diff --git a/README.md b/README.md index 7f6c46a..ef948ef 100644 --- a/README.md +++ b/README.md @@ -129,6 +129,10 @@ Be carefull using this tool - [Gpt OSINT](https://github.com/gigz/gpt-osint) - [Humdata](https://data.humdata.org/dataset) - [datasetsearch](https://datasetsearch.research.google.com/) +- [OSINT Collection](https://start.me/p/DPYPMz/the-ultimate-osint-collection) +- [Academic Torrent](https://academictorrents.com/) +- [Torrent API](https://github.com/Ryuk-me/Torrent-Api-py) +- [API OSINT TORRENT](https://rapidapi.com/theoneappkh/api/torrent-search/) # Forums & Sites @@ -1656,6 +1660,10 @@ Browser plugin that allows you to watch YouTube videos frame by frame. - [EARTH DATA NASA](https://wvs.earthdata.nasa.gov/) - [peakvisor](https://peakvisor.com/) - [peakfinder](https://www.peakfinder.com/) +- [Calc Map Coordinate](https://www.calcmaps.com/map-coordinates/) +- [Latlong Calc](https://www.latlong.net/) +- [Gps Visualizer](https://www.gpsvisualizer.com/calculators) +- [Iq Air](https://www.iqair.com/id/) # Nearby Map From Geospatial @@ -2130,4 +2138,24 @@ Detect a fake network and VPN - [licenseplatemania](https://licenseplatemania.com/) - [platesmania](https://platesmania.com/uk/search?&lang=en) - [findbyplate](https://findbyplate.com/) -- [google image](https://www.google.com/imghp?hl=en) \ No newline at end of file +- [google image](https://www.google.com/imghp?hl=en) + +# Torrent + +- [utorrent](https://www.utorrent.com/) +- [bittorrent](https://www.bittorrent.com/) +- [Jacket](https://github.com/Jackett/Jackett) +- [API OSINT TORRENT](https://github.com/cipher387/API-s-for-OSINT/blob/main/README.md) +- [torrentinim](https://github.com/sergiotapia/torrentinim) + +# SDR OSINT + +- [map sdr points](https://rx-tx.info/map-sdr-points) +- [Airspy SDR RADIO](https://www.sdr-radio.com/airspy-server) +- [AirSpy MAP](https://airspy.com/directory/) + +# API for OSINT + +Resources and collection for your make tool OSINT + +- [API Resoruces OSINT - For Your Private Tool](https://github.com/cipher387/API-s-for-OSINT/blob/main/README.md) \ No newline at end of file diff --git a/wiki/Facebook investiagtions.md b/wiki/Facebook investiagtions.md new file mode 100644 index 0000000..9bd9f59 --- /dev/null +++ b/wiki/Facebook investiagtions.md @@ -0,0 +1,49 @@ +# Detect Fake Facebook Profiles + +- Check the join date + + +Make sure the joining date is old and has related posts like the first post and look at the relative posts, make sure they are recent + +- There are no posts or photos and other content + +First, look at the detailed account information. If the average number of posts is few and most of them are private or only friends, try to interact with the target by profiling the account + +- Persons age does not accord with the profile content + +Look at posts and photos and what is shared there according to age + +- There are no friends who have the same surname + +There is no list of friendships such as close friends, family related to the target or things the target is interested in + +- Friend lists whose profiles are fake + +Check the friend list, whether the account has the same indicators or patterns as the points explained here. You can see and investigate your friendship list from photos, posts and look for other sources, whether from purchased or fake accounts + +- Use of stock image for profiles + +You can do a reverse image search to determine where the photo came from. If you find this photo circulating a lot on the internet and a little information on the internet, you can be sure that it is fake or generated by AI or editing skill + +- Profile picture do not show face or clear image + +There are no related facial photos and the photos in the album are not clear, such as blurry, depicting logos or cartoon photos and other things + +- Friend lists are different culture, location and language + +- Too few friends or to many friend list + +The account is still quiet or has too many friends. It is possible that a new account was created or the account has been created