Recently Browsing 0 members
No registered users viewing this page.
Members online now
No members to show
By Salaheldin A.
OSINT Tools collections:
Verification Toolset : https://start.me/p/ZGAzN7/verification-toolset
Mapping & Monitoring : https://start.me/p/7k4BnY/mapping-monitoring
Search Engines: https://start.me/p/b56G5Q/search-engines
Social Media Dashboard : https://start.me/p/m6MbeM/social-media-intelligence-dashboard
Threat Intel, OSINT and malware investigation resources : https://start.me/p/rxRbpo/ti
AML Toolbox : https://start.me/p/rxeRqr/aml-toolbox
Technisette collection : https://start.me/p/wMdQMQ/tools
Ph055a collection : https://github.com/Ph055a/OSINT-Collection
By Sherman Chu
I'm sure that everyone in this club can agree that OSINT can be a very powerful force-multiplier in infosec, but how do ya'll manage the collection of OSINT?
Specifically, is the collection effort indexed and evaluated in a way that infosec teams (whether SMB or major-enterprise level) can go back and look at the efficacy, integrity, and veracity of said collection effort?
Do ya'll use frameworks such as the Admiralty System to evaluated OSINT data?
By Zoë Rose
Hello OSINT fam 💜
What’s the most valuable advice you’ve received regarding separation of investigations?
1. Create a new virtual machine for every investigation (also shared within IntelTechniques’ How To videos)
2. Use VPNs
3. Don’t overuse the same alias, and in some situations use new ones per engagement