✅ A Toolkit for Tough Situations and Clear Outcomes

:books: The Everyday Investigation Starter Pack

Your full-send playbook for surveillance, evidence, legal battles & catching liars—all free or dirt cheap.


:world_map: What You’re Walking Away With

400+ free tools. 50+ GitHub repos. Cheap hardware lists. Templates for everything. Step-by-step guides for people who’ve never done this before.

Whether someone’s lying to your face, hiding money, tracking your phone, or making your life hell at work—this is how you fight back without dropping $10K on lawyers.


:light_bulb: Why This Actually Matters

You don’t need money to protect yourself. You need information.
This guide turns “I have no idea what to do” into “I have receipts, evidence, and a plan.”
Cheating spouse. Toxic coworker. Sketchy neighbor. Messy divorce. You’re covered.


:sparkles: What’s Inside

  • :mobile_phone: Recover deleted texts, photos & app data (free tools + the apps cheaters hide stuff in)
  • :magnifying_glass_tilted_left: Find anyone’s digital footprint using free OSINT tricks
  • :microphone: Prep for court testimony like a pro witness
  • :detective: Detect hidden cameras, GPS trackers & phone spyware
  • :briefcase: Build an airtight HR case that actually works
  • :money_bag: Protect your assets legally before/during/after marriage
  • :balance_scale: Win neighbor disputes without expensive lawyers
  • :fishing_pole: Catch catfish & verify anyone’s real identity online

:mobile_phone: PART 1: PHONE & DIGITAL FORENSICS

Your Phone Remembers Everything. Even The Deleted Stuff.

Deleted texts aren’t really deleted. They’re just marked “okay to overwrite.” Until something else takes that space, they’re sitting there waiting to be found. The faster you act, the more you recover.


🕳️ SECRET APPS CHEATERS USE (Know What to Look For)

Calculator & Vault Apps (Look Innocent, Hide Everything)

App Name What It Looks Like What It Actually Does
Calculator+ Basic calculator Hidden photo/video vault behind fake calculator
Private Photo Vault Generic folder icon Password-protected media storage
Keepsafe Lock icon Encrypted photo hiding
Vaulty Calculator icon Hidden gallery with decoy password
Hide It Pro “Audio Manager” Secret vault disguised as audio app
CoverMe Messaging app Self-destructing messages + private vault

Encrypted Messaging (Messages That Disappear)

App Why Cheaters Love It
Signal End-to-end encryption, disappearing messages
Telegram Secret chats, self-destruct timer
Wickr No phone number needed, auto-delete
Dust Messages vanish after reading
Confide Screenshot-proof, disappearing text

Fake/Burner Apps

App What It Does
TextNow Free second phone number
Google Voice Hidden second number
Burner Disposable phone numbers
TextFree Anonymous texting

Red flag behaviors: Phone always face-down. New apps you don’t recognize. “Audio Manager” that isn’t for audio. Calculator app opened suspiciously often.

🆓 FREE & CHEAP RECOVERY TOOLS

Cloud Backdoors (CHECK THESE FIRST - Easiest Wins)

Platform Where to Look What You Might Find
Google Drive drive.google.com → Backups Full device backups with messages
iCloud icloud.com → Messages/Backups Synced messages, photos, call logs
WhatsApp Settings → Chats → Chat backup Message history in Google Drive/iCloud
Samsung Cloud samsung.com/account Samsung device backups
Google Photos photos.google.com Auto-synced images they forgot about

Apps That Actually Work

Tool Platform Cost What It Does Success Rate
DiskDigger Android Free File system recovery :star::star::star: Good for recent
Dr. Fone Both $50-70 Texts, WhatsApp, media :star::star::star::star: Solid
PhoneRescue Both $50 Deep recovery :star::star::star::star: Reliable
EaseUS MobiSaver Both Free/Paid Device + cloud recovery :star::star::star: Decent
Tenorshare UltData Both $50 iOS specialist :star::star::star::star: Good for iPhones
iMobie PhoneRescue Both $50 iTunes/iCloud recovery :star::star::star::star:

Pro-Level Tools (For Serious Cases)

Tool Cost Court-Ready? Notes
Cellebrite UFED $15K-40K :white_check_mark: Yes Industry standard, what cops use
Oxygen Forensic $5K+ :white_check_mark: Yes Encrypted app recovery
MOBILedit Forensic $100-500 :white_check_mark: Yes Mid-range, solid reports
Magnet AXIOM $3K+ :white_check_mark: Yes Deep mobile analysis
XRY by MSAB $5K+ :white_check_mark: Yes Used by law enforcement
⚠️ BEFORE YOU TOUCH ANYTHING - READ THIS

STOP. This determines if you recover anything or lose everything.

The Rules

  1. STOP using the phone immediately → Every new text/photo/app overwrites deleted data
  2. Don’t install apps ON the phone → Run recovery tools from a computer
  3. Check cloud backups FIRST → Often has everything without touching the device
  4. Turn off the phone if possible → Prevents automatic overwrites
  5. Put it in airplane mode → Stops incoming data from overwriting

What Affects Your Success

Factor Impact
:alarm_clock: Time since deletion Hours = great odds. Days = okay. Weeks = maybe. Months = unlikely
:bar_chart: Storage size Bigger phone = more space for remnants to survive
:mobile_phone: Phone usage Heavy user = data gets overwritten faster
:locked: Encryption Newer iPhones with full encryption = much harder
:floppy_disk: Storage type Flash memory “forgets” slower than traditional storage

For Court Cases

If you need this for legal proceedings:

  • Document the chain of custody (who touched it, when, where)
  • Generate hash values immediately (proves file wasn’t tampered)
  • Consider hiring a certified forensic examiner
  • Screenshots alone are WEAK—judges want verified forensic extraction

:link: Making Digital Evidence Court-Ready

Screenshots = Weak. Forensic extraction = Strong. Here’s the difference.

A screenshot can be Photoshopped in 30 seconds. Forensic evidence has a digital fingerprint (hash) that proves it wasn’t modified. Courts know the difference.


📋 CHAIN OF CUSTODY CHECKLIST (Print This)

Document EVERYTHING. This is what makes evidence admissible.

Required Documentation

EVIDENCE COLLECTION LOG
=======================
Device: _______________________________________________
Make/Model: ___________________________________________
Serial Number: ________________________________________
IMEI (if phone): ______________________________________

Collection Date: ______________________________________
Collection Time: ______________________________________
Collection Location: __________________________________
Collected By (print name): ____________________________
Collected By (signature): _____________________________

HASH VALUES (run immediately after collection):
MD5: _________________________________________________
SHA256: ______________________________________________

Storage Location: ____________________________________
Access Log:
- Date/Time | Person | Purpose | Signature
- ________|________|_________|__________
- ________|________|_________|__________

Why This Matters

Without documentation, opposing counsel says “this could be fabricated” and your evidence becomes worthless. With it, you have court-admissible proof.

🆓 FREE FORENSIC TOOLS (The Actually Good Stuff)
Tool Link What It Does Skill Level
Autopsy sleuthkit.org/autopsy Full forensic analysis, timeline, keyword search Intermediate
FTK Imager exterro.com/ftk-product-downloads Disk/memory imaging, hash reports Beginner
CAINE Linux caine-live.net Bootable forensic OS, auto write-block Intermediate
Volatility 3 github.com/volatilityfoundation/volatility3 Memory/RAM forensics Advanced
Bulk Extractor github.com/simsong/bulk_extractor Scans without parsing filesystem Intermediate
ExifTool exiftool.org Metadata extraction (when/where photo taken) Beginner
Wireshark wireshark.org Network traffic analysis Advanced
NetworkMiner netresec.com Network forensic analyzer Intermediate
💻 HASH VERIFICATION (Proves Files Weren't Tampered)

Run these commands IMMEDIATELY after collecting evidence. Save the output.

