mirror of
https://github.com/Jieyab89/OSINT-Cheat-sheet.git
synced 2025-12-05 20:40:30 -08:00
Add more resouces and fix broken link
This commit is contained in:
21
README.md
21
README.md
@@ -1118,6 +1118,7 @@ for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Wi
|
||||
- [ebsco](https://www.ebsco.com/)
|
||||
- [gale](https://www.gale.com/)
|
||||
- [hathitrust](https://www.hathitrust.org/)
|
||||
- [connectedpapers](https://www.connectedpapers.com/)
|
||||
|
||||
# Blogs Search Engine
|
||||
|
||||
@@ -1183,6 +1184,7 @@ for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Wi
|
||||
- [UK Company Search](https://find-and-update.company-information.service.gov.uk/)
|
||||
- [Venture Radar](https://www.ventureradar.com/search)
|
||||
- [tracxn](https://tracxn.com/?redirect=false)
|
||||
- [clearbit](https://clearbit.com/)
|
||||
|
||||
# People Searching
|
||||
|
||||
@@ -1222,6 +1224,7 @@ for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Wi
|
||||
- [peekyou](https://www.peekyou.com/)
|
||||
- [castrickclues](https://castrickclues.com/)
|
||||
- [lolarchiver](https://osint.lolarchiver.com/#)
|
||||
- [clearbit](https://clearbit.com/)
|
||||
|
||||
# Family People Search
|
||||
|
||||
@@ -1292,6 +1295,8 @@ for ((i=1;i<=10;i++));do curl -i -s -k -L -X GET -H "User-Agent: Mozilla/5.0 (Wi
|
||||
- [inspektur](https://github.com/bgwastu/inspektur)
|
||||
- [lolarchiver](https://osint.lolarchiver.com/#)
|
||||
- [countrycode](https://countrycode.org/)
|
||||
- [HLR Tsel Code Area](https://web.archive.org/web/20240730155821/http://www.ppipuskrip.com/cek-kode-hlr-telkomsel.html)
|
||||
- [HLR Tsel Area Code ](https://web.archive.org/web/20240730160717/https://kumparan.com/how-to-tekno/cara-mengetahui-kode-area-no-hp-orang-lain-1yzrnn0bUx1)
|
||||
|
||||
Pro Tips
|
||||
|
||||
@@ -1961,6 +1966,7 @@ Search channel, username anymore
|
||||
- [media IO](https://www.media.io/)
|
||||
- [Geospy Github](https://github.com/atiilla/geospy)
|
||||
- [imagga](https://imagga.com/)
|
||||
- [geospy](https://geospy.ai/)
|
||||
|
||||
# Stock Images
|
||||
|
||||
@@ -2163,13 +2169,14 @@ Browser plugin that allows you to watch YouTube videos frame by frame.
