Offensive OSINT s05e05 - Open Source Surveillance - Territorial Dispute
This update is one of the most important one, from analytic as well as research standpoint. Right now you can analyse sp
Offensive OSINT s05e04 - Open Source Surveillance - Username search
CEO, VP of Engineering and PR specialist (spoiler - this is the same person) approved the release of a new feature for t
Offensive OSINT s05e03 - Open Source Surveillance - People API
I'm super excited to announce newest update which allow to easily uncover the person behind the photo or activity in
Offensive OSINT s05e02 - Open Source Surveillance PRO
I'm super excited to announce that Open Source Surveillance has been finished, and today you can register and use it
Offensive OSINT s05e01 - Open Source Surveillance DEMO
Ladies and Gentleman, I'm pleased to announce that Open Source Surveillance has been finished and it's free to r
Offensive OSINT s04e08 - Open Source Surveillance - Events & Public Transport
Welcome in third article in Open Source Surveillance series, in today's episode we discuss traffic incidents, Amtrak
Offensive OSINT s04e05 - Open Source Surveillance - Patreon
In this post I would like to share my plans about Open Source Surveillance project and how you can participate and creat
Offensive OSINT s04e04 - Open Source Surveillance
Open Source Surveillance takes intelligence gathering and cyber espionage to a whole new level. It can be used for offen
Offensive OSINT s04e03 - Tracking Internet facing Industrial Control System devices with Kamerka Lite
Today I want to present additional big feature to my long time project - Kamerka. From now on you can access statistics
Offensive OSINT s02e03 - Intelligence gathering on Internet facing critical infrastructure in United States of America and Russian Federation.
In this episode we will make an analysis of exposed Industrial Control System (ICS) devices in Russia and United States
Offensive OSINT s01e04 - Intelligence gathering on critical infrastructure in Southeast Asia
This is the second part of my investigation into critical infrastructure around the world. This article should have been
Hack like it’s 2077 — Presenting ꓘamerka mobile
From now on ꓘamerka has a mobile version. You can geolocate specific buildings or facilities in web interface and all th
When ꓘamerka meets healthcare — Research on exposed medical devices
ꓘamerka is going after hospitals and health clinics. I’m publishing tons of queries related to healthcare industry and m
Hack the planet with ꓘamerka GUI — Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.
From now on ꓘamerka is not only simple script for mapping devices, it has evolved to fully equipped reconnaissance web a

Page 1 of 2