Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
gmail-osint.activetk.jp
Ghunt online version.
Get info about Google account by email:
- name
- default profile and cover pictures;
- calendar events and timezone;
- Google Maps reviews;
- Google Plus and Google Chat data;
#osint #socmint
Ghunt online version.
Get info about Google account by email:
- name
- default profile and cover pictures;
- calendar events and timezone;
- Google Maps reviews;
- Google Plus and Google Chat data;
#osint #socmint
๐2
Webinar: OSINT: The Ultimate Truth-Seeker on the Internet
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques! In this workshop, you will learn about the fundamentals of OSINT and how to apply them in your investigations.
We'll begin by discussing what OSINT is and how it differs from OSINF (Open-Source Information). We'll also explore the intelligence cycle and how it relates to OSINT investigations. You'll learn about the different phases of the cycle, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination.
Next, we'll delve into technical and non-technical OSINT, explaining the differences between the two. You'll learn how to use tools and techniques like Google search operators, metadata analysis, and social media monitoring to collect information online.
We'll also touch on the topic of Darkweb and explain what it is and how it works. You'll gain an understanding of the difference between the surface web, deep web, and dark web and the challenges associated with conducting OSINT investigations in these areas.
Finally, we'll wrap up the workshop by discussing Darkweb OSINT and how to conduct investigations in the dark web safely and effectively. You'll learn about the legal and ethical considerations involved in dark web investigations, as well as the tools and techniques used to access and gather information from hidden services.
By the end of this workshop, you'll have a solid understanding of OSINT investigations and be able to apply the techniques learned to find valuable information online. Whether you're a student, researcher, or just someone curious about OSINT, this workshop has something for you!
Join us for an interactive and informative session where you can enhance your knowledge and skills in OSINT investigations and uncover the truth behind any online activity!
Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Register Now: https://forms.gle/y46RfWhJ7H3EahBS9
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques! In this workshop, you will learn about the fundamentals of OSINT and how to apply them in your investigations.
We'll begin by discussing what OSINT is and how it differs from OSINF (Open-Source Information). We'll also explore the intelligence cycle and how it relates to OSINT investigations. You'll learn about the different phases of the cycle, including planning and direction, collection, processing and exploitation, analysis and production, and dissemination.
Next, we'll delve into technical and non-technical OSINT, explaining the differences between the two. You'll learn how to use tools and techniques like Google search operators, metadata analysis, and social media monitoring to collect information online.
We'll also touch on the topic of Darkweb and explain what it is and how it works. You'll gain an understanding of the difference between the surface web, deep web, and dark web and the challenges associated with conducting OSINT investigations in these areas.
Finally, we'll wrap up the workshop by discussing Darkweb OSINT and how to conduct investigations in the dark web safely and effectively. You'll learn about the legal and ethical considerations involved in dark web investigations, as well as the tools and techniques used to access and gather information from hidden services.
By the end of this workshop, you'll have a solid understanding of OSINT investigations and be able to apply the techniques learned to find valuable information online. Whether you're a student, researcher, or just someone curious about OSINT, this workshop has something for you!
Join us for an interactive and informative session where you can enhance your knowledge and skills in OSINT investigations and uncover the truth behind any online activity!
Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Register Now: https://forms.gle/y46RfWhJ7H3EahBS9
Google Docs
Webinar- OSINT: The Ultimate Truth-Seeker on the Internet
Date: June 17th, 2023
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques!โฆ
Venue: Online
Time: 9:30PM to 10:30PM
Contact: community.cyberverse@gmail.com
Welcome to the "Introduction to OSINT" workshop, where we will cover essential topics for beginners interested in Open-Source Intelligence (OSINT) techniques!โฆ
๐ฝ๐ช๐๐๐ค๐ช๐ฃ๐ฉ๐ฎ ๐๐จ ๐ผ๐
๐๐๐ฃ๐ : https://youtube.com/shorts/E5an7QPrmCE?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/E5an7QPrmCE?feature=share
YouTube
Bug Bounty vs AI
๐ด BE MY FRIEND ๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix ๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix๐๐๐๐ฃ๐ ๐๐๐๐ฃ...
Legion SMTP v6.5 Latest : https://system32.ink/d/legion-smtp-v6-5-latest-2/
Leak icomanda.com : https://system32.ink/d/leak-icomanda-com/
Leak Globant.com corp GHE : https://system32.ink/d/leak-globant-com-corp-ghe/
Leak Turkish football club Trabzonspor : https://system32.ink/d/leak-turkish-football-club-trabzonspor/
@crackcodes | crackcodes.in | system32.ink |
Leak icomanda.com : https://system32.ink/d/leak-icomanda-com/
Leak Globant.com corp GHE : https://system32.ink/d/leak-globant-com-corp-ghe/
Leak Turkish football club Trabzonspor : https://system32.ink/d/leak-turkish-football-club-trabzonspor/
@crackcodes | crackcodes.in | system32.ink |
๐ฝ๐ช๐ ๐๐ฎ๐ฅ๐: Web-Cache Poisoning
๐๐๐ฃ๐ : https://youtube.com/shorts/60n53QpAxfw?feature=share
๐๐๐ฃ๐ : https://youtube.com/shorts/60n53QpAxfw?feature=share
YouTube
Web Cache Poisoning
๐ฝ๐๐ ๐๐๐ฅ๐: Web Cache Poisoning๐ซ๐๐๐๐๐๐๐ฉ๐๐ค๐: Web cache poisoning is a security attack where an attacker manipulates a web cache to serve malic...
