Programs to optimize protection and information search

Along with the usual programs that make working on the Internet just comfortable, a number of utilities have been developed that provide users with specific assistance.

Collect, analyze, filter

For example, Paterva / Maltego is a universal program that is actively used in the work of journalists and information security specialists. Its main task is to collect data, analyze it, and provide a diagrammatic report.

With its help, materials are found according to the parameters possessed by the search objects. However, the utility is not as simple as it sounds. Before it, you can set the task: to find all the email addresses of one domain registered in one social network. This information may remain solely the property of the requested person or become the property of open sources of information. Also, the program is used as a filter for suspicious email addresses; processes tweets (even anonymous ones).

There are 12 functions in the program. Among them is the search for photographs "by fingerprints" (more correctly, metadata). Depending on what kind of search is used to collect information (from simple to in-depth), the user may need a different amount of free space on the computer, a longer waiting time for the result. The utility requires the installation of software with registration via an email address, from where the data is subsequently taken.

Privacy for security

The site also presents Epic Privacy Browser - a browser for anonymous Internet surfing, which allows you to protect ordinary users from surveillance. By running the "incognito" mode, the anonymous visitor of websites automatically guarantees the safety of his own person. There are several options for disabling tracking modes: using a special plug-in or simply launching the Epic Privacy Browser.

The browser is quite similar to the work of the Shadow Internet, it also makes it possible to turn off ads and access the most closed resources.

Tails Live OS is a specially designed anonymous operating system that protects Internet users from being tracked. At the same time, Internet visits are reduced to using the Tor launch, which uses additional protective measures comparing to Epic Privacy Browser. A non-confidential visit to the "white" Internet is impossible.


This resource is focused on collecting information using free programs, websites, mobile applications, etc. The main goal is to help people find resources that make it possible to get information for free.

Initially, the materials were collected focusing on information security. However, many resources from other directions were added later. Please email us if you think we have forgotten something.

The OSINT Framework project is taken as a basis.

Suggestions, comments, feedback

Write to our email [email protected]