/indiachan/ - indiachan

The containment board for inch rapefugees, intended for an uncensored discourse.

Index Catalog Archive Bottom Refresh
Name
Options
Subject
Message

Max message length: 12000

files

Max file size: 32.00 MB

Total max file size: 50.00 MB

Max files: 5

Supported file types: GIF, JPG, PNG, WebM, OGG, and more

E-mail
Password

(used to delete files and posts)

Misc

Remember to follow the Rules

The backup domains are located at 8chan.se and 8chan.cc. TOR access can be found here, or you can access the TOR portal from the clearnet at Redchannit 3.0.

US Election Thread

8chan.moe is a hobby project with no affiliation whatsoever to the administration of any other "8chan" site, past or present.

inchamars are NOT welcome here make indiachan great again

(51.72 KB 678x452 images.jpeg-11.jpg)

OSINT and doxxing resources megathread मित्र 01/20/2023 (Fri) 18:45:44 Id: d9d212 No. 256
post OSINT, doxxing and deepfaking resources ITT
>>256 https://truepeoplesearch.com https://www.411.com/ https://www.addresses.com/ https://barometer.agorapulse.com/home https://www.annualreports.com/ https://www.anywho.com/ https://www.archives.com/search/vital https://www.boatinfoworld.com/ https://www.brbpublications.com/ https://businessprofiles.com/ https://www.cardetective.com/ https://www.carrierlookup.com/ https://checkpeople.com/ https://checkthatvin.com/ https://www.corporationwiki.com/ http://corrections.com/ https://www.courtreference.com/ https://cityprotect.com/ https://www.courthousedirect.com/ https://www.crowdfireapp.com/ https://www.cyndislist.com/ https://www.decodethis.com/ https://www.email-format.com/ https://www.exploit-db.com/ https://www.flippity.com/ https://forensicprotection.com/ https://www.freepatentsonline.com/ https://www.genealogybank.com/explore/ssdi/all https://github.com/initstring/linkedin2username https://www.goofbid.com/ https://www.gotfreefax.com/ https://www.historicaerials.com/viewer https://www.hotgunz.com/search.php https://audit.iconosquare.com/ https://inmatesplus.com/ https://www.intelius.com/ https://www.windy.com/ https://accountanalysis.app/ https://com.lullar.com/ https://www8.lunapic.com/editor/ https://www.melissa.com/v2/lookups/ https://www.mvrdecoder.com/ https://namevine.com/ https://www.nerdydata.com/ https://nomorobo.com/ https://www1.odcr.com/ https://www.publicrecords.onlinesearches.com/
[Expand Post]https://opencorporates.com/ https://www.peekyou.com/ https://www.peoplefinder.com/ https://pipl.com/ https://www.radarbox.com/ https://radaris.com/ https://www.ripoffreport.com/ https://beacon.schneidercorp.com/ https://searchbysite.com/ https://searchisback.com/ https://www.searchtempest.com/ https://securitytrails.com/dns-trails https://seekmetrics.com/ https://www.sharedcount.com/ https://www.spokeo.com/ https://spyonweb.com/ https://www.spytox.com/
>>256 1) Is there anyway to find someone's email from his phone number without alarming the target? 2)what/how can someone find as many detail as possible with someone social media account 3) any tool or method from which I can find a YouTube account comment history from different videos?
>>306 1 and 2 can be answered if you scroll up, I've listed so many resources but you fucking inchtards can't be bothered to read anything. For 3, use google search operators or scraping scripts.
>>310 Thanks bhai will look into it any head start for 3rd one?
>>313 https://yewtu.be/pTSBNv0LRfE it's a bit old, but the concept is the same. The better way would be to utilise scrapers, you can type youtube comment scraping into your search engine and go from there
>>256 https://osint.sh https://www.bellingcat.com/category/resources/how-tos/ https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/ https://start.me/p/BnrMKd/01-ncso https://www.tryhackme.com/room/searchlightosint https://graphcommons.com/graphs/0a79deca-46a2-48e9-9d90-326b20aa6e9e?auto=true >[Online/Collaborative Coding Playgrounds] https://stackblitz.com/ https://jsfiddle.net/ https://codepen.io/ https://replit.com/ https://tio.run/ https://jsbin.com/ https://jsitor.com/ https://radicle.xyz/ https://playcode.io/ https://liveweave.com/ https://codepad.co/ https://js.do/ https://codesandbox.io/ https://code.collaboradev.com/ https://plnkr.co/ https://dotnetfiddle.net/ >tool to create semantic web ontologies in the browser http://vowl.visualdataweb.org/webvowl.html >paper on event processing using an RDF database https://allegrograph.com/wp-content/uploads/2021/04/Event-Processing-using-an-RDF-Database.pdf >paper on Semantic Modelling of Events Using Linked Open Data https://de.catbox.moe/coa69m.pdf https://github.com/belouve/osint-resource/blob/main/resourcedump.md AUSTRALIA >Australia's Largest Open Source Intelligence Repository https://github.com/DFW1N/DFW1N-OSINT >SA Scan - South Australian Scanner Monitoring (Emergency services paging) https://www.sascan.net.au/?page=grnPaging >Strategic and Policy Advice about Advanced Information Technologies for Corporations and Government Agencies http://www.xamax.com.au/ >Roger Clarke’s Information Infrastructure Home-Page http://www.rogerclarke.com/II/index.html
[Expand Post]RANDOM RESOURCES & REFERENCES >FOR DIGGERS | coreysdigs https://www.coreysdigs.com/resources/ >01 Sprp77's OSINT Resources - Google Drive https://drive.google.com/drive/mobile/folders/1CBcemFdorkAqJ-Sthsh67OVHgH4FQF05?usp=sharing >Open Source Public Intelligence Research Group [ORG] - Google Groups https://groups.google.com/g/marlboroughgroup >Reference, Facts, News - Free and Family-friendly Resources - Refdesk.com https://refdesk.com/ >Social engineering via social media -slideshare.net https://www.slideshare.net/mobile/barryjcoatesworth/social-engineering-socialmedia >The Robing Room - Where Judges are Judges (USA) - reviews and experiences with USA judges. http://www.therobingroom.com/ Intelx.io : to search something within telegram Tool which allows you to enumerate usernames across many websites https://whatsmyname.app/ >GoSpider - Fast web spider written in Go https://github.com/jaeles-project/gospider >Collection of addons for the python scrapy framework https://github.com/croqaz/awesome-scrapy >Looks like a collection of crawlers/scrapers https://github.com/facert/awesome-spider twint >An advanced Twitter scraping & OSINT tool. https://github.com/twintproject/twint tinfoleak >open-source tool for Twitter intelligence analysis https://github.com/vaguileradiaz/tinfoleak birdwatcher >Data analysis and OSINT framework for Twitter https://github.com/michenriksen/birdwatcher datasploit >Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses,…, aggregate all the raw data, and give data in multiple formats https://github.com/DataSploit/datasploit linkedin2username >Generate username lists from companies on LinkedIn. REQUIRES LINKEDIN ACCOUNT https://github.com/initstring/linkedin2username OWASP Maryam >modular open-source framework to harvest data from open sources and search engines quickly and thoroughly https://github.com/saeeddhqan/Maryam ODIN >automated discovery of network assets, including domains, IP addresses, and internet-facing systems. graph visualizing with Neo4j possible https://github.com/chrismaddalena/ODIN OSRFramework >username checking, DNS lookups, information leaks research, deep web search, regular expressions, visualizing queries using ad-hoc Maltego transforms https://github.com/i3visio/osrframework sn0int >Semi-automatic OSINT framework and package manager https://github.com/kpcyrd/sn0int reconspider >Framework for scanning IP Address, Emails, Websites, Organizations. https://github.com/bhavsec/reconspider osmedeus Workflow Engine for Offensive Security https://github.com/j3ssie/osmedeus sublist3r >A python tool designed to enumerate subdomains of websites using OSINT. https://github.com/aboul3la/Sublist3r subfinder >subdomain discovery tool that discovers valid subdomains for websites by using passive online sources https://github.com/projectdiscovery/subfinder cloud_enum >Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud. https://github.com/initstring/cloud_enum spiderfoot >SpiderFoot is an open source intelligence automation tool. Its goal is to automate the process of gathering intelligence about a given target http://www.spiderfoot.net/ theharvester >An OSINT tool for gathering emails, names, subdomains, IPs and URLs related to a target using public sources https://github.com/laramies/theHarvester BigBountyRecon >utilises 58 different techniques and open source tools to expedite the process of initial reconnaissance on the target organisation https://github.com/Viralmaniar/BigBountyRecon photon >Incredibly fast crawler designed for OSINT https://github.com/s0md3v/Photon hakrawler >web crawler designed for easy, quick discovery of endpoints and assets within a web application https://github.com/hakluke/hakrawler gospider >Fast web spider written in Go https://github.com/jaeles-project/gospider gOSINT >OSINT Swiss Army Knife https://github.com/Nhoya/gOSINT belati >ANOTHER swiss army knife for osint!!1!1! https://github.com/aancw/Belati