|
||||
- [nominatim OSM](https://nominatim.openstreetmap.org/)
|
||||
- [Calculator IPVM](https://calculator.ipvm.com/)
|
||||
- [f4map](https://demo.f4map.com/)
|
||||
- [geospy](https://geospy.ai/)
|
||||
|
||||
# Nearby Map From Geospatial
|
||||
|
||||
- [foursquare](https://location.foursquare.com/)
|
||||
- [tripadvisor](https://www.tripadvisor.com/)
|
||||
- [booking](booking.com)
|
||||
- [agoda](agoda.com)
|
||||
- [booking](https://booking.com)
|
||||
- [agoda](https://agoda.com)
|
||||
- [wanderlog review on Google maps](https://wanderlog.com/)
|
||||
- [airbnb](https://www.airbnb.co.id/)
|
||||
- [copernix](https://copernix.io/)
|
||||
@@ -3118,6 +3125,8 @@ Noxer is a powerful Python script designed for automating Android penetration te
|
||||
- [OSCE 3 Guide](https://github.com/CyberSecurityUP/OSCE3-Complete-Guide) Guide for OSCE 3 and OSEE (OSWE, OSEP, OSED, OSEE)
|
||||
- [Enumerate IAM](https://github.com/andresriancho/enumerate-iam) Enumerate the permissions associated with AWS credential set
|
||||
- [Ired team](https://www.ired.team/) Awesome list and notes for exploit, initial access and pentesting
|
||||
- [Subt](https://github.com/tegal1337/subt) SubT is a tool to check if a subdomain is vulnerable to subdomain takeover. It uses `subfinder` to search for subdomains, `dig` to check CNAME, and `curl` to check status code
|
||||
- [apk2url](https://github.com/n0mi1k/apk2url) An OSINT tool to quickly extract IP and URL endpoints from APKs by disassembling and decompiling
|
||||
|
||||
Social Engineering
|
||||
|
||||
@@ -3604,6 +3613,8 @@ OSINT politics and geopolitics, risk crisis
|
||||
- [In the sky](https://in-the-sky.org/satmap_worldmap.php)
|
||||
- [Maxar](https://www.maxar.com/)
|
||||
- [Windy](https://www.windy.com/)
|
||||
- [Satellites Pro](https://satellites.pro/)
|
||||
- [livingatlas](https://livingatlas.arcgis.com/)
|
||||
|
||||
# OSINT for Scraping and Data Collection
|
||||
|
||||
@@ -3616,6 +3627,9 @@ OSINT politics and geopolitics, risk crisis
|
||||
- [TorBot](https://github.com/DedSecInside/TorBoT) Scrapping darkweb
|
||||
- [TorCrawl](https://github.com/MikeMeliz/TorCrawl.py) Scrapping darkweb
|
||||
- [Onioningestor](https://github.com/danieleperera/OnionIngestor) Scrapping darkweb
|
||||
- [selenium](https://www.selenium.dev/) Web automation & site crawler
|
||||
- [BeautifulSoup](https://BeautifulSoup.org/) Open source and collaborative framework for extracting the data you need from websites.
|
||||
- [BeautifulSoup](https://www.crummy.com/software/BeautifulSoup/bs4/doc/) Python library for pulling data out of HTML and XML files
|
||||
|
||||
# OSINT IRC Chat
|
||||
|
||||
@@ -3674,6 +3688,8 @@ Text Analyzer
|
||||
- [smallseotools](https://smallseotools.com/plagiarism-checker/)
|
||||
- [turnitin](https://www.turnitin.com/products/similarity/)
|
||||
- [hivemoderation](https://hivemoderation.com/ai-generated-content-detection)
|
||||
- [humata](https://www.humata.ai/)
|
||||
- [kipper](https://www.kipper.ai/)
|
||||
|
||||
Audio Analyzer
|
||||
|
||||
@@ -3693,6 +3709,7 @@ Website
|
||||
- [similarsites](https://www.similarsites.com/)
|
||||
- [sitelike](https://www.sitelike.org/)
|
||||
- [pr-cy.io](https://pr-cy.io/tools/similar-websites/)
|
||||
- [Clone UI Design](https://clone-ui.design/)
|
||||
|
||||
Company
|
||||
|
||||
|
||||
32
wiki/How To Find Geolocation.md
Normal file
32
wiki/How To Find Geolocation.md
Normal file
@@ -0,0 +1,32 @@
|
||||
# How To Find Geolocation (Geospatial)
|
||||
|
||||
Finding geolocation is not easy, there are obstacles when you want to find a location for example, limited resources, unclear data and the information you find is not valid. Here the detail
|
||||
|
||||
1. The data you get is poor such as image quality, audio, etc.
|
||||
2. Lack of information and lack of valid information
|
||||
3. Lack of data sources such as satellite images, places that are rarely touched by satellites or services about satellites or GIS (Geographic Information Systems)
|
||||
4. Conflict areas, remote and secret areas that are rarely discussed by the public or visited by the public
|
||||
5. Your source of information is not real time, you need a lot of real time information and data to facilitate analysis.
|
||||
6. The large number of identical regions or areas and geographic information in a region (You need to understand each region in terms of geography, houses, settlements etc)
|
||||
7. Sources of data obtained at night or in the shadows (dim places)
|
||||
|
||||
# How To Find Geolocation?
|
||||
|
||||
1. Reverse image, always use it such as Google Lens, Bing, Yandex and other things
|
||||
2. Knowing the image or media (IMINT) Understand the objects in the media. Is there a place name? People? Faces? And anything else you can use that clue?
