Birdy-Edwards.
Automated AI-powered Facebook intelligence tool for target profiling, network analysis and threat reporting Runs entirely on-device via Ollama. #SOCMINT #OSINT #Intelligence #Investigation.
Facebook SOCMINT
How to use
Deep dive into working of Birdy-Edwards.
Birdy-Edwards Trailer
How Birdy-Edwards works, features, UI and Intel gathering.
Automated Profile Analysis Demo
Here in this video you learn how to investigate a single facebook profile and how you gather useful intel from charts and graphs.
Investigation of Manual Batch Urls Video Demo
Here in this video you learn how to investigate and input manually given urls remember one thing the url must contain "/posts/ or /reel/ or /reels/ or /photo? or /photo/" .
Who is it for?
OSINT Researchers
Profile mapping, Interactor profiling, behavioral pattern extraction.
Threat Intelligence Analysts
Identify threat actors, hostile commenters, coordinated activity.
Law Enforcement / Cybercrime Units
Structured evidence gathering from public Facebook content.
Defense & Intelligence Agencies
Counter-narrative monitoring, influence operation detection in Facebook.
Journalists & Investigative Reporters
Expose coordinated harassment, troll networks, disinformation clusters.
Academic Researchers
Social network analysis, sentiment research, political communication studies.
def birdy_edwards(target_url: str):
# Initializing LLM engine...
results = data.gathered(
intel.metadata(target),
intel.interactors(target),
intel.co-interactors(target),
intel.interactors_country(target),
intel.detected_faces(target),
intel.faces_clusters(target)
)
return results
# contact email - jganguly148@gmail.com /
# For Proton-mail user -> jeetganguly404@proton.me