>>256 osintdb >An OSINT ressource collection manager https://github.com/theosintguy/osintdb holehe >check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function https://github.com/megadose/holehe IntelOwl >Intel Owl: analyze files, domains, IPs in multiple ways from a single API at scale https://github.com/intelowlproject/IntelOwl FOCA analyze documents to find metadata and hidden information https://github.com/ElevenPaths/FOCA Open Semantic Search >search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text Mining https://github.com/opensemanticsearch/open-semantic-search Infoga >Email OSINT https://github.com/m4ll0k/Infoga InstagramOSINT >An Instagram Open Source Intelligence Tool https://github.com/sc1341/InstagramOSINT Moriarty-Project >gives information about the phone number that you entered https://github.com/AzizKpln/Moriarty-Project sarenka >gets data from services like shodan, censys etc. in one app https://github.com/pawlaczyk/sarenka terra >OSINT Tool on Twitter and Instagram. https://github.com/xadhrit/terra Web Iota >web scraper which can find all of the images and links/suburls on a webpage https://github.com/SatinWuker/Web-Iota WebDork >find publicly available sensitive information about Companies and Organisations https://github.com/HACKE-RC/webdork
[Expand Post] social-analyzer >Analyzing and finding a person's profile in 1000 social media \ websites https://github.com/qeeqbox/social-analyzer sherlock >Hunt down social media accounts by username across social networks https://github.com/sherlock-project/sherlock Netizenship >find the online presence of a username in popular social media websites like Facebook, Instagram, Twitter, etc. https://github.com/rahulrajpl/netizenship GHunt >Offensive Google framework. https://github.com/mxrch/GHunt E4GL30S1NT >Simple Information Gathering Tool https://github.com/C0MPL3XDEV/E4GL30S1NT
>>256 –Proprietary with free community editions– elasticsearch >Distributed RESTful search engine built on top of Lucene https://www.elastic.co/products/elasticsearch kibana >Browser based analytics and search dashboard for Elasticsearch https://www.elastic.co/products/kibana hunchly >OSINT Software For Online Investigations https://www.hunch.ly/ siren >Investigative Intelligence Platform https://siren.io/ Download: https://support.siren.io/support/solutions/articles/17000125112-platform-12-1-0 –Abandoned Projects– Scylla >The Simplistic Information Gathering Engine | Find Advanced Information on a Username, Website, Phone Number, etc https://github.com/MandConsultingGroup/Scylla poortego https://github.com/mgeide/poortego –Resources– https://github.com/jivoi/awesome-osint https://osintframework.com/ https://github.com/cipher387/osint_stuff_tool_collection https://medium.com/dataseries/telegram-network-visualization-tracing-forwards-and-mentions-f75746712fcf >Aleph is a powerful tool for people who follow the money. It helps investigators to securely access and search large amounts of data - no matter whether they are a government database or a leaked email archive. >Documentation
[Expand Post]https://docs.alephdata.org/ >Public demo instance https://aleph.occrp.org/ https://www.truepeoplesearch.com/
>>256 Elevenlabs.io : speech deepfaker
>>256 https://rentry.co/talknetdeepfake A very comprehensive and easy to follow guide to create free, realistic voice deepfakes
>>567 This is excellent. I need to build a computer again now to take advantage of this. My laptop will heat up too much.
>>631 the guide states that the software can be run on a cloud service like google collab, thus eliminating the need for local hardware
>>632 I hate google Googles t&c dont allow what i want to do Google is blocked where i live and work for security
(209.89 KB 1500x1950 osint.png)

