
Projects
Welcome to my Projects section! Here you'll find examples of how I use creative OSINT methods to untangle digital mysteries and protect clients from cyber threats.
Take a look at my completed and ongoing investigations—each reflects my passion for cybersecurity and commitment to helping others stay safe online.
Volume 1 – AJ OSINT Case Files – Volume 1
Volume 2 – AJ OSINT Case Files – Volume 2
Volume 3 – AJ OSINT Case Files – Volume 3 (coming soon)
Volume 4 - AJ OSINT Case Files - Volume 4 (coming soon)
✅ 📁 AJ OSINT Case Files – Volume 1
🔍*Phishing Investigation: Absoluting.com*
📍Location: Remote / United States
📅 Date: March 2025
📧 A suspicious recruitment email triggered an OSINT investigation. Using public data, email headers, IP tracing, and DNS analysis, I uncovered indicators of phishing and exposed infrastructure tied to threat activity.
🔎 Skills: VirusTotal • MXToolbox • WHOIS • urlscan.io • AbuseIPDB
✅📁 AJ OSINT Case Files – Volume 2
🩺*The Curious Case of Clearview Medical Group*
📍Location: Fayetteville, GA
📅 Date: March 2025
🔍 A suspicious 5-star review for a medical clinic raised questions. Using SOCMINT techniques, I uncovered signs of a planted testimonial.
This case explores review fraud, burner accounts, and how to spot deception in public-facing healthcare content.
📄👉🏽 [ View Full Case Study PDF ]
🔎 Skills: SOCMINT • Review Analysis • Username Tracing • Ethical OSINT
🕵🏽♀️ Coming Soon – AJ OSINT Case Files
📍Volume 3: The Mysterious Image – A Geolocation Challenge
How far can you go with just a single photo? In this case, I’ll use visual clues, metadata, and mapping tools to pinpoint the exact location of a mysterious image shared online.
Skills: Reverse image search, visual verification, Google Street View, source tracing
🔄 Currently in analysis – Stay tuned!
📌 Upcoming Projects (Future Highlights)
🌐 Volume 4: Infrastructure Footprints – Threat Actor Tracking
What starts as a suspicious email leads to a deep dive into phishing domains, shady IPs, and connected infrastructure.
I’ll walk through how I use WHOIS data, DNS records, and open-source tools to uncover digital footprints and track threat activity.
Skills: Threat Intel, Domain Analysis, VirusTotal, urlscan.io, AbuseIPDB
🔍 Case files being compiled.