|
||||
3. Exif or metadata, check the metadata on each file
|
||||
4. Improve the quality of your data such as using AI to clarify objects, editing skills and other things that help clarify objects
|
||||
5. Learn Geography
|
||||
6. Use satellite imagery and street view
|
||||
7. Use animation or 3D building to make it easier to find the POV of an object
|
||||
8. Leverage sun position and shadows
|
||||
9. Use OpenStreetMap for data mining (OSM Query or Overpass Query)
|
||||
10. Trying search historical image or satellite (wayback)
|
||||
11. Trying check nearby about the location (If you has found the location such as building, street name and etc)
|
||||
12. Find out about the place or region you want to know such as seasons, timezone, buildings, people (faces), language and other things.
|
||||
|
||||
Reff:
|
||||
|
||||
- https://www.youtube.com/watch?v=509wv0cohgA
|
||||
- https://kit.exposingtheinvisible.org/en/geolocation.html
|
||||
- https://www.bellingcat.com/resources/how-tos/2014/07/09/a-beginners-guide-to-geolocation/
|
||||
69
wiki/What is Sock Puppets Account.md
Normal file
69
wiki/What is Sock Puppets Account.md
Normal file
@@ -0,0 +1,69 @@
|
||||
# What Mean Sock Puppets?
|
||||
|
||||
A fake account, but this account was created authentically with interactions, photo posts, account personality, date and time created as if this were a real account and without any of your personal data, your history, clues that reflect you. Sock puppets are fake accounts or alternative profiles used to conduct investigations anonymously
|
||||
|
||||
# What Is The Purpose?
|
||||
|
||||
1. To investigate others without revealing your true identity.
|
||||
2. Make the investigation authentic (HUMANINT, MASINT, other. With someone)
|
||||
3. Approach and know the target in real time and in detail
|
||||
4. Monitoring your target
|
||||
|
||||
# How To Detect?
|
||||
|
||||
*Pro tips you can read the https://github.com/Jieyab89/OSINT-Cheat-sheet/blob/main/wiki/Facebook%20investiagtions.md
|
||||
|
||||
1. Be aware that some accounts are known to be sock puppets
|
||||
2. Many sock puppet accounts are female because men are often more gullible
|
||||
3. Be aware that some accounts are known to be sock puppets. It’s crucial to maintain consistency and avoid activities that might raise suspicion.
|
||||
4. Check the human error like blunders, inconsistent, not recognizing a place or information that has been included in detail
|
||||
5. Check the media and post e.g photo, post, comment and other. Check the timestamp too
|
||||
6. They do not have many friends or followers
|
||||
7. They never want to call/video call
|
||||
8. They avoid meeting up
|
||||
9. Their stories do not add up
|
||||
|
||||
# Build Your Sock Puppets Account
|
||||
|
||||
1. Use a separate laptop dedicated to sock puppet activities.
|
||||
2. Never use your real IP address always use a VPN.
|
||||
3. Knowing your data information such as location, place, hobby and other about bio make sure you know the details of what you have written in your profile and bio, make sure it looks legit and authentic and you know exactly what you have written, make sure it is consistent and avoid blunders.
