Workflows

Choose the task first, then choose the tool.

These workflows match the Turkish archive count and structure. Each one starts with the question, keeps safe limits visible, and ends with a report-ready sentence.

22

workflows

207

resources behind the archive

passive

research boundary

Not sure which workflow fits?

Use the decision tree first. It asks what kind of input you have and points to the closest safe workflow.

Open decision tree

Domain

Is this website or domain suspicious?

A safe passive workflow for reading a domain, URL, DNS trace, and archive history.

4 stepsreport line
Open workflow

Image

Is this image old, new, or out of context?

A workflow for checking earlier copies, visual clues, and the claim attached to an image.

4 stepsreport line
Open workflow

Username

Check a username without turning it into identity proof.

A careful workflow for reading public username traces without targeting a person.

4 stepsreport line
Open workflow

Phishing

Review a suspicious phishing domain defensively.

A workflow for checking a link without opening it in a risky way or entering data.

4 stepsreport line
Open workflow

Claim

Verify a social media claim.

A workflow for checking first-source traces, date, context, and possible reuse.

4 stepsreport line
Open workflow

Evidence

Collect evidence without creating privacy harm.

A workflow for keeping URLs, screenshots, archives, and notes in a reusable structure.

4 stepsreport line
Open workflow

Report

Write a short OSINT report.

A workflow for turning findings into a brief, sourced, readable report.

4 stepsreport line
Open workflow

CVE

Check a CVE or exploit claim safely.

A workflow for reading vulnerability claims without testing unauthorized systems.

4 stepsreport line
Open workflow

IOC

Read threat indicators without overclaiming.

A workflow for checking IPs, domains, URLs, and hashes as defensive signals.

4 stepsreport line
Open workflow

IP / ASN

Check IP and ASN reputation carefully.

A workflow for reading IP, ASN, hosting, and reputation signals without assigning blame.

4 stepsreport line
Open workflow

Email

Check an email claim or sender context.

A workflow for reading headers, sender alignment, links, and attachments safely.

4 stepsreport line
Open workflow

Video

Verify a video or clip.

A workflow for checking frames, older uploads, audio/context clues, and event timing.

4 stepsreport line
Open workflow

News

Check a news or breaking-event claim.

A workflow for separating confirmed reporting, early rumors, official statements, and missing context.

4 stepsreport line
Open workflow

Hash

Read a file hash as defensive intelligence.

A workflow for checking hash context without downloading or running unknown files.

4 stepsreport line
Open workflow

Malware

Review a malware reference defensively.

A workflow for reading malware names, hashes, and reports without operational misuse.

4 stepsreport line
Open workflow

Company

Check a company or organization footprint.

A workflow for reading official and public business sources without targeting people.

4 stepsreport line
Open workflow

Wallet

Review a crypto wallet address carefully.

A workflow for reading public blockchain records without making identity claims.

4 stepsreport line
Open workflow

Phone

Check a phone number only within legal and consent-based scope.

A workflow for reading number format and limited context without ownership claims.

4 stepsreport line
Open workflow

GEOINT

Narrow candidate regions from a photo.

A workflow for using terrain, signs, weather, shadows, and map clues without claiming certainty too early.

5 stepsreport line
Open workflow

Location

Verify a location or map clue.

A workflow for checking signs, buildings, terrain, and map evidence safely.

4 stepsreport line
Open workflow

Transport

Check an aircraft, ship, or transport clue.

A workflow for reading public route and vehicle data without enabling live tracking harm.

4 stepsreport line
Open workflow

Unsure

Start here when you do not know what you have.

A guided workflow for identifying the input type and choosing the safest next path.

4 stepsreport line
Open workflow