Windows PowerShell

Get-FileHash C:\path\to\evidence.img -Algorithm SHA256
Get-FileHash C:\path\to\evidence.img -Algorithm MD5

Mac/Linux Terminal

sha256sum /path/to/evidence.img
md5sum /path/to/evidence.img

Windows Command Prompt

certutil -hashfile C:\path\to\evidence.img SHA256
certutil -hashfile C:\path\to\evidence.img MD5

What This Does

Creates a unique “fingerprint” of the file. If even ONE byte changes, the hash completely changes. This proves in court that your evidence is exactly as you collected it.

🛠️ CHEAP HARDWARE (What Pros Use, Budget Version)
Item Price Where to Buy What It Does
Faraday bag (phone) $10-30 Amazon: “Mission Darkness Faraday Bag” Blocks all signals, prevents remote wipe
USB data blocker (4-pack) ~$10 Amazon: “JSAUX USB data blocker” Prevents data transfer when charging
CoolGear USB write blocker ~$40 Amazon: “CoolGear forensic write blocker” Prevents writing to drives during imaging
Raspberry Pi 4 kit ~$75 Standard retailers DIY write blocker, TinyCheck setup
USB 3.0 dock ~$30 Amazon: “UGREEN hard drive dock” Connect drives without modifying them
SD card reader ~$15 Amazon: “Anker SD card reader” Extract SIM/SD card data

DIY Write Blocker (Free Option)

Linux software write-blocker: github.com/msuhanov/Linux-write-blocker

Raspberry Pi build guide: Search “Raspberry Pi forensic write blocker sechaq”

📂 GITHUB FORENSICS GOLDMINE (Bookmark These)
Repo Link Purpose
awesome-forensics github.com/cugu/awesome-forensics Master list of all forensics tools
ALEAPP github.com/abrignoni/ALEAPP Android logs/events/protobuf parser
iLEAPP github.com/abrignoni/iLEAPP iOS logs/events/plists parser
APOLLO github.com/mac4n6/APOLLO Apple Pattern of Life Lazy Output
QuickHash-GUI github.com/tedsmith/quickhash Easy hash verification with GUI
MVT github.com/mvt-project/mvt Mobile Verification Toolkit (spyware detection)
Plaso github.com/log2timeline/plaso Super timeline creation
digital-forensics-lab github.com/frankwxu/digital-forensics-lab Free hands-on training labs
📄 FREE CHAIN OF CUSTODY TEMPLATES
Source Link Format
JotForm jotform.com/pdf-templates/chain-of-custody-evidence-log PDF fillable
CaseIQ caseiq.com/resources/chain-of-custody-template Word/PDF
NIST Guidelines Search “NIST SP 800-86” Official federal guidelines
SWGDE swgde.org Scientific Working Group standards
📺 YOUTUBE CHANNELS FOR LEARNING
Channel Focus Skill Level
13Cubed Digital forensics deep dives Intermediate-Advanced
SANS DFIR Incident response, forensics All levels
DFIRScience Forensics tutorials Beginner-Intermediate
John Hammond Security + forensics Intermediate
David Bombal Networking + security Beginner
💬 COMMUNITIES & SUBREDDITS
Community Link Focus
r/computerforensics reddit.com/r/computerforensics Professional forensics discussion
r/digitalforensics reddit.com/r/digitalforensics Tools, techniques, career
r/OSINT reddit.com/r/OSINT Open source intelligence
Forensic Focus forensicfocus.com/forums Professional forum
AboutDFIR aboutdfir.com Resource hub

:detective: PART 2: COUNTER-SURVEILLANCE

Someone Watching You? Here’s How to Catch Them.

Hidden cameras. GPS trackers. Phone spyware. AirTags in your car. If someone’s monitoring you, these methods expose them.


:magnifying_glass_tilted_left: Bug Sweep DIY (Find Hidden Devices)

🛒 DETECTION GEAR (Budget → Pro)
Device Price What It Finds Best For
Smartphone flashlight FREE IR cameras (see method below) Quick check
Phone camera FREE Infrared LEDs from cameras Night vision cameras
Magnetic field detector app FREE GPS trackers with magnets Car sweeps
Basic RF detector (K18) $30-50 Wireless transmitters Room sweeps
RF + Lens detector combo $50-80 RF signals + camera lenses Complete basic sweep
Jepwco G4 Pro $100-150 All frequencies, pen-sized Discrete sweeping
SpyHawk Pro-10G $200-300 Wide frequency range Serious sweeps
Professional TSCM $2,975+ EVERYTHING When it really matters

Professional Equipment (What They Have That You Don’t)

Equipment Cost Capability
Non-Linear Junction Detector (NLJD) $10,000+ Finds devices even when OFF
REI ORION 2.4 $15,000+ Detects any electronic component
Thermal imaging camera $5,000+ Sees heat signatures through walls
Spectrum analyzer $5,000+ Complete RF spectrum analysis
📱 PHONE FLASHLIGHT METHOD (FREE - 60 Seconds)

This actually works. Hidden cameras use infrared LEDs for night vision—invisible to your eyes, but your phone camera sees them.

Steps

  1. Kill all lights in the room (complete darkness)
  2. Open your phone camera (use the FRONT camera—it usually lacks IR filter)
  3. Slowly scan the room (especially smoke detectors, USB chargers, clocks)
  4. Look for tiny purple/white dots → That’s an IR LED = hidden camera

Pro Tip

Test this first: Point a TV remote at your phone camera and press a button. You’ll see the IR LED light up. That’s what you’re looking for.

📡 RF DETECTOR SWEEP (Step-by-Step)

Before You Start

  1. Turn OFF all your wireless devices (router, smart speakers, Bluetooth everything)
  2. Unplug smart home devices (Alexa, Google Home, smart TVs)
  3. Tell others in household (their phones/devices will trigger false positives)

The Sweep

  1. Set detector sensitivity to HIGH
  2. Start at room corner, walk the perimeter
  3. Move slowly (2-3 seconds per foot)
  4. Beeping/vibration = signal detected
  5. Narrow down by lowering sensitivity as you get closer
  6. Check inside objects that triggered alerts

Common Hiding Spots (Check These First)

🚨 HIGH PRIORITY
├── Smoke detectors (favorite hiding spot)
├── USB wall chargers (cameras built in)
├── Clock radios / alarm clocks
├── Picture frames (can hide pinhole cameras)
├── Air vents / HVAC returns
├── Electrical outlets / light switches
└── Mirrors (check for two-way)

⚠️ ALSO CHECK
├── Stuffed animals / decorations
├── Books (fake books exist)
├── Lamps / lampshades
├── Plant pots
├── Tissue boxes
├── Cable boxes / routers
└── Anything "gifted" to you recently
📶 WIFI AUDIT (Find Unknown Devices On Your Network)

Method 1: Router Admin Panel

  1. Log into your router (usually 192.168.1.1 or 192.168.0.1)
  2. Find “Connected Devices” or “DHCP Client List”
  3. Review every device → Hidden cameras often show as “Unknown Device” or “ESP_XXXXX”
  4. Note MAC addresses of suspicious devices

