101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

516
active users

#osint

8 posts7 participants0 posts today
craigsilverman<p>My latest Indicator post is an <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> case study of how to uncover a large-scale ecommerce scam operation via a single ad placed on Meta. </p><p>Let's dig into domain-generating algorithms and connecting websites via shared URLs, HTML titles &amp; favicons: <a href="https://indicator.media/p/osint-case-study-facebook-marketplace-scam-ad" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">indicator.media/p/osint-case-s</span><span class="invisible">tudy-facebook-marketplace-scam-ad</span></a></p>
cyb_detective<p>SkyTruth</p><p>Free online map that help to find oil slicks in satellite imagery (with LLM) and identify vessels/oil platforms that may be responsible for those slicks.</p><p><a href="https://cerulean.skytruth.org/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">cerulean.skytruth.org/</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/geoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geoint</span></a></p>
Sebastian Meineck<p>Der neue Online-Recherche Newsletter ist da: Spuren sichern, bevor sie verschwinden. 🌬️🐾 Ich stelle zwei meiner liebsten Browser-Erweiterungen vor, die ich jede Woche nutze, und interviewe mit <span class="h-card" translate="no"><a href="https://mastodon.social/@storytracer" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>storytracer</span></a></span> einen der Menschen, die öffentliche Daten vor der Trump-Zensur retten. Viel Spaß beim Lesen! </p><p><a href="https://mastodon.social/tags/newsletter" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>newsletter</span></a> <a href="https://mastodon.social/tags/tools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>tools</span></a> <a href="https://mastodon.social/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p><p><a href="https://sebmeineck.substack.com/p/orn-53-daten-retten-belege-sichern" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sebmeineck.substack.com/p/orn-</span><span class="invisible">53-daten-retten-belege-sichern</span></a></p>
Stéphane Bortzmeyer<p><a href="https://mastodon.gougere.fr/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.gougere.fr/tags/ROSO" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ROSO</span></a> Je suis où ?</p>
cyb_detective<p>Have LLMs Finally Mastered Geolocation</p><p>Test of 20 models against 25 photos, rating each from 0 (red) to 10 (dark green) for accuracy in geolocating the images by x.com/foekepostma x.com/bellingcat</p><p><a href="https://www.bellingcat.com/resources/how-tos/2025/06/06/have-llms-finally-mastered-geolocation/?utm_source=" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bellingcat.com/resources/how-t</span><span class="invisible">os/2025/06/06/have-llms-finally-mastered-geolocation/?utm_source=</span></a></p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/geoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geoint</span></a></p>
cyb_detective<p>Awesome BlackHat Arsenal</p><p>Collection of tools featured in Black Hat Arsenal events (2015-2025, Asia, Europe, USA, Canada, MEA):</p><p>- Lab Tools<br>- Web/AppSec<br>- Red Teaming<br>- <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a><br>- Blue Team &amp; Detection<br>- Reverse Engineering</p><p><a href="https://github.com/elbraino/awesome-blackhat-arsenal" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/elbraino/awesome-bl</span><span class="invisible">ackhat-arsenal</span></a></p>
Fiete Stegers<p><span class="h-card" translate="no"><a href="https://social.tchncs.de/@pixelcode" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>pixelcode</span></a></span> Numbers are being compared in the 6th paragraph of about 20, not in the last one, aren’t they?<br>Anyway, this may not be news to anyone following the war more closely, but think they are doing a good job explaining how numbers are counted by <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> projects and double-checking examples for the general public <a href="https://www.tagesschau.de/faktenfinder/ukraine-russland-deutschland-kriegsgeraete-100.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">tagesschau.de/faktenfinder/ukr</span><span class="invisible">aine-russland-deutschland-kriegsgeraete-100.html</span></a></p>
