OSINT Mastery Guide — Master Index (Jamba Academy)
OSINT Mastery Guide — Master Index
Complete OSINT Mastery Repository de Jamba Academy (~45KB original, 19 secciones).
Mucho contenido es meta del repo upstream (Acknowledgments, Support, Future). Las 3 secciones con valor de conocimiento se han extraido a sub-notas; el resto (About, Architecture, Templates, Legal, Privacy) se preserva aqui como contexto.
Sub-notas por contenido
Doctrina — contenido del libro
osint-mastery-book-overview — la mega-seccion (381 lineas) que describe el contenido completo del libro Jamba.
OSINT-TOOLS — categorias + AI tools
osint-mastery-tools — Tool Categories, AI-Powered OSINT Tools, Repository Statistics.
Doctrina — onboarding y futuro
osint-mastery-learning — Quick Start Guide, Documentation/Learning Resources, Future Development.
📖 About This Repository
In today's data-driven world, Open-Source Intelligence (OSINT) has become an essential skill for cybersecurity professionals, investigators, journalists, researchers, and business analysts. This repository provides a comprehensive collection of professional-grade templates and cutting-edge tools designed to streamline your OSINT operations and enhance your investigative capabilities.
🎯 Repository Objectives
- Standardize OSINT Reporting: Professional templates for consistent, court-ready documentation
- Accelerate Investigations: Ready-to-use tools and methodologies to reduce analysis time
- Ensure Best Practices: Ethical guidelines and legal compliance frameworks
- Foster Community Learning: Open-source collaboration for continuous improvement
- Bridge Theory to Practice: Practical implementation of academic OSINT principles
🗂️ Repository Architecture
Our repository is meticulously organized to provide maximum usability and learning efficiency. Each directory corresponds to specific book chapters and investigation categories.
🗂️ Repository Structure
📦 osint-mastery-guide/
├── 📄 README.md # This comprehensive guide
├── 📄 LICENSE # MIT License terms
├── 📄 CONTRIBUTING.md # Contribution guidelines
├── 📄 CODE_OF_CONDUCT.md # Community standards
├── 📄 CHANGELOG.md # Version history
├── 📄 SECURITY.md # Security policy
├──
├── 📁 osint-templates/ # Professional OSINT Templates
│ ├── 📄 README.md # Templates documentation
│ ├── 📁 investigation-reports/ # Investigation report templates
│ │ ├── 📄 person-investigation-report.md
│ │ ├── 📄 business-intelligence-report.md
│ │ ├── 📄 social-media-analysis-report.md
│ │ ├── 📄 digital-footprint-assessment.md
│ │ ├── 📄 asset-investigation-report.md
│ │ ├── 📄 threat-intelligence-report.md
│ │ ├── 📄 breach-analysis-report.md
│ │ └── 📄 comprehensive-background-check.md
│ ├── 📁 technical-assessments/ # Technical analysis templates
│ │ ├── 📄 network-reconnaissance-report.md
│ │ ├── 📄 domain-website-analysis-report.md
│ │ ├── 📄 infrastructure-assessment.md
│ │ ├── 📄 vulnerability-intelligence-report.md
│ │ ├── 📄 malware-analysis-report.md
│ │ └── 📄 incident-response-template.md
│ ├── 📁 operational-planning/ # Planning and methodology templates
│ │ ├── 📄 osint-collection-plan.md
│ │ ├── 📄 investigation-workflow.md
│ │ ├── 📄 risk-assessment-matrix.md
│ │ ├── 📄 legal-compliance-checklist.md
│ │ ├── 📄 source-verification-framework.md
│ │ └── 📄 evidence-chain-custody.md
│ ├── 📁 specialized-formats/ # Specialized investigation templates
│ │ ├── 📄 court-ready-report.md
│ │ ├── 📄 executive-summary.md
│ │ ├── 📄 regulatory-compliance-report.md
│ │ ├── 📄 insurance-investigation.md
│ │ ├── 📄 academic-research-template.md
│ │ └── 📄 journalism-fact-check.md
│ └── 📁 ai-assisted-templates/ # AI-enhanced investigation templates
│ ├── 📄 ai-pattern-analysis.md
│ ├── 📄 automated-data-correlation.md
│ ├── 📄 sentiment-analysis-report.md
│ ├── 📄 predictive-intelligence.md
