_ __ ___ __ _ _ __ _ __ _____ _____ | '_ ` _ \ / _` | '__| '__/ _ \ \/ / _ \ | | | | | | (_| | | | | | (_) > < (_) | |_| |_| |_|\__,_|_| |_| \___/_/\_\___/
@marroxo
OSINT specialist // digging through the noise since 2018 // trace everything, trust nothing
marroxo@vps-eu:~$ whoami --verbose role : open source intelligence / digital footprinting focus : identity resolution, infra mapping, SOCMINT location : central europe (undisclosed) status : available for responsible disclosure collab commissions: closed marroxo@vps-eu:~$
// 01

about_me

I go by marroxo. I've spent the better part of six years turning publicly available data into actionable intelligence — chasing digital footprints across social platforms, leaked datasets, WHOIS history, BGP tables, and forgotten forum posts from 2009. I got into this through CTFs (shoutout to the old OSINT Ironman days) and never really left.

Day-to-day I work on corporate threat intelligence: brand monitoring, executive exposure mapping, and third-party vendor risk. Outside of work I participate in TraceLabs missing persons CTFs, contribute to community tooling, and write about methodology when I have the time.

I care about reproducibility. Screenshots fade, pivots get lost, and memory is unreliable — so I document obsessively. If I can't show my work, I didn't do the work.

People whose work I read religiously: Bellingcat, Michael Bazzell, Sector035, OSINTCurious, NixIntel. If you're new and haven't read Bazzell's book, stop what you're doing.

He/him. Based somewhere in central Europe. PGP key below.

// now

Working on a post about using FOFA as a Shodan alternative for non-US infrastructure. Re-reading We Are Bellingcat by Eliot Higgins — third time. Running a TraceLabs warm-up this weekend with a few people from the infosec.exchange crowd. Currently annoyed at how many "OSINT courses" on Udemy are just repackaged YouTube tutorials from 2019. Latest rabbit hole: Maigret edge cases on federated platforms.

// 02

skills_and_tools

// recon & footprinting

  • Maltego
  • SpiderFoot
  • Recon-ng
  • theHarvester
  • Amass
  • subfinder
  • httpx
  • Photon
  • Hunchly
  • OSINT Framework

// identity & account intel

  • Sherlock
  • Maigret
  • GHunt
  • Holehe
  • IntelX
  • OSINT Industries
  • Lampyre
  • Mitaka

// infrastructure & network

  • Shodan
  • Censys
  • FOFA
  • BGP.he.net
  • SecurityTrails
  • ViewDNS
  • crt.sh
  • VirusTotal
  • Wigle.net
  • Creepy

// imagery & metadata

  • ExifTool
  • Metagoofil
  • PimEyes
  • TinEye
  • FaceCheck.id
  • SunCalc
  • Mapillary
  • Google Lens

// disciplines


// scripting & tooling

Python /// primary — API wrappers, automation, data pipelines Bash /// enumeration workflows, toolchain glue Regex /// seriously underrated OSINT skill SQL/SQLite /// local breach dump querying Docker /// isolated tool environments
// 03

writing

Methodology-first writeups. I try to document what actually worked, including the dead ends. No "top 10 OSINT tools" listicles here.

Pivoting on a Burner: How I Traced a Fake LinkedIn Profile Back to a Real Person in 45 Minutes

A walkthrough of an anonymized identity resolution case. Starting from a suspicious recruiter LinkedIn profile, using Sherlock for username enumeration, reverse image search via PimEyes, certificate transparency logs on a linked domain, and WHOIS history to connect the persona to a real operator. Covers the full pivot chain methodology and — importantly — why you should document dead ends as carefully as successful pivots.

Certificate Transparency Logs Are an OSINT Goldmine (and Most People Ignore Them)

Deep dive into using crt.sh, Certspotter, and Facebook's CT log aggregator for subdomain enumeration, infrastructure pivot points, and historical company asset discovery. Includes a real-world example of finding a company's internal staging environment exposed to the public web via a wildcard cert entry. If you're not starting every corporate OSINT job with CT logs, you're leaving data on the table.

