The Chinese are at it again..(aliexpress) its an rj45 adapter, but with SPI flash memory chip acting as storage with .exe recognized as malware for windows, and of course sold over 10k times... 🤦♀️
Your long awaited exe, its injecting code into processes, evading virtual machines, modifying proxy settings, extracting keystrokes, and using Russian-language elements to obscure its origin or intent. ENJOY malware analysts
Large storage on the flash memoryhybrid-analysis.com/sample/e3f57d5…
GEOINT / OSINT (🎃🧵🔎) 1. You probably didn't know this but you can create your own custom maps here, why this is interesting, because custom means unique information that can be useful for OSINT and GEOINT investigations.
2. What you can also do is as any good OSINT practice to combine different tools and sources together, like Shodan or other interactive maps to get better insights. Simply search for "site:google.com inurl:maps intext:"was made with Google My Maps"" query.
3. You can modify the query with keywords, some maps include tracks, some include markings of specific devices like CCTV in this example. (Excluding verification at the moment) this is just all hypothetically, really helpful, on top of other tools, depending on the investigation.
How to properly utilize git-sites for OSINT Investigations and research - My guide with tips and tricks (a 🧵) 🔎
1. Not all github.io instances are publicly indexed by search engines, one way to find interesting tools developed for OSINT is to utilize dorks and queries
site:*.github.io + "osint" OR "tool" OR "search engine" OR anything else you're looking for.
2. About dorks and queries : setting a specific timeline is also good approach, as it shows recent stuff.