𝗢𝗵𝗦𝗛𝗜𝗡𝗧
•Introduction to OSINT Web Resources
•Search Engines
•Social Media Intelligence [SOCMINT]
•Mapping and Geospatial Intelligence [GEOINT]
•Imagery Intelligence [IMINT]
•Orbital Intelligence [ORBINT]
•Business Research and Trade Intelligence [TRADINT]
•Financial Intelligence [FININT]
•Vehicle and Transportation Intelligence [VATINT]
•Digital Network Intelligence [DNINT]
•Signals Intelligence [SIGINT]
•Deep Webs and Darknets
•People Investigations
•Email Addresses
•Phone Numbers
•Usernames
•Gaming
•Real Estate
•Data Sets
•Organized Crime and Illicit Trade
•Stolen Property
•War, Crisis and Conflicts
•Weapons and Equipment •Identification
•Government Information
•Dictionaries, Translation and •Decoding
https://ohshint.gitbook.io/oh-shint-its-a-blog
•Introduction to OSINT Web Resources
•Search Engines
•Social Media Intelligence [SOCMINT]
•Mapping and Geospatial Intelligence [GEOINT]
•Imagery Intelligence [IMINT]
•Orbital Intelligence [ORBINT]
•Business Research and Trade Intelligence [TRADINT]
•Financial Intelligence [FININT]
•Vehicle and Transportation Intelligence [VATINT]
•Digital Network Intelligence [DNINT]
•Signals Intelligence [SIGINT]
•Deep Webs and Darknets
•People Investigations
•Email Addresses
•Phone Numbers
•Usernames
•Gaming
•Real Estate
•Data Sets
•Organized Crime and Illicit Trade
•Stolen Property
•War, Crisis and Conflicts
•Weapons and Equipment •Identification
•Government Information
•Dictionaries, Translation and •Decoding
https://ohshint.gitbook.io/oh-shint-its-a-blog
ohshint.gitbook.io
OH SHINT! Welcome Aboard | OH SHINT! It's A Blog!
So what is this site all about? Yep, it's an OSINT blog.
A couple of interesting blog posts on hiding Linux processes
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
https://dfir.ch/posts/slash-proc/
https://righteousit.com/2024/07/24/hiding-linux-processes-with-bind-mounts/
#Linux
#Cybersecurity
dfir.ch
The 'Invisibility Cloak' - Slash-Proc Magic | dfir.ch
Technical blog by Stephan Berger (@malmoeb)
Intro to glibc heap exploitation (HitconCTF, glibc 2.31)
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Credits Tom Mansion (@quarkslab)
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Quarkslab
Heap exploitation, glibc internals and nifty tricks. - Quarkslab's blog
This is a writeup of a heap pwn challenge at HitconCTF Qualifiers 2024, which explains some glibc malloc internals and some heap exploitation tricks that can be used for getting a shell!
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
https://github.com/0xZ0F/Z0FCourse_ReverseEngineering
GitHub
GitHub - 0xZ0F/Z0FCourse_ReverseEngineering: Reverse engineering focusing on x64 Windows.
Reverse engineering focusing on x64 Windows. Contribute to 0xZ0F/Z0FCourse_ReverseEngineering development by creating an account on GitHub.
👍3