block 2 · online
editorial

Articles, guides and updates.

Long-form pieces, tool reviews and operational notes. Every article declares its type, risk level and update cadence.

total
23
featured
2
source
lab.v_articles_base
01featured

Editor-picked.

02all

All articles · 23.

guideApr 21, 2026

How to Use Sanctions and Risk Lists Without Overreading Them

Sanctions and risk datasets can be useful, but they are easy to misread. Here is a practical way to use them without collapsing adjacency into certainty.

/articles/how-to-use-sanctions-and-risk-lists-without-overreading-them
guideApr 21, 2026

A Practical Method for Domain and Infrastructure Recon

A practical framework for reading domains, certificates, DNS history, stack hints, and broader internet-facing context without turning infrastructure research into noise.

/articles/a-practical-method-for-domain-and-infrastructure-recon
articleApr 21, 2026

OpenCorporates vs Aleph: Which One Fits Which Research Job?

OpenCorporates and Aleph are both useful for company research, but they solve different problems. One is better for legal identity, the other for documentary context.

/articles/opencorporates-vs-aleph-which-one-fits-which-research-job
articleApr 21, 2026

crt.sh vs SecurityTrails vs Censys: Three Different Ways to Read Infrastructure

crt.sh, SecurityTrails, and Censys all help with infrastructure research, but they answer different questions and belong at different points in the workflow.

/articles/crtsh-vs-securitytrails-vs-censys
guideApr 21, 2026

Start Here: How to Use an OSINT Tool Catalog Without Getting Lost

A practical introduction to navigating an OSINT tool catalog without falling into random tool-hopping, weak assumptions, or unnecessary complexity.

/articles/start-here-how-to-use-an-osint-tool-catalog-without-getting-lost
guideApr 21, 2026

A Responsible Method for Company Research with Public Sources

A practical framework for researching companies through public records, sanctions data, and document-led sources without turning the process into noise or overreach.

/articles/a-responsible-method-for-company-research-with-public-sources
articleApr 21, 2026

Wayback Machine vs SingleFile vs ArchiveBox: Which Preservation Tool Fits Which Job?

Three very different approaches to preservation: public web history, local page capture, and self-hosted archiving. Here is how to choose the right one for the job.

/articles/wayback-machine-vs-singlefile-vs-archivebox
tutorialApr 21, 2026

Building a Lightweight Evidence Capture Workflow

A practical workflow for capturing, preserving, and packaging public web evidence without overengineering the process or losing track of what matters.

/articles/building-a-lightweight-evidence-capture-workflow
guideApr 20, 2026

Getting Started with Public Surface Analysis

A beginner-friendly walkthrough of what you can responsibly learn from a public URL.

/articles/getting-started-with-public-surface-analysis
articleApr 20, 2026

What Security Headers Actually Tell You

Security headers are not magic. Here is what they do, what they don't, and how to read them.

/articles/what-security-headers-actually-tell-you
guideApr 20, 2026

SPF, DKIM and DMARC: What They Reveal and What They Don't

Email authentication records are not silver bullets. Here is how to interpret them responsibly.

/articles/spf-dkim-dmarc-what-they-reveal
articleApr 21, 2026

SpiderFoot vs Maltego: Breadth, Structure and Workflow Maturity

SpiderFoot and Maltego both expand investigations, but one leans toward broad automated collection while the other shines when structured relationship analysis matters more than raw breadth.

/articles/spiderfoot-vs-maltego-breadth-structure-and-workflow-maturity
articleApr 21, 2026

Hunchly vs ArchiveBox: Evidence Packaging vs Archive Ownership

Hunchly and ArchiveBox both support preservation, but one is built around investigative evidence packaging while the other is better understood as self-hosted archive infrastructure.

/articles/hunchly-vs-archivebox-evidence-packaging-vs-archive-ownership
articleApr 21, 2026

TinEye vs Forensically vs ExifTool: Three Different Jobs in Image Verification

Reverse image search, image forensics, and metadata extraction are not interchangeable. Here is how TinEye, Forensically, and ExifTool fit different verification jobs.

/articles/tineye-vs-forensically-vs-exiftool
articleApr 21, 2026

VirusTotal vs OTX: Context, Detections and When to Use Each

VirusTotal and AlienVault OTX are often used for similar purposes, but one is stronger for detections and artifact context, while the other is stronger for shared intelligence and pulse-style signal enrichment.

/articles/virustotal-vs-otx-context-detections-and-when-to-use-each
guideApr 21, 2026

Choosing Between Manual, Semi-Automated and Automated OSINT Workflows

Not every investigation benefits from more automation. Here is how to choose between manual, semi-automated, and automated workflows without losing context or control.

/articles/choosing-between-manual-semi-automated-and-automated-osint-workflows
tutorialApr 20, 2026

How to Read a Redirect Chain Like a Technical Analyst

HTTP redirects encode decisions, configurations and occasionally mistakes. Here is how to decode them.

/articles/how-to-read-redirect-chain
articleApr 20, 2026

Why Robots.txt, Sitemaps and Metadata Still Matter

These files are often overlooked. Here is why they are worth auditing and how they shape discoverability.

/articles/why-robots-txt-sitemaps-metadata-matter
articleApr 20, 2026

What a Tech-Stack Fingerprint Can and Cannot Tell You

Fingerprinting is useful, but limited. Here is how to interpret findings responsibly.

/articles/tech-stack-fingerprint-interpretation
guideApr 20, 2026

A Responsible Method for Reconnaissance on Public Web Surfaces

Reconnaissance is not inherently malicious. Here is how to do it ethically, legally and systematically.

/articles/responsible-method-for-web-reconnaissance
articleApr 20, 2026

How to Turn Weak Signals into Better Questions

OSINT is not about finding smoking guns. It is about asking better questions.

/articles/turning-weak-signals-into-better-questions