Are you interested in the world of Open-Source Intelligence (OSINT) but with a unique and edgy twist? Look no further than the 'Offensive OSINT' Telegram channel, also known by its username @offensiveosint. This channel is dedicated to providing valuable insights and techniques on OSINT, with a focus on offensive strategies and tactics. But who is behind the 'Offensive OSINT' channel? The channel is curated by a team of experienced cybersecurity professionals and researchers who have a deep understanding of OSINT methodologies. They are passionate about exploring the darker side of OSINT and uncovering innovative ways to use open-source information for offensive purposes. So, what exactly is 'Offensive OSINT'? It is a platform where like-minded individuals can come together to learn, share, and discuss cutting-edge techniques in OSINT. From advanced social engineering tactics to sophisticated data mining strategies, this channel covers it all. Whether you are a cybersecurity enthusiast, a penetration tester, or someone looking to enhance their digital investigation skills, 'Offensive OSINT' has something for everyone. Joining the 'Offensive OSINT' Telegram channel will give you access to exclusive content, such as tutorials, tools, and case studies, that you won't find anywhere else. You will learn how to gather intelligence from various online sources, analyze data effectively, and leverage it to gain a competitive advantage in the cybersecurity field. In addition to educational content, the 'Offensive OSINT' channel also hosts live webinars, Q&A sessions, and virtual meetups where you can interact with industry experts and fellow members. This provides a valuable networking opportunity and a chance to exchange ideas with like-minded individuals. In conclusion, if you are looking to take your OSINT skills to the next level and explore the offensive side of cybersecurity, 'Offensive OSINT' is the perfect channel for you. Join today to unlock a world of possibilities and stay ahead of the curve in the ever-evolving cybersecurity landscape.
16 Sep, 09:07
20 Aug, 10:30
09 Jan, 11:03
.pdf
с помощью Grep.sudo apt install poppler-utils
internal use only
" или "confidential
" и т.д.for i in $(echo "gov.uk" | gau --subs --threads 16 | grep -E -o 'https?://[^[:space:]]+\.pdf' | httpx -silent -mc 200); do if curl -k -s $i | pdftotext -q - - | grep -Eaiq 'confidential|internal use only'; then echo $i | tee output.txt; fi; done
gov.uk
" и его поддомены в поиске URL-ов с PDF-файлами. Затем она проверяет каждый PDF-файл на наличие строк "confidential
" или "internal use only
" и записывает эти URL-ы в файл "output.txt
".09 Jan, 06:32
28 Nov, 13:04
17 Nov, 16:24
04 Nov, 14:33
05 Oct, 15:39
28 Sep, 11:03
https://crt.sh/?Identity=example.com&output=jsonУ этого же ресурса есть публична postgresgl база данных с гостевым доступом:
psql -h crt.sh -p 5432 -U guest certwatchС помощью прямого подключения к бд можно обойти указанный лимит, составив запрос самостоятельно.
26 Sep, 18:56
24 Sep, 09:03
18 Sep, 16:29
14 Sep, 16:20
14 Sep, 16:20
07 Sep, 13:31
29 Aug, 07:21
28 Aug, 10:03
27 Aug, 15:20