Tagged articles
12 articles
Page 1 of 1
Black & White Path
Black & White Path
May 14, 2026 · Information Security

WireTapper: One-Click Open-Source Tool to Reveal All Nearby Wireless Devices

WireTapper is an open-source OSINT/SIGINT platform that passively scans and visualizes every nearby wireless device—from Wi-Fi and Bluetooth to CCTV and vehicle RF—using a privacy-preserving k-anonymous query, integrates multiple external APIs, and offers a quick two-step deployment with a sleek web UI.

BLEOSINTSIGINT
0 likes · 4 min read
WireTapper: One-Click Open-Source Tool to Reveal All Nearby Wireless Devices
AI Explorer
AI Explorer
May 1, 2026 · Information Security

Maigret: A 3000+ Site Username Reconnaissance Tool for OSINT

Maigret is an open‑source Python utility that, with a single username, scans over 3,000 websites to automatically collect public profiles, images, locations and linked accounts, offering a fast, extensible way for OSINT practitioners to build comprehensive digital footprints while emphasizing legal and ethical use.

MaigretOSINTPython
0 likes · 6 min read
Maigret: A 3000+ Site Username Reconnaissance Tool for OSINT
Black & White Path
Black & White Path
Mar 17, 2026 · Information Security

Red Team Playbook: From External Breach to Internal Network Domination

This guide walks through the full red‑team workflow—from reconnaissance and initial access through defense evasion, credential theft, lateral movement, and operational security—detailing concrete tools, commands, and techniques for compromising both external and internal networks.

Lateral MovementOPSECOSINT
0 likes · 10 min read
Red Team Playbook: From External Breach to Internal Network Domination
Black & White Path
Black & White Path
Feb 20, 2026 · Information Security

5 Hidden Risks of Sharing Workplace Updates on Social Media

The article analyzes how everyday posts on platforms like WeChat, GitHub, and TikTok can be harvested as open‑source intelligence, enabling phishing, BEC, and deep‑fake attacks, and offers concrete mitigation steps for security professionals.

BECOSINTcybersecurity awareness
0 likes · 9 min read
5 Hidden Risks of Sharing Workplace Updates on Social Media
Liangxu Linux
Liangxu Linux
Feb 19, 2024 · Information Security

How to Reveal a Weibo Image’s Publisher Using Its URL

This guide explains how to extract the UID of a Weibo user who posted a specific image by dissecting the image URL, converting the embedded hexadecimal string to decimal, and verifying the result against the user’s profile.

Image URLOSINTUID extraction
0 likes · 4 min read
How to Reveal a Weibo Image’s Publisher Using Its URL
Liangxu Linux
Liangxu Linux
Oct 6, 2020 · Information Security

How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT

During the Mid‑Autumn Festival I received a seemingly harmless mooncake email, suspected it was a phishing test, and then used a virtual machine, network‑capture tools, Shodan, and open‑source intelligence to trace the malicious link back to its source and exposed the underlying infrastructure.

Network ReconnaissanceOSINTShodan
0 likes · 4 min read
How I Uncovered a Phishing Mooncake Email Using Wireshark, Shodan, and OSINT
Architects Research Society
Architects Research Society
Aug 10, 2020 · Information Security

Awesome Penetration Testing Resources and Tools

This article compiles a comprehensive, categorized collection of penetration testing resources—including anonymity tools, antivirus evasion utilities, books, CTF frameworks, Docker containers, network analysis tools, OSINT platforms, and more—providing security professionals and researchers with a valuable reference for offensive security engagements.

CTFDockerOSINT
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools
MaGe Linux Operations
MaGe Linux Operations
Oct 18, 2019 · Information Security

How I Traced a Gambling Site Operator Using OSINT Techniques

A detailed OSINT investigation reveals how a victim's plea led to uncovering a hidden gambling website, exposing its server location, associated accounts, personal identities, and ultimately forcing the operator to return the stolen funds and shut down the site.

OSINTcyber investigationsocial engineering
0 likes · 7 min read
How I Traced a Gambling Site Operator Using OSINT Techniques
Java Backend Technology
Java Backend Technology
Oct 9, 2019 · Information Security

How I Traced a Porn Site Operator Using OSINT Techniques

In this detailed case study, the author discovers a pornographic website, uses WHOIS and email reverse‑lookup to uncover a network of 28 related sites, registers an account, follows payment and contact clues, obtains the operator’s IP, phone and address, and ultimately pressures the owner until the sites disappear.

OSINTcyber investigationtrace
0 likes · 6 min read
How I Traced a Porn Site Operator Using OSINT Techniques
Architects Research Society
Architects Research Society
Sep 19, 2019 · Information Security

Awesome Penetration Testing Resources and Tools

This comprehensive collection presents a curated list of penetration testing resources—including anonymity tools, antivirus‑evasion utilities, books, CTF frameworks, Docker containers for vulnerable systems, network analysis utilities, OSINT services, reverse‑engineering tools, and security education materials—providing security professionals and researchers with a valuable reference for offensive security testing and learning.

CTFDockerInfoSec
0 likes · 36 min read
Awesome Penetration Testing Resources and Tools