Jake Creps Profile picture
May 6, 2023 9 tweets 3 min read Read on X
I just realized I hit 20,000 followers on Twitter. That's really incredible. I wanted to say thanks to everyone who has stuck with me over the years.

🧵To celebrate this milestone, I've compiled some of the top #OSINT content I've posted over the last year in this thread.
Finding creative loopholes in the Discord signup page to confirm email address registration.

Using Bitmoji's API to confirm email registration on Snapchat.

Using Facebook's built-in OCR to search license plates within photos.

Connecting usernames across social media platforms through shared Twitter iOS URL tags.

Discovering ChatGPT and outsourcing regex writing to it almost immediately.

Poastal passing 100 stars on GitHub, giving people an easy way to reverse search email addresses.

Using an audio bird finder app to determine the approximate location of a video if birds are present.

Thanks again for the support and encouragement. I'm spending most of my time writing @osintnewsletter these days.

Here's the latest issue "Building your own local OSINT database".

osintnewsletter.com/p/15

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Jake Creps

Jake Creps Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @jakecreps

Mar 19, 2022
🧵There's a community of people on Reddit in the subreddit /r/datahoarder that collect #OSINT at scale and often share it but they don't call it OSINT.

For example, here's a Ukraine mega-thread with a giant list of #UkraineRussianWar resources:

reddit.com/r/DataHoarder/…

🧵👇
🧵I was looking for some more general #OSINT resources that were open source and highlight valuable. I used this Reddit dork to filter down to find this:

subreddit:datahoarder url:github.com

I found hundreds of resources!

reddit.com/search/?q=subr…

🧵👇
One #OSINT resource that I found in this list is called Saveddit. Saveddit is a bulk media downloader for any subreddit. This can be helpful if you're dealing with subreddits that will likely be quarantined or banned soon.

github.com/p-ranav/savedd…

🧵👇
Read 5 tweets
Mar 24, 2021
#OSINT Tool Tuesday

Another week, another set of OSINT tools. This week we'll be looking at tools for OSINT investigations including effective screenshots for evidence capture, scraping pages with HAR files, and collecting OSINT from Google links.

jakecreps.com/osint-tool-tue…

(1/5)
The first #OSINT tool is called Flameshot and was introduced to me by @beige_hat. It's an advanced screenshot tool that allows you to edit captures on the fly, including my personal favorite - depixel.

flameshot.org

(2/5)
The second #OSINT tool is called HAR File Web Scraper from the people over at @stevesiedata. This is an excellent alternative to traditional web scraping. I learned a lot while using the tool. Check out their channel for more education.

stevesie.com/har-file-web-s…

(3/5)
Read 5 tweets
Feb 17, 2021
#OSINT Workflow Wednesday

Another week, another workflow. This week we’re going to look at how to make images for your sock puppet accounts that can beat deep fake and face swap checks as well as some bonus tips.

Let’s go!

(1/9) #OSINT Workflow Wednesday
Step 1: Download a GAN Images

We’re going to need a convincing GAN to get started. You can go to generated.photos or you can go to thispersondoesnotexist.com. Try to find a GAN that has a portrait view and doesn’t have glasses or a lot of facial hair (male).

(2/9)
Step 2: Remove Background from GAN

Go to remove.bg and remove the background from your GAN. We want to eliminate any noise that will prevent us from using this image in later steps.

(3/9)
Read 9 tweets
Feb 16, 2021
#OSINT Tool Tuesday 🚨

Another week, another set of tools. This week we’ll discuss deep fakes, YouTube geolocation search, and data extraction. This will be a good prep for the sock puppet edition of #OSINT Workflow Wednesday tomorrow.

Let’s go!

(1/5) Image
The first #OSINT tool is called Sensity. I heard about this through a tweet from @JaneLytv. This is a great tool for testing your sock puppet accounts to see if you can beat autodetection. More on that tomorrow for OSINT Workflow Wednesday.

platform.sensity.ai/deepfake-detec…

(2/5)
The second #OSINT tool is a geolocation search tool for YouTube videos. Simply input the location and radius, keywords, and timeframe in and see the results you’re looking for. Very useful for location-specific investigations and monitoring.

mattw.io/youtube-geofin…

(3/5)
Read 5 tweets
Feb 10, 2021
#OSINT Workflow Wednesday

Another week, another workflow. This week we’ll take a look at how to build a basic bookmarklet to automate OSINT searches using #javascript. This will be ground floor level stuff, don’t worry!

Let’s go!


(1/9)
Step 1: Create an option for input

Start a new #javascript file and create a variable to accept input for usernames. This will create a prompt when you click the bookmarklet which we'll use to automate our process.

var username = prompt("Enter a username: ");


(2/9)
Step 2: Plug that username into a URL

Create a new variable called fb and add the URL of the site you want to check. This will append the username to the end of the URL which is Facebook in this example.

var fb = "facebook.com" + username;

(3/9)
Read 10 tweets
Feb 9, 2021
#OSINT Tool Tuesday

Another week, another set of tools. This week is a low tech week but we'll look at data set search engines and what to look for, tools for identifying scams and typosquatting, and finally, #OSINT for Github.

Let's go!

(1/6)
The first #OSINT tool is Dataset Search by Google. I've been working with datasets a lot lately and stumbled across this. Try searching for things like "webcams" or "cctv" to see the depth of what types of data you can work with.

datasetsearch.research.google.com

(2/6)
The second #OSINT tool is called Registered Domain Names Search. It seems very basic; however, by searching for keyword only, you can find a ton of phishing prospects. They also have an API for extended results. Try searching for "facebook".

domainsdb.info

(3/6)
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(