Skip to content

Latest commit

 

History

History
93 lines (48 loc) · 6.62 KB

bormaxi8080-osint-timeline_15_13.07.2023.md

File metadata and controls

93 lines (48 loc) · 6.62 KB

alt text

...She liked to sit on the windowsill - across, or even hanging her legs outward. The floor was the last. At first I was afraid that it would fall out, and then I calmed down and realized how cool it is to sit in the window, smoke and watch the whole world spin under your feet: people, houses, trees, cars and even birds...

In the same way, I am now, probably, observing the world, only by myself, from above: people, events, memories, facts... And even the birds remained.


bormaxi8080 OSINT Timeline (15) - 13.07.2023:

--

It has been 500 days of horror since Russia’s full-scale invasion of Ukraine. Team at Centre for Information Resilience has watched and mapped 10,000+ videos and photos showing this horror at eyesonrussia.org which we hope will support some level of accountability one day.

Leica products are still sold on the Russian market. The company explains that they have nothing to do with this and liquidate the local business: https://theins.ru/news/263234


Google Has a Secret Interview Process: https://thehustle.co/the-secret-google-interview-that-landed-me-a-job/

Interesting about OODA technics: https://vc.ru/life/228341-ooda-cikl-chetyre-etapa-dlya-prinyatiya-effektivnyh-resheniy-v-kriticheski-vazhnyh-situaciyah


TM View (Search 112,715,409 trade marks across the European Union and beyond) now has an reverse images AI search function. You can search for similar logos among different countries and different product types: https://www.tmdn.org/tmview/#/tmview/

How to set up an OpenVPN server on Ubuntu 22.04: https://habr.com/ru/articles/744974/

Find, contact, and close your ideal buyers with over 265M contacts and streamlined engagement workflows powered by AI: https://www.apollo.io/


GPT-4 API general availability and deprecation of older models in the Completions API: https://openai.com/blog/gpt-4-api-general-availability

GPT-3 found hundreds of security vulnerabilities in this repo: https://github.com/chris-koch-penn/gpt3_security_vulnerability_scanner

Artificial Intelligence and GPT Tools for Cyber Security 2023:

GPT3 Security Vulnerability Scanner: https://github.com/chris-koch-penn/gpt3_security_vulnerability_scanner

Pwnd GPT - Incident Response Plan: https://github.com/0xKoda/pwnd-GPT

Pwndgb GPT: https://github.com/tenable/pwndbg

Geppeto IDA Pro Plugin with GPT3.5 and 4.0: https://github.com/JusticeRage/Gepetto


glit - Retrieve all mails of users related to a git repository, a git user or a git organization: https://github.com/shadawck/glit

Maryam: Open-source Intelligence(OSINT) Framework. OWASP Maryam is a modular open-source framework based on OSINT and data gathering. It is designed to provide a robust environment to harvest data from open sources and search engines quickly and thoroughly: https://github.com/saeeddhqan/Maryam

Prowler: an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more: https://github.com/prowler-cloud/prowler

Dirspider - This tool is a bash script that can be used to automate the tasks of directory brute forcing and crawling/spider for pentesting. Useful for automating the task of creating a list of directories and files and then manually reviewing the source code of multiple websites: https://github.com/gustanini/dirspider

ODAT: Oracle Database Attacking Tool: https://github.com/quentinhardy/odat

QuickEnum is a tool designed to help with privilege escalation on Linux systems: https://github.com/gustanini/Linux_QuickEnum

ExploitationBundle downloads tools that are commonly transferred to a target once an Initial Foothold has been attained: https://github.com/gustanini/ExploitationBundle

WirelessPentesting-CheatSheet - This repository was originally made as a CheatSheet for OSWP Examination by Offensive Security. With the time, Offensive Security made an second version of OSWP that i haven't taken. As I'm adding sometimes Wireless Pentesting contents that I didn't learned from OSWP, and as i don't know the newest content of OSWP, I'm changing this repository as "WirelessPentesting-CheatSheet" instead of "OSWP-CheatSheet": https://github.com/V0lk3n/WirelessPentesting-CheatSheet

TeamsPhisher - Send phishing messages and attachments to Microsoft Teams users: https://github.com/Octoberfest7/TeamsPhisher

snap.py - (Snap)shot SHA256 hashes of wireless access points to determine whether something has changed since your last visit (e.g. rogue AP), plus detect airbase-ng in use: https://github.com/SpiderLabs/snappy

cve_server - Simple REST-style web service for the CVE searching: https://github.com/SpiderLabs/cve_server

Masher – a helper/tool to help identify creative (non-standard) password hashing in use: https://github.com/SpiderLabs/masher

NMap-Tools - This repository is to host Nmap scripts and tools that may be helpful to penetration testers or security researchers. Contents: /NSE - Nmap Scripting Engine (NSE) plugins --- http-screenshot.nse - Takes a screenshot using wkhtmltoimage-i386 of found web pages: https://github.com/SpiderLabs/Nmap-Tools

DDoSlayer is an Offensive Security Tool written in Python3 by Chris 'SaintDruG' Abou-Chabke from Black Hat Ethical Hacking, designed to perform Distributed Denial of Service (DDoS) attacks: https://github.com/blackhatethicalhacking/DDoSlayer


bormaxi8080 OSINT timeline:

GitHub: https://github.com/bormaxi8080/osint-timeline

LinkedIn: bormaxi8080 OSINT Featured Timeline

You can see Systematized list of my GitHub Starred OSINT Repositories

and contact me on Twitter: https://twitter.com/OSINTech_


If you like the projects that I do, I will be grateful for donations in private dialogue.


WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.