Week in OSINT #2019–41

The latest news from the world of OSINT, with some nice tools and links.

Sector035
Sector035
Oct 14, 2019 · 3 min read

And here we are again with another little overview of some awesome tools and links. And of course we have to share something on the latest TraceLabs missing people CTF that was in Australia. If you have any nice links or tools, feel free to reach out to me on Twitter.

  • CryptoTools
  • PhishStats
  • InstagramOSINT
  • TraceLabs
  • Mitaka

Links: CryptoTools

Link: https://www.aware-online.com/en/osint-tools/cryptocurrency-tools/

Site: PhishStats

Last week Gonzo shared an awesome link on OSINT.team, the website ‘PhishStats’. They collect data on phishing emails and provide a platform that you can use to search for specific phishing campaigns for research. But the dashboard is just for the nice numbers. The real power comes with the API they provide, where you are able to search for specific text, ASN’s, IP addresses, countries and such. The result is an easy query you can even run directly in the browser, and shows you the data you are looking for in JSON.

Searching for anything that touches LinkedIn

Link: https://phishstats.info/

Tool: InstagramOSINT

Diving into owl_kitty

Article: TraceLabs

Link: https://www.facebook.com/WINNewsCanberra/videos/551064062295772/

Tool: Mitaka

Chrome: https://chrome.google.com/webstore/detail/mitaka/bfjbejmeoibbdpfdbmbacmefcbannnbg

FireFox: https://addons.mozilla.org/en-US/firefox/addon/mitaka/

GitHub: https://github.com/ninoseki/mitaka

Have a good week and have a good search!

Week in OSINT

Your weekly dose of OSINT websites, tools and aimed at…

Week in OSINT

Your weekly dose of OSINT websites, tools and aimed at anyone working in the field of analysts, researchers and pentesters.

Sector035

Written by

Sector035

Just a shadowy nerd… Busy with InfoSec, geolocation and OSINT (archived articles only, Week in OSINT can be found on https://sector035.nl)

Week in OSINT

Your weekly dose of OSINT websites, tools and aimed at anyone working in the field of analysts, researchers and pentesters.