My TraceLabs 2024 Workflow: How I Submitted 47 Flags as a Solo Operator

Detailed breakdown of my approach to the TraceLabs missing persons OSINT CTF. Pre-competition prep (VM snapshot discipline, sock puppet readiness, tool checks), live triage methodology, which platform searches yield the highest flag density per minute, and what first-timers consistently miss. Ends with some honest notes about the emotional weight of working on real missing persons cases — it's not a game, even when it's framed as one.

Shodan Dorks I Actually Use (Not the Recycled List Everyone Posts)

An opinionated list of Shodan search queries for real investigative use — not the "find webcams" tutorial content that gets recycled every six months. Focuses on: finding exposed industrial control systems, identifying infrastructure belonging to a specific org via ASN + SSL cert fingerprinting, tracking C2 infrastructure overlap, and correlating results across Shodan, Censys, and FOFA for non-US-hosted assets.

The Email Address Is the Universal Key: A Methodology for Starting With Nothing

Given only an email address, how far can you get? Full pivot chain walkthrough using Holehe (platform presence check), GHunt (Google account details), HaveIBeenPwned API, IntelX breach search, Hunter.io for domain correlation, and WHOIS registrant matching. The Bazzell methodology applied end-to-end. Spoiler: further than most people expect, and faster than it has any right to be.

Geolocation From a Single Window: Breaking Down a Quiztime Challenge

Solving a geolocation challenge using only a photo of an interior view out a window. Methodology: sun angle analysis via SunCalc, visible architecture style (building era, regional construction conventions), partial street signage, reflection analysis in glass, cross-referenced with Google Street View historical imagery and Mapillary. Solved to a specific block in Łódź, Poland. Good reminder that passive environmental details are data too.

OPSEC for Investigators: You're Leaking More Than You Think

Practical, paranoid guide to investigative OPSEC. Topics: browser fingerprinting during OSINT work (Canvas, WebGL, timezone leaks), why a VPN is not enough, VM snapshot and rollback discipline, sock puppet management (email aging, behavioral consistency), and the specific risk of logging into investigation platforms from your real accounts. Not a beginner guide — I assume you already know the basics. Inspired by watching too many people get burned by fixable mistakes.

Mapping a Company's Real Infrastructure When They Try to Hide It

Corporate infrastructure discovery beyond basic Shodan searches. Uses BGP routing tables (bgp.he.net, BGPView) for ASN discovery, reverse IP lookups, SSL cert fingerprinting, passive DNS history via SecurityTrails and VirusTotal, GitHub employee account enumeration for internal tooling mentions, and LinkedIn job postings as a technology stack oracle. Anonymized real case study: a mid-size SaaS company that thought they were invisible. They were not.

// 04

ctf_and_competitions

TraceLabs // Missing Persons OSINT CTF
  • Search Party CTF — Global 2021 (solo) 8th place
  • Search Party CTF — DEF CON 30 qualifier
    team: null_pivot
    4th place
  • World CTF 2023
    47 flags submitted, top category: social media correlation
    top 10
Hack The Box
  • Global rank Pro Hacker
  • Machine writeup: Intelligence (retired) published
  • Traverxec, OpenAdmin, Buff completed
TryHackMe
  • Global rank (peak) top 5%
  • OhSINT, Sakura Room, Searchlight OSINT completed
  • Google Dorking, Yara, Brim completed
Other
  • National Cyber League (NCL) — OSINT category 2019, 2020
  • Quiztime geolocation challenges ongoing
  • OSINTCurious contributor — two published walkthroughs 2022

// certifications & training

// 05

contact

github
github.com/marroxo
osint scripts, tooling, ct-log helpers
x / tw
@marroxo_
OSINT methodology, random finds
mastodon
@marroxo@infosec.exchange
primary social, more signal less noise
discord
marroxo
find me on infosec / osint community servers
// PGP public key fingerprint
4A7F 3C2B 91E8 D056 FA3B   17C9 8E40 2D5A 6B3F 1094
I don't take commissions or consulting work. If you're reaching out about a legitimate responsible disclosure collaboration or TraceLabs teaming, the Mastodon DM is the best path.

If you found this site while investigating me — nice work, take the flag.