bormaxi8080 OSINT Timeline (100) - 06.03.2025

bormaxi8080 OSINT Timeline (100) - 06.03.2025

I am a tree above the road, Come and touch me, If I am just a spirit flying somewhere, You won't touch me - you don't have hands. I am a tree above the road, Not the most crooked, not the most wretched, And where does it lead at the end? I can't see such a distance. At night, someone rushed there laughing. Deep under the ground, the water is silent. I am a tree above the road, Fate was not particularly strict: Clothed in the most beautiful bark, A chipmunk loosened a hole at the roots. A cloud in the sky looks like a boomerang. A tank drove along the road for the first time today.


OSINT Repos List, Repository with gathered from GitHub utilities for OSINT, Development and DevOps. The number of artifacts in the repository exceeded 2600: https://github.com/bormaxi8080/osint-repos-list


After the rapid fall of Bashir al-Assad's regime, the main coordination center of Russian espionage in the Middle East moved from Syria to Iran. However, the strengthening of relations between Moscow and Tehran began back in 2022, as evidenced by the sharp increase in the number of flights of Russian spies to Iran. The Insider found out who heads the GRU residency in Tehran, which banks and shipping companies are profiting from the supply of combat drones that are bringing death in Ukraine, and why Russian spies in Iran are grateful to the Fifth Service of the FSB for drinks: https://theins.ru/inv/279277


How can sexual and gender-based violence be identified through open sources, and what ethical considerations should guide this research? Alexa Koenig is at the forefront of answering these questions. Listen to our Stage Talk with her here: https://rss.com/podcasts/bellingcatstagetalk/1908244/


FBI Crime Data Explorer (stats by USA states).

How many percent of people are killed? by their boyfriends and girlfriends?

How many times more likely are men to be murder victims than women?

Which properties are most likely to be robbed?

https://cde.ucr.cjis.gov/LATEST/webapp/#/pages/explorer/crime/crime-trend


Google Journalist Studio. A collection of tools to empower journalists to do their work more efficiently, creatively, and securely: https://journaliststudio.google.com/

JournalistOnHF. The Essential AI Toolkit for Journalists and Content Creators: https://huggingface.co/spaces/JournalistsonHF/ai-toolkit


The ability to recognize and identify firearms is crucial when investigating images and footage from combat zones and other conflict areas. These resources can help you pinpoint weapon types and gain valuable insights.

Useful tools for firearm identification:

https://www.armalytics.ca/?size=n_10_n

https://www.smallarmssurvey.org/resource/introductory-guide-identification-small-arms-light-weapons-and-associated-ammunition


OSINT Tools, Services and Investigations:

Stega Shade CLI is a user-friendly command-line interface tool designed for image-based steganography. With a focus on simplicity and security, it provides functionality to encode and decode messages into images, including password-protected encoding for enhanced privacy: https://github.com/merwin-asm/StegaShade

CHRONOS. Go tool to download and analyze archive org snapshots, search regex matches, extract endpoints from JS fils, calculate old favicon hashes, extract html tags with XPath: https://github.com/mhmdiaa/chronos

OsintIA_Tools.py is an automated tool for collecting and analyzing public information that combines OSINT techniques with artificial intelligence, providing detailed insights into cybersecurity, potential vulnerabilities, and best mitigation practices: https://github.com/andersonsevla/OsintIA_Tools

E4GL30S1NT - Simple Information Gathering Tool: https://github.com/C0MPL3XDEV/E4GL30S1NT

AFrog. A Security Tool for Bug Bounty, Pentest and Red Teaming: https://github.com/zan8in/afrog

PHPSploit. Full-featured C2 framework which silently persists on webserver with a single-line PHP backdoor: https://github.com/nil0x42/phpsploit


Universal Search & AI:

GPT Crawler. Crawl a site to generate knowledge files to create your own custom GPT from a URL: https://github.com/BuilderIO/gpt-crawler

Chaplin. A visual speech recognition (VSR) tool that reads your lips in real-time and types whatever you silently mouth. Runs fully locally: https://github.com/amanvirparhar/chaplin


Software Development & APIs:

Faiss. A library for efficient similarity search and clustering of dense vectors: https://github.com/facebookresearch/faiss


Linux & DevOps:

Telegraf. Agent for collecting, processing, aggregating, and writing metrics, logs, and other arbitrary data: https://github.com/influxdata/telegraf

Wireless IDS. Ability to detect suspicious activity such as (WEP/WPA/WPS) attack by sniffing the air for wireless packets: https://github.com/SYWorks/wireless-ids

Pangolin. Tunneled Mesh Reverse Proxy Server with Identity and Access Control and Dashboard UI: https://github.com/fosrl/pangolin


Flipper Zero & Other Devices:

Alternative Infrared Remote plugin for FlipperZero: https://github.com/Hong5489/ir_remote


New from CyberDetective:

Exa AI tool to search and crawl the web.?Just describe in words what data you would like to collect with scraping and get ready Python/JavaScript code with a request to Exa API and test it in a sandbox: https://exa.ai


New from GitHub Community:

DocuSeal. Open source DocuSign alternative. Create, fill, and sign digital documents: https://github.com/docusealco/docuseal


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

You can see Systematized List of my GitHub Starred OSINT Repositories

You can contact me on SubStack: https://osintech.substack.com

If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.

Logan Woodward

Senior Sourcing Specialist

4 天前

Almost two years? OMG!

要查看或添加评论,请登录

Maxim Marshak的更多文章