Daily Security – Telegram
Sharing is caring
👎2
Don’t abuse please😅

- A selection of the best Telegram OSINT bots (Phones, punched numbers)
https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-telefony-probyv-nomera/

- (Search for information on Telegram)
https://hackyourmom.com/en/servisy/dobirka-krashhyh-osint-botiv-telegram-poshuk-informacziyi-u-telegram/

- Transportation tracking tools
https://hackyourmom.com/en/kibervijna/instrumenty-dlya-vidstezhennya-transportu-avia/

- Deciphering terrain, deep geoanalysis of video in the context of OSINT
https://hackyourmom.com/en/kibervijna/rozshyfrovuyemo-misczevist-glybokyj-geoanaliz-video-u-konteksti-osint/

- Computer forensics
https://hackyourmom.com/en/kibervijna/kompyuterna-kryminalistyka-forenzyka-dobirka-korysnyh-posylan/

- Offensive Osint Tools
https://github.com/wddadk/Offensive-OSINT-Tools

- OSINT CTF
https://hackyourmom.com/en/kibervijna/osint-ctf-challenges/
https://gralhix.com/list-of-osint-exercises/

- Location tracking
https://github.com/IvanGlinkin/CCTV

-Cool database
https://osintkit.net/login
bot (https://news.1rj.ru/str/osintkit_bot)
https://ohshint.gitbook.io/oh-shint-its-a-blog/osint/osint-wtf

- Roadmap
https://osintph.medium.com/osint-learning-path-20817eb5232e

- Blue team training

https://hackyourmom.com/en/osvita/dobirka-majdanchykiv-dlya-trenuvannya-blue-team/

- Dorks Builder
https://analystresearchtools.com

- Osint toolbox
https://github.com/The-Osint-Toolbox

- Best attack surface visualization tools
https://netlas.io/blog/best_attack_surface_visualization_tools/
bigdomaindata.com/reverse-whois/


- Github
https://sourcegraph.com
https://grep.app

- Games
https://www.geohub.gg/
https://news.1rj.ru/str/molfar_global/3235
https://news.1rj.ru/str/molfar_global/3181
Nite team 4
-Dorks advanced
https://github.com/cipher387/Dorks-collections-list


Tools:
- Malfar bot
@osintkit_bot
- phind.com

-Faceagle for images
https://faceagle.com/


- Bellingcat tools
https://www.bellingcat.com/resources/2024/09/24/bellingcat-online-investigations-toolkit/

- Molfar tools
https://molfar.com/en/useful-apps
4
Forwarded from Investigations by ZachXBT
It appears the crypto exchange Rain was likely exploited for $14.8M on April 29, 2024 after their BTC, ETH, SOL, and XRP wallets saw suspicious outflows. Funds were quickly transferred to instant exchanges and swapped for BTC and ETH.

As of now Rain has yet to make any statement about the incident.

Stolen funds currently sit
137.9 BTC
bc1q53aawrkpt5lvk2e30z36unvmhqqdru7q4rprp2
1881 ETH
0x197bc094f990261fd6841342901c451858756c28
1