|
||||
4. Get a burner phone to avoid using your personal number. You can buy sms activate or buy phone number has register on the sim card
|
||||
5. Never log in from a phone, as it may sync your contacts and reveal your identity.
|
||||
6. Avoid using any real-life information that could be traced back to you.
|
||||
7. Maintence your account
|
||||
8. Create personal branding like blog, site and other things to get reputation
|
||||
9. Dont give any information about you sock account with your friend, husband or wife, any people
|
||||
10. Make it your persona :D
|
||||
11. Create conditions within your account, for example you are an anarchist, bully or you are a good person. Use your own way to create the condition, in Indonesian is (Cipta Kondisi)
|
||||
|
||||
# What Is Catfishing
|
||||
|
||||
Catfishing is a term used to describe brazen identity fraud. This behavior aims to lure someone into a romantic relationship. So that you don't get caught up in a romance full of falsehoods and it has many benefits, it is often used in dating apps or online dating
|
||||
|
||||
## Why is it called Catfishing?
|
||||
|
||||
The practice of catfishing online has been around for many years, simply because it is so easy to falsify your identity on the internet. The term “catfish” became popular after a documentary named Catfish was released in 2010. Afterward, MTV launched a TV series called “Catfish” in 2012.
|
||||
|
||||
## Why Do People Catfish?
|
||||
|
||||
People catfish for a number of reasons. Some do not involve malicious intent, while others directly seek to harm specific people. Some of the primary reasons behind catfishing include:
|
||||
|
||||
1. Insecurity: If a catfisher feels bad about who they are in real life, they may try to create an identity that conforms more closely to what they wish they could be. This often includes using photos of someone they feel is better-looking than them. They may also pretend to have a successful career to experience how it feels to be admired for their “accomplishments.” Catfishers who assume attractive identities may also be trying to garner a lot of “friends” and attention online to feel more popular.
|
||||
|
||||
2. Concealing their identity: There are several reasons why people want to conceal their identity online. When no one knows who you are, it is easier to troll people on discussion boards because of the lack of repercussions. Some people intend to cheat on their spouse or significant other and feel the best way to get away with it is to falsify their identity. In other instances, a person hides their identity to extort money from someone else. If the person figures out the scam, they cannot tell authorities who the attacker is because of the catfisher's false persona.
|
||||
|
||||
3. Mental illness: In some cases, people who suffer from depression or chronic anxiety may choose to get involved in catfishing. As they assume another person’s identity, they gain the confidence they need to associate with others and live what they feel is a more “normal” online life. With a more attractive, successful, or gregarious identity, they get a self-esteem boost whenever they engage with others online.
|
||||
|
||||
4. Revenge: Some catfishers seek revenge on the person they are impersonating. They use the person’s name and face and create an online identity. Then they say or do things online that make the person look bad—or even get involved in illegal activity in the target’s name.
|
||||
|
||||
5. Experimenting with sexual preferences: Some catfishers use the practice to explore their sexual identities. They assume the sexual preference they are interested in online, using an identity different from their own. As they engage in social interactions under that identity, they get a sense of how it would feel to live that lifestyle full-time.
|
||||
|
||||
6. To harass their target: When someone has been trying to stalk, bother, or pursue someone online, the target often blocks the aggressor on one or more social media platforms. When this happens, the attacker may use catfishing to continue their pursuits. Even though the victim does not know who they are interacting with, the catfisher, once accepted as a friend or follower, is still able to see the target’s posts and pictures. In this way, they can keep tabs on what they are doing, when, and with whom.
|
||||
A common thread among many of the reasons why people catfish is an absence of self-confidence. When people are either personally dissatisfied with themselves or feel their real identity is not good enough to accomplish a certain objective, they may assume another “self” to feel better or attain the desired result.
|
||||
|
||||
In other cases, the catfisher lacks the self-confidence needed to express themselves openly, but under the guise of a false identity, they feel they can be who they want to be.
|
||||
|
||||
Reff:
|
||||
|
||||
- https://www.fortinet.com/resources/cyberglossary/catfishing
|
||||
Reference in New Issue
Block a user