The OSINT Framework by @jnordine is one of the most referenced resources in the intelligence community — a massive, well-maintained tree of tools organized by data type: username, email, IP, domain, and so on. It answers the question "what tool searches X?"
That's powerful. But when you're in the middle of an actual investigation, the question you're asking is different: "I need to find a missing person — where do I start?" The data-type model forces you to know the answer before you know the question.
That gap is what I built OSINT Mission Framework to close.
What It Is
A fork of the original OSINT Framework with a second navigation layer added on top — organized around investigative missions rather than data types. The original tool collection is preserved in full (credit to @jnordine). This project adds structured, phase-by-phase workflows for eight common investigation types.
It ships as a single self-contained HTML file. No server, no build step, no dependencies. Open it in a browser and you're ready.
The Eight Missions
Each mission is broken into four sequential phases with curated tool recommendations per phase:
🔍 Missing Person Search
Phase 1: Identity anchors (names, aliases, DOB)
Phase 2: Social footprint mapping
Phase 3: Physical location signals
Phase 4: Verification & cross-referencing
🧒 Missing Children
Phase 1: Official registries (NCMEC, Interpol notices)
Phase 2: Digital trail analysis
Phase 3: Family & social network mapping
Phase 4: NGO resources & escalation
🔐 Privacy Leak / Data Breach
Phase 1: Credential exposure checks
Phase 2: Paste site monitoring
Phase 3: Dark web search
Phase 4: Document metadata analysis
🗂️ Background Check
Phase 1: Identity verification
Phase 2: Criminal & court records
Phase 3: Financial & asset records
Phase 4: Property & address history
🏢 Corporate Intelligence
Phase 1: Registration & corporate structure
Phase 2: Infrastructure & technical footprint
Phase 3: Litigation & regulatory history
Phase 4: Key people & org charts
📍 Physical Location Intel
Phase 1: Image geolocation
Phase 2: IP & network location
Phase 3: Social signal correlation
Phase 4: Transport & check-in data
📰 Disinformation / Fake Accounts
Phase 1: Account authenticity signals
Phase 2: Media verification (reverse image, metadata)
Phase 3: Narrative tracking & spread analysis
Phase 4: Attribution techniques
🌑 Dark Web & Threat Intel
Phase 1: Dark web search & indexing
Phase 2: Threat feed correlation
Phase 3: Credential & leak monitoring
Phase 4: Actor attribution
Features
Beyond the mission layer, the tool includes a few practical UX additions over the original framework:
R — requires registration / account
T — requires local install
D — Google Dork (no tool, just a query pattern)
+ Search across all tools by name or tag
+ Filter by category or mission
+ Classic tree view preserved for power users
+ Works offline — single HTML file, zero dependencies
Who It's For
The original OSINT Framework was built for and by security researchers. This fork is designed to also be useful for journalists, lawyers, HR investigators, and law enforcement analysts who know what they're looking for but not necessarily which tool category to start with.
It's deliberately not a security tool. There are no exploit modules, no active scanning capabilities. Every tool in it queries publicly available data or passive sources. The mission structure is about reducing cognitive overhead at the start of an investigation — not automating anything.
Technical Notes
The entire project lives in a single
osint-mission-framework.html file — pure HTML, CSS, and vanilla JS.
Fork it, drop it in your OSINT lab's public/ folder, or just
open it locally. The data structure for each tool follows the original
OSINT Framework contribution format with a missions array added:
{
"name": "Example Tool",
"type": "url",
"url": "https://example.com",
"missions": ["missing-person", "background-check"]
}
Pull requests are welcome, especially for mission additions or tool coverage gaps. If you're adding a new mission type, open an issue first so we can agree on the phase structure before implementation.
Get It
The project is open source under the MIT license — same as the original OSINT Framework it's based on.
git clone https://github.com/JeanDevenish/OSINT_Framework_Mission_Intelligence
open osint-mission-framework.html
// All OSINT activity must be conducted within the bounds of applicable law. This tool references publicly available data sources only. Always obtain proper authorization before investigating individuals.