C:\DOSec\blog\post-05 — OSINT_FRAMEWORK.TXT _
C:\DOSec> blog> type post-05.txt

OSINT Mission Framework: Organizing Investigations by Goal

The OSINT Framework by @jnordine is one of the most referenced resources in the intelligence community — a massive, well-maintained tree of tools organized by data type: username, email, IP, domain, and so on. It answers the question "what tool searches X?"

That's powerful. But when you're in the middle of an actual investigation, the question you're asking is different: "I need to find a missing person — where do I start?" The data-type model forces you to know the answer before you know the question.

That gap is what I built OSINT Mission Framework to close.

What It Is

A fork of the original OSINT Framework with a second navigation layer added on top — organized around investigative missions rather than data types. The original tool collection is preserved in full (credit to @jnordine). This project adds structured, phase-by-phase workflows for eight common investigation types.

It ships as a single self-contained HTML file. No server, no build step, no dependencies. Open it in a browser and you're ready.

The Eight Missions

Each mission is broken into four sequential phases with curated tool recommendations per phase:

  🔍  Missing Person Search
      Phase 1: Identity anchors (names, aliases, DOB)
      Phase 2: Social footprint mapping
      Phase 3: Physical location signals
      Phase 4: Verification & cross-referencing

  🧒  Missing Children
      Phase 1: Official registries (NCMEC, Interpol notices)
      Phase 2: Digital trail analysis
      Phase 3: Family & social network mapping
      Phase 4: NGO resources & escalation

  🔐  Privacy Leak / Data Breach
      Phase 1: Credential exposure checks
      Phase 2: Paste site monitoring
      Phase 3: Dark web search
      Phase 4: Document metadata analysis

  🗂️  Background Check
      Phase 1: Identity verification
      Phase 2: Criminal & court records
      Phase 3: Financial & asset records
      Phase 4: Property & address history

  🏢  Corporate Intelligence
      Phase 1: Registration & corporate structure
      Phase 2: Infrastructure & technical footprint
      Phase 3: Litigation & regulatory history
      Phase 4: Key people & org charts

  📍  Physical Location Intel
      Phase 1: Image geolocation
      Phase 2: IP & network location
      Phase 3: Social signal correlation
      Phase 4: Transport & check-in data

  📰  Disinformation / Fake Accounts
      Phase 1: Account authenticity signals
      Phase 2: Media verification (reverse image, metadata)
      Phase 3: Narrative tracking & spread analysis
      Phase 4: Attribution techniques

  🌑  Dark Web & Threat Intel
      Phase 1: Dark web search & indexing
      Phase 2: Threat feed correlation
      Phase 3: Credential & leak monitoring
      Phase 4: Actor attribution
        

Features

Beyond the mission layer, the tool includes a few practical UX additions over the original framework:

  R  — requires registration / account
  T  — requires local install
  D  — Google Dork (no tool, just a query pattern)

  + Search across all tools by name or tag
  + Filter by category or mission
  + Classic tree view preserved for power users
  + Works offline — single HTML file, zero dependencies
        

Who It's For

The original OSINT Framework was built for and by security researchers. This fork is designed to also be useful for journalists, lawyers, HR investigators, and law enforcement analysts who know what they're looking for but not necessarily which tool category to start with.

It's deliberately not a security tool. There are no exploit modules, no active scanning capabilities. Every tool in it queries publicly available data or passive sources. The mission structure is about reducing cognitive overhead at the start of an investigation — not automating anything.

Technical Notes

The entire project lives in a single osint-mission-framework.html file — pure HTML, CSS, and vanilla JS. Fork it, drop it in your OSINT lab's public/ folder, or just open it locally. The data structure for each tool follows the original OSINT Framework contribution format with a missions array added:

{
  "name": "Example Tool",
  "type": "url",
  "url": "https://example.com",
  "missions": ["missing-person", "background-check"]
}
        

Pull requests are welcome, especially for mission additions or tool coverage gaps. If you're adding a new mission type, open an issue first so we can agree on the phase structure before implementation.

Get It

The project is open source under the MIT license — same as the original OSINT Framework it's based on.

git clone https://github.com/JeanDevenish/OSINT_Framework_Mission_Intelligence
open osint-mission-framework.html
        

> View on GitHub →

──────────────────────────────────────────

// All OSINT activity must be conducted within the bounds of applicable law. This tool references publicly available data sources only. Always obtain proper authorization before investigating individuals.