mastodontech.de ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Offen für alle (über 16) und bereitgestellt von Markus'Blog

Serverstatistik:

1,5 Tsd.
aktive Profile

#osint

12 Beiträge12 Beteiligte0 Beiträge heute
cyb_detective<p>Introduction to Mastodon for OSINT Practitioners</p><p>Detailed article by Nihad A. Hassan</p><p>- Mastodon servers<br>- Running a Mastodon instance<br>- Finding Mastodon instances</p><p><a href="https://authentic8.com/blog/introduction-mastodon-osint-practitioners" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">authentic8.com/blog/introducti</span><span class="invisible">on-mastodon-osint-practitioners</span></a></p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p>
Recon Village<p>The success of Recon Village <span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>defcon</span></a></span> depends on the people behind the scenes.</p><p>Volunteers are the backbone of everything we do.</p><p>If you're committed, organized, and want to contribute to <a href="https://defcon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> and <a href="https://defcon.social/tags/Recon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recon</span></a> research, Sign up: <a href="https://timecounts.app/recon-village" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">timecounts.app/recon-village</span><span class="invisible"></span></a>"</p>
nemo™ 🇺🇦<p>🔍 Discover what attackers already know about your website in just 20 seconds with Web Check! 🚀 Over 30 checks including security, tech stack, DNS, and more—all in one powerful OSINT tool. Perfect for devs, sysadmins &amp; security pros! 🔐✨ Try it now: <a href="https://web-check.xyz/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">web-check.xyz/</span><span class="invisible"></span></a> <a href="https://mas.to/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a> <a href="https://mas.to/tags/WebDev" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WebDev</span></a> <a href="https://mas.to/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://mas.to/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://mas.to/tags/newz" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newz</span></a></p>
al3x<p>hey friends! another job opportunity came my way, sharing for whoever interested/qualified so i can put you in touch with the recruiter.</p><p>this is a 3rd party recruitment service filling an OSINT Researcher role for a startup building their founding team. some of the responsibilities:</p><p>- Conduct open-source intelligence (OSINT) research to identify and analyze online threats and risks.<br>- Utilize various tools and methodologies to gather and process information from publicly available sources.<br>- Develop tailored reports and provide actionable insights to help individuals and businesses stay safe online.<br>- Contribute to the development and improvement of OSINT research processes and tools.</p><p>hmu and i can put you in touch!</p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/jobs" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>jobs</span></a> <a href="https://infosec.exchange/tags/getfedihired" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>getfedihired</span></a></p>
Tatiana Mikhaleva<p>🎞️ A developer managed to reverse pixelation in video using FFmpeg, GIMP and edge detection - no AI involved.</p><p>By analyzing motion and edges across frames, they could reconstruct original content from blurred areas.</p><p>It’s a reminder: pixelation is visual, not secure.</p><p>🛠️ Code &amp; demo: <a href="https://github.com/KoKuToru/de-pixelate_gaV-O6NPWrI" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/KoKuToru/de-pixelat</span><span class="invisible">e_gaV-O6NPWrI</span></a></p><p><a href="https://mastodon.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://mastodon.social/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://mastodon.social/tags/ffmpeg" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ffmpeg</span></a> <a href="https://mastodon.social/tags/linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>linux</span></a> <a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://mastodon.social/tags/devtools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>devtools</span></a> <a href="https://mastodon.social/tags/technews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>technews</span></a></p>
🇺🇦 🇨🇦:nonazis: Cui Bono?<p>📡 Signals from the Edge – 09 July 2025</p><p>The Ardens initiative is quietly tracking emerging fracture lines—across systems, stories, and signals.</p><p>Our first report covers:<br>– Infrastructure anomalies<br>– Financial irregularities<br>– Coordinated disinfo shifts<br>– Russia’s record-scale hybrid outage (July 8)</p><p>🔍 Read it here: <a href="https://github.com/eirenicon/Ardens/wiki/Signals-from-the-Edge" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/eirenicon/Ardens/wi</span><span class="invisible">ki/Signals-from-the-Edge</span></a></p><p><a href="https://mstdn.social/tags/Resilience" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Resilience</span></a> <a href="https://mstdn.social/tags/HybridThreats" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>HybridThreats</span></a> <a href="https://mstdn.social/tags/Ardens" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ardens</span></a> <a href="https://mstdn.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://mstdn.social/tags/NetworkAwareness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NetworkAwareness</span></a> <a href="https://mstdn.social/tags/eirenicon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>eirenicon</span></a> <a href="https://mstdn.social/tags/NarrativeShift" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>NarrativeShift</span></a> <a href="https://mstdn.social/tags/Technology" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Technology</span></a> <a href="https://mstdn.social/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Infoblox Threat Intel<p>We've seen it before, but it bears highlighting again: current affairs always lead to a domain gold rush! The newly announced "America Party" has already triggered a wave of sketchy-looking domain registrations, many using the .party TLD. Several redirect to rawdiary[.]com, a five-month-old site hosting third-party articles from sources like OANN, Newsmax and Breitbart, as well as more moderate sources like the FT and the BBC. Others are parked. These domains aren’t inherently malicious, but they're certainly opportunistic and built to look like news. Web content flips fast, so here’s a snapshot of domains unlikely to have been registered for anything in good-faith:</p><p>ameirca[.]party<br>amerca[.]party<br>amercia[.]party<br>americs[.]party<br>amerika[.]party<br>ameroca[.]party<br>ameruca[.]party<br>hyperamerica[.]party<br>theunitedstates[.]party<br>americanparty[.]pics<br>americanparty[.]vip<br>americaparty[.]ink<br>americaparty[.]town<br>theamericanparty[.]vip<br>americanparty[.]pro</p><p><a href="https://infosec.exchange/tags/dns" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dns</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/cybercrime" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybercrime</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/infoblox" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infoblox</span></a> <a href="https://infosec.exchange/tags/infobloxthreatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infobloxthreatintel</span></a> <a href="https://infosec.exchange/tags/americaparty" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>americaparty</span></a> <a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/typosquatting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>typosquatting</span></a></p>