(367.64 KB 813x1163 osint2.png)

(1.28 MB 2876x2040 antifa_dox.png)

(22.45 MB OSINT.pdf)

>>256 MORE OSINT RESOURCES >2019 guide to osint https://www.randhome.io/blog/2019/01/05/2019-osint-guide/ >inteltechniques cheatsheet https://inteltechniques.com/JE/OSINT_Packet_2019.pdf >bellingcat guides https://www.bellingcat.com/category/resources/how-tos/ >bellingcat toolkit https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/edit >Week in osint weekly updates in osint TTP https://www.sans.org/blog/-must-have-free-resources-for-open-source-intelligence-osint-/ https://start.me/p/b5Aow7/asint_collection https://conint.io/ an OSINT convention https://github.com/lockfale/osint-framework https://i-intelligence.eu/uploads/public-documents/OSINT_Handbook_2020.pdf https://www.youtube.com/watch?v=BixDUq__R1E&list=PLv4tW3O0XKAa_1rFMPFhFcq3fXkQEeNvr https://www.osintdojo.com/resources/ http://libgen.rs/search.php?req=bazzell&lg_topic=libgen&open=0&view=simple&res=25&phrase=1&column=def https://pimeyes.com/en Face Search Engine Reverse Image Search http://sandlab.cs.uchicago.edu/fawkes/ Image "Cloaking" for Personal Privacy IMPORTANT FOR NEWFAGS- https://ahrefs.com/blog/google-advanced-search-operators/ https://www.hashatit.com/hashtags/osint https://haveibeenpwned.com/ https://www.osintme.com/index.php/page/2/ https://www.osintme.com/index.php/2021/01/16/ultimate-osint-with-shodan-100-great-shodan-queries/ https://www.osintme.com/index.php/2021/04/18/20-osint-resources-for-breach-data-research/ http://www.osinttechniques.com/ https://www.cqcore.uk/email-to-username/ https://codeofaninja.com/tools/ https://keyfindings.blog https://www.blackarch.org/tools.html https://aur.archlinux.org/packages/?K=OSINT&SB=p http://wiki.kenburbary.com/social-meda-monitoring-wiki https://rentry.co/bhangigram_osint https://en.whotwi.com/ twatter account analyzer https://github.com/sinwindie/OSINT here is a great startpage that has a soykaf ton of resources and tools for OSINT/GEOINT/IMINT/SOCMINT ect. Check the different tabs. Cartainly worth bookmarking; https://start.me/p/BnrMKd/01-osint-hub
>>256 stolen from breached.vc
>>256 https://pimeyes.com/en reverse image search
>>256 this is the greatest OSINT thread i have ever seen
>>256 Transcript (could be inaccurate, AI generated) 18 THREAT HUNTING AND OSINT TOOLS • https://prowl.lupovis.io/ - Malicious IP search & loA • https://fullhunt.io/-Identify an attack surface • https://leakix.net/-Identify public clata leaks • https://hunter.io/- Search for email addresses • https://vulners.com/-A vulnerability database • https://intelx.io/- Search engine for data archives • https://grep.app/-Grep across a half million github repos ⚫ grayhatwarfare.com - Search for S3 buckets that are public • https://urlscan.io/-Scan a website incoming and outgoing links • https://pulsedive.com/ - Search for devices connected to the internet • https://www.wigle.net/-Map wireless access points around the world • https://netlas.io/- Search and monitor devices connected to the internet • https://www.greynoise.io/-Search for devices connected to the internet. • https://search.censys.io/-Information about devices connected to the internet • https://www.zoomeye.org/-Cyberspace search engine, search for network devices • https://www.shodan.io/-Search for devices connected to the internet • https://www.onyphe.io/-Search for devices connected to the internet and monitor attack • https://www.criminalip.io/-Search for devices connected to the internet. Monitor attack
>>256 https://play.google.com/store/apps/details?id=com.cuvora.carinfo&hl=en&gl=US >CarInfo - RTO Vehicle Info App DOX the owner of any indian car anonymously, by using their number plate
>>1803 almost forgot about this thread will start posting more stuff soon
>>256 https://imgur.com/a/sdwnyeU some tricks to mess with a person using their email another bonus trick: use the email on services like ig, facebook, twatter etc and keep clicking forgot password if you do this enough, the person will be forced to switch email addresses as it is fucking annoying
>>256 https://indiachan.web.app/ Lol. Posting here because great doxxing resource
