-
#OSINT Awesome OSINT https://github.com/jivoi/awesome-osint … OSINT SubReddit https://reddit.com/r/OSINT/ http://WhotWi.com Spiderfoot https://spiderfoot.net Pymeta https://github.com/m8r0wn/pymeta OSINT Stash https://osint.best My tutorials https://0x00sec.org/t/my-personal-osint-techniques-part-1-of-2-key-layer-contingency-seeding/13033 … https://0x00sec.org/t/my-personal-osint-techniques-volume-2-the-kitchen-sink/13198 … pic.twitter.com/IpqYcWHZM0
Prikaži ovu nit -
#OSINT: theHarvester:https://github.com/laramies/theHarvester … Recon-ng:https://bitbucket.org/LaNMaSteR53/recon-ng … FOCA:https://github.com/ElevenPaths/FOCA … Discover:https://github.com/leebaird/discover … Spiderfoot:http://www.spiderfoot.net/ Sn1per:https://github.com/1N3/Sn1per SimplyEmail:https://github.com/SimplySecurity/SimplyEmail …#bugbountytips#redteam#BugBounty -
#OSINT Found this#darkweb domain: "Cash, Cards and Coke". Apparently leaking its IP (64.32.5.152):pic.twitter.com/26a3kPykwD
Prikaži ovu nit -
#OSINT 2 Search Internet for almost any media/file (search by company/person's name, keyword, etc): http://palined.com/search http://www.mmnt.net/ http://filechef.com/ Track flights/flight stats https://flightaware.com/ https://www.flightview.com/flighttracker/ https://www.flightstats.com/v2/flight-tracker/search …pic.twitter.com/PAlJFRLoAd
Prikaži ovu nit -
My write-up on how I tracked down an alleged member of REvil
#Ransomware group utilizing#OSINT methods. If you enjoyed reading this please share it and I will work hard to create more write-ups like this! https://medium.com/@underthebreach/tracking-down-revils-lalartu-by-utilizing-multiple-osint-methods-2bf3a6c65a80 …Prikaži ovu nit -
[
#REGEX] Find, create, verify and visualize regular expressions with iHateRegex (via@gHacks) : https://buff.ly/37ZdbsQ#osint pic.twitter.com/xRbV9HJsOz
-
#OSINT : Better Whois:http://www.betterwhois.com Active Whois:http://www.johnru.com ZabaSearch:http://www.zabasearch.com TinEye:http://www.tineye.com isearch:http://www.isearch.com/ serversniff:http://serversniff.net/ robtex:http://www.robtex.com#BugBountyTip#Hacking#pentest -
Another Monday with an
#OSINT newsletter! H/T:@NakedSecurity@dutch_osintguy@rickdus@ex16x41 And a special shout-out to@salaheldinaz@GONZOs_int@noneprivacy and@TraceLabs
https://medium.com/week-in-osint/week-in-osint-2020-05-47cbcd2a3bc0 … -
New SpiderFoot 3.0 tutorial showing how to extract
#Bitcoin
and #Ethereum addresses from websites, with automated blockchain querying to get balances using the SpiderFoot 3.0 CLI. https://asciinema.org/a/295957#OSINT -
This man used to work for Muscat and Keith Schembri. He is deeply involved in a cover up of my mother's murder and has helped conceal crucial pieces of evidence, including Schembri's phone.
#OSINT friends, where is he in these photos?#DaphneCaruanaGaliziahttps://twitter.com/neville_gafa/status/1223208885009383426 …
-
We were so proud to see our global TL community come together for 6 hours and use the power of
#OSINTForGood to generate all of these important leads! The TL team is now working to generate valuable intelligence reports for Law Enforcement using these#OSINT findings! pic.twitter.com/BXUPydnewB
-
http://facesaerch.com search pictures of people by name
#OSINT pic.twitter.com/m374rWYYxE
-
SpiderFoot:
#OSINT collection and reconnaissance tool https://buff.ly/2rvIwjf pic.twitter.com/8s7keOuUte
-
Anyone who hasn't tried
@spiderfoot for#OSINT research yet - definitely try it out. We've been hearing rave reviews from users all over the world. https://www.spiderfoot.net/ -
New article
#Turkey submarine spotted with new system.#OSINT and#SubSunday all in one. Thx@YorukIsikhttps://www.forbes.com/sites/hisutton/2020/02/02/turkish-navy-submarine-spotted-with-new-defense-system/ …Prikaži ovu nit -
#OSINT DomainTools:http://www.domaintools.com Active Whois:http://www.johnru.com Domain Dossier:http://centralops.net Network Solutions:http://www.networksolutions.com DNSstuff:http://www.dnsstuff.com DNS-Digger:http://dnsdigger.com Shodan:http://www.shodan.io#bugbountytip -
Since early January what looks a lot like the typical Patriot radar signature is showing up on Sentinel-1 data originating from a remote location in
#SaudiArabia near Al Ula. At the location what looks like a large camp site of sorts that gets built yearly. VIP camping?#OSINT pic.twitter.com/a4BwJGJw6d
Prikaži ovu nit
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.