Outside the window, a river Human voices Diligent hopelessness Softness of ice No inevitability of death No definitions of love.
OSINT Repos List, Repository with gathered from GitHub utilities for OSINT, Development and DevOps. The number of artifacts in the repository exceeded 2600: https://github.com/bormaxi8080/osint-repos-list
How OSINT shaped reporting on the war in Ukraine: https://www.info-res.org/eyes-on-russia/articles/how-osint-shaped-reporting-on-the-war-in-ukraine/
Russian company working with the state promises $4 million for hacking Telegram. Operation Zero (OOO Matrix) is based in St. Petersburg and is run by a certain Sergey Zelenyuk. He has previously stated that his company resells vulnerabilities only in countries “not part of NATO.” The company’s website states that it cooperates with Russian state companies. Unlike traditional bug bounty platforms like Hacker One or Bugcrowd, Operation Zero does NOT warn vendors about vulnerabilities in their products: https://theins.ru/news/279855
Cybersecurity researchers at Citizen Lab, a digital rights watchdog based at the University of Toronto, have exposed the use of a highly sophisticated spyware tool named Graphite. Developed by Israeli cybersecurity firm Paragon Solutions, Graphite was deployed to target high-profile individuals, including journalists and human rights activists, by exploiting a zero-day vulnerability in WhatsApp: https://www.blackhatethicalhacking.com/news/israeli-spyware-graphite-exploits-whatsapp-0-click-attack-uncovered/
OSINT Tools, Services and Investigations:
ICELAND OSINT. Live cams, news monitoring, Game of Thrones locations, traffic info, maps and more: https://start.me/p/RM4Xae/iceland
DOCUMENT SEARCH TOOLS. Filesharing search, FTP servers search, cloud storage search, documents/files search: https://start.me/p/1kl8j9/search-engines-searchers
Deep Fake Detection. Start me page with examples of Deep Fake Tools, Deep Fake detection tools, Deep Fake detection guides and MDR explained articles: https://start.me/p/zpkMMO/deep-fake-tools-detection
ID and other documents OSINT. List of sites for checking and searching information about passports and other documents in European countries: https://start.me/p/Pwxv4y/16-id-and-travel-documents
Terrorism financing OSINT List by Lorando Bono. Reports, organizations info, company/charity info, sanctions lists, crypto investigations and more: https://start.me/p/1kwrGp/terrorism-financing
Company registries by country. A list of dozens of registries for finding information about registered businesses in different countries. Some allow to search only by company identification number, some by name, and some by owner name and address: https://www.disputesregister.org/advice/company-registries-by-country
Profile Image Intel. By the date the profile picture was uploaded, you can determine the possible creation date of the account. This service displays the avatar update date in WhatsApp/Facebook by username and in some other social networks by URL: https://profileimageintel.com/
Scraper of Google Maps reviews. The code allows to extract the most recent reviews starting from the url of a specific Point Of Interest (POI) in Google Maps. An additional extension helps to monitor and incrementally store the reviews in a MongoDB instance: https://github.com/gaspa93/googlemaps-scraper
Baitroute. A web honeypot library to create vulnerable-looking endpoints to detect and mislead attackers: https://github.com/utkusen/baitroute
DSViper. This is for Ethical Use only! Currently the payloads can only bypass latest real time monitoring and not cloud based detections, due to a lot of virus total submissions. Works like a charm in lab assessments like HTB Prolab's or any other Penetration Testing certification that has antivirus enabled: https://github.com/dagowda/DSViper
Universal Search & AI:
Voice Note Transcription and Summarizer Bot for Telegram. A powerful Telegram bot that transcribes and summarizes voice notes using state-of-the-art AI models. Built with Python and powered by Groq's API with Whisper and Llama 3 model for transcription and summarization: https://github.com/aviaryan/voice-transcribe-summarize-telegram-bot
AI-Renamer. A Node.js CLI that uses Ollama and LM Studio models (Llava, Gemma, Llama etc.) to intelligently rename files by their contents: https://github.com/ozgrozer/ai-renamer
Software Development & APIs:
SeleniumBase. Python APIs for web automation, testing, and bypassing bot-detection: https://github.com/seleniumbase/SeleniumBase
White Obfuscate. A tool to obfuscate / to make Python code unreadable. It obfuscates your code and prevents easy access of others to your code: https://github.com/whxitte/white-obfuscate
Caffeine. A high performance caching library for Java: https://github.com/ben-manes/caffeine?tab=readme-ov-file
Linux & DevOps:
1Panel offers an intuitive web interface for managing websites, files, containers, databases and LLMs within a Linux server: https://github.com/1Panel-dev/1Panel
Caps-Log. A small TUI journaling tool: https://github.com/NikolaDucak/caps-log
Flipper Zero & Other Devices:
Flipper zero exploiting vulnerability to open any Sentry Safe and Master Lock electronic safe without any pin code: https://github.com/H4ckd4ddy/flipperzero-sentry-safe-plugin
New from CyberDetective:
B2BHint. Search for information on registered businesses around the world. It's can search either by company name or by a person's surname: https://b2bhint.com
BrowserExt. Get detailed info by Chrome/Edge extension ID. Risk score, required permissions, sensitive data scan results, manifest viewing: https://browserext.info/
New from GitHub Community:
Jinsp. Visually inspect JSON data from the terminal: https://github.com/simeonkr/jinsp
Photo Video Watermark. Telegram bot for creating watermark on photos and videos: https://github.com/h1w/photo-video-watermark
LinkedIn: OSINTech's Featured Timeline
SubStack: OSINTech's Substack
WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.