│ └── 📄 machine-learning-insights.md
├──
├── 📁 osint-tools/ # Modern OSINT Tools & Technologies
│ ├── 📄 README.md # Tools documentation
│ ├── 📁 search-and-discovery/ # Search engines and discovery tools
│ │ ├── 📁 advanced-search-engines/
│ │ ├── 📁 specialized-databases/
│ │ ├── 📁 academic-resources/
│ │ └── 📁 government-databases/
│ ├── 📁 social-media-intelligence/ # Social media analysis tools
│ │ ├── 📁 platform-specific-tools/
│ │ ├── 📁 cross-platform-analyzers/
│ │ ├── 📁 sentiment-analysis/
│ │ └── 📁 network-mapping/
│ ├── 📁 technical-reconnaissance/ # Technical analysis tools
│ │ ├── 📁 domain-analysis/
│ │ ├── 📁 network-scanning/
│ │ ├── 📁 certificate-analysis/
│ │ └── 📁 infrastructure-mapping/
│ ├── 📁 people-investigation/ # Person-focused investigation tools
│ │ ├── 📁 identity-verification/
│ │ ├── 📁 background-checking/
│ │ ├── 📁 contact-discovery/
│ │ └── 📁 relationship-mapping/
│ ├── 📁 business-intelligence/ # Corporate investigation tools
│ │ ├── 📁 company-research/
│ │ ├── 📁 financial-analysis/
│ │ ├── 📁 regulatory-monitoring/
│ │ └── 📁 competitive-intelligence/
│ ├── 📁 geospatial-intelligence/ # Location-based analysis tools
│ │ ├── 📁 mapping-platforms/
│ │ ├── 📁 satellite-imagery/
│ │ ├── 📁 location-tracking/
│ │ └── 📁 geographic-correlation/
│ ├── 📁 ai-powered-tools/ # Artificial Intelligence OSINT tools
│ │ ├── 📁 machine-learning/
│ │ ├── 📁 natural-language-processing/
│ │ ├── 📁 image-recognition/
│ │ ├── 📁 pattern-analysis/
│ │ └── 📁 automated-reporting/
│ ├── 📁 data-visualization/ # Analysis and presentation tools
│ │ ├── 📁 link-analysis/
│ │ ├── 📁 timeline-creation/
│ │ ├── 📁 network-diagrams/
│ │ └── 📁 interactive-dashboards/
│ ├── 📁 privacy-and-security/ # Privacy protection and security tools
│ │ ├── 📁 anonymization-tools/
│ │ ├── 📁 vpn-tor-setup/
│ │ ├── 📁 secure-communications/
│ │ └── 📁 operational-security/
│ └── 📁 mobile-and-iot/ # Mobile device and IoT investigation
│ ├── 📁 mobile-forensics/
│ ├── 📁 app-analysis/
│ ├── 📁 iot-discovery/
│ └── 📁 wireless-intelligence/
├──
├── 📁 documentation/ # Additional documentation and guides
│ ├── 📁 getting-started/ # Beginner guides and tutorials
│ ├── 📁 advanced-techniques/ # Expert-level methodologies
│ ├── 📁 legal-and-ethics/ # Legal compliance and ethical guidelines
│ ├── 📁 case-studies/ # Real-world application examples
│ ├── 📁 training-materials/ # Educational resources and exercises
│ └── 📁 reference-guides/ # Quick reference cards and checklists
├──
├── 📁 scripts-and-automation/ # Automation scripts and utilities
│ ├── 📁 python-scripts/ # Python automation tools
│ ├── 📁 bash-utilities/ # Shell scripts and utilities
│ ├── 📁 api-integrations/ # API connection scripts
│ └── 📁 data-processing/ # Data analysis and processing tools
├──
└── 📁 community/ # Community resources
├── 📁 contributions/ # Community-contributed content
├── 📁 discussions/ # Discussion topics and Q&A
├── 📁 events/ # Workshops, webinars, and conferences
└── 📁 resources/ # Additional learning resources
🛡️ Privacy and Security
🔐 Operational Security (OPSEC)
Protecting yourself during OSINT investigations:
- 🌐 Network Security: VPN usage, Tor networks, secure connections
- 💻 System Security: Isolated investigation environments, secure operating systems
- 📱 Communication Security: Encrypted messaging, secure email, anonymous communications
- 🗄️ Data Protection: Encrypted storage, secure backup procedures, data retention policies
🔍 Investigation Security
Protecting investigation integrity and sources:
- 🤐 Source Protection: Anonymizing sources and protecting informants
- 📊 Data Integrity: Maintaining chain of custody and evidence integrity
- 🔒 Access Control: Limiting access to sensitive investigation materials
- 📝 Documentation Security: Secure storage and transmission of reports