๐ฑLeak BilgeAdam IT Group : https://system32.ink/d/leak-bilgeadam-it-group/
๐ฑdata leak of Concremat Companies : https://system32.ink/d/data-leak-of-concremat-companies/
๐ฑBanshee _ Windows x64 Kernel Driver/Rootkit : https://system32.ink/d/banshee-_-windows-x64-kernel-driver-rootkit/
๐ฑphishing script Sberbank online : https://system32.ink/d/phishing-script-sberbank-online/
๐ฑskybuzz Leak : https://system32.ink/d/skybuzz-leak/
๐ฑMobSecco | Clone Cordova application for bypassing security restrictions : https://system32.ink/d/mobsecco-clone-cordova-application-for-bypassing-security-restrictions/
๐ฑdata leak of Concremat Companies : https://system32.ink/d/data-leak-of-concremat-companies/
๐ฑBanshee _ Windows x64 Kernel Driver/Rootkit : https://system32.ink/d/banshee-_-windows-x64-kernel-driver-rootkit/
๐ฑphishing script Sberbank online : https://system32.ink/d/phishing-script-sberbank-online/
๐ฑskybuzz Leak : https://system32.ink/d/skybuzz-leak/
๐ฑMobSecco | Clone Cordova application for bypassing security restrictions : https://system32.ink/d/mobsecco-clone-cordova-application-for-bypassing-security-restrictions/
๐2
๐ฑLeak Fiduagraria is a joint-stock company : https://system32.ink/d/leak-fiduagraria-is-a-joint-stock-company/
๐ฑCVE-2023-34830: Reflected XSS found in i-doit Open : https://system32.ink/d/cve-2023-34830-reflected-xss-found-in-i-doit-open-v-24/
@crackcodes | crackcodes.in |system32.ink
๐ฑCVE-2023-34830: Reflected XSS found in i-doit Open : https://system32.ink/d/cve-2023-34830-reflected-xss-found-in-i-doit-open-v-24/
@crackcodes | crackcodes.in |system32.ink
๐๐ค๐จ๐ฉ ๐ช๐ฃ๐๐๐ง๐๐จ๐ฉ๐๐ข๐๐ฉ๐๐ ๐๐ช๐ก๐ฃ๐๐ง๐๐๐๐ก๐๐ฉ๐ฎ : ๐พ๐๐๐ ๐๐๐จ๐๐ค๐ฃ๐๐๐๐ช๐ง๐๐ฉ๐๐ค๐ฃ
๐๐๐๐๐พ:
1. What is SOP?
2. Working of CORS.
3. CORS Script (Given in desc)
4. Practical Labs of CORS.
๐๐๐ฃ๐ : https://youtu.be/IAyAg540Wxc
๐๐๐๐๐พ:
1. What is SOP?
2. Working of CORS.
3. CORS Script (Given in desc)
4. Practical Labs of CORS.
๐๐๐ฃ๐ : https://youtu.be/IAyAg540Wxc
YouTube
12 CORS Misconfiguration
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐: ๐ช๐๐น๐ ๐๐๐ง๐๐ฅ๐: https://drive.โฆ
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cybertix
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.in
๐ด RESOURCES
๐: ๐ช๐๐น๐ ๐๐๐ง๐๐ฅ๐: https://drive.โฆ
๐ฅExploits:
๐ฑCVE-2023-29343 Arbitrary file write in Sysmon version 14.14 Exploit : https://system32.ink/d/cve-2023-29343-arbitrary-file-write-in-sysmon-version-14-14-exploit/
๐ฑCVE-2022-44666 jar-poc : https://system32.ink/d/cve-2022-44666-jar-poc/
๐ฅDataleaks:
๐ฑLeak Safiran Airport Services Company : https://system32.ink/d/leak-safiran-airport-services-company/
๐ฑLeak dashboard.bkkbn_go_id : https://system32.ink/d/leak-dashboard-bkkbn-go-id/
๐ฑLeak islamicreminder_net : https://system32.ink/d/leak-islamicreminder-net/
๐ฑLeak newmtcap_com_br : https://system32.ink/d/leak-newmtcap-com-br/
๐ฅTools:
๐ฑPayloads All The PDFs - A list of crafted malicious PDF files : https://system32.ink/d/payloads-all-the-pdfs-a-list-of-crafted-malicious-pdf-files/
๐ฑCVE-2023-29343 Arbitrary file write in Sysmon version 14.14 Exploit : https://system32.ink/d/cve-2023-29343-arbitrary-file-write-in-sysmon-version-14-14-exploit/
๐ฑCVE-2022-44666 jar-poc : https://system32.ink/d/cve-2022-44666-jar-poc/
๐ฅDataleaks:
๐ฑLeak Safiran Airport Services Company : https://system32.ink/d/leak-safiran-airport-services-company/
๐ฑLeak dashboard.bkkbn_go_id : https://system32.ink/d/leak-dashboard-bkkbn-go-id/
๐ฑLeak islamicreminder_net : https://system32.ink/d/leak-islamicreminder-net/
๐ฑLeak newmtcap_com_br : https://system32.ink/d/leak-newmtcap-com-br/
๐ฅTools:
๐ฑPayloads All The PDFs - A list of crafted malicious PDF files : https://system32.ink/d/payloads-all-the-pdfs-a-list-of-crafted-malicious-pdf-files/
Forwarded from Tสษชแดแดส Pแดษดษขแดษชษด ( trickypenguin.ink )
