Welcome to IntelHub. This extension aggregates advanced open-source intelligence (OSINT) tools into a single, convenient interface, allowing researchers and analysts to perform operations quickly and efficiently.
At the top left of the extension, you will find the Refresh button to update the tool list and extension settings. Below it is a Search Bar for quickly locating specific categories or tools.
On the right side, there is a Scroll Bar to navigate between different categories. In the top right corner, there is a toggle button to switch the Theme.
This category centralizes tools you have marked as "Favorites" from the general pool, and allows adding custom tools and managing categories.
New Category: Create new folders/categories to organize your favorite tools.
Add Custom Tool: Add an external tool (not present in the extension) by entering a Name, URL, and short Description. You can assign the tool to a specific category before saving.
Export/Import: Export your favorites list and settings as a backup file, or import them to transfer to another user.
Ongoing Management: This is how the tool list looks after adding items. To delete a category, click the trash can icon on the right. To remove a tool from favorites, click the Star icon (Unstar).
This category contains the core of the extension - a comprehensive list of intelligence tools divided by topics. The list is automatically synced with the GitHub repository and updates every 24 hours (or upon manual Refresh).
Clicking on a topic (Category) will open the list of tools belonging to it:
- Clicking a tool will open it in a new tab.
- Clicking the Star icon next to a tool name will add it to "Favorites".
- Hovering over a tool will display a short description (Tooltip) of its function.
This tool allows you to perform a reverse image search across multiple search engines simultaneously.
Input Options:
- Upload: Upload an image file from your computer.
- Paste: Paste an image directly from the Clipboard.
Before searching, select the checkboxes for the search engines you wish to use (Google, Yandex, Bing, TinEye, etc.). Your selection is saved for next time.
A tool for extracting hidden information (Metadata/EXIF) from files.
Select the desired file type (Image, PDF, or Office document) and upload it. The data report will appear immediately at the bottom of the window (scroll down to view full details).
An interface for easily building advanced Google search queries.
Enter the desired parameters in the various fields (Search within a specific site, File type, Keywords in Title/URL/Text). After building the query, you can click Search on Google for immediate execution, or view the query structure in the box below and copy it.
A suite of tools for Telegram investigations. This category allows phone number lookups, user/group detail gathering, and export analysis.
User & Group Profiler: Enter a username (or link) to perform a deep scan and display user details, profile picture, status, and an option to Fetch Numeric ID.
A collection of tools for analyzing the current page or a specific URL for initial reconnaissance.
Available Tools:
- Website Fingerprint: Captures the site's fingerprint (technologies, cookies) for authenticity checks.
- WHOIS & DNS: Checks domain ownership and DNS records.
- Technology Detection: Identifies the underlying technology stack.
- Subdomain Finder: Locates subdomains.
- Save Page Offline: Saves the current page as a local HTML file for documentation.
- Archive Search: Searches for the site's history in various web archives.
Designed to extract the Numeric User ID from social media profiles, or to navigate to a profile based on an existing ID.
Navigate to the profile page (e.g., on Facebook) and click the first button to extract the ID.
Contains tools for checking the safety and origin of links.
- Unshorten URL: Decodes shortened links (like bit.ly) to reveal the original address.
- Scan for Viruses: Checks the link against the VirusTotal database.
Scans and extracts Entities from text. The system identifies emails, crypto wallets, phone numbers, usernames, and more.
You can analyze text via Paste, external text file upload, or by scanning the Current Page in the browser. Results can be exported to CSV.
Clicking this category opens the visualization system.
Using the graph, you can create an investigation map, add entity cards, and link them to visualize the intelligence picture clearly.






















