│   │   ├── 📁 mapping-platforms/
│   │   ├── 📁 satellite-imagery/
│   │   ├── 📁 location-tracking/
│   │   └── 📁 geographic-correlation/
│   ├── 📁 ai-powered-tools/        # Artificial Intelligence OSINT tools
│   │   ├── 📁 machine-learning/
│   │   ├── 📁 natural-language-processing/
│   │   ├── 📁 image-recognition/
│   │   ├── 📁 pattern-analysis/
│   │   └── 📁 automated-reporting/
│   ├── 📁 data-visualization/      # Analysis and presentation tools
│   │   ├── 📁 link-analysis/
│   │   ├── 📁 timeline-creation/
│   │   ├── 📁 network-diagrams/
│   │   └── 📁 interactive-dashboards/
│   ├── 📁 privacy-and-security/    # Privacy protection and security tools
│   │   ├── 📁 anonymization-tools/
│   │   ├── 📁 vpn-tor-setup/
│   │   ├── 📁 secure-communications/
│   │   └── 📁 operational-security/
│   └── 📁 mobile-and-iot/          # Mobile device and IoT investigation
│       ├── 📁 mobile-forensics/
│       ├── 📁 app-analysis/
│       ├── 📁 iot-discovery/
│       └── 📁 wireless-intelligence/
├── 
├── 📁 documentation/               # Additional documentation and guides
│   ├── 📁 getting-started/        # Beginner guides and tutorials
│   ├── 📁 advanced-techniques/    # Expert-level methodologies
│   ├── 📁 legal-and-ethics/       # Legal compliance and ethical guidelines
│   ├── 📁 case-studies/           # Real-world application examples
│   ├── 📁 training-materials/     # Educational resources and exercises
│   └── 📁 reference-guides/       # Quick reference cards and checklists
├── 
├── 📁 scripts-and-automation/     # Automation scripts and utilities
│   ├── 📁 python-scripts/         # Python automation tools
│   ├── 📁 bash-utilities/         # Shell scripts and utilities
│   ├── 📁 api-integrations/       # API connection scripts
│   └── 📁 data-processing/        # Data analysis and processing tools
├── 
└── 📁 community/                  # Community resources
    ├── 📁 contributions/          # Community-contributed content
    ├── 📁 discussions/            # Discussion topics and Q&A
    ├── 📁 events/                 # Workshops, webinars, and conferences
    └── 📁 resources/              # Additional learning resources

🛡️ Privacy and Security

🔐 Operational Security (OPSEC)

Protecting yourself during OSINT investigations:

  • 🌐 Network Security: VPN usage, Tor networks, secure connections
  • 💻 System Security: Isolated investigation environments, secure operating systems
  • 📱 Communication Security: Encrypted messaging, secure email, anonymous communications
  • 🗄️ Data Protection: Encrypted storage, secure backup procedures, data retention policies

🔍 Investigation Security

Protecting investigation integrity and sources:

  • 🤐 Source Protection: Anonymizing sources and protecting informants
  • 📊 Data Integrity: Maintaining chain of custody and evidence integrity
  • 🔒 Access Control: Limiting access to sensitive investigation materials
  • 📝 Documentation Security: Secure storage and transmission of reports

Themes