Skip to content

Latest commit

 

History

History
67 lines (34 loc) · 3.47 KB

File metadata and controls

67 lines (34 loc) · 3.47 KB

alt text

...On one of the mausoleums, built by order of Timur, the saying was inscribed: "The Sultan is the shadow of God on earth." Over time, the inscription partially crumbled and remained: "The Sultan is a shadow". Why do they always forget it?..


Tracing the Odnoklassniki Profile of the Texas Mall Shooter: https://www.bellingcat.com/news/2023/05/09/tracing-the-odnoklassniki-profile-of-the-texas-mall-shooter/


Qualcomm chips were caught secretly spying on users.

According to the blog of the German company Nitrokey, which deals with hardware solutions in the field of information security, undocumented functionality has been discovered in Qualcomm single-chip platforms, thanks to which some data from smartphones is sent directly to Qualcomm servers - without any involvement of the operating system.

https://www.nitrokey.com/news/2023/smartphones-popular-qualcomm-chip-secretly-share-private-information-us-chip-maker


ChatGPT

Instant Plugins for ChatGPT. Introducing the Wolfram ChatGPT Plugin Kit: https://writings.stephenwolfram.com/2023/04/instant-plugins-for-chatgpt-introducing-the-wolfram-chatgpt-plugin-kit/

PentestGPT. GPT-empowered penetration testing tool: https://github.com/GreyDGL/PentestGPT


Platforms

Ethos. The OT-centric, open-source platform for sharing anonymous early warning threat information: https://www.ethos-org.io/


API

IP Geolocation API

Around the globe, industry-leading organizations use IPinfo's geolocation data to create efficient, enjoyable, and secure online experiences for their users. These IP geolocation insights lead to better conversion rates, improved customer satisfaction, and much more with our API that's built for low latency responses. Link: https://ipinfo.io/products/ip-geolocation-api


Tools


OSINTech's Timeline

LinkedIn: OSINTech's Featured Timeline

SubStack: OSINTech's Substack


WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.