bormaxi8080 OSINT Timeline (87) - 05.12.2024

bormaxi8080 OSINT Timeline (87) - 05.12.2024

Those who do not want to see will never see, even if you hang spotlights all over the world, it will be useless.


OSINT Repos List, Repository with gathered from GitHub utilities for OSINT, Development and DevOps. The number of artifacts in the repository exceeded 2300: https://github.com/bormaxi8080/osint-repos-list


"Black Legion" - Secret Fake Private Military Company in Kyrgyzstan: https://www.youtube.com/watch?v=NcWYhewG9Ho


"First Department" reported the discovery of an infection of an anti-war activist's phone with the Monokle spyware from the Russian FSB

The human rights project "First Department" reported on the infection of the devices of the anti-war activist with Russian citizenship Kirill Porubets with the Monokle spyware, developed by the St. Petersburg company "Special Technology Center" (STC). This is the first time that human rights activists have learned of the use of this program against anti-war Russians, claims "First Department".

As "First Department" explained to The Insider, so far only Android devices are known to be infected. However, the possibility of installing it on iOS is not excluded and is being studied.

Porubets managed to leave Russia after being detained by special services and threatened with treason.

Monokle is a malicious program that provides its operator with remote access to Android-based phones. The Trojan allows the person who controls the program to read messages, record the screen, listen to calls, track the victim's movements, download files from the device and see passwords stored on it: https://theins.ru/news/276831


Acts of sabotage point to future aggression. Russia is actively conducting subversive and subversive activities in Europe, preparing for a major war with NATO. Press publications and testimonies of officials about the situation in the sphere of European security - in the review by Masha Slonim: https://newtimes.ru/articles/detail/249189/

In a new interview on the SlonFm channel, a Ukrainian cadet and founder of a small OSINT community, InfoHunters, shares his experience working with open sources of information. He explains how data analysis and social networks help identify large concentrations of Russian troops, and explains why OSINT skills are becoming increasingly important for everyone. The interview discusses the most high-profile works of Ukrainian OSINT communities and gives advice for complete beginners in this field. More in the full video (Ukrainian): https://www.youtube.com/watch?v=BcwoXeQZ8As


How to find the email of the Linkedin profile owner without a Linkedin account? Use various third-party databases (Amazing Hiring, Prospeo, SalesQL etc). Today I also found out https://recruitryte.com (50 emails free).


A list of OSINT tools that may be useful to you when conducting investigations related to Bulgaria. Most of resources and tools has versions in English version, but a basic knowledge of Bulgarian is required: https://github.com/paulpogoda/OSINT-Tools-Bulgaria

A list of websites which have proved useful during OSINT investigations in Israel. Most of them are Hebrew only, but some have an English version as well: https://github.com/paulpogoda/OSINT-Tools-Israel

A list of OSINT tools that may be useful to you when conducting investigations related to the United Arab Emirates (Abu Dhabi, Dubai, Sharjah, Ajman, Umm Al Quwain, Ras Al Khaimah and Fujairah): https://github.com/paulpogoda/OSINT-Tools-Emirates


OSINT Tools, Services and Investigations:

Telegram Checker - A Python tool for checking Telegram accounts via phone numbers. Automatically verifies account existence, downloads profile pictures, and provides detailed user information in a clean JSON format. Built with Telethon API for reliable Telegram interaction: https://github.com/unnohwn/telegram-checker

WhatsApp Spy is an app designed to monitor and log all on-screen texts whenever a user opens WhatsApp / Whatsapp Business. It also supports Instagram and Messenger, sending logs to either Discord or Telegram, without port forwarding: https://github.com/wellrodrig/Whatsapp-Spy

The OTX Scraper is a Bash script designed to fetch URLs associated with a given domain from AlienVault's Open Threat Exchange (OTX) platform. It is particularly useful for cybersecurity professionals and researchers who want to gather intelligence for reconnaissance and vulnerability analysis: https://github.com/Suryesh/OTX_AlienVault_URL

