Systems Audit
OSINT Methodology & Tools
You shouldn't have to be a hacker to understand how the system works.
These frameworks and tools represent my investigative process — open-source, reproducible, and accessible to anyone willing to dig.
Reconnaissance
- subfinder — subdomain discovery
- amass — attack surface mapping
- assetfinder — related domains
- httpx — probe verification
Document Analysis
- pdf-parser — metadata extraction
- exiftool — file forensics
- OCR pipelines — scanned docs
- grep/ripgrep — text search
Network Mapping
- nuclei — vulnerability scanning
- theHarvester — OSINT aggregation
- maltego — visual linking
- shodan — internet-wide search
Operational Security
- Tor/proxy chains
- VM isolation
- compartmentalized identities
- encrypted communications
The Process
- 1Define — What are you trying to prove? Scope the question.
- 2Collect — Gather primary sources. Government docs, court filings, corporate records.
- 3Verify — Cross-reference. Never trust a single source.
- 4Analyze — Find the pattern. Connect the dots.
- 5Publish — Document everything. Make it reproducible.
Available Products
The Digital Audit Handbook
£29
Complete methodology for conducting system audits. Tools, process, legal considerations.
Get on Gumroad →Privacy Playbook for the Paranoid
£19
Operational security for researchers, journalists, and activists.
Get on Gumroad →