/indiachan/ - indiachan

The containment board for inch rapefugees, intended for an uncensored discourse.

Index Catalog Archive Bottom Refresh
Name
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

Uncommon Time Winter Stream

Interboard /christmas/ Event has Begun!
Come celebrate Christmas with us here


8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

inchamars are NOT welcome here make indiachan great again

(51.72 KB 678x452 images.jpeg-11.jpg)

OSINT and doxxing resources megathread मित्र 01/20/2023 (Fri) 18:45:44 Id: d9d212 No. 256
post OSINT, doxxing and deepfaking resources ITT
>>256 this is the greatest OSINT thread i have ever seen
>>256 Transcript (could be inaccurate, AI generated) 18 THREAT HUNTING AND OSINT TOOLS • https://prowl.lupovis.io/ - Malicious IP search & loA • https://fullhunt.io/-Identify an attack surface • https://leakix.net/-Identify public clata leaks • https://hunter.io/- Search for email addresses • https://vulners.com/-A vulnerability database • https://intelx.io/- Search engine for data archives • https://grep.app/-Grep across a half million github repos ⚫ grayhatwarfare.com - Search for S3 buckets that are public • https://urlscan.io/-Scan a website incoming and outgoing links • https://pulsedive.com/ - Search for devices connected to the internet • https://www.wigle.net/-Map wireless access points around the world • https://netlas.io/- Search and monitor devices connected to the internet • https://www.greynoise.io/-Search for devices connected to the internet. • https://search.censys.io/-Information about devices connected to the internet • https://www.zoomeye.org/-Cyberspace search engine, search for network devices • https://www.shodan.io/-Search for devices connected to the internet • https://www.onyphe.io/-Search for devices connected to the internet and monitor attack • https://www.criminalip.io/-Search for devices connected to the internet. Monitor attack
>>256 https://play.google.com/store/apps/details?id=com.cuvora.carinfo&hl=en&gl=US >CarInfo - RTO Vehicle Info App DOX the owner of any indian car anonymously, by using their number plate
>>1803 almost forgot about this thread will start posting more stuff soon
>>256 https://imgur.com/a/sdwnyeU some tricks to mess with a person using their email another bonus trick: use the email on services like ig, facebook, twatter etc and keep clicking forgot password if you do this enough, the person will be forced to switch email addresses as it is fucking annoying
>>256 https://indiachan.web.app/ Lol. Posting here because great doxxing resource
>>256 https://rentry.org/databreachsources Data Breach Sources: https://en.wikipedia.org/wiki/List_of_data_breaches - Wikipedia list of past data breaches https://sizeof.cat/post/data-leaks/ - Large list of data breaches with torrent links https://breachforums.is - Data breach forum, decent selection, uses a credit system to download leaks https://ddosecrets.com/wiki/Distributed_Denial_of_Secrets - "Journalist non-profit devoted to publishing and archiving leaks" https://wikileaks.org/ - One of the original data breach operations, with a political twist https://enlacehacktivista.org/ - Hacktivist wiki designed to "[p]rovide a space for hackers to publish their hacks, leaks, and communiques" There are also likely various Discord servers, Telegram channels, IRC channels, XMPP servers, and the like that facilitate the buying and selling of data breaches. Check Data Breaches: https://haveibeenpwned.com/ More links to database dumps can be found here: https://github.com/hacxx-underground/Files-1 https://github.com/hacxx-underground/Files-2 https://github.com/hack-ito/Files https://maia.crimew.gay/posts/rosgosstrakh-hack/ https://breachforums.is/Thread-Rosgosstrakh-700K-Customers-400GB https://xss.is/ https://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion/ https://cracked.io/ https://www.nulled.to/ https://hackforums.net/ https://sizeof.cat/links/ https://www.ransomlook.io/recent https://rebreached.vc/ breachedu76kdyavc6szj6ppbplfqoz3pgrk3zw57my4vybgblpfeayd.onion
