osint,
-
arXiv:2501.08723v1 Announce Type: new Abstract: Email phishing remains a prevalent cyber threat, targeting victims to extract sensitive information or deploy malicious software. This paper explores the integration of open-source intelligence (OSINT) tools and machine learning (ML) models to enhance phishing detection across multilingual datasets. Using Nmap and theHarvester, this study extracted 17 features, including domain…
-
Новогодняя OSINT-лотерея Масштабный розыгрыш подарковот OSINT-каналов Digital-Разведка✕ Heartov-OSINT –Место на обучении «Digital-Разведчик 3.0»Mycroft Intelligence –10 USDT в любой валютеJhorj Privacy – 5 месячных членств в OSINT-клубе @Jhorj_clubBlackat – Подписка 6 месяцев на бот для поиска информации BlackatSearchBafomёd OSINT – VIP подписка 6 месяцев на фреймворк osintsan.ruКибердед official – Фирменный мерч (Футболка и бейсболка)⚠️Условия: 1. Подписаться…
-
Update to the popular collection of OSINT tools and resources.https://github.com/jivoi/awesome-osint?tab=readme-ov-file
-
Published in · 4 min read · 2 days ago Another Day In The Office Duty calls and you’re on your Security Analyst shift in Security Operations (SOC) today. You’re looking for opportunity to do some deep-diving research into ransomware and malware group activity, let’s hop straight to it. In the context of this research,…
-
There are many open-source intelligence tools on the Internet for finding information about a person’s online presence on different social media accounts like Sherlock and Userrecon. Still, sometimes we have to investigate an email address. You may also like to read: All In One Facebook Toolkit For Information Gathering In this article, we will learn how…
-
In today’s digital landscape, gathering intelligence is a critical component of cybersecurity and ethical hacking. Ethical hackers use Open Source Intelligence (OSINT) tools to collect information about their targets from publicly available sources. OSINT allows hackers to leverage data from the internet, social media, databases, and other open channels to uncover potential vulnerabilities.
-
Tosint is an open-source Telegram OSINT tool that extracts useful information from Telegram bots and channels. It’s suited for security researchers, investigators, and others who want to gather insights from Telegram sources.
-
Published in · 4 min read · 5 days ago Open-source intelligence (OSINT) is an essential tool for cyber security professionals. It involves gathering information from publicly available sources to identify potential threats, vulnerabilities, and targets. This article provides a comprehensive guide on how to conduct OSINT investigations effectively.
-
Last month the US Senate Intelligence Committee proposed the introduction of new legislation to deal with ransomware attacks – basically, to treat them on par with terrorism.
-
In this analysis we’ll take a look at the Internet connected infrastructure of U.S Secret Service’s most wanted cybercriminal with a $10M reward Danil Potekhin using a variety of tools in terms of connecting the dots using current real time and historical passive DNS information to find out where he was and used to host…
-
Are you ready to elevate your OSINT skills or enhance your cybersecurity expertise? This guide is crafted to help you master GoBuster for OSINT with practical, hands-on tips. Whether you’re an experienced hacker or just starting out, you’ll find actionable insights and real-world examples to get you up and running with GoBuster. But before we…
-
In this edition of Between Two Nerds Tom Uren and The Grugq discuss what it would mean to be in a golden age of OSINT and whether we are in one.
-
Published in · 4 min read · 22 hours ago Penetration testing is an offensive sphere of Cybersecurity and is divided into stages of execution. Pentest starts with information gathering, with possible OSINT implementation and ends with writing a report on the vulnerabilities found.
-
Open Source Intelligence (OSINT) is the practice of gathering, analyzing, and disseminating information from publicly available sources to address specific intelligence requirements.
-
Reconnaissance is the first phase of penetration testing which means gathering information before any real attacks are planned So Ashok is an Incredible fast recon tool for penetration tester which is specially designed for Reconnaissance” title=”Reconnaissance”>Reconnaissance phase. And in Ashok-v1.1 you can find the advanced google dorker and wayback crawling machine. Main Features – Wayback…
-
Dear blog readers, In this analysis I’ll provide actionable intelligence on the LabHost phishing as a service cybercrime enterprise. =&0=&
-
I’ve recently obtained access to a publicly obtainable set of personally identifiable information belonging to a secondary Breached Forum team members and based on this discovery I’ve decided to dig a little bit deeper and find out related domain name registrations courtesy of the same individuals that are members of the forum on our way…
-
Dear blog readers, In this analysis I’ll offer and provide an in-depth technical overview of the Internet-connected infrastructure behind the Maze Ransomware Group using public sources including the data leak broker who’s responsible for the Sonatrach Data Leak with the idea to assist the appropriate parties researchers and analysts on their way to properly attribute…
-
Pip-Intel is a powerful tool designed for OSINT (Open Source Intelligence) and cyber intelligence gathering activities. It consolidates various open-source tools into a single user-friendly interface simplifying the data collection and analysis processes for researchers and cybersecurity professionals.