Discover
The OSINT Podcast

The OSINT Podcast
Author: Jake Creps
Subscribed: 5Played: 20Subscribe
Share
© Jake Creps
Description
4 Episodes
Reverse
Tools, tactics, and investigations that show both the power and the risks of open-source intelligence.In the third episode of the rebooted OSINT Podcast, host Jake Creps explores a mix of new tools and hard-hitting case studies that highlight how investigators can find, process, and analyse information at scale. From browser extensions that reveal hidden metadata to frameworks that structure analysis, this episode dives into the cutting edge of OSINT tradecraft.Highlights include:* 🔎 VSCO SPY – a Chrome extension that reveals hidden metadata on VSCO photos, including geolocation, device details, and timestamps.* 🕵️ Shodan-hash – a CLI tool for pivoting on favicons, headers, and HTML to uncover related infrastructure.* 🎥 TikSpyder – a clever tool that combines Google search with Apify to make TikTok easier to investigate.* 🌍 West Papua bot network – how investigators exposed a $300,000 influence operation using only free OSINT tools.* 🧩 The Analytical Hierarchy of OSINT – why structure matters, and how to turn raw data into actionable intelligence.* ⚠️ Malicious uses of OSINT – how cybercriminals weaponise public data for attacks, from Sony Pictures to MGM and beyond.Each segment unpacks how these methods work in practice, what risks they highlight, and how OSINT practitioners can adapt their own investigations accordingly.Sources & Links:* Full show notes and newsletter: OSINTNewsletter.com/79* VSCO SPY – Chrome Extension* Shodan-hash CLI* TikSpyder – GitHub* West Papua Bot Network* The Analytical Hierarchy of OSINT* Malicious Uses of OSINT Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
In the second episode of the rebooted OSINT Podcast, host Jake Creps spotlights some of the most inventive tools and recent case studies reshaping open-source investigations. From tattoo recognition datasets to AI-driven scraping, this episode dives deep into how practitioners can sharpen their tradecraft with the latest resources.Highlights include:* 🔍 Meawfy – the most advanced crawler for searching Mega.nz, surfacing everything from open-source software to hidden educational troves.* 🤖 Parse.bot – an AI-powered scraping tool that instantly turns any website into a structured API.* 🕵️ Tattoodo as a biometric dataset – why tattoos could become the next frontier in image-based investigations.* ⚡ Agent.ai – a growing library of task-specific AI agents, including a Company Research Agent that pulls instant org intel.* 📍 Instagram’s Snap Map-like feature – how quiet location updates in DMs can reveal where someone lives or travels.* 📧 Validating Gmail addresses ethically – using Calendar embeds to check if burner accounts are real.* 🈺 Phishing with Japanese characters – a subtle but dangerous trick exploiting punycode and lookalike symbols in URLs.Jake unpacks what each of these means for investigators, how they might be applied in practice, and what risks they raise for both privacy and security.Sources & Links:* Full show notes & newsletter: OSINTNewsletter.com/78* Meawfy* Parse.bot* Tattoodo OSINT– Aidan Raney * Agent.ai* Instagram’s New Map Tool* Gmail Validation Tips – Yoni * Japanese Character Phishing – Michel Coene / JAMESWT Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
Listen to the podcast on Spotify, Apple Podcasts, or on Substack. In the first episode of the rebooted OSINT Podcast, host Jake Creps dives into the latest trends, tools, and investigations shaping open-source intelligence. Topics include OSINT’s role in counterterrorism, monitoring Chinese content for geopolitical insights, the risks of publicly indexed ChatGPT conversations, and creative pivots like SoundCloud-to-YouTube tracking. Jake also explores practical tools, from bookmarklets to geolocation training, and how AI-powered setups like VS Code + Copilot can supercharge investigations.Sources & Links:Full show notes & newsletter: OSINTNewsletter.com/77* Op-Ed: David Cook – How Publicly Available Clues Could Thwart the Next Lone Actor Terror Attack (https://washingtonreporter.news/p/op-ed-david-cook-how-publicly-available)* Investigating Chinese Content for OSINT – Justin Charters (https://www.linkedin.com/posts/justen-charters-1b99a953_chinese-osint-tips-1-belt-and-road-activity-7354278158306566144-p7Xz/)* ChatGPT Public Conversations Indexed on Google – Oliver Molander(https://www.linkedin.com/posts/olivermolander_artificialintelligence-activity-7356621639284862976-jlEL/)* New OSINT Bookmarklets from My OSINT Training – Micah Hoffman* BandLab: https://www.linkedin.com/posts/micahhoffman_another-osint-bookmarklet-this-bandlab-user-activity-7353427318880538625-cjsC/* TikTok: https://www.linkedin.com/posts/micahhoffman_extract-dates-from-tiktok-urls-with-click-activity-7353086892084482048-dkJh/* TraceTracks (https://github.com/Oblivios/TraceTracks)* GeoHints (https://geohints.com/) Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe
We’re returning with sharper insights, deeper investigations and the same mission as before: keeping you ahead of the curve in open source intelligence. Join Jake Creps every fortnight for episodes bringing you the latest in tools, tactics and investigations, with some extra special guests lined up to share their expertise and insights.🔎 Follow the OSINT Podcast:X / Twitter: https://x.com/osintpodcastLinkedIn: https://www.linkedin.com/company/osint-podcast/ Get full access to The OSINT Newsletter at osintnewsletter.com/subscribe