>>3933 Come here too https://discord.gg/nigger Desicord/niggercord discord server link, many great doxxing resources, many retards present, several retards from old inch post faces and rate each other. Come and doxx em.
>>4223 Good find anon
>>4223 >>4271 nice try RAW
>>256 Roadmap: 1) Choose your architecture (intel, arm, etc) 2) Choose your platform (windows, android, etc) 3) Choose your target compiled language (c/c++, go, etc) 4) Learn how binaries live in operating systems (memory layout, start_main, binary format, etc) 5) Learn to map high level abstractions and Low level constructs, which is all the game of reversing (work with, different compiler options, different compiler, non-stripped versus stripped versions, etc) Workflow of RE: 0) gather the binary for metadata 1) gather symbols and strings 2) gather addresses and entry points 3.a) exploredynamically the process (loadtime, runtime) 3.b) map asm constructs with high level abstractions 4) turn things into RE knowledge Applied RE knowledge: -> decompilation -> modification -> documentation -> reproduction -> exploitation -> forensics -> plagarism -> any research - The C++ Programming Language (4th Edition) by Bjarne Stroustrup - Hands-On Design Patterns with C++ by Fedor Pikus
[Expand Post]- Game Engine Architecture by Jason Gregory - Game Programming Patterns by Robert Nystrom - Introduction to Algorithms by Thomas Cormen & Charles Leiserson - Complete Mathematics by Trevor Johnson & Hugh Neill - Intermediate Algebra by Richard Rusczsyk & Mathew Crawford - Linear Algebra Done Right by Sheldon Axler - Calculus: An Intuitive and Physical Approach by Morris Kline - Essential Mathematics for Games and Interactive Applications by James M. Van Verth & Lars Bishop - Principles of Modern Digital design by Parag Lala (old, but gold) - Crafting Interpreters by Robert Nystrom https://www.learncpp.com/ https://en.cppreference.com/w/ https://cplusplus.com/doc/tutorial/ https://github.com/RayTracing/raytracing.github.io https://www.pbr-book.org/ https://paroj.github.io/gltut/ https://vulkan-tutorial.com/ https://students.cs.byu.edu/~cs235ta/references/Cpp%20Style/Google%20Cpp%20Style%20Guide.pdf http://algorithms.wtf/ https://github.com/andrei-drexler/ironwail https://www.mediafire.com/file/ly4qzqngfxft390/Introduction_to_algorithms-3rd_Edition.pdf/file https://vkguide.dev/ https://github.com/SaschaWillems/Vulkan https://github.com/prographon/graphics-developer-roadmap https://engine-programming.github.io/ https://github.com/EpicGames/UnrealEngine?tab=readme-ov-file https://hackmd.io/dLaaFCjDSveKVeEzqomBJw https://github.com/NVIDIA-Omniverse/PhysX https://en.cppreference.com/w/cpp/links/libs https://kavigihan.medium.com/introduction-to-windows-api-970f714ba700 https://learn.microsoft.com/en-us/cpp/cpp/c-cpp-language-and-standard-libraries?view=msvc-170 https://www.linkedin.com/pulse/what-general-c-project-structure-like-herbert-elwood-gilliland-iii/ https://medium.com/@edlyuu/zig-c-c-compiler-wtf-is-zig-c-790d9ad8d85b https://ziglang.org/documentation/0.11.0/ https://github.com/TheCherno/ProjectTemplate https://jeffe.cs.illinois.edu/teaching/algorithms/ https://www.uber.com/en-IN/blog/bootstrapping-ubers-infrastructure-on-arm64-with-zig/ https://andrewkelley.me/post/zig-cc-powerful-drop-in-replacement-gcc-clang.html?uclick_id=66364643-e100-4459-b891-e524fc3ed67f https://docs.unrealengine.com/5.3/en-US/programming-with-cplusplus-in-unreal-engine/ https://git-scm.com/doc https://github.com/sharkdp/dbg-macro/tree/master https://github.com/SergiusTheBest/plog