Skip to content

Latest commit

 

History

History
86 lines (46 loc) · 5.2 KB

bormaxi8080-osint-timeline_18_03.08.2023.md

File metadata and controls

86 lines (46 loc) · 5.2 KB

alt text

The children of the void act without thought. Only a tear in the eye flashes.


bormaxi8080 OSINT Timeline (18) - 03.08.2023:

--

Elon Musk's actions are a brazen attempt to silence honest criticism and independent research: https://doxa.team/news/2023-07-31-musk-infantile

The Phishing Risks of Twitter’s Name Change to X: https://socradar.io/the-phishing-risks-of-twitters-name-change-to-x/

A critical vulnerability dubbed CVE-2023-30799 has put over 900,000 MikroTik RouterOS routers at severe risk, allowing attackers to gain “super-admin” privileges and take full control of the devices without detection: https://www.blackhatethicalhacking.com/news/super-admin-privilege-vulnerability-plagues-mikrotik-routers/

Hackers Released New Black Hat AI Tools XXXGPT and Wolf GPT: https://cybersecuritynews.com/black-hat-ai-tools-xxxgpt-and-wolf-gpt/


How to conduct person of interest investigations using OSINT and Maltego: https://www.maltego.com/blog/how-to-conduct-person-of-interest-investigations-using-osint-and-maltego/

Integrating Wireless Data into Your OSINT Investigations from Maltego: https://www.maltego.com/blog/integrating-wireless-data-into-your-osint-investigations/


Awesome Browser Extensions for OSINT - A collection of awesome browser extension useful for OSINT along with their use case: https://github.com/osintambition/Awesome-Browser-Extensions-for-OSINT

Social-Media-OSINT-Tools-Collection - A collection of most useful OSINT tools for SOCINT: https://github.com/osintambition/Social-Media-OSINT-Tools-Collection

OSINT resources for CTI: https://www.authentic8.com/resources/OSINT-resources

Added searching for old usernames of Twitter account with memory.lol in Maigret. Don't forget to update socid-extractor to the last version (v0.0.25)!

Also, remind you that you can start your investigations from any parseable account, example with parse mode: maigret --parse https://api.memory.lol/v1/tw/libsoftiktok Thanks to @cybdetective


Quiet - a private, p2p alternative to Slack and Discord built on Tor & IPFS: https://github.com/TryQuiet/quiet

DiG GUI - Web Interface for DNS Queries: https://www.diggui.com/

lmt - a cli program written in go that can be used to run applications with resource limits enforced using cgroupsv2: https://github.com/Rohansjamadagni/lmt

Pipper - Python Module able to automatically install missing imported libraries through pip: https://github.com/D35m0nd142/Pipper

Sniffle - a sniffer for Bluetooth 5 and 4.x LE: https://github.com/nccgroup/Sniffle

MetadataPlus - Chris Nevin @ NCCGroup A tool to extract metadata from Microsoft Office files that includes new locations not checked in other tools: https://github.com/nccgroup/MetadataPlus

Code Credential Scanner - a script is intended to scan a large, diverse codebase for hard-coded credentials, or credentials present in configuration files. These represent a serious security issue, and can be extremely hard to detect and manage: https://github.com/nccgroup/ccs

credential-digger - a GitHub scanning tool that identifies hardcoded credentials while filtering the false positive data through machine learning models: https://github.com/SAP/credential-digger

LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities: https://github.com/capture0x/LFI-FINDER Details: https://www.kitploit.com/2023/07/lfi-finder-tool-focuses-on-detecting.html

Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner: https://github.com/D35m0nd142/LFISuite

DWH - Simple (but working) WEP/WPA/WPA2 Hacking script: https://github.com/D35m0nd142/DWH

FakeSG enters the 'FakeUpdates' arena to deliver NetSupport RAT: https://www.malwarebytes.com/blog/threat-intelligence/2023/07/socgholish-copycat-delivers-netsupport-rat

fakes-gen-cli - a Library and CLI tool for generating fake data as formatted as CSV, TSV and JSON: https://github.com/ogata-k/fakes-gen-cli

pdlist - a passive subdomain finder: https://github.com/gnebbia/pdlist


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

LinkedIn: bormaxi8080 OSINT Featured Timeline

You can see Systematized list of my GitHub Starred OSINT Repositories

and contact me on Twitter: https://twitter.com/OSINTech_


If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.