Search By Image - Browser extension for reverse image search, available for Chrome, Edge and Safari: https://github.com/dessant/search-by-image

Image Forensics. This is an integrated framework for image forensic analysis. It includes a Java webservice, including seven splicing detection algorithm implementations, plus additional forensic tools, located in the subdirectory?[java_service](https://github.com/MKLab-ITI/image-forensics/tree/master/java_service)?and a Matlab algorithm evaluation framework: https://github.com/MKLab-ITI/image-forensics

Website to GIF - GitHub Action to turn your website into a GIF: https://github.com/PabloLec/website-to-gif

Deface - Video anonymization by face detection: https://github.com/ORB-HD/deface

DeDigger - Find public files in Google Drive: https://www.dedigger.com/

ScrapeComfort - Effortlessly extract data with the power of AI automating the process: https://github.com/Indie-Platforms/scrapecomfort

Voice Writing Electron - A real-time, instant dictation desktop application built on Electron that uses Whisper and GROQ under the hood: https://github.com/aviaryan/voice-writing-electron

Striker is an offensive information and vulnerability scanner: https://github.com/s0md3v/Striker


Universal Search & AI:

Awesome AI Web Search. List of open source and proprietary AI web search tools (with launch dates): https://github.com/felladrin/awesome-ai-web-search

An open-source OCR API that leverages OpenAI's powerful language models with optimized performance techniques like parallel processing and batching to deliver high-quality text extraction from complex PDF documents. Ideal for businesses seeking efficient document digitization and data extraction solutions: https://github.com/yigitkonur/swift-ocr-llm-powered-pdf-to-markdown

Gradio WebUI for AdvancedLivePortrait: https://github.com/jhj0517/AdvancedLivePortrait-WebUI


Software Development:

WhoDB - A lightweight next-gen data explorer - Postgres, MySQL, SQLite, MongoDB, Redis, MariaDB & Elastic Search with Chat interface: https://github.com/clidey/whodb

SQL Seeder - This Go package provides a tool for generating SQL INSERT statements from JSON or Excel data. It supports various relationships between tables (one-to-many and many-to-many) and allows you to customize the delimiters used in your data: https://github.com/darwishdev/sqlseeder

Chance - Random generator helper for JavaScript: https://github.com/chancejs/chancejs


Linux & DevOps:

ShellFirm - Intercept any risky patterns (default or defined by you) and prompt you a small challenge for double verification: https://github.com/kaplanelad/shellfirm

ArchImage - Build AppImage packages for all distributions but including Arch Linux packages. Powered by JuNest: https://github.com/ivan-hc/ArchImage


Flipper Zero & Other Devices:

Evil portal app for the flipper zero + WiFi dev board: https://github.com/bigbrodude6119/flipper-zero-evil-portal


New from CyberDetective:

MAPTILER. Detailed worldwide 3D + 3D satellite + aerial photo maps. A lot of additional tools (real-time weather, elevation profile etc). SDK for creating your own interactive 3D maps with incredibly wide functionality: https://maptiler.com

Manhom.com - Large databases with detailed info about 240K+ persons from Arab regions. Biographies, social media profiles, related peoples and more. The site also allows you to track changes on the pages of people you are interested in: https://manhom.com

A free online tool for reading files metadata. What distinguishes it from many analogs is the number of fields to be read (maximum data, even the most insignificant) + a large number of supported formats: https://metashieldclean-up.tu.com


New from GitHub Community:

Posthumous Automation - Code gets invoked when I die: https://github.com/0x41head/posthumous-automation


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

You can see Systematized List of my GitHub Starred OSINT Repositories

You can contact me on Twitter: https://twitter.com/OSINTech_

If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.


要查看或添加评论,请登录

Maxim Marshak的更多文章

社区洞察

其他会员也浏览了