AmplifyUkraine 🔱🇺🇦<p>OSINTukraine has 4 months of funding left. To continue preserving <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23Telegram" target="_blank">#Telegram</a> data and war archives, we need new supporters. Help us stay online here: <a href="https://osintukraine.com/en/donate" rel="nofollow noopener" target="_blank">osintukraine.com/en/donate</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23osint" target="_blank">#osint</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23wardata" target="_blank">#wardata</a><br><br><a href="https://osintukraine.com/en/donate" rel="nofollow noopener" target="_blank">Donate</a></p>
Recon Village<p>Maybe your recon tool hasn’t gone viral.<br>But your experience will resonate with the DEFCON community.</p><p>@Recon Village is now accepting CFPs for <span class="h-card" translate="no"><a href="https://defcon.social/@Def" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>Def</span></a></span> CON Whether it’s a lesson, a breakthrough, or a wild story — we want to hear it.</p><p>⏳ Submit by June 15: <a href="https://zurl.co/3UQwo" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">zurl.co/3UQwo</span><span class="invisible"></span></a></p><p><a href="https://defcon.social/tags/CallForPapers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CallForPapers</span></a> <a href="https://defcon.social/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a> <a href="https://defcon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://defcon.social/tags/Recon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recon</span></a> <a href="https://defcon.social/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurity</span></a></p>
cyb_detective<p>Subscrape</p><p><a href="https://infosec.exchange/tags/Python" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Python</span></a> tool to search subdomains and extract titles, urls, emails, tokens and any other information from the HTML code of their main pages using regular expressions.</p><p><a href="https://github.com/cesc0sec/SecResearch" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/cesc0sec/SecResearch</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p>
Recon Village<p>Have you tracked threat actors, unraveled complex cloud environments, or uncovered SaaS misconfigurations?</p><p>Your insights could inspire and educate the global security community.</p><p>The @Recon Village for Papers at <span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>defcon</span></a></span> Hacking Conference is now open. Submit your talk by June 15 and be part of one of the most respected OSINT stages in the world.</p><p>🔗 Submit here: <a href="https://zurl.co/R1bz2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="">zurl.co/R1bz2</span><span class="invisible"></span></a></p><p><a href="https://defcon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://defcon.social/tags/DEFCON" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DEFCON</span></a> <a href="https://defcon.social/tags/Recon" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Recon</span></a> <a href="https://defcon.social/tags/CyberThreatIntel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberThreatIntel</span></a> <a href="https://defcon.social/tags/CallForSpeakers" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CallForSpeakers</span></a></p>
Bellingcat<p># Фактчекинг легенды: Nmap и предполагаемый доступ к админке gov.kz<br>## Введение<br>В IT-сообществе гуляет захватывающая история: якобы в 2021 году кто-то с помощью одной команды в Nmap случайно наткнулся на уязвимость сайта Министерства образования Казахстана (gov.kz) и получил доступ к админке без пароля! Такие байки — почти легенды для айтишников, особенно новичков, вдохновляя копаться в кибербезопасности. Но стоп: правда ли это? С точки зрения фактчекинга, история вызывает вопросы. Этот пост, основанный на OSINT-методологии (анализе открытых источников), разбирает инцидент по косточкам, отделяя факты от вымысла. Мы исследуем технические детали, контекст и уроки — всё в духе профессионального, но живого подхода, подходящего для Google Blogger! <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://qoto.org/tags/TechLegend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechLegend</span></a><br>---<br>## Ключевые слова<br>- Nmap: Мощный инструмент для сканирования сети — ищет хосты, порты, уязвимости. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <br>- Gov.kz: Домен госресурсов Казахстана, включая сайт Минобразования. <a href="https://qoto.org/tags/GovTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GovTech</span></a> <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kazakhstan</span></a> <br>- Кибербезопасность: Защита систем от атак и несанкционированного доступа. <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <br>- Уязвимость: Слабое звено, открывающее дверь хакерам. <br>- Админка: Панель управления сайтом — святая святых веб-ресурса. <br>- Фактчекинг: Проверка историй на правду через открытые данные. <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FactCheck</span></a> <br>- OSINT: Разведка по открытым источникам — от СМИ до соцсетей. <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <br>- Халатность: Небрежность админов, из-за которой системы становятся уязвимы. <br>- Информационная безопасность: Меры для защиты данных и серверов. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <br>- Легенда IT: Поучительные байки, мотивирующие IT-сообщество. <a href="https://qoto.org/tags/TechLegend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechLegend</span></a><br>---<br>## Целевая аудитория<br>- Студенты и новички в IT <br> Молодые айтишники, горящие желанием изучать кибербезопасность. Эта история может вдохновить, но вам нужен критический взгляд! <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <br>- Исследователи кибербезопасности <br> Профи, анализирующие уязвимости госсайтов и методы их обнаружения. <a href="https://qoto.org/tags/GovTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GovTech</span></a> <br>- Специалисты по инфобезу <br> Эксперты, которые борются с рисками и учатся на случаях халатности. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <br>- Журналисты и фактчекеры <br> Медийщики, проверяющие IT-истории для точных и честных публикаций. <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FactCheck</span></a> <br>- Госструктуры Казахстана <br> Ответственные за цифровую безопасность, чтобы извлечь уроки и закрыть бреши. <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kazakhstan</span></a><br>---<br>## Факты под микроскопом<br>1. Нет следов инцидента в 2021 году <br> Ни казахстанские СМИ, ни международные источники (Wired, ZDNet) не упоминают, чтобы через nmap <a href="http://gov.kz" rel="nofollow noopener" target="_blank"><span class="invisible">http://</span><span class="">gov.kz</span><span class="invisible"></span></a> кто-то ворвался в админку Минобразования. Такой громкий случай точно попал бы в новости или отчёты KZ-CERT. Где доказательства? <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FactCheck</span></a> <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kazakhstan</span></a><br>2. Синтаксис nmap — фейл <br> Команда nmap <a href="http://gov.kz" rel="nofollow noopener" target="_blank"><span class="invisible">http://</span><span class="">gov.kz</span><span class="invisible"></span></a> — технический ляп. Nmap работает с доменами (nmap gov.kz) или IP, а не с URL. Это намёк: история писалась для вау-эффекта, а не для правды. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a><br>3. Админка без пароля? Сомнительно <br> Да, халатность случается, но боевой сервер госструктуры на .gov.kz без авторизации — это редкость. Даже в странах с несовершенной кибергигиеной базовая защита обычно есть. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <a href="https://qoto.org/tags/GovTech" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>GovTech</span></a><br>4. Реакция властей — нестыковка <br> Исследователи порой находят баги и получают ответы или награды от госструктур Казахстана. Полное игнорирование доступа к базе данных? Звучит неправдоподобно. <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kazakhstan</span></a> <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a><br>---<br>## Вывод<br>Скорее всего, это анекдотическая байка, созданная, чтобы зажечь интерес новичков к инфобезу. Такие легенды — вроде «взлома Пентагона через Excel» — популярны в IT, но факты тут шатки. Мораль хороша, а реальность под вопросом. <a href="https://qoto.org/tags/TechLegend" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TechLegend</span></a> <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FactCheck</span></a><br>---<br>## Уроки на миллион<br>- Халатность — частая причина дыр в безопасности. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <br>- Linux и nmap — мощные инструменты в умелых руках. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <a href="https://qoto.