Skip to content

Latest commit

 

History

History
105 lines (54 loc) · 7.07 KB

bormaxi8080-osint-timeline_34_23.11.2023.md

File metadata and controls

105 lines (54 loc) · 7.07 KB

alt text

There is such a thing called a countdown. For some it turns on at 50, for others at 30, for others at 14 - and for everyone it is always completely different. There is always one thing in common: it is a countdown. The point after which you already count, and no longer live just like that, without thinking.


bormaxi8080 OSINT Timeline (34) - 23.11.2023:

--

UkraineFacts - By the International Fact-checking Network Signatories: https://ukrainefacts.org/

A New Tool Allows Researchers to Track Damage in Gaza from Bellingcat: https://www.bellingcat.com/resources/2023/11/15/a-new-tool-allows-researchers-to-track-damage-in-gaza/

2023 Israel-Hamas war - A GitHub repository corresponds to the dataset used for our research purpose. The repository contains fact-checked articles and social media posts about the 2023 Israel–Hamas war. The data is extracted through the AMUSED framework: https://github.com/Gautamshahi/2023-Israel-Hamas-war

Free Media Literacy Resources Hub Launches To Support UK Teachers, As 90% Call For Media Literacy To Be Taught In Schools: https://thestudentview.org/train-the-trainer-free-media-literacy-program-launches-to-support-uk-teachers-as-90-call-for-media-literacy-to-be-taught-in-schools-2/

From Pixels to Punches - Geolocating a neo-Nazi and White Nationalist Combat Event in Los Angeles: https://www.bellingcat.com/news/2023/11/16/from-pixels-to-punches-geolocating-a-neo-nazi-and-white-nationalist-combat-event-in-los-angeles/

VSquare - Russian spies still call Brussels home: https://euromaidanpress.com/2023/11/16/vsquare-russian-spies-still-roam-free-in-brussels/

Russia imports Czech-made parts for Mi-8 helicopters through India and Kazakhstan, journalistic investigation finds: https://www.pravda.com.ua/eng/news/2023/11/20/7429607/

Denial of Pleasure - Attacking Unusual BLE Targets with a Flipper Zero: https://www.whid.ninja/blog/denial-of-pleasure-attacking-unusual-ble-targets-with-a-flipper-zero

Study: When we see what others do, our brain sees not what we see, but what we expect: https://medicalxpress.com/news/2023-11-brain.html

Fav-up – IP lookup by favicon using Shodan: https://hakin9.org/fav-up-ip-lookup-by-favicon-using-shodan/

Google search bad. What to do: https://medium.com/@cyb_detective/google-search-bad-what-to-do-fc1061d3a1ce


8 basic methods of automating the collection of information from company websites

search subdomains, mail servers, whois

getting a list of URLs using WayBackUrls

extract contact info with Nuclei twitter.com/pdnuclei 

and more:

https://medium.com/@cyb_detective/8-basic-methods-of-automating-the-collection-of-information-from-company-websites-9757f3cd1e06


Awesome Privacy - A curated list of services and alternatives that respect your privacy because PRIVACY MATTERS: https://github.com/pluja/awesome-privacy

Awesome CTO - A curated and opinionated list of resources for Chief Technology Officers, with the emphasis on startups: https://github.com/kuchin/awesome-cto


TypeDB - the polymorphic database powered by types: https://github.com/vaticle/typedb

Mongoaudit is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing: https://github.com/stampery/mongoaudit

IMAPLoginTester - A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers: https://github.com/rm1984/IMAPLoginTester

PhotoGuard - This repository contains the code for our recent work on safe-guarding images against manipulation by ML-powerd photo-editing models such as stable diffusion: https://github.com/MadryLab/photoguard

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker: https://github.com/desaster/kippo

Webanalyze - Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning: https://github.com/rverton/webanalyze

DORA: Data-agnOstic Representation Analysis paper. DORA allows to find outlier representations in Deep Neural Networks: https://github.com/lapalap/dora

Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist Penetration Testers and Red Teams with lateral movement within Active Directory environments: https://github.com/Leo4j/Amnesiac

Fuxploider - File upload vulnerability scanner and exploitation tool: https://github.com/almandin/fuxploider

Squalr Memory Editor - Game Hacking Tool Written in C#: https://github.com/Squalr/Squalr

Uncomment - A Powerful tool to fetch all the comments from the supplied URL's: https://github.com/rohsec/Uncomment

LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services: https://github.com/rohsec/LEAKEY/

Garud - An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically: https://github.com/R0X4R/Garud

subby by n0mi1k is a high-speed subdomain enumeration tool that excels in automatically detecting wildcard DNS records and filtering out invalid subdomains. It provides two enumeration modes-DNS for fast and stealthy queries and Web for detailed insights through HTTP(S) requests: https://github.com/vevv/subby

Pretender - Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing: https://github.com/RedTeamPentesting/pretender

FinDOM-XSS - A fast DOM based XSS vulnerability scanner with simplicity: https://github.com/dwisiswant0/findom-xss

C2concealer is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike: https://github.com/RedSiege/C2concealer


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

LinkedIn: bormaxi8080 OSINT Featured Timeline

You can see Systematized list of my GitHub Starred OSINT Repositories

and contact me on Twitter: https://twitter.com/OSINTech_


If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.