***Myself and any other potential contributors to this website are NOT in any way affiliated with, sponsored by, or endorsed by any of the companies that may be listed on this website.
> *Feel free to save, download, archive, copy, share, edit, re-post and re-upload any content that can be found on this web site. You do not have to give me credit, but that would be obviously preferred if you did! Also, I would prefer that people do not just take this content and claim it as their own. Although I'm sure that will happen eventually because that's how the internet works, not that big of a deal either way. Sharing is caring!*
To view the most recently added resources for 2022, click [here](https://github.com/OhShINT/ohshint.gitbook.io/blob/main/Lists_of_OSINT_Web_Resources/2022-Recently-Added-Resources_ohshint.md).
Figured it was time to actually document some of my work. This blog is mostly going to be articles, write-ups and other ramblings about a few different intelligence and counter-intelligence subjects.
Including anything related to open-source intelligence, operational security, anonymity, surveillance and counter-surveillance techniques, trade-craft, and probably a little bit of cyber-security related content.
A little backstory about the author (_that's me_). I am a licensed private investigator who has specialized in the art of intelligence collection, surveillance, and counter-surveillance operations.
Some of my other hobbies include cyber-security, internet culture, firearms technology, forensic document examination, and general spy-craft related things. There will be articles about all of these different subjects here soon, as ~I have planned to post a new article every week if time permits and can actually get away from my busy schedule~. Well, this was a lie..
- *Everything and anything related to OSINT investigations, intelligence discovery and intelligence collection. Including lists of resources and tools, write-ups of my OSINT research, guides and different techniques on how to conduct OSINT investigations on a vast amount of different platforms and subjects.*
L E T S G E T S O M E O S I N T G O I N G O N I N H E R E
```
## Shoutz and Greetz
[@cyb_detective](https://twitter.com/cyb_detective), [@sinwindie](https://twitter.com/sinwindie), [@zewensec](https://twitter.com/zewensec), [Oryon](https://github.com/oryon-osint), [@palenath](https://twitter.com/palenath), [@WebBreacher](https://twitter.com/WebBreacher), [@ChaosD0c](https://twitter.com/ChaosD0c), [@epieos](https://twitter.com/epieos), [@AccessOSINT](https://twitter.com/AccessOSINT), [@Lorandbodo](https://twitter.com/Lorandbodo), [@dutch_osintguy](https://twitter.com/dutch_osintguy), [@jakecreps](https://twitter.com/jakecreps), [Shikata](https://twitter.com/_shikata_), [ser3n1ty](https://ser3n1ty.com), [Chimra](https://twitter.com/Blessed_Chimra), [Sporeo](https://twitter.com/SporeoTheOreo), [@d4vid_lucifer](https://twitter.com/d4vid_lucifer), [yyyy](https://teachyourselfinfosec.com), [@ryancollins_dev](https://twitter.com/ryancollins_dev), Gara, all the great people from [Bellingcat](https://www.bellingcat.com), [LaptopHackingCoffee](https://disboard.org/server/326839256758616068), [The OSINTion](https://www.theosintion.com), [TraceLabs](https://www.tracelabs.org), [OSINT Curious](https://osintcurio.us), [Abstract Security](https://abstract-security.lugons.org), [IntelTechniques](https://inteltechniques.com), [JHDiscord](https://www.johnhammond.org), [HackTheBox](https://hackthebox.eu), [sector035](https://sector035.nl), [Digital Forensics Discord](https://github.com/Digital-Forensics-Discord-Server), 0x4rk0 Discord, and all the others who did not wish to be named, thank you all! <3