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a> <br>- Факты проверяйте ссылками и данными, а не верьте на слово! <a href="https://qoto.org/tags/FactCheck" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FactCheck</span></a> <br>Хотите реальные кейсы уязвимостей госресурсов? Можем копнуть глубже! <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <a href="https://qoto.org/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a><br>---<br>## Библиография и источники<br>- Nmap Official Documentation <br> <a href="https://nmap.org/book/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">nmap.org/book/</span><span class="invisible"></span></a> <br> Подтверждает: Nmap не дружит с http://, только домены и IP. <a href="https://qoto.org/tags/Nmap" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Nmap</span></a> <br>- OWASP: Common Web Vulnerabilities <br> <a href="https://owasp.org/www-project-top-ten/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">owasp.org/www-project-top-ten/</span><span class="invisible"></span></a> <br> Почему админка без пароля — серьёзный баг. <a href="https://qoto.org/tags/InfoSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>InfoSec</span></a> <br>- MITRE CVE Database <br> <a href="https://cve.mitre.org/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">cve.mitre.org/</span><span class="invisible"></span></a> <br> База уязвимостей, включая госсектор. <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <br>- Казахстанский CERT — KZ-CERT <br> <a href="https://cert.gov.kz/" rel="nofollow noopener" target="_blank"><span class="invisible">https://</span><span class="">cert.gov.kz/</span><span class="invisible"></span></a> <br> Новости и отчёты о киберинцидентах в Казахстане. <a href="https://qoto.org/tags/Kazakhstan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Kazakhstan</span></a> <br>- Hacking News — Wired, ZDNet <br> <a href="https://www.wired.com/tag/hacking/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="">wired.com/tag/hacking/</span><span class="invisible"></span></a> <br> <a href="https://www.zdnet.com/topic/security/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="">zdnet.com/topic/security/</span><span class="invisible"></span></a> <br> Реальные кейсы взломов. <a href="https://qoto.org/tags/Hacking" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hacking</span></a> <br>- Bug Bounty Platforms <br> <a href="https://www.hackerone.com/" rel="nofollow noopener" target="_blank"><span class="invisible">https://www.</span><span class="">hackerone.com/</span><span class="invisible"></span></a> <br> Примеры уязвимостей, найденных исследователями. <a href="https://qoto.org/tags/CyberSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSec</span></a> <br>- Книга: "The Art of Exploitation" — Jon Erickson <br> Основа для изучения инструментов вроде Nmap. <a href="https://qoto.org/tags/OpenSource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OpenSource</span></a></p><p>⁂௹∞°</p><p>retroshare://channel?name=%D0%A4%D0%B0%D0%BA%D1%82%D1%87%D0%B5%D0%BA%D0%B8%D0%BD%D0%B3%20%D0%BB%D0%B5%D0%B3%D0%B5%D0%BD%D0%B4%D1%8B%3A%20Nmap%20%D0%B8%20%D0%BF%D1%80%D0%B5%D0%B4%D0%BF%D0%BE%D0%BB%D0%B0%D0%B3%D0%B0%D0%B5%D0%BC%D1%8B%D0%B9%20%D0%B4%D0%BE%D1%81%D1%82%D1%83%D0%BF%20%D0%BA%20%D0%B0%D0%B4%D0%BC%D0%B8%D0%BD%D0%BA%D0%B5%20gov.kz&amp;id=63472370d4139ee7ad355edb74012351&amp;msgid=3787fe92e95f60c2e6df08b32e8cac3fa24f4a41</p>
craigsilverman<p>Ad libraries from Meta, Google and other platforms can be incredibly useful for reporting and investigations. Track campaigns and narratives, hunt for disinfo &amp; scams, and more. </p><p>Here's the Indicator guide to using and investigating ad libraries:<br><a href="https://indicator.media/p/a-guide-to-investigating-digital" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">indicator.media/p/a-guide-to-i</span><span class="invisible">nvestigating-digital</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a></p>
craigsilverman<p>Our free Friday Briefing has:</p><p>📍 Exclusive data about the recent Community Notes outage<br>📍 OSINT tools &amp; tips for Discord, investigating companies, prompting LLMs <br>📍 New research on AI, scams, fake accounts on X<br>📍 Lots more!</p><p>Read it: <a href="https://indicator.media/p/x-community-notes-goes-down-running-apps-osint-scams-discord" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">indicator.media/p/x-community-</span><span class="invisible">notes-goes-down-running-apps-osint-scams-discord</span></a> <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a></p>
AmplifyUkraine 🔱🇺🇦<p>OSINTukraine has 4 months of funding left. To continue preserving <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23Telegram" target="_blank">#Telegram</a> data and war archives, we need new supporters. Help us stay online here: <a href="https://osintukraine.com/en/donate" rel="nofollow noopener" target="_blank">osintukraine.com/en/donate</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23osint" target="_blank">#osint</a> <a class="hashtag" rel="nofollow noopener" href="https://bsky.app/search?q=%23wardata" target="_blank">#wardata</a><br><br><a href="https://osintukraine.com/en/donate" rel="nofollow noopener" target="_blank">Donate</a></p>
