Derived from the classical concept of Nous, “intellect and direct awareness,” NousInt is designed to provide clarity within the noise of the web.
NousInt is a curated catalog of OSINT and OPSEC resources, bringing reconnaissance tools, threat intelligence feeds, and privacy focused playbooks in one organized platform.
We also have a multi-modal PII scanner, multi model deepfake scanner, and our own articles :D
This is an open source and ongoing project by bellobyte.
Art Credits: Inko Ojamist
Created: January 2026
Status
- ☑️ Initial development done!! Now adding on more features.
- Adding more tools
- Making a video for the placeholder
- Make tool db easier to manage with markdown
- Organizing topics to cover in articles like physical counter surveillance tactics/threat analysis/other stuff!
- Finding other new features to add :p
🌐 Live Site: nousint-cd55bda4eead.herokuapp.com (soon to be nousint.app c:)
- 🔍 OSINT Catalog - Curated collection of reconnaissance and intelligence gathering tools
- 🛡️ OPSEC Resources - Privacy-focused tools and defensive security resources
- 🤖 AI Deepfake Detection - Multi-model/modal scanning using Gemini AI, SightEngine, and HuggingFace models
- 📝 Security Articles - Educational content on OSINT, OPSEC, and AI threats
- 🎨 Dual Themes - Blue (defensive) and Red (offensive) interface modes
- 🔒 Privacy-First - No data collection, all scans processed in real-time
And yes, I used AI to help a lot with advanced topics. It's pretty obvious, and I am not hiding it because I still learned and applied my knowledge from web security courses and programming classes! And who knew that integrating apis and deploying websites wasn't that hard all this time? not me :D
This project addresses the GWC Cybersecurity + AI Challenge theme:
- Problem: AI-generated deepfakes threaten identity and trust, and many social media posts expose user PII which threaten user privacy. There is also lack of OSINT knowledge due to lack of structured knowledge bases.
- Solution: Use AI and a catalog of resources to detect and protect against AI-generated threats, from automated OSINT tools to mass surveillance, as well as human threat actors.
- Impact: Empowers users to verify media authenticity before sharing, and protect their privacy through education!
- Backend: FastAPI, Python 3.11, Uvicorn
- AI Services: Google Gemini 2.5 Flash, SightEngine, HuggingFace: Organika/sdxl-detector
- Frontend: Vanilla JavaScript, CSS
- Content: Markdown with Obsidian callouts support
- Security: File validation, MIME type checking, rate limiting (slowapi)
- Deployment: Heroku
The site is live at nousint-cd55bda4eead.herokuapp.com, but if you'd like to run it locally or contribute:
- Clone the repository:
git clone https://github.com/bellobyte/NousInt.git
cd NousInt- Create a virtual environment and install dependencies:
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt- Set up environment variables:
Create a
.envfile with your API keys:
RIZZ_KEY=your_gemini_api_key
SIGHTENGINE_API_USER=your_sightengine_user
SIGHTENGINE_API_SECRET=your_sightengine_secret
HF_API_KEY=your_huggingface_key- Run the application:
python main.py- Navigate to http://localhost:5000
NousInt/
├── main.py # FastAPI application & routes
├── templates/ # HTML templates (Jinja2)
├── static/
│ ├── css/ # Stylesheets (dual theme support)
│ ├── js/ # Frontend logic, catalog data
│ ├── images/ # Logos
│ └── vendor/ # Font Awesome icons
├── articles/ # Markdown articles
├── requirements.txt # Python dependencies
└── Procfile # Heroku deployment config
Contributions are welcome! Whether it's:
- Adding new tools
- Writing articles
- Improving security
- Fixing bugs or improving UI/UX
- Suggesting features
Feel free to open an issue, post a discussion, or submit a pull request!
This project catalogs security tools for educational and research purposes. Many of these tools can be used for both defensive security (protecting systems) and offensive security (penetration testing).
Users are responsible for ensuring their use of any cataloged tools complies with applicable laws and regulations. Unauthorized access to computer systems is illegal under laws including the Computer Fraud and Abuse Act (CFAA) and similar statutes worldwide. This catalog is not intended to promote or facilitate illegal activity.
Tools are provided for reference only. Use at your own risk and responsibility.
This project is licensed under the MIT License - see the LICENSE file for details.