security OSINT Engine V4.2

Birdy-Edwards.

Automated AI-powered Facebook intelligence tool for target profiling, network analysis and threat reporting Runs entirely on-device via Ollama. #SOCMINT #OSINT #Intelligence #Investigation.

Facebook SOCMINT

How to use

Deep dive into working of Birdy-Edwards.

play_arrow

Birdy-Edwards Trailer

How Birdy-Edwards works, features, UI and Intel gathering.

play_arrow

Automated Profile Analysis Demo

Here in this video you learn how to investigate a single facebook profile and how you gather useful intel from charts and graphs.

play_arrow

Investigation of Manual Batch Urls Video Demo

Here in this video you learn how to investigate and input manually given urls remember one thing the url must contain "/posts/ or /reel/ or /reels/ or /photo? or /photo/" .

Who is it for?

Search

OSINT Researchers

Profile mapping, Interactor profiling, behavioral pattern extraction.

shield

Threat Intelligence Analysts

Identify threat actors, hostile commenters, coordinated activity.

gavel

Law Enforcement / Cybercrime Units

Structured evidence gathering from public Facebook content.

psychology

Defense & Intelligence Agencies

Counter-narrative monitoring, influence operation detection in Facebook.

news

Journalists & Investigative Reporters

Expose coordinated harassment, troll networks, disinformation clusters.

school

Academic Researchers

Social network analysis, sentiment research, political communication studies.

def birdy_edwards(target_url: str):
    # Initializing LLM engine...
    results =  data.gathered(
        intel.metadata(target),
        intel.interactors(target),
        intel.co-interactors(target),
        intel.interactors_country(target),
        intel.detected_faces(target),
        intel.faces_clusters(target)
    )

    return results 

# contact email - jganguly148@gmail.com /
# For Proton-mail user -> jeetganguly404@proton.me