Tweetovi

Blokirali ste korisnika/cu @AccessOSINT

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @AccessOSINT

  1. Prikvačeni tweet
    2. velj

    Which soundtracks are being used while people expose their data on TikTok? You can find out in my latest blog which I will continue to update.

    Poništi
  2. proslijedio/la je Tweet
    prije 58 minuta
    Poništi
  3. proslijedio/la je Tweet
    prije 17 sati

    Today we released Dufflebag, the latest Bishop Fox tool. Use Dufflebag to search for exposed secrets from your Amazon EBS. Previously seen at but now available for your use:

    Poništi
  4. proslijedio/la je Tweet
    prije 18 sati
    Poništi
  5. proslijedio/la je Tweet
    3. velj

    RT : Which soundtracks are being used while people expose their data on TikTok? You can find out in my latest blog which I will continue to update.

    Poništi
  6. proslijedio/la je Tweet
    1. velj

    99 smartphones are transported in a handcart to generate virtual traffic jam in Google Maps. Through this activity, it is possible to turn a green street red which has an impact in the physical world by navigating cars on another route!

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    31. sij
    Poništi
  8. proslijedio/la je Tweet
    30. sij

    My write-up on how I tracked down an alleged member of REvil group utilizing methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this!

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    29. sij

    Ready or not, here I come. 🕵️‍♂️ The new series of starts Thursday 13th February. 9pm.

    Poništi
  10. proslijedio/la je Tweet
    24. sij

    Twitter has a new security feature, if you tweet a password it put asterisks instead. Try it now ******

    Poništi
  11. proslijedio/la je Tweet
    25. sij

    We are at a critical junction in the fight against cybercrime and while technology is more advanced than ever, how can we exploit it effectively to stay ahead of the bad guys?

    Poništi
  12. proslijedio/la je Tweet
    26. sij

    Data extraction bug in Facebook. Sorry, no write-up for this one for the current time!

    Poništi
  13. proslijedio/la je Tweet
    25. sij

    EXIF Hound is a pay-what-you-want app designed for the digital forensics community for tracking EXIF metadata in the real world

    Poništi
  14. proslijedio/la je Tweet
    24. sij

    Google’s Dataset Search has indexed almost 25 million databases giving users a single site to search for, and find links to the data they require. Worth a visit.

    Poništi
  15. proslijedio/la je Tweet
    24. sij

    Happy Friday All! Lots of people have been asking when of will be airing with a prize of £100k! will announce soon but I promise you don't have long to wait now! 🔜🔜🔜🏃‍♂️🏃‍♀️👀

    Poništi
  16. proslijedio/la je Tweet

    When you are looking for subdomain takeover Use this method Save all subdomains on txt file And use dig for found all cname ` dig -f txt.txt|grep CNAME ` you will get all cname for subdomains Open cnames and looking for error if mean takeover This method it so easy

    Poništi
  17. proslijedio/la je Tweet
    22. sij

    It only took 5 years, but here's a new blog post. This technique uses Pingbacks to unmask the real IP address of a Wordpress website that's hidden behind Cloudflare (or any other proxy network) Feedback/criticism welcome 😉

    Poništi
  18. proslijedio/la je Tweet
    20. sij

    It is many years since I lived in Germany, but I really like following and for their posts about German current events. Also for shattering my faith in the efficiency of German public transport 😁😁

    Poništi
  19. proslijedio/la je Tweet
    20. sij

    Intelligence Training Scenario – I often get asked for scenario and training materials, so I thought I’d put together the following scenario. Test Your Analytical Skills with this Criminal Intelligence Scenario here -

    Intelligence Training Scenario - Intelligence101
    Poništi
  20. proslijedio/la je Tweet
    20. sij

    Useful OSINT/Forensics tip. How different apps generate image filenames. In some cases it could be possible to use this information to identify which platform an image originated from.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·