Resources for Uncovering Online Information
Michael Bazzell, Jason Edison

#OSINT
این نسخه تازه شامل تکنیکها، اسکریپتها و ابزارهای بهروزرسانیشده است!
🕵️ نگاهی تازه به OSINT
سالها و در نسخههای قبلی این کتاب، ما به منابع خارجی برای ابزارهای جستجو، محیطهای مجازی و تکنیکهای تحقیقاتی تکیه داشتیم. اما بارها این رویکرد ما را ناامید کرده است:
این کتاب آمده است تا این مشکل را برطرف کند:
🚀 ویژگیهای ویرایش یازدهم
📂 بخشهای کلیدی جدید
این ساختار به شما یک برنامه عملی و شفاف برای تحقیقات فعال آینده میدهد.
New 11th Edition contains many updated techniques, scripts, and tools!
Revision: 2024.11.01
🕵️ A New Approach to OSINT
For years, previous editions of this book relied heavily on external resources for search tools, virtual environments, and investigation methods. That dependency often failed us when:
The 11th Edition fixes this. From now on:
This approach puts the power back in your hands, making you a more proficient subject matter expert, ready to defend and articulate the sources behind your findings.
🚀 What’s New in the 11th Edition
📂 Expanded Sections Covering
Together, these provide a clear action plan for your next active investigation.
Table of Contents
Chapter 1: Why Virtual Machines?
Chapter 2: Macos Host Optimization
Chapter 3: Macos Vm Software
Chapter 4: Linux Host Optimization
Chapter 5: Linux Vm Software
Chapter 6: Windows Host Optimization
Chapter 7: Windows Vm Software
Chapter 8: Osint Vm Operating Systems
Chapter 9: Osint Vm Web Browsers
Chapter 10: Osint Vm Applications
Chapter 11: Osint Vm Scripts
Chapter 12: Osint Vm Apis
Chapter 13: Osint Vm Maintenance
Chapter 14: Osint Vm Automated Build
Chapter 15: Android Virtualization
Chapter 16: Custom Search Tools
Chapter 17: Search Engines
Chapter 18: Social Networks: Facebook
Chapter 19: Social Networks: X (Twitter)
Chapter 20: Social Networks: Instagram
Chapter 21: Social Networks: Tiktok
Chapter 22: Online Communities
Chapter 23: Email Addresses
Chapter 24: Usernames
Chapter 25: People Search Engines
Chapter 26: Telephone Numbers
Chapter 27: Online Maps
Chapter 28: Documents
Chapter 29: Images
Chapter 30: Videos
Chapter 31: Broadcast Streams
Chapter 32: Domain Names
Chapter 33: Ip Addresses
Chapter 34: Government & Business Records
Chapter 35: Virtual Currencies
Chapter 36: Breaches: Investigative Benefits
Chapter 37: Breaches: Hardware Configuration
Chapter 38: Breaches: Software Configuration
Chapter 39: Breaches: Terminal Commands
Chapter 40: Data Leaks
Chapter 41: Data Breaches
Chapter 42: Stealer Logs
Chapter 43: Ransomware
Chapter 44: Queries, Scripts, Databases, & Backups
Chapter 45: Methodology & Workflow
Chapter 46: Documentation & Reporting
Chapter 47: Policy, Ethics, & Development
About the Author
Michael Bazzell investigated computer crimes on behalf of the government for over 20 years. During the majority of that time, he was assigned to the FBI’s Cyber Crimes Task Force where he focused on various online investigations and open source intelligence (OSINT) collection. As an investigator and sworn federal officer through the U.S. Marshals Service, he was involved in numerous major criminal investigations including online child solicitation, child abduction, kidnapping, cold-case homicide, terrorist threats, and advanced computer intrusions. He has trained thousands of individuals in the use of his investigative techniques and privacy control strategies.
After leaving government work, he served as the technical advisor for the first season of the television hacker drama Mr. Robot. His books Open Source Intelligence Techniques and Extreme Privacy are used by several government agencies as training manuals for intelligence gathering and privacy hardening. He now hosts the weekly Privacy, Security, and OSINT Show, and assists individual clients in achieving ultimate privacy, both proactively and as a response to an undesired situation. Details about his company’s services can be found online at IntelTechniques.com.









