Connect the dots.See the truth.

A modern platform for visual, flexible, and extensible graph-based investigations. Built with modern technologies for seamless data exploration, enrichment, and connection. For cybersecurity analysts and investigators.

Flowsint Dashboard

Why Flowsint?

OSINT tools evolve, appear, and disappear. What never changes is the need to see, exploit, and analyze data clearly. Flowsint provides the durable base your investigations rely on—tools become simple extensions you can plug in or unplug at any time.

Instead of juggling fragile scripts and siloed services, centralize your knowledge in one graph. Add a new source? Swap an API? Your investigation stays intact and your insights remain continuous.

A solid foundation

Build your investigations on a durable graph core that stays stable while tools evolve.

Plug-and-play tools

Connect or replace OSINT tools in minutes. No lock-in, no friction.

Break data silos

Centralize, link, and visualize entities and relationships for a clear picture.

Built for change

Stay agile as methods and sources shift—your workflow remains intact.

Key features

Built with modularity, performance, and developer extensibility in mind. Flowsint provides everything you need for modern graph-based investigations.

Entities and relationships exploration

An intuitive, interactive graph UI to explore, edit, and expand entities and their relationships.

Entities and relationships exploration

Flexible entity modeling

Use dynamic schemas (Pydantic-based) to define how your data is structured.

Dynamic schemas

Build flexible data models using Pydantic-based schemas that adapt to your needs

Entity relationships

Define complex relationships between entities with rich metadata and properties

Schema evolution

Evolve your data models over time without breaking existing data structures

Validation & type safety

Ensure data integrity with built-in validation and type checking

Custom field types

Support for various data types including text, numbers, dates, and more.

Pluggable enrichers

Create enrichment flows as simple REST/Python webhooks. Run enrichers manually or chain them together.

Pluggable enrichers

Unlock endless possibilities with n8n

Flowsint can be seamlessly plugged into n8n workflows (or any other webhook connector) to connect with over 500 services and platforms. Build sophisticated automation workflows that transform how you conduct investigations.

Automated OSINT collection

Set up workflows that automatically collect and enrich data from social media, news sources, and public databases whenever new entities are added to your investigation.

Real-time threat monitoring

Create monitoring workflows that trigger alerts in Slack or Teams when specific indicators of compromise or threat patterns are detected in your graph.

Investigation report automation

Automatically generate and distribute investigation reports via email or save them to cloud storage whenever case milestones are reached.

Cross-platform entity tracking

Build workflows that search for entities across multiple platforms and automatically update your investigation graph with new connections and data.

Ready to integrate Flowsint into your automation workflows?

Learn more about n8n integration soon.

Who is it for?

Flowsint is built for professionals who need to understand complex relationships and connections in their data.

Cybersecurity & threat analysts

Investigate threats, analyze attack patterns, and map threat actor relationships

OSINT researchers

Gather and analyze open-source intelligence from multiple data sources

Investigative journalists

Uncover connections, trace relationships, and build comprehensive stories

Corporate intelligence teams

Monitor competitive landscape and analyze business relationships

R&D and innovation analysts

Track emerging technologies and innovation patterns

Anyone mapping complex relationships

Need to map, enrich, and navigate complex interconnected data

Roadmap

Planned features and enhancements to make Flowsint even more powerful and flexible for investigation needs.

Custom entity types

Support for custom entity types to fit any domain or use case

planned

Built-in enrichers

Ability to create and integrate custom built-in enrichers for advanced data enrichment

planned

STIX 2.x support

Full support for STIX 2.x data objects to enable Cyber Threat Intelligence workflows

planned