...She liked to sit on the windowsill - across, or even hanging her legs outward. The floor was the last. At first I was afraid that it would fall out, and then I calmed down and realized how cool it is to sit in the window, smoke and watch the whole world spin under your feet: people, houses, trees, cars and even birds...
In the same way, I am now, probably, observing the world, only by myself, from above: people, events, memories, facts... And even the birds remained.
--
It has been 500 days of horror since Russia’s full-scale invasion of Ukraine. Team at Centre for Information Resilience has watched and mapped 10,000+ videos and photos showing this horror at eyesonrussia.org which we hope will support some level of accountability one day.
Leica
products are still sold on the Russian market. The company explains that they have nothing to do with this and liquidate the local business: https://theins.ru/news/263234
Google Has a Secret Interview Process: https://thehustle.co/the-secret-google-interview-that-landed-me-a-job/
Interesting about OODA technics: https://vc.ru/life/228341-ooda-cikl-chetyre-etapa-dlya-prinyatiya-effektivnyh-resheniy-v-kriticheski-vazhnyh-situaciyah
TM View
(Search 112,715,409 trade marks across the European Union and beyond) now has an reverse images AI search function. You can search for similar logos among different countries and different product types: https://www.tmdn.org/tmview/#/tmview/
How to set up an OpenVPN server on Ubuntu 22.04: https://habr.com/ru/articles/744974/
Find, contact, and close your ideal buyers with over 265M contacts and streamlined engagement workflows powered by AI: https://www.apollo.io/
GPT-4 API
general availability and deprecation of older models in the Completions API: https://openai.com/blog/gpt-4-api-general-availability
GPT-3
found hundreds of security vulnerabilities in this repo: https://github.com/chris-koch-penn/gpt3_security_vulnerability_scanner
Artificial Intelligence and GPT Tools for Cyber Security 2023:
GPT3 Security Vulnerability Scanner
: https://github.com/chris-koch-penn/gpt3_security_vulnerability_scanner
Pwnd GPT
- Incident Response Plan: https://github.com/0xKoda/pwnd-GPT
Pwndgb GPT
: https://github.com/tenable/pwndbg
Geppeto IDA Pro
Plugin with GPT3.5 and 4.0: https://github.com/JusticeRage/Gepetto
glit
- Retrieve all mails of users related to a git repository, a git user or a git organization: https://github.com/shadawck/glit
Maryam
: Open-source Intelligence(OSINT) Framework. OWASP Maryam is a modular open-source framework based on OSINT and data gathering. It is designed to provide a robust environment to harvest data from open sources and search engines quickly and thoroughly: https://github.com/saeeddhqan/Maryam
Prowler
: an Open Source Security tool for AWS, Azure and GCP to perform Cloud Security best practices assessments, audits, incident response, compliance, continuous monitoring, hardening and forensics readiness. Includes CIS, NIST 800, NIST CSF, CISA, FedRAMP, PCI-DSS, GDPR, HIPAA, FFIEC, SOC2, GXP, Well-Architected Security, ENS and more: https://github.com/prowler-cloud/prowler
Dirspider
- This tool is a bash script that can be used to automate the tasks of directory brute forcing and crawling/spider for pentesting. Useful for automating the task of creating a list of directories and files and then manually reviewing the source code of multiple websites: https://github.com/gustanini/dirspider
ODAT
: Oracle Database Attacking Tool: https://github.com/quentinhardy/odat
QuickEnum
is a tool designed to help with privilege escalation on Linux systems: https://github.com/gustanini/Linux_QuickEnum
ExploitationBundle
downloads tools that are commonly transferred to a target once an Initial Foothold has been attained: https://github.com/gustanini/ExploitationBundle
WirelessPentesting-CheatSheet
- This repository was originally made as a CheatSheet for OSWP Examination by Offensive Security. With the time, Offensive Security made an second version of OSWP that i haven't taken. As I'm adding sometimes Wireless Pentesting contents that I didn't learned from OSWP, and as i don't know the newest content of OSWP, I'm changing this repository as "WirelessPentesting-CheatSheet" instead of "OSWP-CheatSheet": https://github.com/V0lk3n/WirelessPentesting-CheatSheet
TeamsPhisher
- Send phishing messages and attachments to Microsoft Teams users: https://github.com/Octoberfest7/TeamsPhisher
snap.py
- (Snap)shot SHA256 hashes of wireless access points to determine whether something has changed since your last visit (e.g. rogue AP), plus detect airbase-ng in use: https://github.com/SpiderLabs/snappy
cve_server
- Simple REST-style web service for the CVE searching: https://github.com/SpiderLabs/cve_server
Masher
– a helper/tool to help identify creative (non-standard) password hashing in use: https://github.com/SpiderLabs/masher
NMap-Tools
- This repository is to host Nmap scripts and tools that may be helpful to penetration testers or security researchers. Contents: /NSE - Nmap Scripting Engine (NSE) plugins --- http-screenshot.nse - Takes a screenshot using wkhtmltoimage-i386 of found web pages: https://github.com/SpiderLabs/Nmap-Tools
DDoSlayer
is an Offensive Security Tool written in Python3 by Chris 'SaintDruG' Abou-Chabke from Black Hat Ethical Hacking, designed to perform Distributed Denial of Service (DDoS) attacks: https://github.com/blackhatethicalhacking/DDoSlayer
GitHub: https://github.com/bormaxi8080/osint-timeline
LinkedIn: bormaxi8080 OSINT Featured Timeline
You can see Systematized list of my GitHub Starred OSINT Repositories
and contact me on Twitter: https://twitter.com/OSINTech_
If you like the projects that I do, I will be grateful for donations in private dialogue.
WARNING! All tools, programs and techniques published in this repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.