Method 2: Free Apps (If No Router Access)

App Platform Link
Fing iOS/Android App stores
Network Scanner Android Play Store
WiFi Analyzer Android Play Store
LanScan iOS App Store

Red Flags

  • Devices named “Camera” or “ESP32” or “ESP8266”
  • Unknown manufacturer (look up MAC address prefix at maclookup.app)
  • Devices that appear only at certain times
  • More devices than you can account for
🪞 OTHER QUICK DETECTION METHODS

Two-Way Mirror Test

Put your fingernail directly on the mirror surface:

  • Gap between finger and reflection = Normal mirror :white_check_mark:
  • No gap (finger touches reflection) = Possible two-way mirror :warning:

Flashlight Lens Finder

  1. Turn off lights
  2. Hold flashlight next to your eye (parallel to your line of sight)
  3. Shine around the room slowly
  4. Camera lenses reflect distinctively (bright, colored glint)

FM Radio Bug Detection

  1. Tune FM radio to empty frequency
  2. Turn volume up
  3. Walk around room slowly
  4. Squealing/feedback = possible transmitter nearby

Phone Call Interference Test

  1. Make a phone call
  2. Walk around room on speakerphone
  3. Clicking, buzzing, interference in specific spots = possible bug
  4. (Note: Some interference is normal near electronics)
🚗 VEHICLE SWEEP (GPS Trackers & AirTags)

Where They Hide GPS Trackers

EXTERIOR
├── Wheel wells (magnetic attachment)
├── Under bumpers (front and rear)
├── Behind license plates
├── Under the car (magnetic boxes)
└── Inside bumper cavities

INTERIOR
├── Under seats
├── Inside seat cushions
├── Behind dashboard panels
├── In OBD-II port (diagnostic port)
├── Inside door panels
├── Trunk lining
└── Glove compartment (wired to power)

AirTag / SmartTag Detection

iPhone: If unknown AirTag is traveling with you, you’ll get automatic notification after ~8 hours

Android: Download “Tracker Detect” (Apple’s official app) or “AirGuard” (third-party, better)

Physical Search Tips

  • Use a flashlight + mirror on extension pole for undercarriage
  • Check OBD-II port (below steering wheel) for plug-in trackers
  • Feel inside wheel wells with your hand (trackers often magnetic)
  • Look for anything that doesn’t belong

:mobile_phone: Phone Spyware Detection

Someone installed stalkerware on your phone? Here’s how to find and kill it.

🚩 SIGNS YOUR PHONE IS COMPROMISED

High-Confidence Indicators

Sign Why It Matters
Battery drains fast (even idle) Spyware runs constantly in background
Phone overheats randomly Constant data transmission
Data usage spikes Uploading your data to attacker
Phone is slow/laggy Spyware consuming resources
Apps you didn’t install Look for generic names like “System Service”
Settings changed “Unknown sources” enabled, security features off

Behavioral Red Flags

Sign What It Means
Partner knows things they shouldn’t They’re reading your messages
Someone always knows your location GPS tracking
Private conversations referenced Microphone access
Phone “pocket dials” them often Remote activation

Technical Red Flags

Sign Platform Meaning
Cydia/Sileo apps visible iPhone Device is jailbroken (required for most spyware)
“Unknown sources” enabled Android Sideloading allowed
Device admin apps you don’t recognize Android Deep system access granted
VPN/MDM profile you didn’t install iPhone Enterprise-level monitoring
Root checker shows rooted Android System compromised
🆓 FREE ANTI-SPYWARE APPS

Android

App Detection Rate Link
Malwarebytes Excellent Play Store
Kaspersky Mobile 100% in tests Play Store
ProtectStar Anti Spy 99.87% Play Store
Google Play Protect Good (built-in) Play Store → Profile → Play Protect
Avast Mobile Security Good Play Store
Bitdefender Excellent Play Store

iOS

iPhone’s closed system makes spyware harder to install, but not impossible.

Protection How to Access
Check for jailbreak Look for Cydia, Sileo, or Zebra apps
Review MDM profiles Settings → General → VPN & Device Management
Enable Lockdown Mode Settings → Privacy & Security → Lockdown Mode (extreme protection)
Check Screen Time Settings → Screen Time (unauthorized changes?)
Review app permissions Settings → Privacy → review each category
🔧 MANUAL DETECTION (No Apps Needed)

Android Manual Check

Step 1: Device Admin Apps
Settings → Security → Device admin apps
→ Remove anything you don’t recognize

Step 2: Accessibility Services
Settings → Accessibility → Installed services
→ Spyware needs this to read your screen

Step 3: Apps with Special Access
Settings → Apps → Special access → check each category:

  • Display over other apps
  • Modify system settings
  • Notification access
  • Usage access

Step 4: Unknown Sources
Settings → Security → Unknown sources
→ Should be OFF unless you specifically need it

Step 5: Review All Apps
Settings → Apps → See all apps
→ Look for apps with generic names, no icon, or that you don’t remember installing

iOS Manual Check

Step 1: Check for Jailbreak
Look for: Cydia, Sileo, Zebra, Installer 5, Checkra1n
→ If present, device is compromised

Step 2: MDM Profiles
Settings → General → VPN & Device Management
→ Remove any profiles you didn’t install

Step 3: Privacy Permissions
Settings → Privacy → Review:

  • Location Services (check “Always” access apps)
  • Microphone
  • Camera
  • Photos
    → Remove access from suspicious apps

Step 4: Screen Time
Settings → Screen Time
→ Check if someone set restrictions without your knowledge

💻 GITHUB STALKERWARE DETECTION TOOLS
Tool Link What It Does
stalkerware-indicators github.com/AssoEchap/stalkerware-indicators Database of 172+ known stalkerware apps (package names, signatures, IOCs)
TinyCheck github.com/KasperskyLab/TinyCheck Raspberry Pi tool that analyzes network traffic for spyware signatures
MVT (Mobile Verification Toolkit) github.com/mvt-project/mvt Professional-grade mobile forensics, detects Pegasus and other APTs
androidqf github.com/botherder/androidqf Android Quick Forensics - fast evidence gathering
spytrap-adb github.com/spytrap-org/spytrap-adb ADB-based stalkerware detection
android-stalkerware github.com/diskurse/android-stalkerware Analysis and research on Android stalkerware

Using stalkerware-indicators

This repo contains package names of known stalkerware. You can check if any are installed:

# Connect phone via ADB, then:
adb shell pm list packages | grep -f stalkerware_package_names.txt
🛡️ PROTECTION HARDWARE
Item Price Amazon Search Purpose
USB data blocker (4-pack) ~$10 “JSAUX USB data blocker” Prevents data transfer when charging at public/untrusted outlets
Faraday bag (phone) ~$20 “Mission Darkness Faraday Bag” Blocks ALL signals - GPS, cell, WiFi, Bluetooth
Webcam cover ~$5 “webcam cover slide” Physical camera block for laptop
Microphone blocker ~$10 “mic blocker 3.5mm” Plugs into headphone jack, blocks mic
Privacy screen protector ~$15 “privacy screen protector [phone model]” Prevents shoulder surfing
Raspberry Pi 4 ~$75 “Raspberry Pi 4 kit” Run TinyCheck for network analysis
☎️ HELP ORGANIZATIONS

If you’re being stalked or surveilled by a partner/ex:

Organization Contact Services
Coalition Against Stalkerware stopstalkerware.org Resources, detection guides
NNEDV Safety Net techsafety.org Tech safety for DV survivors
National DV Hotline 1-800-799-7233 24/7 support
Cyber Civil Rights Initiative cybercivilrights.org Tech abuse support

Important: If you find spyware and are in a dangerous relationship, removing it may alert your abuser. Contact a DV organization first for safety planning.


