fbpx
Home OSINT

OSINT

The Ultimate Sock Puppets Tutorial for OSINT Operators

This article intends to discuss the concept of sock puppets. What are sock puppets account, why would you need to use them during OSINT,...

OSINT – Open Source Intelligence Training Course Free

This course goes from scratch to advanced; it covers the most critical aspect of OSINT (open-source intelligence). The OSINT plays a vital role in...

OSINT Tutorial to Track An Aircraft And Flight Information In Real-Time

No doubt Internet is said to be the world's largest repository of data and information. It contains an enormous amount of data related to...

The Complete OSINT Tutorial to Find Personal Information About Anyone

This article mainly focuses on how to discover a person's digital footprint and gather personal data by using open-source intelligence (OSINT). So, in its...

How to find the password of hacked email addresses using OSINT

Open-source intelligence or OSINT is a potent technique, and it can give a lot of valuable information, if implemented correctly with the right strategy...

How to Identify Company’s Hacked Email Addresses Using Maltego & HaveIbeenPawned

This article is part of the Maltego OSINT tutorial, where you will learn to identify the already hacked account, and it’s password using the...

OSINT tutorial to Find Information from a Phone Number – PhoneInfoga Tool

Phone number plays a vital role in the social engineering and the open source intelligence investigation. Everyone carry’s phone, the phone is now linked...

OSINT SPY: Search Engine For Hackers

Performs OSINT scan on email/area/ip_address/association utilizing OSINT-SPY. It can be utilized by Data Miners, Infosec Researchers, Penetration Testers and digital wrongdoing agent with a...

D0xk1t: OSINT & Active Reconnaissance Suite

D0xk1t is an open-source, self-hosted and easy to use OSINT and active reconaissance web application for penetration testers. Based off of the prior command-line...

Open Source OSINT Assistant: DataSploit

The various Open Source Intelligence (OSINT) tools used to capture data, gives the user all the relevant information about the domain / email /...

Oryon C Portable – Open Source Intelligence Framework

Open source intelligence is the process-oriented terminology that simply means to collect information from publicly available sources. OSINT (Open source intelligence) is viable to gather information about...

Searching Shodan For Fun And Profit

SHODAN is a search engine that lets you find specific computers (routers, servers, etc.) using a variety of filters. Some have also described it...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...