Independent. Decentralized. Nonprofit.
ODINT is an independent, decentralized nonprofit research organization dedicated to auditing publicly accessible government digital infrastructure worldwide using open-source intelligence (OSINT) methodologies. We expose what those in power would rather keep hidden — through rigorous, reproducible, passive reconnaissance.
We don't hack. We don't exploit. We document what's already public and hold power accountable with it.
This is our shared workspace. Our war room.
Every piece of research, every lead, every methodology, every tool reference, every dataset note — it belongs here. If it's in your head or buried in a DM, it's not helping the mission. Put it here.
This repo is how we build on each other's work instead of working in silos.
| Directory | Contents | Status |
|---|---|---|
CYBER RECON TOUR/ |
Government, military, media, education, and business domains organized by country and region | Active — 270 countries, 14 regions |
Ideas and future directories to build out:
| Directory | What It Will Contain |
|---|---|
RESEARCH/ |
Country analyses, domain inventories, API exposure notes, infrastructure maps |
LEADS/ |
Government domains worth investigating, tips on exposed infrastructure, leads from the field |
METHODOLOGIES/ |
OSINT techniques, recon workflows, tool configurations, data collection procedures |
TOOLS/ |
Scripts, tool recommendations, browser extensions, useful databases, reference material |
INTELLIGENCE/ |
Disinformation campaigns, threat actor observations, geopolitical context, regional briefings |
DATASETS/ |
Archived data, metadata dumps, certificate logs, document collections (sanitized) |
LEGAL/ |
Jurisdiction notes, disclosure frameworks, legal considerations by country |
If you're not sure whether something belongs — it probably does. Push it.
Know a government website in your country that looks like it was built in 2003 and probably leaks data? A ministry portal with exposed APIs? A military subdomain that shouldn't be public? Drop it in. We have the tools. We have the pipeline. We just need targets.
Fork the repo, add your domains to the right region in CYBER RECON TOUR/, and open a PR. One domain per line. Bare domains only — no https://, no trailing /.
git clone https://github.com/Ringmast4r/ODINT.git
cd ODINT
# Add domains to the right region file
git add .
git commit -m "Add [country] government domains"
git push origin mainDon't want to touch git? Don't care about PRs? Submit an anonymous tip with the domains. No email required. No sign-in. No tracking. We'll add them ourselves.
Clone it. Run the Recon Suite against whatever you want. Push your findings. Raw notes, half-finished leads, messy data — all of it is better than nothing. Clean it up later.
No gatekeeping. No bureaucracy. No approval process. If it helps the mission, push it.
The tools powering ODINT's reconnaissance operations. 16 Go-based OSINT tools — scanners, pipelines, exploit frameworks, and target lists.
Recon Suite — Full tool index, documentation, and campaign results.
Every ODINT contributor operates under these non-negotiable principles:
- Passive reconnaissance only — no active exploitation, no unauthorized access, ever
- Public data only — all research must be independently reproducible
- Protect the vulnerable — journalist and activist data is scrubbed on request within 24 hours
- Document everything — methodology is always published alongside findings
- Independence — no government or corporate influence on our research
- Government API exposure analysis
- Identity and hash correlation research
- Infrastructure mapping (DNS, SSL/TLS, CT logs)
- Document and metadata archiving
- Credential and key exposure discovery
- Authoritarian regime digital infrastructure
- Disinformation and influence operations (Indo-Pacific, Latin America)
- Border security and trafficking network intelligence
- Counterterrorism network mapping
Have information about exposed government infrastructure, data leaks, or something worth investigating? Submit it anonymously — no email, no sign-in, no tracking.
270 Countries & Territories | 14 Regions | CYBER RECON TOUR/
Curated lists of government, military, media, education, and business domains organized by country and region. Each file contains categorized targets for passive reconnaissance.
270 Countries & Territories | 14 Regions
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- Email: odint_io@proton.me
- Web: odint.io
- Secure: Signal available on request
Transparency doesn't happen by accident. It happens because people like us do the work — methodically, ethically, and relentlessly.
If you have something that helps the mission, commit it. If you found something worth investigating, document it. If you built something useful, share it.
This repo is only as powerful as what we put into it. Let's build something that matters.
ODINT is an American public benefit nonprofit corporation. 501(c)(3) status pending.