:magnifying_glass_tilted_right: PART 3: OSINT & IDENTITY VERIFICATION

Find Anyone’s Digital Footprint (100% Legal)

Reverse image search. Username hunting. Email tracing. Catch catfish. Verify strangers. All free.


🖼️ REVERSE IMAGE SEARCH (Catch Fake Photos)

The Big Players

Tool Link Best For Notes
Yandex Images yandex.com/images #1 FOR FACES Russian search engine, best facial recognition
TinEye tineye.com Exact matches 67B+ images indexed
Google Images images.google.com General search Largest database
Bing Visual Search bing.com/visualsearch Alternative Different results than Google
FaceCheck.ID facecheck.id Catfish detection Built specifically for finding fake profiles
PimEyes pimeyes.com Facial recognition Limited free searches

Pro Tips

  • Always try multiple engines - They index different images
  • Yandex beats Google for faces - Seriously, try it
  • Crop to just the face for better facial recognition results
  • Try variations - Original, cropped, flipped horizontally
  • Check oldest results - Original source often appears with earliest date
🤖 AI-GENERATED FACE DETECTION

More fake profiles use AI-generated faces. Here’s how to spot them:

Detection Tools

Tool Link Free?
IMGDetector.ai imgdetector.ai Yes
AI or Not aiornot.com Yes (limited)
Deepware Scanner deepware.ai Yes
Sensity AI sensity.ai Enterprise

Manual Detection (Look For These)

Sign What to Look For
Earrings don’t match Different style/shape on each ear
Background blur/distortion Unnatural blurring, warped lines
Hair anomalies Strands that disappear, merge, or float
Teeth issues Too perfect, blurry, or misaligned
Asymmetrical accessories Glasses frames different on each side
Skin texture Too smooth, plasticky appearance
Eyes Different sizes, unusual catchlights
👤 USERNAME SEARCH (Find All Their Accounts)

Command Line Tools (More Powerful)

Tool Link Coverage
Sherlock github.com/sherlock-project/sherlock 400+ sites
Maigret github.com/soxoj/maigret 3000+ sites (Sherlock fork, more comprehensive)
WhatsMyName github.com/WebBreacher/WhatsMyName Focus on accuracy
Blackbird github.com/p1ngul1n0/blackbird 500+ sites, fast

Quick Install & Run:

# Sherlock
pip3 install sherlock-project
sherlock username

# Maigret (more sites)
pip3 install maigret
maigret username

Web-Based Tools (No Installation)

Tool Link Notes
Namechk namechk.com Quick visual check
WhatsMyName Web whatsmyname.app Browser version
Instant Username instantusername.com Real-time availability
Knowem knowem.com 500+ sites
📧 EMAIL & PHONE VERIFICATION

Email Investigation

Tool Link What It Does
Hunter.io hunter.io 25 free searches/month, finds associated accounts
Holehe github.com/megadose/holehe Check what sites email is registered on
Epieos epieos.com Email OSINT, finds Google ID, calendar info
HaveIBeenPwned haveibeenpwned.com Check if email was in data breaches (100% free)
EmailRep emailrep.io Email reputation scoring

Phone Number Investigation

Tool Link What It Does
NumLookup numlookup.com Free carrier lookup, VOIP detection
Truecaller truecaller.com 433M+ user database, spam detection
CallerID Test calleridtest.com Basic lookup
Sync.me sync.me Caller ID database
PhoneInfoga github.com/sundowndev/phoneinfoga Advanced phone OSINT

Red Flags

Indicator Risk Level
VOIP number (Google Voice, TextNow) :warning: Higher fraud risk
Email created recently :warning: Possible throwaway
No breach history :warning: Might be new/fake
Carrier = “VOIP” :warning: Burner number likely
📹 VIDEO CALL LIVENESS TESTS (Catch Deepfakes)

If someone seems too good to be true, test them on video call. Deepfakes struggle with:

Tests to Run

Test What to Ask Why It Works
Profile turn “Can you turn your head to the side?” Deepfakes struggle with 90° profile
Hand-face touch “Touch your nose with your finger” Hands near faces break deepfakes
Multiple fingers “Hold up 3 fingers… now 5” Finger counting is hard for AI
Object test “Show me something red in your room” Proves real environment
Wave test “Wave with both hands” Two-hand coordination
Lighting change “Can you move to a different light?” Tests dynamic rendering
Spontaneous request Random specific ask Can’t be pre-recorded

Signs of Deepfake

  • Unnatural blinking (too little or too regular)
  • Face doesn’t match head movement
  • Lighting on face doesn’t match background
  • Audio slightly out of sync
  • Edges of face shimmer or blur
  • Hair looks “painted on”
🏛️ FREE BACKGROUND CHECK ALTERNATIVES

Court Records (Free)

Resource Link Coverage
JudyRecords judyrecords.com 760M+ US court cases—FREE
CourtListener courtlistener.com 4M+ federal/state opinions
PACER pacer.uscourts.gov Federal court records ($0.10/page)
UniCourt unicourt.com State + federal (some free)

Public Records Directories

Resource Link What It Finds
Black Book Online blackbookonline.info Links to free public records by state
SearchSystems searchsystems.net Public records database directory
FamilySearch familysearch.org Birth, death, marriage records
NSOPW nsopw.gov Sex offender registry (official)

Property & Business Records

Resource Link
OpenCorporates opencorporates.com
SEC EDGAR sec.gov/edgar
County assessor sites Google “[county] property records”
🧩 BROWSER EXTENSIONS (One-Click OSINT)
Extension What It Does Link
RevEye Reverse image search (Google, Bing, Yandex, TinEye in one click) Chrome/Firefox
Search by Image Multi-engine reverse search Chrome/Firefox
InVID/WeVerify Video verification toolkit Chrome/Firefox
Wayback Machine Check archived versions of pages Chrome/Firefox
Wappalyzer Identify website technologies Chrome/Firefox
BuiltWith Technology profiler Chrome

GitHub collection: github.com/The-Osint-Toolbox/OSINT-Browser-Extensions

📚 MASTER OSINT GITHUB REPOS
Repo Link Purpose
awesome-osint github.com/jivoi/awesome-osint THE master list
OSINT Framework osintframework.com Visual tool directory
SpiderFoot github.com/smicallef/spiderfoot Automated OSINT, 200+ modules
theHarvester github.com/laramies/theHarvester Email/domain gathering
Recon-ng github.com/lanmaster53/recon-ng Web recon framework
Maltego maltego.com Relationship mapping (free CE version)
Photon github.com/s0md3v/Photon Fast web crawler for OSINT
GHunt github.com/mxrch/GHunt Google account investigation
Holehe github.com/megadose/holehe Email to registered accounts

:balance_scale: PART 4: COURTROOM & LEGAL SELF-DEFENSE

Win Your Case Before You Walk In

Testimony prep. Evidence presentation. What judges actually care about. How to not blow it on the stand.


