There is such a thing called a countdown. For some it turns on at 50, for others at 30, for others at 14 - and for everyone it is always completely different. There is always one thing in common: it is a countdown. The point after which you already count, and no longer live just like that, without thinking.
--
UkraineFacts
- By the International Fact-checking Network Signatories: https://ukrainefacts.org/
A New Tool
Allows Researchers to Track Damage in Gaza from Bellingcat: https://www.bellingcat.com/resources/2023/11/15/a-new-tool-allows-researchers-to-track-damage-in-gaza/
2023 Israel-Hamas war
- A GitHub repository corresponds to the dataset used for our research purpose. The repository contains fact-checked articles and social media posts about the 2023 Israel–Hamas war. The data is extracted through the AMUSED framework: https://github.com/Gautamshahi/2023-Israel-Hamas-war
Free Media Literacy Resources Hub Launches To Support UK Teachers
, As 90% Call For Media Literacy To Be Taught In Schools: https://thestudentview.org/train-the-trainer-free-media-literacy-program-launches-to-support-uk-teachers-as-90-call-for-media-literacy-to-be-taught-in-schools-2/
From Pixels to Punches
- Geolocating a neo-Nazi and White Nationalist Combat Event in Los Angeles: https://www.bellingcat.com/news/2023/11/16/from-pixels-to-punches-geolocating-a-neo-nazi-and-white-nationalist-combat-event-in-los-angeles/
VSquare
- Russian spies still call Brussels home: https://euromaidanpress.com/2023/11/16/vsquare-russian-spies-still-roam-free-in-brussels/
Russia imports Czech-made parts for Mi-8 helicopters through India and Kazakhstan
, journalistic investigation finds: https://www.pravda.com.ua/eng/news/2023/11/20/7429607/
Denial of Pleasure
- Attacking Unusual BLE Targets with a Flipper Zero: https://www.whid.ninja/blog/denial-of-pleasure-attacking-unusual-ble-targets-with-a-flipper-zero
Study
: When we see what others do, our brain sees not what we see, but what we expect: https://medicalxpress.com/news/2023-11-brain.html
Fav-up
– IP lookup by favicon using Shodan: https://hakin9.org/fav-up-ip-lookup-by-favicon-using-shodan/
Google search bad
. What to do: https://medium.com/@cyb_detective/google-search-bad-what-to-do-fc1061d3a1ce
8 basic methods of automating the collection of information from company websites
search subdomains, mail servers, whois
getting a list of URLs using WayBackUrls
extract contact info with Nuclei twitter.com/pdnuclei
and more:
Awesome Privacy
- A curated list of services and alternatives that respect your privacy because PRIVACY MATTERS: https://github.com/pluja/awesome-privacy
Awesome CTO
- A curated and opinionated list of resources for Chief Technology Officers, with the emphasis on startups: https://github.com/kuchin/awesome-cto
TypeDB
- the polymorphic database powered by types: https://github.com/vaticle/typedb
Mongoaudit
is a CLI tool for auditing MongoDB servers, detecting poor security settings and performing automated penetration testing: https://github.com/stampery/mongoaudit
IMAPLoginTester
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by trying to login on IMAP servers: https://github.com/rm1984/IMAPLoginTester
PhotoGuard
- This repository contains the code for our recent work on safe-guarding images against manipulation by ML-powerd photo-editing models such as stable diffusion: https://github.com/MadryLab/photoguard
Kippo
is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker: https://github.com/desaster/kippo
Webanalyze
- Port of Wappalyzer (uncovers technologies used on websites) to automate mass scanning: https://github.com/rverton/webanalyze
DORA
: Data-agnOstic Representation Analysis paper. DORA allows to find outlier representations in Deep Neural Networks: https://github.com/lapalap/dora
Amnesiac
is a post-exploitation framework entirely written in PowerShell and designed to assist Penetration Testers and Red Teams with lateral movement within Active Directory environments: https://github.com/Leo4j/Amnesiac
Fuxploider
- File upload vulnerability scanner and exploitation tool: https://github.com/almandin/fuxploider
Squalr Memory Editor
- Game Hacking Tool Written in C#: https://github.com/Squalr/Squalr
Uncomment
- A Powerful tool to fetch all the comments from the supplied URL's: https://github.com/rohsec/Uncomment
LEAKEY
is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and easy to add checks for new services: https://github.com/rohsec/LEAKEY/
Garud
- An automation tool that scans sub-domains, sub-domain takeover, then filters out XSS, SSTI, SSRF, and more injection point parameters and scans for some low hanging vulnerabilities automatically: https://github.com/R0X4R/Garud
subby
by n0mi1k is a high-speed subdomain enumeration tool that excels in automatically detecting wildcard DNS records and filtering out invalid subdomains. It provides two enumeration modes-DNS for fast and stealthy queries and Web for detailed insights through HTTP(S) requests: https://github.com/vevv/subby
Pretender
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing: https://github.com/RedTeamPentesting/pretender
FinDOM-XSS
- A fast DOM based XSS vulnerability scanner with simplicity: https://github.com/dwisiswant0/findom-xss
C2concealer
is a command line tool that generates randomized C2 malleable profiles for use in Cobalt Strike: https://github.com/RedSiege/C2concealer
GitHub: https://github.com/bormaxi8080/osint-timeline
LinkedIn: bormaxi8080 OSINT Featured Timeline
You can see Systematized list of my GitHub Starred OSINT Repositories
and contact me on Twitter: https://twitter.com/OSINTech_
If you like the projects that I do, I will be grateful for donations in private dialogue.
WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.