Another repository I use quite a lot: https://alternativeto.net/
osint | geoint | socmint | python
Connecting.The.Dots.
Finds it!
Toots about #OSINT; some #OpSec, #InfoSec & bit #Python
osint-research.bsky.social
OSINT_Links: http://is.gd/osint_research
Also: linktr.ee/osint_research
my.osint.research@proton.me
Another repository I use quite a lot: https://alternativeto.net/
Looking for nautical maps and information for your #OSINT investigations?
Well, look no further and try this free resource.
OpenSeaMap: https://openseamap.org/index.php?id=openseamap&no_cache=1
Here's some of the books I intend to read or finish during the holidays. Not just #OSINT or #CyberSecurity.
Submarine Cable Map https://www.submarinecablemap.com/
Want to learn some basic Linux skills to help with your #OSINT investigations?
@cyb_detective got you covered.
Here's a great tool to assist in your #geolocation work
Created by https://bsky.app/profile/dw-innovation.mastodon.social.ap.brid.gy (not yet fully on BlueSky)
More:
https://innovation.dw.com/articles/spot-the-easy-way-to-verify-locations
There is also a nice tutorial inside.
Finally found some time to go about these #geolocation challenges.
https://challenge.bellingcat.com/
How's everybody else doing?
TY @bellingcat.com @foeke.bsky.social @aiganysh.bsky.social @giancarlofiorella.bsky.social @koltai.bsky.social @nickwaters.bsky.social
Here is a nice series of #OSINT challenges, available for free for you to try.
Bellingcat Open Source Challenge https://challenge.bellingcat.com/
My main site to post #OSINT, #InfoSec, #OpSec related stuff will be under the blue skies.
https://bsky.app/profile/osint-research.bsky.social
🦋
In der aktuellen Folge von OSINT Studio beleuchten Matthias Wilson und ich die Bedeutung moderner Technologien & sozialer Medien für digitale Sicherheit und Open Source Intelligence #OSINT. Darüber hinaus geben wir aber auch praktische Tipps, z.B. wie man Bing zur Suche weiterer Domains nutzen kann.
I have taken some time off lately, and utterly enjoyed it! But it was about time I did some writing again... No Week in #OSINT yet, but something else.
Because I wanted to share my thoughts on what I call "black box OSINT" tools 👇
This Monday only a few items, but a lengthy section aboud very important upcoming change within Chrome!
H/T: @gralhix and others!
Cybersecurity accounts in Mastodon:
Developers of OSINT tools
@binarypool
@navlys_
@soxoj
@IntelScott
@webbreacher
@C3n7ral051nt4g3ncy
@SEINT
@gonzo
@tek
@n0kovo
@noneprivacy
@Edent
@irohsint@0sint.social
@pruvisto
@CommanderRoot
OSINT bloggers
@BobGourley
@InfoSecSherpa
@nixintel
@hatless1der
@osint_research
@OSINTtechniques
@osintessentials
@ChristinaLekati
@sin
@OSINTgeek
@defcon
@tradecraft
@cyb_detective
@secou
@osintunleashed
@osinttechnical
@cybersecstu
@fiete
@ActoTiger
@jomo
@myosinttraining
@osint_cyn
OSINT books authors
@febrezo
@jengolbeck
Cybersecurity tools creators
@ivre
@caffix
@zaproxy
@metasploit
@podalirius
@evilsocket
@droe
@schweikert
@autumnalbee
@frozen
@gregcastle
@robertswiecki
@epi
@tomnomnom
@webtonull
@Xnl_h4ck3r
@shipcod3
@Foss
@SteveD3
Cybersecurity bloggers
@vanderaj
@Jhaddix
@adamshostack
@kozmic
@r00t0v3rr1d3
@alobbs
@shellsharks
@dcuthbert
@xabean
@p0lr
@agent0x0
@securestep9
@CurtWilson
@nerdpr0f
@misfir3
@thepacketrat
@spaf
@SashaRomanosky
🕵️ #OSINT Exercise #023 is now out!
🌡️Level: Beginners: Easy; Experts: Easy.