🎤 TESTIMONY PREP MASTER CHECKLIST

2 Weeks Before

  • Create chronological timeline of ALL events
  • Review every document you’ll reference
  • File witness list (65 days before in many jurisdictions)
  • Organize evidence binder (3 copies: you, judge, opposing party)
  • Label each exhibit with number/letter
  • Schedule practice session with your attorney

1 Week Before

  • Review prior statements you’ve made (depositions, declarations)
  • Practice Q&A with attorney or trusted friend
  • Research the judge’s courtroom rules/preferences
  • Plan your outfit (conservative, professional)
  • Confirm courtroom location and parking
  • Prepare childcare/work coverage

Day Before

  • Review timeline and key dates one more time
  • Lay out clothes
  • Pack evidence binder
  • Get good sleep
  • NO alcohol or substances

Day Of

  • Eat a real breakfast (low blood sugar = bad decisions)
  • Arrive 30+ minutes early
  • Turn phone COMPLETELY OFF (not just silent)
  • Use restroom before proceedings
  • Bring water, tissues, notepad, pen
  • Deep breaths in the parking lot
🗣️ ON THE STAND: GOLDEN RULES

The DO List

Rule Why
Answer ONLY the question asked Extra info gives opposing counsel ammunition
Pause before answering Gives your attorney time to object
Look at the judge when answering Shows respect, builds credibility
Say “I don’t recall” if true Better than guessing wrong
Say “I don’t understand” if true Better than answering wrong question
Keep answers SHORT Yes. No. Specific fact. Stop.
Ask for questions to be repeated Buys time, ensures clarity

The DON’T List

Rule Why
Don’t volunteer information You’re not there to help them
Don’t say “never” or “always” Easy to disprove
Don’t argue with opposing counsel Makes you look defensive
Don’t make faces when others testify Judge sees everything
Don’t start with “My lawyer told me…” Waives attorney-client privilege
Don’t exaggerate Destroys all credibility
Don’t guess “I don’t know” is a valid answer

Body Language

Do Don’t
Sit erect, feet flat Slouch or lean back
Hands visible, still Cross arms
Make eye contact with judge Stare at floor
Breathe normally Sigh heavily
Keep neutral expression Roll eyes, smirk, cry (if avoidable)
📋 PRESENTING EVIDENCE (Step-by-Step)

Getting Evidence Admitted

Step 1: Mark the exhibit (“Your Honor, I’d like to mark this as Exhibit A”)

Step 2: Show to opposing party first (they get to see it)

Step 3: Authenticate it (witness confirms what it is and that it’s accurate)

Step 4: Offer into evidence (“I offer Exhibit A into evidence”)

Step 5: Handle objections (opposing counsel may object, answer their concerns)

Step 6: Judge rules (admitted or excluded)

Authentication By Type

Evidence Type How to Authenticate
Photos Witness says: when taken, where, by whom, accurate depiction
Texts/Emails Show timestamps, phone numbers, BOTH sides of conversation
Documents Identify by title, date, author, how you got it
Voice recordings Witness identifies voices, confirms accuracy
Social media Screenshots with URL visible, timestamps, account identification

Common Objections & Responses

Objection What It Means Possible Response
“Hearsay” Out-of-court statement offered for truth Identify exception (admission, business record, etc.)
“Relevance” Not related to issues in case Explain connection to dispute
“Foundation” Not properly authenticated Lay more foundation with witness
“Best evidence” Should have original Explain why copy is acceptable
👥 WITNESS PREPARATION (Legal vs. Illegal)

What Attorneys CAN Do (Legal)

  • Review facts and documents with witness
  • Explain courtroom procedures and rules
  • Practice delivery and clarity
  • Teach calm responses to cross-examination
  • Explain what types of questions to expect
  • Advise on appropriate dress and demeanor
  • Conduct mock examinations

What NO ONE Should Do (Witness Tampering - 18 U.S.C. § 1512)

  • Script exact testimony word-for-word
  • Instruct witness to lie
  • Suggest witness omit facts
  • Threaten or bribe witness
  • Encourage witness to “forget” things
  • Coordinate stories between witnesses

Penalty: Up to 20 years federal imprisonment

Witness Credibility Factors (What Judges Evaluate)

Factor Why It Matters
Consistency Does testimony match prior statements and evidence?
Demeanor Confident or evasive? Calm or defensive?
First-hand knowledge Did they actually see/hear it?
Bias Do they have reason to favor one side?
Detail recall Appropriate level of detail for timeframe?
Corroboration Does other evidence support their story?
🎯 WHAT JUDGES ACTUALLY CARE ABOUT

Things That WIN Points

Behavior Why Judges Like It
Organized, prepared Shows respect for court’s time
Consistent with documents Demonstrates honesty
Admits uncertainty when appropriate Shows intellectual honesty
Respectful to everyone Even opposing party
Direct answers Doesn’t waste time
Appropriate emotion Human but controlled

Things That LOSE Points

Behavior Why Judges Hate It
Contradicting yourself Destroys credibility
Eye rolling, sighing Disrespectful
Arguing with counsel Makes you look difficult
Surprise evidence Violation of disclosure rules
Excessive emotion Manipulation tactic
Interrupting Disrespectful
🎙️ SPEECH PRACTICE TOOLS (FREE/CHEAP)

Practice your testimony at home with these tools:

Tool Platform Cost What It Does
Orai iOS/Android Free tier AI speech coach, filler word detection
Speeko iOS/Android Free tier Speech analysis, pacing feedback
online-voice-recorder.com Browser Free Simple voice recording
OBS Studio Desktop Free Video recording for mock testimony
Zoom Desktop Free Record yourself, watch playback
Voice Memos iOS Free Quick audio recording

Practice Method

  1. Have someone read likely questions
  2. Record your answers
  3. Watch/listen for: filler words, eye contact, fidgeting, rambling
  4. Practice until you’re comfortable with your main points
  5. DON’T memorize scripts (sounds robotic)
🆓 FREE LEGAL RESOURCES
Resource Link What It Offers
LawHelp.org lawhelp.org Legal aid by state, free forms
ABA Free Legal Answers abafreelegalanswers.org Attorneys answer questions free (income qualified)
California Courts Self-Help selfhelp.courts.ca.gov Forms, guides, legal help finder
Legal Aid at Work legalaidatwork.org Employment law help (CA)
Nolo.com nolo.com Free legal articles + affordable guides
Avvo avvo.com Free Q&A, lawyer ratings
FindLaw findlaw.com Legal information database
Cornell LII law.cornell.edu Free access to all US law

:briefcase: PART 5: WORKPLACE PROTECTION

Document Everything. Trust No One. Cover Your Ass.

Toxic coworkers. Backstabbing. Retaliation. HR complaints that actually stick.


📝 THE DOCUMENTATION FORMULA (Copy This)

Every incident gets this format. No exceptions.

INCIDENT DOCUMENTATION
======================
DATE: [Exact date - Month/Day/Year]
TIME: [Exact time - include AM/PM]
LOCATION: [Where it happened - be specific]
PRESENT: [Who was there - names and titles]

WHAT HAPPENED:
[Facts only. What was said/done. Direct quotes when possible.
No interpretation, no emotion, no opinion. Just what occurred.]

