2025
23 talksAutonomous Video Hunter: AI Agents for Real-Time OSINT
Kevin Dela Rosa
Building Local Knowledge Graphs for OSINT: Bypassing Rate Limits and Maintaining OPSEC
Donald Pellegrino
CTI-Agent: Automated battlecards from CTI reports
Mohamed Nabeel
Discord OSINT: An Empathic Banana and a Data Scraper Walk into a Search Bar
Zach Malinich
enumeraite: AI assisted web attack surface enumeration
Özgün Kültekin
From Dare to Discovery: How OSINT and Modern Recon Techniques Uncovered a Global VPN Infrastructure
Vladimir Tokarev
How to Become One of Them: Deep Cover Operations in Cybercriminal Communities
Sean Jones +1 more
Inside the Shadows: Tracking RaaS Groups and Evolving Cyber Threats
John Dilgen
Investigating Foreign Tech from Online Retailers
Michael Portera
KEYNOTE: Attack Surface in Motion: Why Today’s Threats Don’t Knock First
Muslim Koser
Mapping the Shadow War - From Estonia to Ukraine
Evgueni Erchov
OSINT Signals Pop Quiz!
Master Chen
Plug and Prey: Scanning and Scoring Browser Extensions
Nishant Sharma +1 more
Plumbing The Plumber: A Playbook for Integration Servers
Ryan Bonner +1 more
Pretty Good Pivot: Examining the PGP Key Pair Creation Habits of Dark Net Vendors
Sinwindie
Robin: The Archaeologist of the Dark Web - Because Manual Dark Web OSINT is So Last Season
Apurv Singh Gautam
Connected Car Attack Surface Mapping: OSINT Techniques for Automotive Threat Intelligence
Reuel Magistrado
Legal Entity-Driven Reconnaissance with OWASP Amass: Enhancing Bottom-Up Discovery Using RDAP
Jeff Foley
OSINT Against the Machine: Fighting AI-Generated Disinformation
Zoey Selman
Panel Discussion - Recon First Thinking: Winning Bounties Without Telling the Firewalls
Rohit Grover +3 more
Panel Discussion - The State of OSINT in 2025: The Technical Arms Race
Ram Ganesh
People as the Payload: OSINT Tactics for Identity Tracing, Social Graphing, and Executive Recon
Ankit Gupta +1 more
Pre-Identifying DNS Wildcards: A New Standard of Care
Daniel Schwalbe
2024
14 talksBastardo Grande: Hunting the Largest Black Market Bike Fence In The World
Bryan Hance
Bypassing WHOIS Rate Limiting and Alerting on Fresh Enterprise Domains
Willis Vandevanter
GeoINT Mastery: A pixel is worth a thousand words
Mishaal Khan
Maltego Community Workshop
Carlos Fragoso
OSINT at Clemson: Unmasking John Mark Dougan's Disinformation Empire
Steven Sheffield
OWASP Amass Expanding Data Horizons: Amassing More Than Subdomains
Jeff Foley
Pushing the limits of mass DNS scanning
Jasper Insinger
Recon MindMap: Organize, Visualize, and Prioritize Your Recon Data Efficiently
Lenin Alevski
Recursion is a Harsh Mistress: How (Not) To Build a Recursive Internet Scanner
TheTechromancer
SWGRecon: Automate SWG Rules, Policy, and Bypass Enumeration
Vivek Ramachandran
Tapping the OSINT potential of Telegram
Megan Squire
The art of Pivoting in OSINT Investigations
Ram Ganesh
From RAGs to Riches: Navigating Large Attack Surfaces with LLMs to Find Bugs
Anthony Rhodes
Hospitals, Airports, and Telcos - Modern Approach to Attributing Hacktivism Attacks
Itay Cohen
2023
20 talksAzure AD recon with OSINT tools
Dr Nestori Syynimaa
Bug Bounty Recon - Bypassing Geographic DNS with Ensemble
Anthony Russell
Bugs, Bounties, & Breaches - Insider Tales from the Trenches
Jason Haddix
Crushing crumbs of information to eat a whole cake.
Felipe Pr0teus
Easy EASM - the zero dollar attack surface management tool
Jason Haddix
Finding Hidden Gems In Temporary Mail Services
Berk Can Geyikci
Getting ahead of the bad guys with Internet Scanning data.