AIL Project<p>AIL 6.2 released - Smarter Analysis, Search and Enhanced User Experience</p><p>We’re excited to release AIL Framework v6.2, a major update with new features and improved performance. This version makes analysis easier and the overall experience faster and more user-friendly.</p><p>Among the highlights are a fully revamped search engine powered by MeiliSearch, improved language detection for short text, local AI-driven image descriptions, and a yara-hunting editor tool.</p><p>🔗 <a href="https://www.ail-project.org/blog/2025/05/28/AIL-v6.2.released/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">ail-project.org/blog/2025/05/2</span><span class="invisible">8/AIL-v6.2.released/</span></a></p><p><a href="https://infosec.exchange/tags/darkweb" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>darkweb</span></a> <a href="https://infosec.exchange/tags/threatintelligence" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintelligence</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a></p>
cyb_detective<p>YouTube Comments History</p><p>Get comment history of any YouTube user (by handle/ID). Search across 20 billion comments.</p><p>youtube-tools.lolarchiver.com</p><p>Free trial by request - x.com/lol_archiver </p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/socmint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>socmint</span></a></p>
cyb_detective<p>Top 5 Mistakes When Trying to Geo-Locate a Photo</p><p>A short article on typical photo geolocation problems with tools and tips by x.com/ingvarpavlovich</p><p><a href="https://medium.com/@ingvarpavlovich/top-5-mistakes-when-trying-to-geo-locate-a-photo-basic-8bb47f14f6a2" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@ingvarpavlovich/to</span><span class="invisible">p-5-mistakes-when-trying-to-geo-locate-a-photo-basic-8bb47f14f6a2</span></a></p><p><a href="https://infosec.exchange/tags/osint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>osint</span></a> <a href="https://infosec.exchange/tags/geoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>geoint</span></a></p>
Ronny Lam<p><span class="h-card" translate="no"><a href="https://social.overheid.nl/@opensource" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>opensource</span></a></span> even <span class="h-card" translate="no"><a href="https://mastodon.nl/@wsslmn" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>wsslmn</span></a></span> and <span class="h-card" translate="no"><a href="https://procolix.social/@koen" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>koen</span></a></span> are in the picture. <a href="https://mastodon.social/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> ;-)</p>
sekurak News<p>O2 UK łata podatność pozwalającą na geolokalizację użytkowników smartfonów z technologią VoLTE</p><p>Operatorzy GSM, dla poprawienia jakości rozmów, mogą wykorzystać standard VoLTE czy Voice over LTE, pozwalający na realizację połączeń głosowych z użyciem sieci 4G LTE. Zwykle do rozmów telefonicznych oraz SMSów wykorzystywane były starsze (i mniej bezpieczne) standardy jak 2G i 3G, a nowsze technologie zapewniały tylko szybszą wymianę danych. VoLTE...</p><p><a href="https://mastodon.com.pl/tags/WBiegu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WBiegu</span></a> <a href="https://mastodon.com.pl/tags/Geolokalizacja" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Geolokalizacja</span></a> <a href="https://mastodon.com.pl/tags/Gsm" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Gsm</span></a> <a href="https://mastodon.com.pl/tags/Lte" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Lte</span></a> <a href="https://mastodon.com.pl/tags/OSINT" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>OSINT</span></a> <a href="https://mastodon.com.pl/tags/Prywatno%C5%9B%C4%87" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Prywatność</span></a> <a href="https://mastodon.com.pl/tags/SiP" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SiP</span></a> <a href="https://mastodon.com.pl/tags/Wificalling" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Wificalling</span></a></p><p><a href="https://sekurak.pl/o2-uk-lata-podatnosc-pozwalajaca-na-geolokalizacje-uzytkownikow-smartfonow-z-technologia-volte/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">sekurak.pl/o2-uk-lata-podatnos</span><span class="invisible">c-pozwalajaca-na-geolokalizacje-uzytkownikow-smartfonow-z-technologia-volte/</span></a></p>