Unlocking the Secrets: Using Email OSINT Tools for Cybersecurity Investigations