Vitor Ventura
How I Built Recon to Scale with Serverless Architecture
Gunnar Andrews (g0lden)
How I Found Your Password, and Other Advanced Data Hoarding Techniques
M4x 5yn74x
I Am The Disinformation Campaign
Master Chen
Keynote - Reshaping Reconnaissance: AI's Role in Open Source Intelligence
Matt Edmondson
Leakonomics 101: The Last Year in Data Leaks
Nick Ascoli
Mastering OSINT: Advanced Techniques in the Realm of Big Data
Seyfullah KILIÇ
Nosy Cops: Exposing the Hidden Potential of Police Radio
sally, who makes yachts
Oh The Places You'll Guo: Using Media Variants to Trace the Organization and Behavior of an Coordinated Inauthentic Influence Operation
Patrick Warren
Oh! The OSINT You Can Do!
Joe Gray
OSINT Privacy Unmasked: Taking Control of Your Digital Footprint in a Hyper-Connected World
Zoey Selman (aka V3rbaal)
Riding with the Chollimas: Our 100-Day Quest to Identify a North Korean State-Sponsored Threat Actor
Mauro Eldritch
The Perils of Generative AI: Implications for Open Source Intelligence Research
Andy Dennis
Unlocking the Power of OWASP Amass: Introducing the Open Asset Model for Comprehensive Attack Surface Mapping
Jeff Foley
2022
16 talks(Not-So-Secret) Tunnel: Digging into Exposed ngrok Endpoints
Eugene Lim
A Light in Darkness: Child Predator Hunting through OSINT, Dark Web Sleuthing & Linguistic Analysis
Jessica Smith
Attack Surface Management Panel
Ben Sadeghipour
Finding Hidden Gems In Temporary Mail Services
Berk Can Geyikçi
FOX STEED: Analysis of a Social Media Identity Laundering Campaign
Shea Nangle
Information Confrontation 2022 - A loud war and a quiet enemy
wbbigdave
New Frontiers in GitHub Secret Snatching
Tillson Galloway
Not All Who Wander Are Lost: Using OSINT for a Fulfilling Travel Experience
Tracy Z. Maleeff
NPM, "Private" Repos, and You
Justin Rhinehart
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs
Martin Vigo
Scanning your way into internal systems via URLScan
Rojan Rijal
Sonic scanning: when fast is not fast enough
Jasper Insinger
Stalking Back
Master Chen
The Bug Hunters Methodology - Application Analysis Edition v1.5
Jason Haddix
The Future of Collecting Data from the Past: OSINT Now and Beyond
Micah Hoffman
The Richest Phisherman in Colombia
Nick Ascoli
2021
15 talks.GOV Doppelgänger: Your Häx Dollars at Work
Anthony Kava
Adversary Infrastructure Tracking with Mihari
Manabu Niseki
Can I Make My Own Social Threat Score?
Master Chen
Finding Hidden Gems via URL Shortener Services
Utku Sen
Future of Asset Management
Ben Sadeghipour
How vigilant researchers can uncover APT attacks for fun and non profit
Ladislav Baco
Let the bugs come to me - how to build cloud-based recon automation at scale
Ryan Elkins
OSINT and the Hermit Kingdom. Leveraging online sources to learn more about the worlds most secret nation
Nick
OSINT for Sex Workers
Kala Kinyon
People Hunting: A Pentesters Perspective
Mishaal Khan
So You Want to OPSEC, Eh?
Ritu Gill
The Bug Hunter’s Recon Methodology
Tushar Verma
Using OSINT to Aid in Human Trafficking and Smuggling Cases
Rae
Using Passive DNS for gathering Business Intelligence
Andy Dennis
Venator: Hunting & Smashing Trolls on Twitter
Mauro Eldritch
2020
5 talks2019
21 talks“Can you add a conference line, please?” - Using Cloud Services for Dial-In Reconnaissance Automation
Alina Dorina
A URL Shortened By Any Other Name
Master Chen
Advanced Recon with OWASP Amass
Jeff Foley
Asset Discovery: Making Sense of the Ocean of OSINT
Richard Gold
Building an OSINT and Recon Program to address Healthcare Information Security issues
MITCHELL PARKER
DECEPTICON: OPSEC to Slow the OSINT
Joe Gray
Derevolutionizing OS Fingerprinting: the cat and mouse game
Jaime Sanchez - aka @segofensiva -
Finding the needle in the twitter haystack.