several times for a specific purpose and is not consistent with the bio and profile linked to the friends list. Try to chat or interact with your friends list, if there is no response and the chat is like a robot reply, you don't follow the fanpage then it's definitely fake + +- Profile name is different to the profile name as in the url + +- The like post, photo are on single topic + +- Bio inconistencies + +Reff: + +- https://www.bellingcat.com/resources/2021/11/01/a-beginners-guide-to-social-media-verification/ +- https://docs.google.com/spreadsheets/d/18rtqh8EG2q1xBo2cLNyhIDuK9jrPGwYr9DI2UncoqJQ/edit#gid=930747607 +- https://www.bellingcat.com/resources/2021/11/09/first-steps-to-getting-started-in-open-source-research/?utm_campaign=Digital%20Investigations&utm_medium=email&utm_source=Revue%20newsletter + \ No newline at end of file diff --git a/wiki/How to make collection.md b/wiki/How to make collection.md new file mode 100644 index 0000000..74fddb6 --- /dev/null +++ b/wiki/How to make collection.md @@ -0,0 +1,20 @@ +# How To Make Collection + +- Passive Collection + +Search for information from open information sources. Utilizing information sources from the internet such as Google, Datasets, Scarapping platforms and other things, you can also utilize AI, Big Data and ML for your analysis needs. This is very useful if you want to create further analysis as well as your own private platform + +- Active Collection + +Use of various techniques to search for certain insights or information such as scanning, penetration testing, social engineering and post-exploit. This can be useful for carrying out further, valid and detailed espionage or collecting your data from the source you have hacked + +- Aditional Information + +Why ML, Big Data and AI need? For example for threat intelligence and data mapping + +> Structuring data into ontologies and events +> Classifying events and entities, helping human analysts prioritize alerts +> Forecasting events and entity properties through predictive models +> They were able to make more informed decisions faster +> The information they accessed became more relevant and actionable +> Their existing security solutions were improved \ No newline at end of file diff --git a/wiki/OSINT analysis tips.md b/wiki/OSINT analysis tips.md new file mode 100644 index 0000000..29c86ff --- /dev/null +++ b/wiki/OSINT analysis tips.md @@ -0,0 +1,19 @@ +# OSINT Tips Analysis + +There are still many steps you can do, I can't mention them all, this is a brief scenario that I often do + +- Collection + +This stage the researcher will collect information which are on social media profiles, media images, videos, sounds, education and other things + +- Processing + +Researchers will analyze and validate from data example the images in the post and view the metadata and data that has been collected + +- Exploitation + +At this stage the researcher will carry out sample analysis using Google Maps to do geoint and get pin points from the image. Exploitation also sometimes referred to as analysis e.g with social engineering and other things + +- Production + +Production, in this stage researcher will make a report containing what data researchers can start from the collection, processing and exploitation (analysis) stages and data that has been validated and mature \ No newline at end of file diff --git a/wiki/Where OSINT Data From.md b/wiki/Where OSINT Data From.md new file mode 100644 index 0000000..ff0a297 --- /dev/null +++ b/wiki/Where OSINT Data From.md @@ -0,0 +1,7 @@ +# Where OSINT Data From? + +- Law Enforcement Sources +- Paid Sources +- Open Source +- Data Breach +- Social Engineering & HUMINT \ No newline at end of file diff --git a/wiki/Who used OSINT.md b/wiki/Who used OSINT.md new file mode 100644 index 0000000..1279cda --- /dev/null +++ b/wiki/Who used OSINT.md @@ -0,0 +1,9 @@ +# Who OSINT Used + +- Ethical Hacking and Penetration Testing +- Journalist +- Identifying External Threats +- Law Enforcer +- Goverment +- Company +- General \ No newline at end of file