Skip to content

Latest commit

 

History

History
85 lines (44 loc) · 5.57 KB

bormaxi8080-osint-timeline_17_27.07.2023.md

File metadata and controls

85 lines (44 loc) · 5.57 KB

alt text

Live as you would not be ashamed if you lived to old age, do not shine to anyone if you cannot, but shine to your own, shine and sanctify to those and those whom you really love.


bormaxi8080 OSINT Timeline (17) - 27.07.2023:

--

A new investigation by The Insider: how the GRU and SVR monitor the Moldovan authorities through antennas at the Russian embassy: https://theins.ru/politika/263644

Poison the mockingbird. How the FSB tried to kill Dmitry Bykov: https://theins.ru/politika/242567

There is everything: how to measure mortality at the front and the number of mobilized through search queries: https://theins.ru/obshestvo/263048

"Important stories": The family of the creator of the Lancet kamikaze drones owns property in the UK: https://theins.ru/news/263548

Sberbank collects consent to the processing of biometric data using the terminal and your card with a PIN code: https://habr.com/ru/articles/457686/


How OSINT Differs from Traditional Cyber Threat Intelligence: https://blog.shadowdragon.io/how-can-enterprise-business-use-osint-to-improve-cyber-threat-defense

Like most of us, criminals enjoy the benefits of online activities and social networking. SocialNet captures these digital tracks, maps against their aliases, and explores their connections in near real time to expedite your investigations and threat analysis: https://www.linkedin.com/products/shadowdragon-socialnet/


Australian Open Source Intelligence Gathering Resources, Australias Largest Open Source Intelligence Repository for Cyber Professionals and Ethical Hackers: https://github.com/DFW1N/DFW1N-OSINT


Build an email spam detector using Amazon SageMaker: https://aws.amazon.com/blogs/machine-learning/build-an-email-spam-detector-using-amazon-sagemaker/


Search, drag and compare size on maps: https://www.thetruesize.com/

Do you want to leverage shadows in geolocation investigations? You can benefit from SunCalc: http://suncalc.org/

Image investigation tools on Malfrat's OSINT Map: https://map.malfrats.industries/

http://leonardo.ai: AI graphic Swiss Army knife: Image generation (dozens of models) Canvas generation Texture generation Partly free, but very powerfull toolkit.

More than Mountaineering: Using PeakVisor for Geolocation: https://www.bellingcat.com/resources/2023/07/13/more-than-mountaineering-using-peakvisor-for-geolocation


An n-gram is a collection of n successive items in a text document that may include words, numbers, symbols, and punctuation. N-gram models are useful in many text analytics applications where sequences of words are relevant, such as in sentiment analysis, text classification, and text generation. N-gram modeling is one of the many techniques used to convert text from an unstructured format to a structured format. An alternative to n-gram is word embedding techniques, such as word2vec: https://www.mathworks.com/discovery/ngram.html

20 command line tools for forensic investigation of Windows artifacts: https://github.com/dfir-dd/dfir-toolkit

Elcomsoft iOS Forensic Toolkit Tips & Tricks: https://blog.elcomsoft.com/2023/07/ios-forensic-toolkit-tips-tricks/

HackBrowserData is a command-line tool for decrypting and exporting browser data ( passwords, history, cookies, bookmarks, credit cards, download records, localStorage and extension ) from the browser. It supports the most popular browsers on the market and runs on Windows, macOS and Linux.: https://github.com/moonD4rk/HackBrowserData

WhatsApp Spy - logs online/offline events from ANYONE in the world: https://github.com/jasperan/whatsapp-osint

zbox-fs - Zero-details, privacy-focused in-app file system: https://github.com/zboxfs/zbox

Lupo -  Malware IOC Extractor. Debugging module for Malware Analysis Automation: https://github.com/malienist/lupo

ADCSKiller is a Python-based tool designed to automate the process of discovering and exploiting Active Directory Certificate Services (ADCS) vulnerabilities. It leverages features of Certipy and Coercer to simplify the process of attacking ADCS infrastructure: https://github.com/grimlockx/ADCSKiller

netspionage - Network Forensics CLI utility that performs Network Scanning, OSINT, and Attack Detection: https://github.com/ANG13T/netspionage

BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for custom keywords as well as Regular Expressions from publicly-exposed storage buckets by scanning files that store data in plain-text: https://github.com/redhuntlabs/BucketLoot


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

LinkedIn: bormaxi8080 OSINT Featured Timeline

You can see Systematized list of my GitHub Starred OSINT Repositories

and contact me on Twitter: https://twitter.com/OSINTech_


If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.