Diary of a Threat ActorSocial Media OSINT: Twitter Follower/Interaction AnalysisWe all love seeing our name in someone’s Twitter Circle. However, it’s extremely revealing and shows exactly who we interact with the most…Apr 25Apr 25
Diary of a Threat ActorPrecise Location Phone TrackingThis can be difficult, however, there are easy methods to achieve this, and within the scope of the law. I use a subscription-based service…Apr 25Apr 25
Diary of a Threat ActorObtaining Geographical Location Data from MetadataIf media contains geolocation data, you can extract the metadata from the EXIF image file (Exchangeable Image File Format) especially if…Apr 25Apr 25
Diary of a Threat ActorModifying Maigret for Username OSINT SearchLet’s talk about username search scripts for a moment. The first question you’re probably wondering is which one is the best? Well, in most…Apr 25Apr 25
Diary of a Threat ActorHow to Obtain IP address from Email HeadersIn these examples, I will show you how to examine email headers to obtain the IP address of the sender in ProtonMail and Gmail. This will…Apr 25Apr 25
Diary of a Threat ActorVerify if Email Address is ValidIf you’ve ever wanted to verify if an Email address was valid but was not sure exactly how to verify it without sending a message to the…Apr 25Apr 25