Bill<p>Hey <a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> people. I know the OS stands for Open Source, but if you were to pay for ONE TOOL to make your life easier what would it be?</p>
Krypt3ia<p><a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a></p>
Johannes Filter<p>Unter <a href="https://www.surveillancewatch.io" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">surveillancewatch.io</span><span class="invisible"></span></a> findet man eine aufbereitete Datenbank zur Überwachungssoftware inklusive Analyse zu den Finanzströmen. Man kann per Formular neue Einträge vorschlagen. <a href="https://chaos.social/tags/recherche" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>recherche</span></a> <a href="https://chaos.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p>
Christoffer S.<p>Russian cyber threat activity profiled using recently published <a href="https://swecyb.com/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> articles. For this analysis about 17 articles have been used, and each source is well-referenced at the bottom of the article.</p><p>Two main perspectives; Victimology and Capabilities trying to understand, through the referenced articles, what can be gleaned about their current priorities.</p><p>Let me know if you find it useful, or a complete pile of horse dung.</p><p><a href="https://cstromblad.com/posts/russia-threat-actor-profile/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cstromblad.com/posts/russia-th</span><span class="invisible">reat-actor-profile/</span></a></p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Infosec</span></a> <a href="https://swecyb.com/tags/Russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Russia</span></a></p>
Sajid Mahmood<p>Search Engine Hacking: The Hacker's Guide to Advance Google Search</p><p>Advanced search techniques help us uncover hidden information about our targets. They save time and provide pinpoint accuracy in search results. Almost all major search engines support these advanced methods, making them useful for both ordinary users and hackers alike.</p><p><a href="https://sajidmahmood.com/p/search-engine-hacking-the-hackers-guide-to-advance-google-search/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sajidmahmood.com/p/search-engi</span><span class="invisible">ne-hacking-the-hackers-guide-to-advance-google-search/</span></a></p><p><a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://mastodon.social/tags/googlehacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>googlehacking</span></a> <a href="https://mastodon.social/tags/dorking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>dorking</span></a> <a href="https://mastodon.social/tags/searchengines" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>searchengines</span></a> <a href="https://mastodon.social/tags/blog" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>blog</span></a></p>
Samantaz Fox<p>Regarding my last retoot, It's easy to confirm with <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> tools that there is indeed some huge GNSS jamming in progress in the Baltic Sea. All boat and plane tracking websites show incoherent GPS tracking data.</p><p>Sites used:<br><a href="https://www.aisfriends.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">aisfriends.com/</span><span class="invisible"></span></a><br><a href="https://www.planemapper.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">planemapper.com/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/electronicwarfare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>electronicwarfare</span></a> <a href="https://infosec.exchange/tags/russia" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>russia</span></a> <a href="https://infosec.exchange/tags/balticsea" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>balticsea</span></a> <a href="https://infosec.exchange/tags/GNSS" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GNSS</span></a> <a href="https://infosec.exchange/tags/gps" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>gps</span></a></p>
Frédéric Paletou<p>BA 101 <a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> 🤟🏼</p>
Alonso Caballero / ReYDeS🟡 Finalizamos la primera sesión del Curso Fundamentos de Forense Digital 2025. Información: https://www.reydes.com/e/Curso_Fundamentos_de_Forense_Digital ¡Gracias a todos los participantes! #cybersecurity #hacking #redteam #forensics #dfir #osint
cyb_detective<p>OSINT Tools Bangladesh</p><p>- Open Data portals<br>- Legal Entities<br>- Cadastral and other Maps<br>- Vehicles<br>- People, phones, social etc.<br>- Public procurements</p><p><a href="https://github.com/paulpogoda/OSINT-Tools-Bangladesh" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/paulpogoda/OSINT-To</span><span class="invisible">ols-Bangladesh</span></a></p><p>Contributor x.com/paulpogoda</p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p>
Andreas Fischinger<p>PENTAGON PIZZA INDEX: Geniales OSINT Projekt: Analysiert die Aktivitäten der Pizzashops im Umkreis des Pentagons und stellt diese in einem übersichtlichen Dashboard anhand der DEFCON Alarmstufen des US Militärs dar. <a href="https://pentagon-pizza.vercel.app/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pentagon-pizza.vercel.app/</span><span class="invisible"></span></a> <a href="https://mastodon.social/tags/USPolitics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>USPolitics</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a></p>
ṫẎℭỚ◎ᾔ ṫ◎ℳ<p>Search X without an account. </p><p><a href="https://xcancel.com" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">xcancel.com</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/x" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x</span></a> <a href="https://infosec.exchange/tags/twitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twitter</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
RedwoodSec<p>Palantir is creating profiles of anti-ICE protestors for the U.S. Department of Homeland Security. It’s likely they’re doing this for any anti-Trump sentiment expressed on any platform, including the fediverse. <a href="https://infosec.exchange/tags/uspol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>uspol</span></a> <a href="https://infosec.exchange/tags/palantir" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>palantir</span></a> <a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p>
Sam Bent<p>Use X without an account. <br><a href="https://xcancel.com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">xcancel.com/</span><span class="invisible"></span></a><br><a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://mastodon.social/tags/x" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>x</span></a> <a href="https://mastodon.social/tags/twitter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>twitter</span></a></p>