Wicked Clown
From email address to phone number
Martin Vigo
Generating Personalized Wordlists by Analyzing Target's Tweets
Utku Sen
Hack the Planet! Hackers Influencing Positive Change
Robert Sell
Hack to Basics - Adapting Exploit Frameworks to Evade Microsoft ATP
Anthony "C01И" Rose +1 more
OSINT Approach in Big-Data
Seyfullah KILIÇ
PIE - A hardware based Prebellico Intelligence Exfiltration Botnet
William Suthers
Social Media: The New Court of Public opinion (exploring the effects of social media and out unconscious bias)
Susan
The OSINT space is Growing Are we Ready
Adrian Korn
Use Responsibly: Recon Like an insider threat for Best User Training ROI
Kala Kinyon
Using OSINT for Competitive Intelligence
Chris Kirsch
AttackSurfaceMapper: Automate and Simplify the OSINT Process
Andreas Georgiou & Jacob Wilkin
Manhunting 101 - OSINT Crash Course vs Human Targets
Jason Edison
Mining for Gold: A Framework for Accessing Pastebin’s Hidden Treasures
Mike Landeck
2018
23 talks1983: I’m born. 2018: I’m taking on the bad guys
Jennifer Roderick
Adventures in the dark web of government data
Marc DaCosta
Applied OSINT For Politics: Turning Open Data Into News
Lloyd Miller
Bug Bounty Hunting on Steroids
Anshuman Bhartiya
Building visualisation platforms for OSINT data using open source solutions
Bharath Kumar +1 more
Core OSINT: Keeping Track of and Reporting All the Things
Micah Hoffman
Emergent Recon - fresh methodology and tools for hackers in 2018
Jason Haddix
Hacking the international RFQ Process #killthebuzzwords
Dino Covotsos
How WHOIS Data Uncovered $32 Billion Connected to the Mormon Church
Ethan Dodge
I fought the law and law lost
Mauro Caseres
Introducing YOGA: Your OSINT Graphical Analyzer
Micah Hoffman
Mapping Social Media with Facial Recognition
Jacob Wilkin
Mapping wifi networks and triggering on interesting traffic patterns
Caleb Madrigal
OpenPiMap - Hacking the hackers with OSINT, Raspberry Pis, and Data Analysis
Mark Klink
Prebellico - 100% Passive Pre-Engagement and Post Compromise Network Reconnaissance Tool
William Suthers
skiptracer - ghetto OSINT for broke hackers
illwill
Stalker In A Haystack
Master Chen
Supercharge Your Web Recon With Commonspeak and Evolutionary Wordlists
Michael Gianarakis +1 more
Targeted User Analytics and Human Honeypotss
Mbis0n Shadorū
WhiteRabbit: Combining Threat Intelligence Public Blockchain Data and Machine Learning to go Down the "Dirty Money" Rabbit Hole
Olivia Thet +1 more
Winning a SANS 504 CTF without winning a SANS CTF
Wbbigdave
Cartoons, Sketchnotes, Bullet Journals and Other Data Visualization Tricks
Raye Keslensky
Using Deep Learning to uncover darkweb malicious actors and their close circle
Rod Soto
2017
18 talksAn Introduction to Graph Theory for OSINT
Andrew Hay
Attack Surface Discovery with Intrigue
Jcran
Building Google For Criminal Enterprises
Anthony
Do Tinder Bots Dream of Electric Toys? How Tinder Bots are breaking hearts all over the world, and trashing Tinder’s reputation while they’re at it.
Inbar Raz
Domain Discovery: Expanding your scope like a boss
Jason Haddix
FERPA: Only Your Grades Are Safe; OSINT In Higher Education
Leah
How to obtain 100 Facebooks accounts per day through internet searches
Guillermo Buendia (m0m0)
Into the Bird’s Nest: A Comprehensive Look at Twitter as a Research Tool
Tracy Z. Maleeff
Keynote
Shane McDougal
OSINT Tactics on Source Code & Developers
Simon Roses
Recon and bug bounties what a great love story
Abhijeth
Skip tracing for fun and profit
Rhett Greenhagen
Total Recoll: Conducting Investigations without Missing aThing
Dakota Nelson
Up close and personal - Keeping an eye on mobile applications
Mikhail Sosonkin
Using DFIR Orchestration and Automation Tools and Playbooks For OSINT and Recon
Tyler
Intro to OSINT: Zero on the way to Hero
Joe Gray
Twitter Forensics
Christian Henerich
Using phonetic algorithms to increase your search space and detect misspellings.
Alex Kahan