Skip to content
View wideintel's full-sized avatar
  • Joined Jan 1, 2026

Block or report wideintel

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this userโ€™s behavior. Learn more about reporting abuse.

Report abuse
wideintel/README.md

๐Ÿ›ก๏ธ WideIntel: The Strategic Intelligence Fusion Center

EMPOWERING OFFICIAL INVESTIGATIONS FOR LAW ENFORCEMENT, GOVERNMENT, NON-PROFITS & VERIFIED INVESTIGATORS.

WideIntel is a specialized, tactical infrastructure delivering advanced OSINT capabilities, data breach analysis, and digital forensics tools exclusively for official investigations.

WideIntel Status Restricted Grid Mission Protocol


๐Ÿ›๏ธ MISSION PROTOCOL

EST. 2025 // CLASSIFIED OPERATIONS

WideIntel bridges the gap between commercial intelligence and official investigations. We provide a specialized infrastructure empowering Law Enforcement, National Security Agencies, and Cyber Defense Units to mitigate digital threats without budgetary constraints.

In an era of escalating cybercrime, verified investigators often lack immediate access to critical data due to bureaucratic red tape and paywalls. WideIntel was engineered to solve this latency. By aggregating fragmented breach data, public records, and dark web signals into a single Zero-Knowledge Query Engine, we reduce investigation times from days to seconds.

Our mandate: Information Superiority for the Good Guys.


๐Ÿ” 1. CORE INTELLIGENCE (RESTRICTED GRID)

Authorized investigators access a centralized aggregation engine that queries multiple datasets simultaneously. WideIntel operates as a centralized intelligence fusion center, aggregating real-time intelligence from commercial, government, and dark-web sources.

๐Ÿšฉ Strategic API Fusion & Modules:

  • Universal Lookup (All-in-One): The platform's flagship engine. Executes a multi-threaded heuristic search across Breach Data, Social Media APIs, and Public Records simultaneously to build a comprehensive target profile.
  • Unified OSINT Search: A specialized deep-web engine focusing on username enumeration and identifying hidden digital footprints across forums, gaming platforms, and obscure social networks.
  • SEON Intelligence: Digital footprint analysis checking Email/Phone against 50+ social platforms (Facebook, LinkedIn, etc.) to verify identity and activity levels.
  • OSINTCat & IntelFetch: Versatile pivot tools that accept Email, Phone, IP, or Username and return associated entities from proprietary intelligence databases.
  • GHunt & Holehe: Advanced profiling modules for Google Accounts and social media registration checking (120+ platforms).

๐Ÿ”— REQUEST OFFICIAL ACCESS: https://www.wideintel.org/access


๐Ÿ’พ 2. BREACH & LEAKS (RESTRICTED ACCESS)

Direct access to indexed databases of compromised credentials, info-stealer logs, and historical leaks for attribution and account takeover verification.

  • Unified: A unified gateway querying multiple third-party breach repositories and stealer logs (Redline, Raccoon, Vidar) to find infected device fingerprints.
  • LeakCheck Global: Queries a global index of public data breaches to retrieve hashed or plaintext passwords associated with the target.
  • HudsonRock Forensic: Specialized search for 'Info-Stealer' malware logs. Identifies if a specific computer or employee device was compromised by botnets.
  • IntelX Archive: Searches the dark web, paste sites, and historical leaked documents for specific selectors (domains, emails, UUIDs).
  • Snusbase & BreachBase: Direct access to massive indices of dehashed passwords and domain-centric breach searches (e.g., @company.com).
  • HackCheck & IDLeakCheck: High-velocity engines optimized for government and public record breaches, providing rapid attribution for national identity exposure.

๐Ÿ› ๏ธ 3. PUBLIC ARSENAL (51 FREE TOOLS - DIRECT LINKS)

The Public Arsenal operates as a decentralized forensic suite. Every tool utilizes Zero-Knowledge architectureโ€”processing data client-side to ensure investigator anonymity.