⏰Solution with full walkthrough will be uploaded to YouTube tomorrow.
🙊Have fun and no spoilers!
#osintchallenge
https://gralhix.com/osint-exercise-023/
Welcome to Black Friday! Save 25% off our bundles using coupon code: blackfriday2023 for either the OSINT Immersion or the All OSINT Course Bundle. Sign up now at https://www.myosint.training/
List of #osint/#cybersecurity Mastodon accounts continues to grow. There are legends like @InfoSecSherpa, @Jhaddix and @adamshostack as well as accounts known to a very narrow circle of people.
Feel free to add to the list yourself and whoever you like
https://github.com/cipher387/OSINT-and-Cybersecurity-accounts-in-Mastodon
@binarypool
@navlys_
@webbreacher
@C3n7ral051nt4g3ncy
@SEINT
@gonzo
@tek
@n0kovo
@noneprivacy
@Edent
@irohsint
@pruvisto
@CommanderRoot
@InfoSecSherpa
@nixintel
@hatless1der
@osint_research
@OSINTtechniques
@osintessentials
@sin
@defcon
@tradecraft
@cyb_detective@0sint.social
@secou
@osintunleashed
@osinttechnical
@cybersecstu
@ivre
@caffix
@zaproxy
@metasploit
@podalirius
@evilsocket
@droe
@schweikert
@autumnalbee
@frozen
@robertswiecki
@epi
@tomnomnom
@webtonull
@kozmic
@r00t0v3rr1d3
@alobbs
@gregcastle
@ChristinaLekati
f@iete@mastodon.social
@IntelScott
@ActoTiger
@febrezo
@jengolbeck
@OSINTgeek
@jomo
@cyb_detective
@soxoj
@shellsharks
@Jhaddix
@Xnl_h4ck3r
@dcuthbert
@xabean
@adamshostack
@p0lr
@xabean
@Foss
@vanderaj
@agent0x0
@SteveD3
@securestep9
@CurtWilson
@nerdpr0f
@misfir3
@thepacketrat
@myosinttraining
@osint_cyn
@cyb_detective @InfoSecSherpa @Jhaddix @adamshostack @osint_research @febrezo @jengolbeck @OSINTgeek @jomo @soxoj @shellsharks @Xnl_h4ck3r @dcuthbert @xabean @p0lr @vanderaj @agent0x0 @SteveD3 @securestep9 @CurtWilson @nerdpr0f @misfir3 @thepacketrat @myosinttraining @osint_cyn @binarypool @navlys_ @webbreacher @C3n7ral051nt4g3ncy @SEINT @gonzo @tek @n0kovo @noneprivacy @Edent @irohsint @pruvisto @CommanderRoot @nixintel @hatless1der @OSINTtechniques @osintessentials @sin @defcon @tradecraft @cyb_detective@0sint.social @secou @osintunleashed @osinttechnical @cybersecstu @ivre @caffix @zaproxy @metasploit @podalirius @evilsocket @droe @schweikert @autumnalbee @frozen @robertswiecki @epi @tomnomnom @webtonull @kozmic @r00t0v3rr1d3 @alobbs @gregcastle @ChristinaLekati @IntelScott @ActoTiger oh wow - honored to be listed alongside so many people I admire in the industry. 🙏
So, my day job is a mix of developing, investigations, osint, exploitation, automation, data engineering, data analysis visualization, etc
A bunch of fun stuff that I've been lucky to learn over the years and become sort of specialized in.
I'm now on a team that has quite a few junior analysts - brilliant at what they do. However, missing some technical skills and background that could really help elevate them and their effectiveness on the team.
I've formerly helped teach @jms_dot_py #automatingosint course.
I developed a course called "python for cyber investigators" for cyber investigators.
But, I'm really wondering about these analysts. They need something specific. I'm considering calling it "technical osint". Giving these employees exposure to some (at least) basic technical concepts and how osint intersects with it.
I spend a significant amount of time building tooling to enable me to do this type of analysis myself. To me that means its useful
What do you think? Is it worth helping others learn it?