https://learn.microsoft.com/en-us/vcpkg/get_started/get-started-msbuild?pivots=shell-cmd https://catchchallenger.herman-brule.com/wiki/Quick_Benchmark:_Gzip_vs_Bzip2_vs_LZMA_vs_XZ_vs_LZ4_vs_LZO https://learn.microsoft.com/en-us/cpp/build/walkthrough-creating-and-using-a-dynamic-link-library-cpp?view=msvc-170 https://www.raylib.com/index.html https://github.com/KhronosGroup/Vulkan-Hpp https://www.glfw.org/docs/latest/ https://github.com/glfw/glfw https://github.com/NVIDIA-Omniverse/PhysX https://www.fmod.com/ https://github.com/Cvelth/vkfw https://docs.vulkan.org/guide/latest/what_is_vulkan.html https://www.vulkan.org/learn#vulkan-tutorials https://github.com/g-truc/glm https://github.com/lz4/lz4 https://github.com/dreamworksanimation/openmoonray https://github.com/ocornut/imgui https://github.com/wolfpld/tracy https://github.com/tksuoran/erhe?tab=readme-ov-file https://github.com/raizam/gamedev_libraries?tab=readme-ov-file#math https://walbourn.github.io/introducing-directxmath/ https://github.com/Microsoft/DirectXMath https://philippegroarke.com/posts/2018/c++_ui_solutions/ https://learn.microsoft.com/en-us/cpp/?view=msvc-170 https://www.alexandre-pestana.com/volumetric-lights/ https://github.com/ConfettiFX/The-Forge https://github.com/DiligentGraphics/DiligentEngine https://github.com/ssloy/tinyrenderer https://github.com/ssloy/tinyraytracer https://github.com/ssloy/tinykaboom https://github.com/ssloy/tinyraycaster https://github.com/bkaradzic/bgfx https://developer.nvidia.com/blog/writing-portable-rendering-code-with-nvrhi/ https://github.com/Dav1dde/glad https://www.ambiera.com/irrklang/index.html https://simoncoenen.com/blog/programming/graphics/DoomEternalStudy https://www.adriancourreges.com/blog/2016/09/09/doom-2016-graphics-study/ https://github.com/assimp/assimp https://github.com/nothings/stb https://github.com/nem0/lumixengine?tab=readme-ov-file https://github.com/aseprite/freetype2 https://github.com/zeux/meshoptimizer https://github.com/Cyan4973/xxHash https://github.com/bkaradzic/genie https://github.com/nem0/OpenFBX?tab=readme-ov-file https://github.com/FlaxEngine/FlaxEngine https://github.com/syoyo/tinygltf https://github.com/dllsystem/FreeImage https://github.com/google/mathfu https://miloyip.github.io/game-programmer/ https://float.exposed/0x3dcccccd https://slashbinbash.de/cppdev.html https://github.com/mcmilk/7-Zip-zstd http://www.radgametools.com/bnkmain.htm https://github.com/KhronosGroup/glTF https://github.com/Snektron/vulkan-zig https://github.com/spanzeri/vkguide-zig https://www.freecodecamp.org/news/gitignore-file-how-to-ignore-files-and-folders-in-git/ https://www.shadertoy.com/ https://www.gamedevmap.com/index.php?location=Bangalore https://registry.khronos.org/vulkan/specs/1.3/html/chap1.html https://github.com/TheCherno/Hazel https://artificial-mind.net/blog/2020/11/14/cpp17-consteval https://quuxplusone.github.io/blog/2018/08/07/force-constexpr/ https://www.noesisengine.com/docs/Gui.Core.UnrealTutorial.html https://coherent-labs.com/Documentation/cpp/ https://int10h.org/oldschool-pc-fonts/readme/ https://www.shadertoy.com/view/WsVSzV https://guyinatuxedo.github.io/index.html https://cryptohack.org/ https://pwnable.xyz/challenges/ https://lolbas-project.github.io/ https://github.com/wtsxDev/reverse-engineering https://web.archive.org/web/20210710080726/http://security.cs.rpi.edu/courses/binexp-spring2015/ https://crackmes.one/lasts/1 https://godbolt.org/ https://www.slideshare.net/AngelBoy1/presentations https://github.com/onethawt/reverseengineering-reading-list https://github.com/EbookFoundation/free-programming-books/tree/main https://pacman128.github.io/pcasm/ https://www.magnumdb.com/ https://struppigel.blogspot.com/2017/06/training-1-file-type-analysis-and-code.html?view=sidebar