Toggle navigation
TWText.com
TWText.com
faq
Contact US
Follow US
#OSINT
Ash
Amethyst_Brews
I wish companies would ditch stupid generic “security questions” that anyone can find out though #OSINT. If you want truely unique ?’s they need to be something like: “Hey girl,
Read more
redintelpanda.com
RedIntelPanda
What I do not see here is a ratio of how many deportation flights occur to DoD personnel hauls. I track a lot of Omni flights. The bulk of their
Read more
Dani Hensley
DHensleyChicago
[Thread] - How CPD Watches Social Media: Their Tools, Techniques, and Methods If you wanna learn about CPD Intelligence operations, including the events that occurred overnight, follow this thread. #Chicago
Read more
nixintel
nixintel
THREAD: #Geolocation of images taken indoors is infinitely more difficult than geolocating those taken outside, but there are still some resources that can help. Time for some real #OSINT nerdery
Read more
Sinwindie
sinwindie
Just another scammer found while doing some #OSINT on the #DarkWeb... Site claims that they are "untraceable", but they are using BTC which has a public ledger... http://mixerqpxchohuxlf[.]onion asks for
Read more
𝕄𝕒𝕣𝕥𝕚𝕛𝕟 𝕂. 𝕀𝕟𝕗𝕠𝕊𝕖𝕔
InfoSecISee2IT
@j_opdenakker @AppSecBloke (happy hour ff) This is what really bothers me. Totally useless in infosec not contributing to people who want to learn. A little OSINT and what do you
Read more
Not the Actual US Cyber Command
AltCyberCommand
I'm pleased to announce v1.44.1 of Parlance, a #Parler and #ParlerApp #OSINT research tool. This release supports tunable threading and comment/link expansion in JSON output, plus several new subcommands. Vive
Read more
Robert Caruso
robertcaruso
Happy (lazy?) Sunday. Short thread on efficiencies for digital natives, knaves, and nomads. 1/x BOOKMARKS: don't reinvent the wheel and don't rely on the cloud. KIS[S]. You only need five
Read more
Chris Vickery
VickerySec
The Watergate2.0 operation began in June 2016.Minus the hotel rooms, plus smartphones. Hot-mic audio streaming, screen capture, and file transfer, all through deceptively invoked web browser components (e.g. WebRTC +
Read more
Bellingcat
bellingcat
When Syria’s oil industry collapsed, civilians in non-regime areas had to resort to toxic and polluting coping strategies to ensure fuel for cooking, transportation and heating.Here’s what @wammezz found using
Read more
First Draft
firstdraftnews
Knowing the exact time that something was posted can help you verify content on social media. Each platform has a different way of displaying dates and times. This thread will
Read more
Eric Ellason
SlickRockWeb
Time to declare victory apparently with hydroxychloroquine. This despite no clear RCT data, multiple failed studies, clinical trials cut short in Sweden, discontinued use in Germany, S Korea & other
Read more
Layer 8 Conference
Layer8Conf
We realized we didn't have a URL for the podcast, so we got one. Someone else got the .com version, so we got the .org. Find information about our podcast
Read more
ɐʇɯon3ɹ
atmon3r
Lastly, @github has announced that it has saved github and stored data in Arctic. The project is called: Arctic World Archive.A few small #OSINT/#GEOINT searches to find the storage location
Read more
Eric Ellason
SlickRockWeb
I have seen plenty of sextorsion emails over the past couple of years .... but never a VOTEtorsion email. I guess this is one very unique use of a pilfered
Read more
Erkende
Erkende22
Comme tout dans la vie cette formation a du bon et du mauvais. Oui d'un côté elle pourra permettre de créer des harceleurs qui dans tous les cas trouveraient un
Read more
‹
1
2
3
4
5
6
7
›