Cyber Crime Triage
Move quickly from a phone number, email, IP, or domain to useful OSINT indicators for cyber complaints and online fraud leads.
About Intelkit Solutions
Intelkit Solutions proudly presents Khoj, a modern and powerful OSINT toolkit designed for law enforcement agencies and cyber investigation teams.
Built entirely in India, Khoj reflects our commitment to reliable, secure, and high-performance investigative technology tailored for real-world policing needs.
Intelkit Solutions develops investigation-focused technology for teams that need dependable digital intelligence during time-sensitive work. Our approach is practical: build tools that reduce repetitive lookup effort, support lawful investigation workflows, and help officers convert scattered identifiers into usable leads.
We focus on Indian operational requirements, secure usage, and fast access to relevant intelligence sources so investigation teams can work with better speed, structure, and clarity.
Khoj brings together a complete suite of OSINT capabilities in a single, seamless platform, offering robust IP intelligence, domain intelligence, mobile number intelligence, vehicle information tools, and an advanced LBS Management Suite for telecom-based investigations.
It enables officers to capture essential digital evidence, generate detailed OSINT reports, analyse movement patterns, verify identities, and trace assets with ease.
Khoj simplifies complex investigative workflows and delivers fast, actionable intelligence at scale.
Move quickly from a phone number, email, IP, or domain to useful OSINT indicators for cyber complaints and online fraud leads.
Use LBS tools, cell ID decoding, tower dump support, and historical map generation to study movement and location patterns.
Verify identifiers such as PAN, voter ID, driving license, GST, CIN, and DIN during investigation workflows.
Check RC, chassis, engine, challan, FasTag transaction, and linking information to support asset-oriented inquiries.
Review IP intelligence, reverse IP data, Whois records, DNS history, subdomains, technology signals, and phishing indicators.
Run high-volume checks for MNP, IP, cell ID, IMEI, and SMS headers when investigations involve many identifiers.