WITNESSES:
[Name, title, contact info for everyone who saw/heard it]

EVIDENCE:
[Screenshots, emails, documents - list with dates and locations]

IMPACT:
[How this affected your work, projects, reputation - factual]

FOLLOW-UP:
[Any actions taken, responses received]

Storage Rules

Do Don’t
BCC personal email on important messages Store documentation on work computer only
Save to personal cloud (Google Drive, Dropbox) Use company-owned cloud storage
Screenshot with timestamps Rely on memory
Keep witness contact info Assume they’ll remember later
Print and store physical copies at home Keep only digital copies
🪜 ESCALATION LADDER

The Path (In Order)

Step Action When Duration
1 Document incident Same day as incident Ongoing
2 Direct conversation Within 48 hours One conversation
3 Recap email Immediately after conversation Same day
4 Formal HR complaint After pattern emerges (2-3 incidents) Days-weeks
5 Follow up with HR If no response in 2 weeks Every 2 weeks
6 EEOC complaint If HR fails or retaliation occurs Within 180-300 days
7 Employment lawyer Ongoing issues, termination threat ASAP

The Recap Email Technique (Powerful)

After ANY verbal conversation about an issue:

Subject: Confirming our conversation on [date]

Hi [Name],

I’m writing to confirm our conversation today where you stated [exact words they said, in quotes if possible].

[Include any commitments made, next steps discussed]

Please let me know if I’ve misunderstood anything.

Best,
[Your name]

Why this works: Creates paper trail. If they don’t correct you, they’ve confirmed your version of events.

🚩 RED FLAGS TO DOCUMENT

Backstabbing Patterns

Sign How to Document
Credit stolen Save your original work with timestamps; document who claimed it when
Left off emails/meetings Screenshot invites you should have received; note who was included
Different rules for you Compare written policies to how they’re applied to you vs. others
Rumors traced to them Document who told you what, when they heard it, who they heard it from
Sudden negative reviews Save prior positive feedback; note timing relative to any complaints you made
Public undermining Document witnesses, exact words used
Agreements broken Email confirmations of agreements before they’re broken

Retaliation Indicators (After You Complained)

Sign Why It’s Concerning
Negative review right after complaint Temporal proximity = evidence of retaliation
Reassignment to worse duties Adverse employment action
Exclusion from projects Career damage
Sudden “performance issues” Paper trail being created against you
Hours/schedule changed Constructive dismissal attempt
Coworkers told to avoid you Isolation tactic
⚠️ WRONGFUL TERMINATION: CRITICAL DEADLINES

These are HARD DEADLINES. Miss them and you lose your claim.

Claim Type Deadline Where to File
EEOC (Title VII, ADA, ADEA) 180 days (300 in some states) eeoc.gov
OSHA 11(c) - Safety retaliation 30 DAYS OSHA
Sarbanes-Oxley (corporate fraud) 180 days OSHA
False Claims Act (qui tam) 6 years Federal court
California FEHA 3 years CRD (formerly DFEH)
New York Human Rights Law 3 years DHR or court

What Counts as Retaliation

Three elements required:

  1. Protected activity - You complained about discrimination, harassment, safety, etc.
  2. Adverse action - You were fired, demoted, transferred, had hours cut, etc.
  3. Causal connection - The adverse action happened BECAUSE of your complaint

Temporal proximity matters:

Timing Strength of Case
Days-weeks after complaint Strong inference of retaliation
1-3 months Good circumstantial evidence
4+ months Need additional evidence
📞 EEOC FILING PROCESS (FREE)

Step-by-Step

Step 1: Submit Online Inquiry

Step 2: Schedule Interview

  • Through portal OR call 1-800-669-4000
  • Prepare your documentation
  • Bring evidence

Step 3: File Charge of Discrimination

  • Form completed with EEOC staff
  • You’ll get a charge number
  • Copy sent to your employer

Step 4: Investigation

  • EEOC investigates (up to 180 days)
  • May request mediation
  • May request documents from employer

Step 5: Resolution

  • EEOC issues determination
  • If they find violation, they’ll try to settle
  • If not resolved, you get Right to Sue letter

Step 6: Right to Sue

  • 90 days to file lawsuit after receiving letter
  • Clock starts when you RECEIVE it, not when it’s sent

What to Bring to Your Interview

  • Written timeline of events
  • Copies of all documentation
  • Names and contact info for witnesses
  • Copies of relevant policies
  • Your employment contract if you have one
  • Recent performance reviews
  • Any termination letter or writeups

:house: PART 6: NEIGHBOR DISPUTES

Small Claims, Mediation & Boundary Wars

When to sue. When to settle. How much you can win. Where to find free mediators.


💰 SMALL CLAIMS LIMITS BY STATE (2024-2025)
State Limit State Limit
California $12,500 Nevada $10,000
Texas $20,000 Arizona $3,500
Florida $8,000 Colorado $7,500
New York $5,000-$10,000 Washington $10,000
Tennessee $25,000 Oregon $10,000
Georgia $15,000 Michigan $6,500
North Carolina $10,000 Ohio $6,000
Illinois $10,000 Pennsylvania $12,000
Kentucky $2,500 Delaware $25,000

What Small Claims CAN Do

:white_check_mark: Award money damages up to the limit
:white_check_mark: Order return of personal property
:white_check_mark: Award costs and fees (sometimes)

What Small Claims CAN’T Do

:cross_mark: Order neighbor to move fence (need civil court for injunctions)
:cross_mark: Determine property lines (need quiet title action)
:cross_mark: Enforce ongoing compliance
:cross_mark: Award punitive damages (usually)

🤝 FREE COMMUNITY MEDIATION

Success rate: 70-80%. Usually takes 2-4 hours. Costs $0.

How to Find Free Mediators

  1. Search: “[your county] community mediation center”
  2. NAFCM directory: nafcm.org
  3. Ask court clerk: Many courts have free or low-cost mediation programs
  4. Bar association: Often have pro bono mediation programs

Cost Comparison

Method Total Cost Timeline Success Rate
Free community mediation $0 2-4 hours 70-80%
Court-annexed mediation $0-200 1-3 hours 60-70%
Private mediator $200-500/hr 2-8 hours 70-80%
Small claims court $75-400 1-4 months ~50% (judgments for plaintiffs)
Civil court + attorney $5,000-$100,000+ 6-24 months Varies

When Mediation Works

  • Noise disputes
  • Parking issues
  • Tree/vegetation conflicts
  • Property line disagreements (minor)
  • Fence appearance disputes
  • Pet issues
  • Communication breakdowns

When You Need Court

  • Significant property damage ($10K+)
  • Neighbor refuses all communication
  • Injunction needed (stop doing something)
  • Physical safety concerns
  • Ongoing willful violations
📐 BOUNDARY DISPUTE CHECKLIST

Before Doing Anything Legal

  1. Talk to neighbor first (document the conversation)
  2. Get a survey ($300-800, proves exact property lines)
  3. Research deed (county recorder’s office)
  4. Check local ordinances (fence height, setbacks, etc.)
  5. Send written notice (certified mail, keep copy)
  6. Try mediation (free, often required before court anyway)

Types of Legal Claims

Claim What It’s For Where to File
Trespass Encroachment, entering your property Small claims (money) or civil (injunction)
Nuisance Ongoing interference with your property use Civil court
Quiet title Determining who owns disputed land District/Superior court
Declaratory judgment Court declares rights regarding property District/Superior court

Evidence to Gather

  • Survey showing property lines
  • Photos/video of encroachment
  • Dated photos showing progression
  • Written communications with neighbor
  • Local ordinances they’re violating
  • Estimates for damage repair
  • Witness statements
⚠️ ADVERSE POSSESSION WARNING

If neighbor’s fence/structure has been on your land 10-15+ years, they might legally own that strip now.

