Skip to content

Latest commit

 

History

History
37 lines (19 loc) · 2.26 KB

File metadata and controls

37 lines (19 loc) · 2.26 KB

alt text

“Nationalism is never healthy. Lack of a brain is a disease"


How moral injury and vicarious trauma can impact researchers and journalists, and how you might be able to limit that impact: https://soundcloud.com/bellingcat/the-risk-of-moral-injury-in-open-source-research-with-hannah-storm?si=61effc3d13d34735938207e78c4fa8d7&utm_medium=text

Kali Linux 2023.4 Released (Cloud ARM64, Vagrant Hyper-V & Raspberry Pi 5): https://www.kali.org/blog/kali-linux-2023-4-release/


Chaya protects your privacy through steganography, cryptography and compression. It effectively encrypts your payloads using AES-256-GCM cryptography, embeds them using LSB-LPS steganography technique into images and compresses them using FLIF to evade detection by performing lossless compression: https://github.com/xerohackcom/Chaya

RepoList. Generate Wordlists from GitHub Repositories: https://github.com/Ademking/repolist

InstaFollower. Instagram Auto Follow users from List: https://github.com/Ademking/InstaFollower

PassDetective is a command-line tool that scans shell command history to detect mistakenly written passwords, API keys, and secrets. Using regular expressions, it helps prevent accidental exposure of sensitive information in your command history: https://github.com/aydinnyunus/PassDetective

BulkSMSPython. Send SMS to your list of numbers using Android ADB: https://github.com/Ademking/BulkSMSPython

Excel-to-Trello. Creates Trello Cards/Labels using Excel: https://github.com/Ademking/Excel-to-Trello

GoBuster. Directory/File, DNS and VHost busting tool written in Go: https://github.com/OJ/gobuster


OSINTech's Timeline

LinkedIn: OSINTech's Featured Timeline

SubStack: OSINTech's Substack


WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.