← Back to Home

ODINT conducts systematic research into publicly accessible government digital infrastructure using open-source intelligence methodologies. All our research is passive, reproducible, and documented to the highest standards.

API

Exposed Government APIs

Systematic identification of misconfigured REST APIs, WordPress installations, GraphQL endpoints, and web services exposing sensitive data.

ID

Identity Exposure Research

Analyzing hash exposure vulnerabilities (MD5, SHA256, Gravatar) that can be cracked to reveal PII and demonstrate identity correlation risks.

NET

Infrastructure Mapping

Comprehensive enumeration of domains, subdomains, IP ranges, netblocks, CDNs, and hosting infrastructure using passive DNS and CT logs.

DOC

Document Scraping & Archiving

Mass collection and archiving of PDFs, Office documents, data exports, and government publications before they disappear.

META

Metadata & EXIF Analysis

Extracting embedded metadata from documents and images - author info, GPS coordinates, software versions, edit history, and hidden data.

SSL

SSL/TLS Certificate Analysis

Certificate transparency monitoring, expiry tracking, issuer analysis, and discovering hidden infrastructure through cert relationships.

MEDIA

Media Collection

Archiving photos, videos, and multimedia from government sources with full metadata preservation and chain of custody documentation.

LOG

Log & Backup Discovery

Identifying exposed log files, error logs, database backups, .sql dumps, .bak files, and configuration files left publicly accessible.

CRED

Credential Exposure

Discovering exposed API keys, tokens, SSH keys, PGP keys, and credentials inadvertently published in government repositories and configs.

GEO

Geolocation Intelligence

IP geolocation, server location mapping, GPS extraction from media, and correlating digital infrastructure with physical facilities.

TECH

Technology Stack Analysis

Fingerprinting CMS platforms, frameworks, server software, and third-party services to map technical dependencies and vulnerabilities.

GOV

Authoritarian Regime Focus

Special focus on digital vulnerabilities in authoritarian governments where exposure serves democratic accountability and human rights documentation.