๐Ÿ‡ฎ๐Ÿ‡ณ Indian Investigation Suite (Specialized)

  • ๐Ÿš€ CDR Processor - Full TSP Support + Tower Mapping (Jio, Airtel, VI, BSNL).
  • ๐Ÿš€ BSA Analyzer - Bank Statement Analysis & Fund Flow Tracing for Financial Fraud.
  • ๐Ÿš€ TSDP Parser - AI-powered Transaction Screenshot Data Parser (UPI/Banking).
  • ๐Ÿš€ Lat Long Mapper - Geospatial coordinate plotting & tactical route animation.
  • ๐Ÿš€ IFSC Lookup - Bulk Indian Bank Branch & Geolocation lookup.
  • ๐Ÿš€ Cell Tower Locator - Triangulation via Cell-ID and LAC data.
  • ๐Ÿš€ CDR Analyzer Lite - Quick-check utility for standard Call Detail Records.

๐Ÿ”ฌ Digital Forensics (Evidence Analysis)

  • ๐Ÿ” Error Level Analysis (ELA) - Forensic visualization technique to detect if an image has been digitally altered.
  • ๐Ÿ” Exif Forensics - Extracts GPS coordinates, Device Model, and Timestamps from raw images.
  • ๐Ÿ” Email Header Forensics - Parses raw headers to map routing paths and identify the true sender's IP.
  • ๐Ÿ” Document Metadata - Extracts 'Author', 'Software Version', and hidden OLE properties from Office/PDF docs.
  • ๐Ÿ” Stego Analyzer - Analyzes file entropy and binary strings to detect hidden archives or concealed messages.
  • ๐Ÿ” WhatsApp Viewer - Professional visualizer for exported forensic chat logs.
  • ๐Ÿ” Stylometry Analyzer - Linguistic analysis for authorship attribution of anonymous threats.

๐ŸŒ Infrastructure & Network Recon

  • ๐Ÿ“ก Shodan Host & Port Scan - Passive port scanning, banner grabbing, and service identification (CVE detection).
  • ๐Ÿ“ก Traceroute Visualizer - Maps network hops between our server and the target to identify ISPs.
  • ๐Ÿ“ก Subdomain Recon - Enumerates subdomains using Certificate Transparency (CT) logs and passive DNS.
  • ๐Ÿ“ก DNS Deep Dig - Retrieves A, MX, TXT, and SOA records to map a domain's infrastructure.
  • ๐Ÿ“ก SSL Chain Mapper - Maps certificate history to track infrastructure changes and ownership.
  • ๐Ÿ“ก MAC Vendor Lookup - Identifies hardware manufacturers (OUI Lookup).

๐Ÿ•ต๏ธโ€โ™‚๏ธ OSINT & Social Media Intelligence

  • ๐Ÿ”— Sherlock User Recon - Scans 300+ social platforms for digital footprints associated with a username.
  • ๐Ÿ”— GitHub Recon - Retrieves user activity, repositories, and potential emails exposed in commit logs.
  • ๐Ÿ”— Genesis Discord - Converts Discord numeric IDs into account creation dates and historical data.
  • ๐Ÿ”— Persona Generator - High-fidelity synthetic identity creation for undercover ops.
  • ๐Ÿ”— Dork Builder - Professional Google Dorking GUI for sensitive data leaks.

๐Ÿ” Utilities & Threat Intel


โš™๏ธ TECHNICAL SPECIFICATIONS

  • Zero-Knowledge Architecture: Investigative data is processed locally on the investigator's node; no data is stored on WideIntel servers.
  • Intelligence Fusion: Aggregates real-time data streams from commercial, government, and dark-web sources simultaneously.
  • Forensic Standards: Designed in compliance with ISO/IEC 27037 principles for digital evidence handling.

WideIntel: Information Superiority for the Good Guys.


Official Portal: www.wideintel.org
Public Arsenal: www.wideintel.org/freetools
API Contribute, Reporting & Security: https://www.wideintel.org/contribute

Popular repositories Loading

  1. wideintel wideintel Public

    WideIntel: Strategic Intelligence Infrastructure for Official Investigations. Centralized Grid for LEA/Govt & 51+ Professional Forensic Modules for Public Access.