OsintFlow ✙
30.1K subscribers
12.1K photos
2.22K videos
92 files
5.28K links
@osintkit_check_bot - пошук росіян 🎯
@osintflow_connect - зв'язок з адміном🙍‍♂️

1️⃣OSINT-розслідування та документування воєнних злочинів рф
2️⃣OSINT-методологія та інструментарій по фактчекінгу
3️⃣Інструкції з кіберрозвідки
Download Telegram
Forwarded from Cyber Detective
Forensic Toolkit


Universal tools
Mobile tools
Memory/RAM tools
Network tools
Cipher/decoding tools
PE (Portable Executable Files)/Malware tools
OSINT tools
EZ (Eric Zummerman) Tools
SANS (Escal Institute of Advanced Technologies) cheatsheets
Test/CTF Images
Test device setup
DFIR start guides and Youtube channels
Forensic blogs and podcasts
Linux distribution and virtual machines


https://start.me/p/q6mw4Q/forensics


Creator https://twitter.com/KevinPagano3
Forwarded from Cyber Detective
There are dozens of tools for automating Google Dorking and collecting search results.

Many of them are based on the python module "googlesearch".

It is extremely simple.

But it can be applied to a multitude of investigative purposes.

You can learn it in two minutes and use it to create the perfect search automation script for your purposes.

1. Installation:

pip install googlesearch-python

2. Simple search:

from googlesearch import search
search("Osint")

3. Search with output URL of the results to the console:

for url in search('Osint'):
print(url)

4. Search in Russian:

search('Osint', lang="ru")

5. Search with a fixed number of results:

search('Osint', num_results=3)


The picture above shows an example of search automation with results output to a text file.


Official project repository: https://github.com/MarioVilas/googlesearch
Forwarded from Cyber Detective
Control Validation Compass

Database of 9,000+ publicly-accessible detection rules and 2,100+ offensive security tests, aligned with over 500 common attacker techniques.

For #RedTeam and #blueTeam

https://controlcompass.github.io
Forwarded from Cyber Detective
Hacking the Cloud

Encyclopedia of the attacks/tactics/techniques that offensive security professionals can use on cloud exploitation (#AWS, #Azure, #GoogleCloud, #Terraform,)

https://hackingthe.cloud

Contributor twitter.com/Frichette_n
👍1
WARNING....RU
Cryptocurrency Osint Toolkit

Blockchain Explorers;
Transaction Visualisation;
Block Analysis;
Wallets identification;
Articles and webinars

https://start.me/p/ek4rxK/cryptocurrency-osint

#bitcoin #blockchain #osint
Use the last couple posts very carefully. Owner those is General Director of LLC Internet-Rozysk Russian Federation, st Peters Burg.
Monitoring social pages https://github.com/neriymus/Fetcher
WARNING ....RU
Email Investigation Toolkit:

Verification tools (SMTP, WHOIS, Headers)
Email tracking, logging and geolocation
Phishing email, permutation
Identification email user
Search email by site, password, PGP

▫️ https://start.me/p/b5gEPe/email-osint
One more tool for searching nicknames
Forwarded from Cyber Detective
BlackBird

- Search username across 73 sites:
- API username check (Protonmail, PlayerDB, Hackthebox etc);
- Check archived Twitter accounts.

https://github.com/p1ngul1n0/blackbird

#osint #socmint

Creator twitter.com/p1ngul1n0
Forwarded from Cyber Detective
Little timesave trick

Use "map:" advanced search operator for quick view some geographical object (country, town, river) in #Google search results.

map:europe
map:berlin
map:dnepr
Just for example, u can mix operators like map:moscow
intext:fsb
For quick checking of phone numbers in telegram. Enter
https://t.me/+390990000000
in web browser ( or telegram) if the number is not hidden in the privacy settings - you will be shown a telegram account of this person. Sometimes such a trick is very helpful. I was recently in this situation)
#OSINT #DEEPFAKE Deepfake is a realistic substitution of photo, audio and video materials created using neural networks. What are the services for detecting deepfakes?

deepfake-detection
Fake Profile Detector
DFSpot-Deepfake-Recognition
KaiCatch
RealAI
deepware
Weishi
DFSpot-Deepfake-Recognition