Requirements Vary by State (Generally)

  • Actual possession - They physically used the land
  • Open and notorious - Obvious, not hidden
  • Hostile - Without your permission
  • Exclusive - They controlled it
  • Continuous - For the statutory period (10-21 years depending on state)

How to Prevent Future Claims

Send this letter via certified mail and RECORD IT with county recorder:

“I give you permission to use that strip of my land on your side of our fence until I say otherwise. This permission may be revoked at any time in writing.”

Why this works: Permission destroys the “hostile” element. They can’t claim adverse possession if they had permission.

📄 FREE MEDIATION & AGREEMENT TEMPLATES
Template Link
Settlement agreement pandadoc.com/settlement-agreement-template
Boundary line agreement pandadoc.com/boundary-line-agreement-template
Neighbor fence agreement template.net (search “fence agreement”)
Mediation agreement juro.com/contract-templates/settlement-agreement
General release lawdepot.com

:money_bag: PART 7: ASSET PROTECTION

Prenups, Postnups & Trusts That Actually Work

Legal ways to protect what’s yours. Before marriage. During marriage. Before everything goes wrong.


📊 THE BIG THREE COMPARED
Method When Protection Level Cost DIY Possible?
Prenup Before wedding :star::star::star::star::star: Strongest $1,000-5,000 Yes (with caution)
Postnup After wedding :star::star::star::star: Strong $2,000-7,500 Yes (with caution)
DAPT Trust Anytime :star::star::star: State-dependent $5,000-30,000 No (too complex)
Irrevocable Trust Anytime :star::star::star::star: Strong $5,000-15,000 No
💍 PRENUP/POSTNUP REQUIREMENTS FOR VALIDITY

Must-Have Elements

Requirement Why It Matters
:check_box_with_check: In writing Oral agreements not enforceable
:check_box_with_check: Signed by both parties Obvious but often missed
:check_box_with_check: Full financial disclosure Each person lists all assets/debts
:check_box_with_check: Voluntary No coercion, threats, pressure
:check_box_with_check: Fair terms Not grossly one-sided
:check_box_with_check: Time to review Can’t be sprung last-minute
:check_box_with_check: Notarized Required in many states
:check_box_with_check: Independent counsel Strongly recommended; required in some states

What Makes Courts Throw Them Out

Red Flag Why It Invalidates
Signed under pressure Duress = not voluntary
Hidden assets at signing Fraud
Wildly unfair terms Unconscionable
Signed right before wedding Duress/no time to consider
One party didn’t understand No informed consent
No independent lawyers Appearance of overreaching

Timing Requirements

Timing Risk Level
6+ months before wedding :white_check_mark: Safe
3-6 months before :warning: Acceptable
1-3 months before :warning: Risky
Less than 1 month :cross_mark: High risk of challenge
Days before wedding :cross_mark: Very likely to be thrown out
California 7-day minimum waiting period required
🗣️ HOW TO BRING UP THE PRENUP

Opening Lines That Work

Vulnerable approach:

“My parents divorced when I was young and it financially devastated my mom. I need us to have the protection she never had.”

Practical approach:

“A prenup isn’t about doubting us—it’s about making sure we’re aligned on money stuff before it becomes emotional.”

Mutual protection:

“I want to make sure we’re BOTH protected no matter what happens. This protects you as much as me.”

Family pressure (honest):

“My family is insisting on this, and I’d rather us create something together that’s fair to both of us than have them dictate terms.”

Responses to Common Objections

Objection Response
“Don’t you trust me?” “I absolutely do. Trust is why I can have this conversation with you.”
“You’re planning for divorce” “No—planning for our marriage. All marriages end, either in death or divorce. This protects us in BOTH scenarios.”
“It’s not romantic” “What’s romantic is building a future together where we’re both protected and aligned.”
“My parents didn’t need one” “Different era. We have more complexity—careers, property, maybe previous marriages. This is modern planning.”

Red Flags During Discussion

If your partner does any of these, consult a lawyer ASAP:

  • Refuses any discussion whatsoever
  • “Sign this or no wedding” ultimatum
  • Presents agreement days before wedding
  • Refuses negotiation on ANY terms
  • Won’t let you have your own lawyer review
  • Gets extremely angry at the suggestion
  • Hides financial information during disclosure
💻 DIY PRENUP PLATFORMS
Platform Cost Notes Best For
HelloPrenup $599/couple State-specific, clean interface First marriages, simple assets
Neptune Varies Attorney included Want professional help at lower cost
Rocket Lawyer $39.99/month Basic template Very simple situations
LegalZoom $299+ Template + review option Name recognition comfort
Prenup.com $599 Guided process Tech-savvy couples

Free Templates (Use With EXTREME Caution)

Source Link Warning
LegalTemplates.net legaltemplates.net State compliance not guaranteed
eForms.com eforms.com Basic template only
LawDistrict.com lawdistrict.com May miss state requirements

:warning: Critical Warning: Free templates may not comply with your state’s requirements. If either spouse has significant assets, owns a business, or this involves alimony waivers, PAY FOR ATTORNEY REVIEW. A $1,000 review now beats a $100,000 problem later.

🏦 ASSET PROTECTION TRUST STATES (DAPT)

State Comparison

State Wait Period Exception Creditors State Income Tax
Nevada 2 years NONE None
South Dakota 2 years Child support only None
Ohio 18 months Alimony, child support Yes
Tennessee 18 months Alimony, child support None
Delaware 4 years Alimony, child support, divorce None
Alaska 4 years Child support, divorce None
Wyoming 2 years Limited None
Mississippi 2 years Limited Yes

Choosing a State

Priority Best State
Maximum protection Nevada (no exception creditors)
Fastest protection Ohio or Tennessee (18 months)
Privacy + protection South Dakota (sealed litigation)
Lowest cost Compare attorney fees by state

What DAPTs Protect Against

:white_check_mark: Future creditors (lawsuits filed AFTER trust created)
:white_check_mark: Divorcing spouse (in some states)
:white_check_mark: Business liability
:white_check_mark: Professional malpractice claims

What DAPTs DON’T Protect Against

:cross_mark: Existing creditors
:cross_mark: IRS (federal tax liens)
:cross_mark: Child support (in most states)
:cross_mark: Fraudulent transfer claims
:cross_mark: Claims within waiting period

Cost Reality

Item Cost Range
Attorney setup $5,000-15,000
Corporate trustee (annual) $2,000-5,000/year
Ongoing maintenance $500-2,000/year

:warning: LegalZoom, Rocket Lawyer, etc. do NOT offer DAPTs. These are complex instruments that require specialized legal expertise.

🔐 KEEP SEPARATE = STAY SEPARATE

The Golden Rule

NEVER mix pre-marriage assets with marital funds

If You… Your Separate Property…
Deposit inheritance into joint account Becomes marital property
Use premarital savings for house down payment Commingled = marital
Add spouse to investment account Now it’s joint
Use separate funds for joint expenses without tracking Gets murky fast

How to Keep Assets Separate

Asset Type Protection Method
Inheritance Keep in separate account, NEVER deposit to joint
Pre-marriage savings Maintain separate account, document original balance
Investment accounts Don’t add spouse as owner; document pre-marriage value
Real estate Keep deed in your name only if pre-marriage
Business Document pre-marriage value; keep personal and business separate

Documentation to Keep

  • Account statements from before marriage
  • Inheritance letters/documentation
  • Gift letters for large gifts
  • Pre-marriage property appraisals
  • Business valuations at time of marriage

:detective: PART 8: HIRING PROFESSIONALS

When DIY Isn’t Enough

Private investigators. Forensic accountants. When to hire. How much they cost. How to vet them.


