Articles by Tag #osint

Browse our collection of articles on various topics related to IT technologies. Dive in and explore something new!

DNS Abuse Sanctuary: How NiceNIC (IANA 3765) Shields Global Cybercrime

Comprehensive investigation exposing NiceNIC as a bulletproof registrar with phishing scores 326x industry standard. Trust Wallet heist, Scattered Spider, and the infrastructure enabling $8.5M+ in crypto theft.

Learn More 99 25Jan 13

The Backbone of Global Scam: How NameSilo, Webnic, and NiceNic

Global scam thrives on registrar protection. 💥 Every second you read this, someone is being scammed...

Learn More 76 0Aug 31 '25

🕵️‍♂️ DestroyScammers: De-anonymizing Crypto Thieves with Open Source Intelligence

TL;DR: Crypto scammers act like jurisdiction doesn’t apply to them. It does. We built the...

Learn More 0 0Nov 30 '25

I Replaced My LLM Orchestrator with Plant Biology — Here's What Happened

How SMESH signal diffusion transformed a dark web OSINT tool from sequential pipeline to emergent swarm intelligence

Learn More 1 0Jan 20

User Scanner : Find Your Perfect Username Across All Platforms in Seconds ⚡

User Scanner A powerful Email OSINT tool that checks if a specific email is registered...

Learn More 8 14Oct 26 '25

UserScanner a CLI tool to help you select a unique username across all popular sites.

User Scanner Repo: https://github.com/kaifcodec/user-scanner Super easy to contribute...

Learn More 3 1Nov 30 '25

user-scanner a cli tool written in python which helps you choose a unique username across all popular sites and games ⚡

🚀 User Scanner: Find Your Perfect Username Across All Platforms in Seconds ⚡ Tired of...

Learn More 1 1Dec 10 '25

When AI Content Systems Reproduce Content Without Attribution: A Documented Case Study

A documented investigation into automated content plagiarism and what it reveals about AI-powered...

Learn More 4 1Dec 8 '25

The Hunter Behind the Hacker

0x01. Executive Summary During cyberattacks, adversaries often rely on...

Learn More 0 0Sep 22 '25

The Most Popular Cyberspace Search Engine — ZoomEye

When people talk about cyberspace search engines, Shodan is often labeled the "pioneer." But if you...

Learn More 0 0Sep 16 '25

Shodan vs ZoomEye Query Syntax Comparison

This article provides a side-by-side comparison of the most common query operators in Shodan vs the...

Learn More 0 0Sep 23 '25

Use ZoomEye to find Jupyter servers without identity verification enabled

1. Abstract In the process of using Jupyter Notebook and JupyterLab, some users lack...

Learn More 0 0Sep 26 '25

Redirector OSINT - One-Command Redirect & Logging Tool

When doing OSINT or red team work, I always needed a quick way to: redirect traffic to a...

Learn More 0 0Sep 5 '25

Building a Forensic Image Analyser: Bridging the Gap in OSINT Investigations

I recently built a Dockerised Image Metadata Analyser to solve this. Here is the breakdown of why I...

Learn More 0 0Jan 14

A Breakdown of Darkweb Exit Scams & Their Warning Signs

Exit scams in darknet markets follow predictable patterns. From a security perspective, they’re not...

Learn More 0 0Dec 8 '25

Top 5 Domain and IP Intelligence Tools in OSINT

Open Source Intelligence (OSINT) has become a cornerstone for cybersecurity professionals,...

Learn More 0 0Sep 23 '25

Top 5 Technical Asset Discovery Tools in OSINT

Open Source Intelligence (OSINT) is a vital component of cybersecurity research and threat hunting....

Learn More 0 0Sep 16 '25

🚀 The Power of OSINT: How Hackers & Investigators Gather Hidden Data! 🔍

🔎 The Power of OSINT: Uncover Hidden Data Like a Pro! Open-Source Intelligence (OSINT) is a...

Learn More 5 0Feb 26 '25

Surface Watchdog: Building a Self-Running OSINT Daemon in Termux

⚠️ Disclaimer This project is intended for educational and lawful use only. All monitoring performed...

Learn More 1 0Aug 1 '25

Isn’t OSINT Just Glorified Googling?

If you’ve ever mentioned OSINT (Open-Source Intelligence) in a conversation, chances are you’ve heard...

Learn More 1 0Aug 30 '25

Kashi CTF 2025 Writeup - English

Table of Contents : OSINT Kings (458 Pts) Old Diner (411 Pts) Misc Easy Jail (100...

Learn More 1 0Feb 24 '25

IntelHub — local-first OSINT toolkit for your browser (open source)

IntelHub is a free, open-source OSINT toolkit that runs entirely in your browser. No external...

Learn More 1 0Aug 19 '25

Exploring the Synergy Between Cyberwarfare and Open Source Intelligence (OSINT): A Comprehensive Analysis

Abstract: In today’s digital battlefield, cyberwarfare and open source intelligence (OSINT) form a...

Learn More 0 0Apr 24 '25

Taranis AI: Revolutionizing OSINT with the Power of AI

Quick Summary: 📝 Taranis AI is an advanced OSINT tool that leverages AI and NLP to collect...

Learn More 1 0Apr 25 '25

Mastering the Art of Online Investigation: TryHackMe's "Search Skills" Walkthrough

In the world of cybersecurity, knowing how to search effectively is just as important as knowing how...

Learn More 0 0Jun 23 '25

A Complete Guide to the Latest ZoomEye Search Syntax

ZoomEye, a leading cyberspace search engine, has updated its query syntax to provide more precise...

Learn More 1 0Sep 23 '25

Extract Photo Metadata and Location Safely – No Uploads Needed

Every photo tells a story. Beyond what you see in the image, most modern photos contain hidden...

Learn More 1 0Feb 1

Exploring the Synergy Between Cyberwarfare and OSINT

In today’s digital age, the battlefield has shifted from conventional spaces to the cyber realm. The...

Learn More 0 0Mar 4 '25

Best Practices for Enhancing Attack Surface Management and Accelerating Vulnerability Response

Attack Surface Management (ASM) has become a cornerstone of modern cybersecurity. As enterprises...

Learn More 0 0Sep 23 '25

How to Automate Developer OSINT with Python

Learn how to create a simple Python script to automate gathering open-source intelligence (OSINT) about developers from public sources.

Learn More 1 0Mar 3 '25