Online HTML to JSO script generator tool
https://trickypenguin.ink/jso-generator-online/
@trickypenguin
TOOL LINK ๐๏ธ
#tools #jsogenerator #defacer
https://trickypenguin.ink/jso-generator-online/
@trickypenguin
TOOL LINK ๐๏ธ
#tools #jsogenerator #defacer
โค2
Who wanna work with me
Dm Fast Limited Seats Available
Monthly Earning Depends on your work Minimum 4000โน - 5000โน/Month earning Guaranteed...
No Education Qualification Required, 4-5 hours of work... Best for Students and For Those Who has nothing at that time..
I'm personally monitoring this work
Dm Here @lexlegion
We got more than 100 DMs within an hour so that's why it's very difficult to message everyone ana call everyone and explain all processes...
That's why I will try to share my telegram group link... Join There Today we are going to explain live What's the exact work... And how to you can able to earn money just doing some normal things
Join My Telegram Group
https://t.me/+2IeX8b7dpukzMGM1
Who know me Please promote my Post in your group for help Others...
Today Live VC Timing @9 p.m.
Join fast and Grab the Amazing Opportunity...
Dm Fast Limited Seats Available
Monthly Earning Depends on your work Minimum 4000โน - 5000โน/Month earning Guaranteed...
No Education Qualification Required, 4-5 hours of work... Best for Students and For Those Who has nothing at that time..
I'm personally monitoring this work
Dm Here @lexlegion
We got more than 100 DMs within an hour so that's why it's very difficult to message everyone ana call everyone and explain all processes...
That's why I will try to share my telegram group link... Join There Today we are going to explain live What's the exact work... And how to you can able to earn money just doing some normal things
Join My Telegram Group
https://t.me/+2IeX8b7dpukzMGM1
Who know me Please promote my Post in your group for help Others...
Today Live VC Timing @9 p.m.
Join fast and Grab the Amazing Opportunity...
โคโ๐ฅ1
Forwarded from ๐พ.๐ฟ.๐ (๐๐๐๐๐๐๐พ๐๐) ๐ฉ
โค๏ธ Top 10 Burpsuite Extensions You Must Know in 2023 โค๏ธ
Burp Suite is a widely recognized web application security testing tool that has gained immense popularity among security professionals. One of the standout features of Burp Suite is its extensive collection of extensions, which enhance its capabilities and empower testers to perform comprehensive security assessments. In this blog post, we will explore the top 10 Burp Suite extensions you must know in 2023.
READ BLOG
https://www.crackcodes.in/2023/06/top-10-burpsuite-extensions-you-must.html
Burp Suite is a widely recognized web application security testing tool that has gained immense popularity among security professionals. One of the standout features of Burp Suite is its extensive collection of extensions, which enhance its capabilities and empower testers to perform comprehensive security assessments. In this blog post, we will explore the top 10 Burp Suite extensions you must know in 2023.
READ BLOG
https://www.crackcodes.in/2023/06/top-10-burpsuite-extensions-you-must.html
Media is too big
VIEW IN TELEGRAM
No matter where you hide Indian Security Agencies will find you ๐ฎ๐ณ๐ฅ
๐ฅ8
Exploits:
๐ฑCVE-2023-1829 Exploit : https://system32.ink/d/cve-2023-1829-exploit/
๐ฑHammulator framework POC : https://system32.ink/d/hammulator-framework-poc/
๐ฑExploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476) : https://system32.ink/d/exploits-for-a-heap-overflow-in-minidlna/
@crackcodes | crackcodes.in | system32.ink
๐ฑCVE-2023-1829 Exploit : https://system32.ink/d/cve-2023-1829-exploit/
๐ฑHammulator framework POC : https://system32.ink/d/hammulator-framework-poc/
๐ฑExploits for a heap overflow in MiniDLNA <=1.3.2 (CVE-2023-33476) : https://system32.ink/d/exploits-for-a-heap-overflow-in-minidlna/
@crackcodes | crackcodes.in | system32.ink