🔍 PRIVATE INVESTIGATOR PRICING

Service Rates

Service Cost Range
Hourly rate $50-150/hour
Background check $100-500
Surveillance (per day) $500-1,500
Asset search $500-2,000
Social media investigation $200-1,000
Infidelity investigation (full) $2,000-10,000+
Phone forensics $500-5,000
Skip tracing (finding someone) $100-500

What PIs CAN Do

:white_check_mark: Surveillance in public places
:white_check_mark: Background checks
:white_check_mark: Asset searches
:white_check_mark: Social media investigation
:white_check_mark: Interview witnesses
:white_check_mark: Document findings for court
:white_check_mark: Testify as expert witness

What PIs CAN’T Do (Legally)

:cross_mark: Hack phones/computers
:cross_mark: Access private accounts without authorization
:cross_mark: Trespass on private property
:cross_mark: Record without consent (varies by state)
:cross_mark: Impersonate law enforcement
:cross_mark: Access sealed records

How to Vet a PI

Check Why
State license Verify at state licensing board website
Insurance Should have E&O and liability
Specialization Matches your case type
References Ask for and call them
Written contract Clear scope, fees, deliverables
No guaranteed results Legit PIs don’t promise outcomes
💵 FORENSIC ACCOUNTANT PRICING

Service Rates

Service Cost Range
Hourly rate $150-450/hour
Basic asset search $2,500-5,000
Income analysis $3,000-10,000
Business valuation $5,000-25,000
Full divorce forensics $10,000-50,000+
Expert witness testimony $300-600/hour

When You Need One

Situation Why
Spouse owns business Can hide income, undervalue business
Complex investments Hedge funds, private equity, options
Suspected hidden accounts Offshore, crypto, unreported
Lifestyle vs. income mismatch Spending more than they claim to earn
Self-employed spouse Cash income easy to hide
Multiple income streams Complexity = hiding opportunities

What They Find

  • Hidden bank accounts
  • Underreported income
  • Overstated business expenses
  • Unreported cash transactions
  • Cryptocurrency holdings
  • Offshore accounts
  • Fake debt to friends/family
  • Assets in others’ names

Methods They Use

  • Bank statement analysis
  • Lifestyle analysis (spending vs. reported income)
  • Business financial review
  • Tax return analysis
  • Crypto transaction tracing
  • Public records search
  • Deposition support
📱 PROFESSIONAL PHONE FORENSICS PRICING

Service Rates

Service Cost Range
Basic extraction $500-1,500
Full forensic analysis $1,500-5,000
Court-ready report $1,000-3,000
Expert witness testimony $300-500/hour
Encrypted app recovery $2,000-5,000+
Damaged device recovery $1,000-10,000+

When to Hire Pro vs. DIY

Hire Pro Try DIY First
Need court-admissible evidence Just want to see what’s there
Device is encrypted Basic Android with no lock
Device is damaged Phone is working fine
Legal proceedings involved Personal peace of mind
Time since deletion is long Deleted recently
Encrypted apps (Signal, etc.) Standard SMS messages

Finding a Reputable Examiner

  • Look for certifications: CCE, CFCE, EnCE, ACE
  • Check if they’re authorized Cellebrite/MSAB partner
  • Ask about chain of custody procedures
  • Verify they can testify in court if needed
  • Get written estimate before starting
🏠 PROFESSIONAL BUG SWEEP (TSCM)

Pricing

Service Cost Range
Home sweep (apartment) $500-1,500
Home sweep (house) $1,500-3,000
Per square foot ~$1.50/sq ft
Minimum charge $2,975 (typical)
Vehicle sweep $200-500
Office sweep $2,000-10,000+

What Pros Have That You Don’t

Equipment Cost What It Does
Non-Linear Junction Detector $10,000+ Finds electronics even when OFF
Thermal imaging camera $5,000+ Detects heat signatures
Spectrum analyzer $5,000+ Full RF spectrum analysis
TALAN phone analyzer $10,000+ Detects wiretaps
Video borescope $500+ Sees inside walls/vents

When to Hire Pro

  • High-stakes divorce/custody
  • Business/trade secrets at risk
  • Stalking/harassment situation
  • DIY sweep found nothing but gut says otherwise
  • Need expert testimony for court
  • Dealing with sophisticated adversary

:books: MASTER RESOURCE COMPILATION

One Place for Everything


📱 SUBREDDITS BY TOPIC
Topic Communities
Legal general r/legaladvice, r/Ask_Lawyers
Divorce/custody r/Divorce, r/Custody, r/FamilyLaw
Digital forensics r/computerforensics, r/digitalforensics
Privacy/security r/privacy, r/cybersecurity, r/netsec
OSINT r/OSINT, r/RBI, r/TracerPak
Employment r/antiwork, r/humanresources, r/AskHR
Neighbor issues r/neighbors, r/treelaw, r/legaladvice
Relationships r/relationship_advice, r/survivinginfidelity
Scams r/Scams, r/catfish
🏛️ GOVERNMENT FREE RESOURCES
Resource Link What It Offers
EEOC eeoc.gov / 1-800-669-4000 Employment discrimination complaints
OSHA Whistleblower whistleblowers.gov Workplace safety retaliation
LawHelp.org lawhelp.org Legal aid by state
JudyRecords judyrecords.com 760M+ court records FREE
USA.gov Legal Aid usa.gov/legal-aid Federal legal aid directory
ABA Free Legal abafreelegalanswers.org Attorney Q&A (income qualified)
FTC Consumer consumer.ftc.gov Fraud reporting, consumer rights
CFPB consumerfinance.gov Financial complaints
💻 TOP GITHUB REPOS (Bookmark These)

Digital Forensics

Spyware Detection

OSINT

🛒 BUDGET HARDWARE SHOPPING LIST
Item Price Amazon Search
USB data blocker (4-pack) ~$10 “JSAUX USB data blocker”
Faraday bag (phone) ~$20 “Mission Darkness Faraday Bag”
RF bug detector ~$30-50 “K18 RF detector”
Lens finder ~$30 “hidden camera lens finder”
USB write blocker ~$40 “CoolGear forensic write blocker”
Raspberry Pi 4 kit ~$75 “Raspberry Pi 4 starter kit”
USB 3.0 drive dock ~$30 “UGREEN hard drive dock”
Webcam cover (3-pack) ~$5 “webcam cover slide”
Privacy screen ~$15 “privacy screen [phone model]”
📺 YOUTUBE CHANNELS FOR LEARNING
Channel Focus Best For
13Cubed Digital forensics deep dives Intermediate-Advanced
SANS DFIR Incident response, forensics All levels
DFIRScience Forensics tutorials Beginner-Intermediate
John Hammond Security + CTF Intermediate
NetworkChuck Networking basics Beginner
David Bombal Networking + security Beginner
The Cyber Mentor Ethical hacking Intermediate

:bullseye: THE BOTTOM LINE

You just got handed a toolkit that would cost $10,000+ if you hired professionals for everything.

Save this. Bookmark it. Come back when you need it.

The next time life throws chaos at you—cheating partner, toxic workplace, messy divorce, sketchy neighbor, creepy surveillance—you’ll know exactly what to do.

Knowledge is leverage. Now you have both. :flexed_biceps:


12 Likes

Great and valuable resource @SRZ thank you.

1 Like

Man, this is too good to be true. This is literally paid stuff I am seeing for free. Even for a paid one, I don’t think we can get this much on one go.

1 Like