>>256 https://rentry.org/databreachsources Data Breach Sources: https://en.wikipedia.org/wiki/List_of_data_breaches - Wikipedia list of past data breaches https://sizeof.cat/post/data-leaks/ - Large list of data breaches with torrent links https://breachforums.is - Data breach forum, decent selection, uses a credit system to download leaks https://ddosecrets.com/wiki/Distributed_Denial_of_Secrets - "Journalist non-profit devoted to publishing and archiving leaks" https://wikileaks.org/ - One of the original data breach operations, with a political twist https://enlacehacktivista.org/ - Hacktivist wiki designed to "[p]rovide a space for hackers to publish their hacks, leaks, and communiques" There are also likely various Discord servers, Telegram channels, IRC channels, XMPP servers, and the like that facilitate the buying and selling of data breaches. Check Data Breaches: https://haveibeenpwned.com/ More links to database dumps can be found here: https://github.com/hacxx-underground/Files-1 https://github.com/hacxx-underground/Files-2 https://github.com/hack-ito/Files https://maia.crimew.gay/posts/rosgosstrakh-hack/ https://breachforums.is/Thread-Rosgosstrakh-700K-Customers-400GB https://xss.is/ https://xssforumv3isucukbxhdhwz67hoa5e2voakcfkuieq4ch257vsburuid.onion/ https://cracked.io/ https://www.nulled.to/ https://hackforums.net/ https://sizeof.cat/links/ https://www.ransomlook.io/recent https://rebreached.vc/ breachedu76kdyavc6szj6ppbplfqoz3pgrk3zw57my4vybgblpfeayd.onion
>>3933 Come here too https://discord.gg/nigger Desicord/niggercord discord server link, many great doxxing resources, many retards present, several retards from old inch post faces and rate each other. Come and doxx em.
>>4223 Good find anon
>>4223 >>4271 nice try RAW
>>256 Roadmap: 1) Choose your architecture (intel, arm, etc) 2) Choose your platform (windows, android, etc) 3) Choose your target compiled language (c/c++, go, etc) 4) Learn how binaries live in operating systems (memory layout, start_main, binary format, etc) 5) Learn to map high level abstractions and Low level constructs, which is all the game of reversing (work with, different compiler options, different compiler, non-stripped versus stripped versions, etc) Workflow of RE: 0) gather the binary for metadata 1) gather symbols and strings 2) gather addresses and entry points 3.a) exploredynamically the process (loadtime, runtime) 3.b) map asm constructs with high level abstractions 4) turn things into RE knowledge Applied RE knowledge: -> decompilation -> modification -> documentation -> reproduction -> exploitation -> forensics -> plagarism -> any research - The C++ Programming Language (4th Edition) by Bjarne Stroustrup - Hands-On Design Patterns with C++ by Fedor Pikus
[Expand Post]- Game Engine Architecture by Jason Gregory - Game Programming Patterns by Robert Nystrom - Introduction to Algorithms by Thomas Cormen & Charles Leiserson - Complete Mathematics by Trevor Johnson & Hugh Neill - Intermediate Algebra by Richard Rusczsyk & Mathew Crawford - Linear Algebra Done Right by Sheldon Axler - Calculus: An Intuitive and Physical Approach by Morris Kline - Essential Mathematics for Games and Interactive Applications by James M. Van Verth & Lars Bishop - Principles of Modern Digital design by Parag Lala (old, but gold) - Crafting Interpreters by Robert Nystrom https://www.learncpp.com/ https://en.cppreference.com/w/ https://cplusplus.com/doc/tutorial/ https://github.com/RayTracing/raytracing.github.io https://www.pbr-book.org/ https://paroj.github.io/gltut/ https://vulkan-tutorial.com/ https://students.cs.byu.edu/~cs235ta/references/Cpp%20Style/Google%20Cpp%20Style%20Guide.pdf http://algorithms.wtf/ https://github.com/andrei-drexler/ironwail https://www.mediafire.com/file/ly4qzqngfxft390/Introduction_to_algorithms-3rd_Edition.pdf/file https://vkguide.dev/ https://github.com/SaschaWillems/Vulkan https://github.com/prographon/graphics-developer-roadmap https://engine-programming.github.io/ https://github.com/EpicGames/UnrealEngine?tab=readme-ov-file https://hackmd.io/dLaaFCjDSveKVeEzqomBJw https://github.com/NVIDIA-Omniverse/PhysX https://en.cppreference.com/w/cpp/links/libs https://kavigihan.medium.com/introduction-to-windows-api-970f714ba700 