Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026
    Facebook X (Twitter) Instagram
    • Demos
    • Technology
    • Gaming
    • Buy Now
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Canadian Cyber WatchCanadian Cyber Watch
    • Home
    • News
    • Alerts
    • Tips
    • Tools
    • Industry
    • Incidents
    • Events
    • Education
    Subscribe
    Canadian Cyber WatchCanadian Cyber Watch
    Home»News»The OSINT Newsletter – Issue #101
    News

    The OSINT Newsletter – Issue #101

    adminBy adminApril 2, 2026No Comments7 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Share
    Facebook Twitter LinkedIn Pinterest Email


    👋 Welcome to the 101st issue of The OSINT Newsletter. This issue contains OSINT news, community posts, tactics, techniques, and tools to help you become a better investigator.

    🚨 This is the first post in the return of OSINT Tool Tuesday, an ongoing series of tool review deep dives aimed at helping investigators improve their tool kit. I understand it’s Thursday… we will be publishing these on Tuesdays moving forward!

    TheBigBrother is a GitHub project that offers a comprehensive OSINT framework designed to investigate an individual’s digital footprint across the internet, enabling users to gather information such as associated usernames, social media profiles, metadata, and other publicly available intelligence. Essentially, it’s a username tool on steroids.

    🎩 H/T: Chadi0x

    TheBigBrother allows you to search primarily by username, while also supporting a range of modules including email lookups, domain intelligence, metadata extraction (EXIF), and cryptocurrency tracing.

    It brings together multiple OSINT techniques into a single toolkit, making it a valuable resource for investigations across law enforcement, cyber security, corporate intelligence, executive protection, and online threat analysis.

    In this guide, I’ll walk you through how to set up The Big Brother, how to use the tool, practical use cases you can apply it to, and key pivot points you can leverage from the information it uncovers.

    Let’s get started. ⬇️

    Recommended = Docker Method

    The easiest way to get The Big Brother up and running is by using Docker, which handles all dependencies and environment configuration for you.

    Before you begin, make sure you have installed:

    You can verify installation with by typing these commands into your terminal:

    On your terminal, run:

    Run the following command to build and start the tool:

    This will:

    MANUAL SETUP

    If you prefer not to use Docker, you can install and run The Big Brother locally using Python.

    Make sure the following are installed:

    You can verify with:

    1. Create a virtual environment

    1. Install Dependencies

    1. Launch the Application

    1. Install Dependencies

    1. Launch the Application

    Next Steps:

    Once running, open your browser and go to:

    http://localhost:8000

    You’ll see the The Big Brother web interface, where you can:

    • Enter usernames

    • Run modules

    • View results visually

    Now, let’s dive into TheBigBrother usage and use cases.

    Now that we’ve covered the basics, let’s dive into some of the core modules within The Big Brother and how you can use them in OSINT investigations.

    The Profiler module is designed to build a high-level overview of a target by aggregating information from multiple sources into a single profile.

    This can include:

    • Usernames

    • Social media accounts

    • General online presence

    Example:

    This will produce a consolidated view of the target, helping you quickly understand who you’re dealing with.

    On the web interface, you can enter a target identifier (username, email address, phone number). Associated profile images will appear in the blank space above.

    🗒️ This is a great starting point before diving deeper into specific modules.

    The Footprint module focuses on identifying where a username exists across the internet.

    Example:

    This will:

    As you can see, our test on the web interface brought up 7 platforms linked to our email address.

    🗒️ Use this to identify pivot points into other tools or manual investigation.

    The Net Scan module is used for gathering network-level intelligence.

    Example:

    This may return:

    Our YouTube example on the web interface brought up the below network information:

    🗒️ Useful for infrastructure mapping and identifying related assets.

    The Dark Web module attempts to identify whether a target appears in:

    • Data breaches

    • Leaked databases

    • Dark web mentions

    Example:

    This can help uncover:

    • Compromised credentials

    • Exposure risks

    • Historical leaks

    You can enter a keyword e.g. a leak or database into the web interface search bar as below:

    The Crypto module is used to analyse cryptocurrency wallets and transactions.

    Example:

    This may reveal:

    • Transaction history

    • Wallet activity

    • Links to other wallets

    On the web interface, simply enter the wallet address in question into the search bar below (bitcoin or ethereum).

    🗒️ Particularly useful in fraud, ransomware, or financial investigations.

    The SSL module gathers intelligence from SSL certificates.

    Example:

    This can uncover:

    • Associated domains

    • Certificate details

    • Infrastructure links

    🗒️ Great for finding hidden or related domains tied to a target.

    The EXIF module extracts metadata from images.

    Example:

    This may include:

    • GPS coordinates

    • Device information

    • Date/time data

    As in our web interface example, you won’t always get detailed information.

    🗒️ Extremely useful when analysing images from social media or leaks.

    The Dorks module leverages advanced search queries (Google Dorking) to find indexed information about a target.

    Example:

    This will generate queries to uncover:

    • Public documents

    • Exposed data

    • Indexed profiles

    🗒️ Helps surface information that isn’t easily found through direct searches.

