Systems Audit

OSINT Methodology & Tools

You shouldn't have to be a hacker to understand how the system works.

These frameworks and tools represent my investigative process — open-source, reproducible, and accessible to anyone willing to dig.

Reconnaissance

  • subfinder — subdomain discovery
  • amass — attack surface mapping
  • assetfinder — related domains
  • httpx — probe verification

Document Analysis

  • pdf-parser — metadata extraction
  • exiftool — file forensics
  • OCR pipelines — scanned docs
  • grep/ripgrep — text search

Network Mapping

  • nuclei — vulnerability scanning
  • theHarvester — OSINT aggregation
  • maltego — visual linking
  • shodan — internet-wide search

Operational Security

  • Tor/proxy chains
  • VM isolation
  • compartmentalized identities
  • encrypted communications

The Process

  1. 1Define — What are you trying to prove? Scope the question.
  2. 2Collect — Gather primary sources. Government docs, court filings, corporate records.
  3. 3Verify — Cross-reference. Never trust a single source.
  4. 4Analyze — Find the pattern. Connect the dots.
  5. 5Publish — Document everything. Make it reproducible.

Available Products

The Digital Audit Handbook

£29

Complete methodology for conducting system audits. Tools, process, legal considerations.

Get on Gumroad →

Privacy Playbook for the Paranoid

£19

Operational security for researchers, journalists, and activists.

Get on Gumroad →