https://learn.microsoft.com/en-us/cpp/cpp/c-cpp-language-and-standard-libraries?view=msvc-170 https://www.linkedin.com/pulse/what-general-c-project-structure-like-herbert-elwood-gilliland-iii/ https://medium.com/@edlyuu/zig-c-c-compiler-wtf-is-zig-c-790d9ad8d85b https://ziglang.org/documentation/0.11.0/ https://github.com/TheCherno/ProjectTemplate https://jeffe.cs.illinois.edu/teaching/algorithms/ https://www.uber.com/en-IN/blog/bootstrapping-ubers-infrastructure-on-arm64-with-zig/ https://andrewkelley.me/post/zig-cc-powerful-drop-in-replacement-gcc-clang.html?uclick_id=66364643-e100-4459-b891-e524fc3ed67f https://docs.unrealengine.com/5.3/en-US/programming-with-cplusplus-in-unreal-engine/ https://git-scm.com/doc https://github.com/sharkdp/dbg-macro/tree/master https://github.com/SergiusTheBest/plog https://learn.microsoft.com/en-us/vcpkg/get_started/get-started-msbuild?pivots=shell-cmd https://catchchallenger.herman-brule.com/wiki/Quick_Benchmark:_Gzip_vs_Bzip2_vs_LZMA_vs_XZ_vs_LZ4_vs_LZO https://learn.microsoft.com/en-us/cpp/build/walkthrough-creating-and-using-a-dynamic-link-library-cpp?view=msvc-170 https://www.raylib.com/index.html https://github.com/KhronosGroup/Vulkan-Hpp https://www.glfw.org/docs/latest/ https://github.com/glfw/glfw https://github.com/NVIDIA-Omniverse/PhysX https://www.fmod.com/ https://github.com/Cvelth/vkfw https://docs.vulkan.org/guide/latest/what_is_vulkan.html https://www.vulkan.org/learn#vulkan-tutorials https://github.com/g-truc/glm https://github.com/lz4/lz4 https://github.com/dreamworksanimation/openmoonray https://github.com/ocornut/imgui https://github.com/wolfpld/tracy https://github.com/tksuoran/erhe?tab=readme-ov-file https://github.com/raizam/gamedev_libraries?tab=readme-ov-file#math https://walbourn.github.io/introducing-directxmath/ https://github.com/Microsoft/DirectXMath https://philippegroarke.com/posts/2018/c++_ui_solutions/ https://learn.microsoft.com/en-us/cpp/?view=msvc-170 https://www.alexandre-pestana.com/volumetric-lights/ https://github.com/ConfettiFX/The-Forge https://github.com/DiligentGraphics/DiligentEngine https://github.com/ssloy/tinyrenderer https://github.com/ssloy/tinyraytracer https://github.com/ssloy/tinykaboom https://github.com/ssloy/tinyraycaster https://github.com/bkaradzic/bgfx https://developer.nvidia.com/blog/writing-portable-rendering-code-with-nvrhi/ https://github.com/Dav1dde/glad https://www.ambiera.com/irrklang/index.html https://simoncoenen.com/blog/programming/graphics/DoomEternalStudy https://www.adriancourreges.com/blog/2016/09/09/doom-2016-graphics-study/ https://github.com/assimp/assimp https://github.com/nothings/stb https://github.com/nem0/lumixengine?tab=readme-ov-file https://github.com/aseprite/freetype2 https://github.com/zeux/meshoptimizer https://github.com/Cyan4973/xxHash https://github.com/bkaradzic/genie https://github.com/nem0/OpenFBX?tab=readme-ov-file https://github.com/FlaxEngine/FlaxEngine https://github.com/syoyo/tinygltf https://github.com/dllsystem/FreeImage https://github.com/google/mathfu https://miloyip.github.io/game-programmer/ https://float.exposed/0x3dcccccd https://slashbinbash.de/cppdev.html https://github.com/mcmilk/7-Zip-zstd http://www.radgametools.com/bnkmain.htm https://github.com/KhronosGroup/glTF https://github.com/Snektron/vulkan-zig https://github.com/spanzeri/vkguide-zig https://www.freecodecamp.org/news/gitignore-file-how-to-ignore-files-and-folders-in-git/ https://www.shadertoy.com/ https://www.gamedevmap.com/index.php?location=Bangalore https://registry.khronos.org/vulkan/specs/1.3/html/chap1.html https://github.com/TheCherno/Hazel https://artificial-mind.net/blog/2020/11/14/cpp17-consteval https://quuxplusone.github.io/blog/2018/08/07/force-constexpr/ https://www.noesisengine.com/docs/Gui.Core.UnrealTutorial.html https://coherent-labs.com/Documentation/cpp/ https://int10h.org/oldschool-pc-fonts/readme/ https://www.shadertoy.com/view/WsVSzV https://guyinatuxedo.github.io/index.html https://cryptohack.org/ https://pwnable.xyz/challenges/ https://lolbas-project.github.io/ https://github.com/wtsxDev/reverse-engineering https://web.archive.org/web/20210710080726/http://security.cs.rpi.edu/courses/binexp-spring2015/ https://crackmes.one/lasts/1 https://godbolt.org/ https://www.slideshare.net/AngelBoy1/presentations https://github.com/onethawt/reverseengineering-reading-list https://github.com/EbookFoundation/free-programming-books/tree/main https://pacman128.github.io/pcasm/ https://www.magnumdb.com/ https://struppigel.blogspot.com/2017/06/training-1-file-type-analysis-and-code.html?view=sidebar https://graphics.stanford.edu/~seander/bithacks.html https://cs.lmu.edu/~ray/notes/nasmtutorial/ https://denniskubes.com/2017/01/24/the-5-minute-guide-to-c-pointers/ https://www.internalpointers.com/post/gentle-introduction-multithreading https://goalkicker.com/ https://ropemporium.com/ https://github.com/shellphish/how2heap https://icyphox.sh/blog/python-for-re-1/ https://tetzank.github.io/posts/return-oriented-programming/ https://manybutfinite.com/post/anatomy-of-a-program-in-memory/ https://github.com/LordNoteworthy/cpu-internals https://mediatum.ub.tum.de/doc/1367533/file.pdf https://github.com/0x4143/malware-gems https://www.felixcloutier.com/x86/ https://hexterisk.github.io/blog/posts/ https:/
>>5597 basado
>>256 What Do You Need? Our mail tool is wifiphiser . All activities should be performed on a machine with Kali Linux installed. Keep in mind, you can generally use VirtualBox with the dissemination introduced. What else? You need a USB WiFi connector, ideally something from Alfa or TP-Link. Bit by bit guidance 1) Clone repository rougehostapd . • git clone wifiphisher/roguehostapd 2) Install wifiphisher. • git clone wifiphisher/wifiphisher • cd wifiphisher • sudo python setup.py introduce 3) Enter the wifiphisher command (no spot). This is generally what we will see when we drive the group. And afterward a window like this will open: here you can see which Wi-Fi networks are close by. 4) Select the ideal passage (press ENTER). Then, at that point it will be diverted to the page where the assault will begin. The attack happens in 3 phases: Sending deauthentication packets . This is important for the customer gadgets to disengage from the organization and attempt to start another association with the Wi-Fi switch. Checking the quantity of associated victims . This way we can see the number of individuals are associated with our Wi-Fi area of interest. HTTP requests . They show what solicitation is being shipped off the casualty's internet browser by our area of interest. At the point when de-verification happens and machines attempt to reconnect, they essentially associate with the open Wi-Fi organization of a similar name. This is the fundamental thought behind this sort of assault! This is what mammoths will see when they associate with our Wi-Fi area of interest.
[Expand Post]Here, the client who is attempting to associate is provoked to enter their Facebook login accreditations (simply a model). So you need to gain admittance to Wi-Fi. Mammoths drive in information, and we catch it. This is the thing that the casualty will see when he "signs in" to Facebook. Done! We got the casualty's accreditations, which implies we can sign into the record and do anything we desire there. Conclusion Never associate with open free Wi-Fi areas of interest, just visit sites with HTTPS encryption, and never utilize your accreditations to sign in to sites with HTTP. In the event that you truly need to, basically utilize a VPN. It will scramble traffic. Stay Connected!
>>256 https://techcrunch.com/2024/04/18/world-check-database-leaked-sanctions-financial-crimes-watchlist/ >LSEG's Refinitiv World-Check database containing 5,299,116 records of PEPs, criminals, terrorists, heightened risk individuals and organizations has been stolen by GhostR on March 2024 https://fastupload.io/ybR8WQDmWVjXkqB/file https://fastupload.io/vsq5szYGA7ltiSZ/file
>>6485 This is going to be very interesting
>>6485 need more, please don't make me go to breachforums,
>>256 The OSINT community did such a wonderful job covering the Ukraine war. From footage to estimates of deaths on each side and keeping up to date on the situation of the war. If future wars receive this kind of coverage, it would be amazing for the rest of us who like to keep up with non Govt sources.


Forms
Delete
Report
Quick Reply