    The GEOINT module focuses on geographic intelligence.

    Example:

    This may help:

    • Identify locations from images

    • Analyse geographic patterns

    • Support situational awareness

    Our web interface search produced various location insights from various different sources, ideal for corroboration.

    🗒️ Useful for uncovering location-based insights from images, videos, and geographic data.

    The Sky Radar module is used for aviation-related intelligence.

    Example:

    This can provide:

    • Flight tracking data

    • Aircraft information

    • Movement patterns

    🗒️ Useful in niche investigations involving travel, logistics, or tracking assets.

    TheBigBrother is essentially a username intelligence + image correlation tool that:

    That combination is best for identity linking, username pivoting, and avatar-based correlation.

    The bottom line? It shines in early-stage investigations, when you’re trying to answer: “Where else does this person exist online?”

    Where this tool is actually useful in OSINT:

    Identity Correlation/linking accounts

    If you start with a username or even just a profile image, you can find matching usernames across platforms, confirm links using reused profile pictures, and cluster accounts belonging to the same person.

    Social Media Investigations

    The tool accelerates what analysts normally do manually i.e. searching usernames across platforms, comparing profile photos and running reverse image searches separately. With this automated, you can quickly find forgotten/old accounts, identify niche platforms, and uncover behaviour patterns across platforms.

    Reverse Image Pivoting

    This is, in our opinion, an underrated use of the tool. Essentially, because it auto-runs reverse image searches, you can detect reused avatars across multiple accounts, spot fake personas using stock/AI images, and find the original source of a profile image. This is useful for catfish investigations, scammer tracking, or simply verifying whether a persona is real.

    Threat Intelligence / Cyber Investigations

    In cyber threat intel, attackers often reuse usernames, avatars, and branding. TheBigBrother helps pivot from a known handle to a broader footprint, and can identify presence on GitHub, forums, marketplaces, and social platforms.

    Red Teaming / Privacy Audits

    Security teams can use this tool to understand what an attacker could discover publicly via simulating how easily identities can be correlated and identifying OPSEC failures such as username and avatar reuse.

    🏁 New CTF Challenge Live – The Insider

    A new CTF challenge has been posted on our CTF website. This week’s challenge focuses on Local search methods. Your task is to identify the username of an insider who plans to target a company with ransomware and also determine the targeted company name.

    Start competing in our Capture the Flag (CTF)

    🪃 If you missed the last CTF, here’s a link to catch up.

    Last week’s CTF challenge featured a challenge titled “The Hacktivist”.

    Solution WU :

    Using Twitter Viewer – View Twitter Without Account and typing the username of the X account “RepresaliaNet” we could browse the posts made by the threat actor without having an account.

    While browsing the posts, we could notice that one of the posts published on Nov 28, 2024 contains the username : YourZer321-PVC

    Scrolling further, we could see that the first post date was : 25/09/2024

    To find the country we needed to have an account (Sock Puppet). By clicking on “about this account”, we could see that the account was based in : Uzbekistan

    ✅ That’s all for this issue of The OSINT Newsletter. Thanks for reading and supporting this publication with a paid subscription.

    💡 Remember OSINT != tools. Tools help you plan and collect data but the result of that tool is not OSINT. You must analyze, verify, receive feedback, refine, and produce a final, actionable product of value before it can be called intelligence.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleSSA-216014 V1.3 (Last Update: 2026-02-10): Vulnerabilities in EFI variable of SIMATIC IPCs, SIMATIC Tablet PCs, and SIMATIC Field PGs
    Next Article OpenSSH security advisory (AV26-312) – Canadian Centre for Cyber Security
    admin
    • Website

    Related Posts

    News

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026
    News

    Is a $30,000 GPU Good at Password Cracking?

    April 8, 2026
    News

    InfoSec News Nuggets 04/08/2026

    April 8, 2026
    Add A Comment

    Comments are closed.

    Demo
    Top Posts

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews
    85
    Featured

    Pico 4 Review: Should You Actually Buy One Instead Of Quest 2?

    January 15, 2021 Featured
    8.1
    Uncategorized

    A Review of the Venus Optics Argus 18mm f/0.95 MFT APO Lens

    January 15, 2021 Uncategorized
    8.9
    Editor's Picks

    DJI Avata Review: Immersive FPV Flying For Drone Enthusiasts

    January 15, 2021 Editor's Picks

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Demo
    Most Popular

    Global Takedown of Massive IoT Botnets Halts Record-Breaking Cyberattacks

    March 20, 202619 Views

    Catchy & Intriguing

    March 17, 202619 Views

    The Grandparent Scam: How AI Voice Technology Makes This Old Con Deadlier Than Ever

    March 18, 202617 Views
    Our Picks

    Incident: Eagers Automotive says IT outage stems from cyber incident | iTnews

    April 8, 2026

    Accelerating Our Footprint and Innovation: Why VulnCheck Posted a Record-Setting Q3 | Blog

    April 8, 2026

    CISA Adds One Known Exploited Vulnerability to Catalog

    April 8, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • Home
    • Technology
    • Gaming
    • Phones
    • Buy Now
    © 2026 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.