Информационная война в Интернете (Кризисный PR, на основе поиска
спрятанной фактуры), обучение Конкурентной разведке и другие
услуги, которые можно заказать Евгению Ющуку
Масштабная программа семинара, на основе
авторского курса Евгения Ющука, преподававшегося в Магистратуре
по Конкурентной разведке в УрГЭУ (в формате вебинара)
Блог Ющука Евгения Леонидовича "Конкурентная
разведка"
Ющук Евгений Леонидович. PR- "Айкидо":
Продвижение на негативе, за счет ресурсов противника
Концепция "Репутационной крепости".
Разрушение репутационной защиты объектов любой сложности
Магистратура Евгения Ющука по Конкурентной
разведке (УрГЭУ, 2010-2020 гг.)
A
curated list of amazingly awesome open source intelligence
tools and resources.Open-source
intelligence (OSINT)is intelligence
collected from publicly available sources. In the intelligence
community (IC), the term "open" refers to overt, publicly
available sources (as opposed to covert or clandestine
sources)
DeHashed-
DeHashed helps prevent ATO with our extensive data set &
breach notification solution. Match employee and consumer
logins against the world’s largest repository of aggregated
publicly available assets leaked from third-party breaches.
Secure passwords before criminals can abuse stolen
information, and protect your enterprise.
National
Cellular Directory- was created to help
people research and reconnect with one another by performing
cell phone lookups. The lookup products includes have
billions of records that can be accessed at any time, as
well as free searches one hour a day, every day.
Reverse
Phone Lookup- Detailed information about
phone carrier, region, service provider, and switch
information.
Spy
Dialer- Get the voicemail of a cell
phone & owner name lookup.
Twilio-
Look up a phone numbers carrier type, location, etc.
Phone
Validator- Pretty accurate phone lookup
service, particularly good against Google Voice numbers.
Exonera
Tor- A database of IP addresses that
have been part of the Tor network. It answers the question
whether there was a Tor relay running on a given IP address
on a given date.
Spyse-
Scans entire internet using OSINT and collects all valuable
info in its own database: Ipv4 hosts, domains/Meta/Whois,
AS, TLS/SSL, Ports/Banners/Protocols, technologies, OS and
much other info.
SecurityTrails-
API to search current and historical DNS records, current
and historical WHOIS, technologies used by sites and whois
search for phone, email, address, IPs etc.
URLVoid-
Analyzes a website through multiple blacklist engines and
online reputation tools to facilitate the detection of
fraudulent and malicious websites.
The
Collection of Computer Science Bibliographies-
The CCSB is a collection of bibliographies of scientific
literature in computer science from various sources,
covering most aspects of computer science.
Tor
Browser- Tor is a free software that
prevents people from learning your location or browsing
habits by letting you communicate anonymously on the
Internet.
HTTrack-
Allows you to download a World Wide Web site from the
Internet to a local directory, building recursively all
directories, getting HTML, images, and other files from the
server to your computer.
Amass-
The amass tool searches Internet data sources, performs
brute force subdomain enumeration, searches web archives,
and uses machine learning to generate additional subdomain
name guesses. DNS name resolution is performed across many
public servers so the authoritative server will see the
traffic coming from different locations. Written in Go.
findsubdomains-
Automatically scans different sources to collect as many
subdomains as can. Validate all the data through various
tools and services to provide correct results without
waiting.
Barcode
Reader- Decode barcodes in C#, VB, Java,
C\C++, Delphi, PHP and other languages.
Belati-
Belati - The Traditional Swiss Army Knife For OSINT. Belati
is tool for Collecting Public Data & Public Document
from Website and other service for OSINT purpose.
Datasploit-
Tool to perform various OSINT techniques on usernames,
emails addresses, and domains.
Greynoise-
"Anti-Threat Intelligence" Greynoise characterizes the
background noise of the internet, so the user can focus on
what is actually important.
The
Harvester- Gather emails, subdomains,
hosts, employee names, open ports and banners from different
public sources like search engines, PGP key servers and
SHODAN computer database.
Intrigue
Core- Framework for attack surface
discovery.
Maltego-
Maltego is an open source intelligence (OSINT) and graphical
link analysis tool for gathering and connecting information
for investigative tasks.
OpenRefine-
Free & open source power tool for working with messy
data and improving it.
Orbit-
Draws relationships between crypto wallets with recursive
crawling of transaction history.
REScure
Threat Intel Feed- REScure is an
independent threat intelligence project which we undertook
to enhance our understanding of distributed systems, their
integration, the nature of threat intelligence and how to
efficiently collect, store, consume, distribute it.
OTX
AlienVault- Open Threat Exchange is the
neighborhood watch of the global intelligence community. It
enables private companies, independent security researchers,
and government agencies to openly collaborate and share the
latest information about emerging threats, attack methods,
and malicious actors, promoting greater security across the
entire community.
Digital
Stakeout- DigitalStakeout Scout™ is the
leading security intelligence tool to collect data from the
surface web, social media, dark web and technical sources to
illuminate and investigate external threats.