mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-12 15:50:34 -08:00
Update wiki & resources
This commit is contained in:
11
README.md
11
README.md
@@ -544,6 +544,11 @@ net huggers
|
||||
- [openwifimap](https://openwifimap.ne)
|
||||
- [unwiredlabs](https://unwiredlabs.com/products)
|
||||
- [cellphonetrackers wifi tracker](https://cellphonetrackers.org/gsm/wifi-tracker.php)
|
||||
- [mylnikov BSSID Public API](https://www.mylnikov.org/archives/1170)
|
||||
- [wifidb](https://wifidb.net/wifidb/)
|
||||
- [combain](https://combain.com/)
|
||||
- [freifunk](https://www.freifunk-karte.de/)
|
||||
- [GONZOsint- geowifi](https://github.com/GONZOsint/geowifi)
|
||||
|
||||
# SOC & Threat Hunting
|
||||
|
||||
@@ -2256,6 +2261,10 @@ Geojson viewer
|
||||
- [wanderlog review on Google maps](https://wanderlog.com/)
|
||||
- [airbnb](https://www.airbnb.co.id/)
|
||||
- [copernix](https://copernix.io/)
|
||||
- [trip](https://www.trip.com/)
|
||||
- [traveloka](https://www.traveloka.com/)
|
||||
- [hotels](https://id.hotels.com/)
|
||||
- [booking](https://www.booking.com/)
|
||||
|
||||
# Fact Checking
|
||||
|
||||
@@ -3238,6 +3247,7 @@ Noxer is a powerful Python script designed for automating Android penetration te
|
||||
- [Ired team](https://www.ired.team/) Awesome list and notes for exploit, initial access and pentesting
|
||||
- [Subt](https://github.com/tegal1337/subt) SubT is a tool to check if a subdomain is vulnerable to subdomain takeover. It uses `subfinder` to search for subdomains, `dig` to check CNAME, and `curl` to check status code
|
||||
- [apk2url](https://github.com/n0mi1k/apk2url) An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
|
||||
- [dogbolt](https://dogbolt.org/) Online decompiler
|
||||
|
||||
Social Engineering
|
||||
|
||||
@@ -3245,6 +3255,7 @@ Social Engineering
|
||||
- [emkei](https://emkei.cz/)
|
||||
- [anonymailer](https://anonymailer.net/)
|
||||
- [Phishious](https://github.com/CanIPhish/Phishious)
|
||||
- [GoPhish](https://getgophish.com/)
|
||||
|
||||
Active Directory
|
||||
|
||||
|
||||
@@ -31,4 +31,20 @@ Signals intelligence is intelligence derived from signals and electronic systems
|
||||
|
||||
8. ELINT
|
||||
|
||||
Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Usually used in military applications, information collected generally does not include personal communications. The sensors used to collect data may be active or passive. A particular signal is analyzed and compared with data recorded for a known signal type
|
||||
Electronic Intelligence focuses its attention on the Radar Systems and to the analysis of their characteristics. Usually used in military applications, information collected generally does not include personal communications. The sensors used to collect data may be active or passive. A particular signal is analyzed and compared with data recorded for a known signal type
|
||||
|
||||
9. HUMINT
|
||||
|
||||
Human Intelligence focuses collecting information or intelligence from humans and provided by human resources. For example interrogations and conversations, interviews, surveys, espionage with people who have access to information. Surveillance of targets, uncovering people with potential access to information, approaches to targets
|
||||
|
||||
10. OPSEC (Operational security)
|
||||
|
||||
Operational Security is a risk management and security process and strategy used to classify and protect sensitive information and prevent it from falling into unauthorized hands or people. In implementing OPSEC, information will be classified and steps will be taken to identify potential threats and vulnerabilities that may occur in that sensitive information. The approach involves analyzing an organization's systems and operations from the perspective of those who could potentially attack and retrieve sensitive information. Several applications in practice such as monitoring behavior, social media, and implementing best security practices will reduce the risk of exposure of sensitive information.
|
||||
|
||||
11. FISINT
|
||||
|
||||
Foreign instrumentation signals intelligence involves collecting information from foreign nationals who are testing or using aerospace, surface, or sub-surface systems. Foreign instrumentation signals intelligence involves the collection of information from foreign nationals who are testing or using aerospace, surface, or subsurface systems, related to the testing and operational deployment of foreign aerospace, surface, and subsurface systems. FISINT is not in ordinary human language, but in machine-to-machine (instrumentation) language or in a combination of ordinary human language and instrumentation language. FISINT is also considered a subset of MASINT (intelligence measurement and signature)
|
||||
|
||||
12. COMINT
|
||||
|
||||
Communications intelligence focuses information gathered from the communications between individuals or groups of individuals, including telephone conversations, text messages, email conversations, radio calls, and online interactions on the analysis of signals containing speech or text. Tapping voice, text or signal channels is aimed at finding information about voice, text and signal transmissions. That can lead to determining a number of intelligence considerations about the communications, such as signal bandwidth and protocol, modulation type and rate, and the radio frequency used
|
||||
@@ -1,9 +1,13 @@
|
||||
# Where OSINT Data From?
|
||||
|
||||
- Law Enforcement Sources (Private Source) or (Publication)
|
||||
- Paid Sources
|
||||
- Open Source
|
||||
- Law Enforcement Sources (Private Sources) or (Publication)
|
||||
- Paid Sources
|
||||
- Open Sources (Internet)
|
||||
- Data Breach
|
||||
- Social Engineering & HUMINT
|
||||
- Social Media
|
||||
- Data Broker
|
||||
- Data Broker
|
||||
- News Portal
|
||||
- Journalist and Documentarian
|
||||
- Satellite Data
|
||||
- Academic Sources
|
||||
Reference in New Issue
Block a user