https://graphics.stanford.edu/~seander/bithacks.html https://cs.lmu.edu/~ray/notes/nasmtutorial/ https://denniskubes.com/2017/01/24/the-5-minute-guide-to-c-pointers/ https://www.internalpointers.com/post/gentle-introduction-multithreading https://goalkicker.com/ https://ropemporium.com/ https://github.com/shellphish/how2heap https://icyphox.sh/blog/python-for-re-1/ https://tetzank.github.io/posts/return-oriented-programming/ https://manybutfinite.com/post/anatomy-of-a-program-in-memory/ https://github.com/LordNoteworthy/cpu-internals https://mediatum.ub.tum.de/doc/1367533/file.pdf https://github.com/0x4143/malware-gems https://www.felixcloutier.com/x86/ https://hexterisk.github.io/blog/posts/ https:/
>>5597 basado
>>256 What Do You Need? Our mail tool is wifiphiser . All activities should be performed on a machine with Kali Linux installed. Keep in mind, you can generally use VirtualBox with the dissemination introduced. What else? You need a USB WiFi connector, ideally something from Alfa or TP-Link. Bit by bit guidance 1) Clone repository rougehostapd . • git clone wifiphisher/roguehostapd 2) Install wifiphisher. • git clone wifiphisher/wifiphisher • cd wifiphisher • sudo python setup.py introduce 3) Enter the wifiphisher command (no spot). This is generally what we will see when we drive the group. And afterward a window like this will open: here you can see which Wi-Fi networks are close by. 4) Select the ideal passage (press ENTER). Then, at that point it will be diverted to the page where the assault will begin. The attack happens in 3 phases: Sending deauthentication packets . This is important for the customer gadgets to disengage from the organization and attempt to start another association with the Wi-Fi switch. Checking the quantity of associated victims . This way we can see the number of individuals are associated with our Wi-Fi area of interest. HTTP requests . They show what solicitation is being shipped off the casualty's internet browser by our area of interest. At the point when de-verification happens and machines attempt to reconnect, they essentially associate with the open Wi-Fi organization of a similar name. This is the fundamental thought behind this sort of assault! This is what mammoths will see when they associate with our Wi-Fi area of interest.
[Expand Post]Here, the client who is attempting to associate is provoked to enter their Facebook login accreditations (simply a model). So you need to gain admittance to Wi-Fi. Mammoths drive in information, and we catch it. This is the thing that the casualty will see when he "signs in" to Facebook. Done! We got the casualty's accreditations, which implies we can sign into the record and do anything we desire there. Conclusion Never associate with open free Wi-Fi areas of interest, just visit sites with HTTPS encryption, and never utilize your accreditations to sign in to sites with HTTP. In the event that you truly need to, basically utilize a VPN. It will scramble traffic. Stay Connected!
>>256 https://techcrunch.com/2024/04/18/world-check-database-leaked-sanctions-financial-crimes-watchlist/ >LSEG's Refinitiv World-Check database containing 5,299,116 records of PEPs, criminals, terrorists, heightened risk individuals and organizations has been stolen by GhostR on March 2024 https://fastupload.io/ybR8WQDmWVjXkqB/file https://fastupload.io/vsq5szYGA7ltiSZ/file
>>6485 This is going to be very interesting
>>6485 need more, please don't make me go to breachforums,
>>256 The OSINT community did such a wonderful job covering the Ukraine war. From footage to estimates of deaths on each side and keeping up to date on the situation of the war. If future wars receive this kind of coverage, it would be amazing for the rest of us who like to keep up with non Govt sources.


Forms
Delete
Report
Quick Reply