Skip to content

Latest commit

 

History

History
95 lines (50 loc) · 6.04 KB

bormaxi8080-osint-timeline_09_01.06.2023.md

File metadata and controls

95 lines (50 loc) · 6.04 KB

alt text

...The smells of linden and apple trees interrupt everything: even the winter fumes mixed with burnt plastic. The smell of death. This is the first time even for me. Standing wet in the rain, and like this. Just let me feel what kind of bird flew by here and inadvertently touched it with its wing, what smell was and is, and what kind of flower: and I will understand. It happens sometimes.

Photo: Presidential Palace, Almaty, Kazakhstan, May 2022


bormaxi8080 OSINT Timeline (09) - 01.06.2023:

--

Be sure to look. The patriotic faces of these juveniles, not obscured by morality, are still motherfc..ers, under the leadership of motherfc..ers already adults, are creating state fascism and censorship. All young, promising, all smiling. Something is being discussed. They have mugs on OSINT, f..ck.

It is these boys and girls born in 2000 that launch rockets.

PS: All of these characters, one and all, will be counted and held accountable, regardless of age. The responsibility is severe. No one will go unnoticed.

Link: https://t.me/rdc_grfc/117


But, in fact, what grows out of juvenile motherf..ers: these motherfuc..ers are already adults and deserve special attention. Here is the website (here: https://internet-rozysk.rf/), and Facebook and VK groups (here: https://www.facebook.com/internet.rozysk/, here: https://vk.com/internet.rozysk), and a channel in a cart with twenty-five thousand subscribers (here: https://t.me/irozysk), or rather, a whole network of channels with bots, a system for tracking users, identifying numbers, locations, connecting to SORM, friendship with various influential Russian bodies, a blog with letters from them, and so on and so forth. And all this is loudly called OSINT, although in fact it is an ordinary Comrade Major. In general, this guys are serious, and they should also be dealt with seriously, with the involvement of serious resources.


Who creates the digital Gulag in Russia: https://avtozak.info/kto-v-rossii-sozdaet-cifrovoj-gulag/


According to an investigation by the Organized Crime and Corruption Reporting Project, the territory of Kazakhstan is used to supply drones to the Russian military. For this, the company Aspan Arba is used, on the website of which it is stated that it supplies drones for the mining, oil industry, and agriculture. sectors. The company, according to the investigation, has the same owner as the Russian one, which sells drones to the military: https://www.occrp.org/en/investigations/kazakhstan-has-become-a-pathway-for-the-supply-of-russias-war-machine-heres-how-it-works


Geolocating Mobile Phones With An IP: https://nixintel.info/osint/geolocating-mobile-phones-with-an-ip/


Nmap vs Wireshark

Comparing The Two Popular Network Tools: https://www.stationx.net/nmap-vs-wireshark/ Understanding Nmap Scan with Wireshark: https://shamsher-khan-404.medium.com/understanding-nmap-scan-with-wireshark-5144d68059f7


Tools:

GeoWordlists is a tool to generate wordlists of passwords containing cities at a defined distance around the client city: https://github.com/p0dalirius/GeoWordlists

Pyramid - a tool to help operate in EDRs' blind spots: https://github.com/naksyn/Pyramid

fireprox - AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation: https://github.com/chm0dx/fireprox

creepyCrawler - OSINT tool to crawl a site and extract useful recon info: https://github.com/chm0dx/creepyCrawler

gitSome - OSINT tool to extract email addresses and other useful info from various GitHub sources: https://github.com/chm0dx/gitSome

leakyBuckets - Find open storage buckets and accessible files across Amazon Web Services, Google Cloud, and Microsoft Azure simultaneously: https://github.com/chm0dx/leakyBuckets

NetDahar - a network logging tool that logs per process activities: https://github.com/mamun-sec/NetDahar

telegram_backup - Java app to download all your telegram data: https://github.com/fabianonline/telegram_backup

Ripple - a "panic button" app for triggering a "ripple effect" across apps that are set up to respond to panic events: https://github.com/guardianproject/ripple

maskRequired - Analyze a list of cleartext passwords and output a list of masks with the associated counts for each. Useful in identifying the highest value masks to use when trying to crack hashes from similar datasets: https://github.com/chm0dx/maskRequired

CredKing - Password spraying using AWS Lambda for IP rotation: https://github.com/ustayready/CredKing

CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA tokens: https://github.com/ustayready/CredSniper

cloudgpt - Vulnerability scanner for AWS customer managed policies using ChatGPT: https://github.com/ustayready/cloudgpt

Proxy - Tool for search proxies. The script obtains a list of proxies from: https://www.proxy-list.download: https://github.com/DeadS3c/Proxy

DarkWeb - Repository to include the findings for the Dark Web: https://github.com/DeadS3c/DarkWeb


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

LinkedIn: bormaxi8080 OSINT Featured Timeline

You can see Systematized list of my GitHub Starred OSINT Repositories

and contact me on Twitter: https://twitter.com/OSINTech_


If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.