OSINT and Sleuthing - Cause you retards LOOOOVE dawksing

  • 🐕 I am attempting to get the site runnning as fast as possible. If you are experiencing slow page load times, please report it.
BreachForums V2 (before original LEA takeover) - Includes most of the famous breaches, including KiwiFarms too
New BreachForums Databases - Recent databases after the LEA takeover, doesn't include current BF stuff

Thank you, this is appreciated. Unfortunately, accessing this requires me to enable javascript and cookies in tor browser. Since I do not yet trust these websites, I do not want to do that and open myself up to fingerprinting and malware vector. So I am afraid that this is not accessible for me.
 
These books are wonderful. Do you have any similar recommendations?
What I linked is all I know.
https://www.osint.industries/ - Costs but you get some seriously good results
I heard from another thread (which I can't find for the life of me, it was about a person named Claudia, who even joined the forum, doxing the owners of clearnet CSAM sites.) that you can allegedly replicate their results with sherlock, holehe, and ghunt. I haven't used ghunt, and probably never will use osint industries, so take that with a grain of salt.
 
I heard from another thread (which I can't find for the life of me, it was about a person named Claudia, who even joined the forum, doxing the owners of clearnet CSAM sites.) that you can allegedly replicate their results with sherlock, holehe, and ghunt. I haven't used ghunt, and probably never will use osint industries, so take that with a grain of salt.
It was yanked.


Pretty sure Silverstein Legal is behind the censoring as OSINT Guardian (https://archive.is/UfHvb) which is the original source has recently been mysteriously pulled from the Internet. However, a digital archive does remain. I'd quickly make a local copy just in case.

 
  • Informative
Reactions: Cowboy Kim
Not gonna bother replying directly because there's a lot but if you don't want to use a tool and just want to download the databases to grep through it yourself, here you go.

BreachForums V2 (before original LEA takeover) - Includes most of the famous breaches, including KiwiFarms too
New BreachForums Databases - Recent databases after the LEA takeover, doesn't include current BF stuff

I had a list of torrent links to like 100+ other breaches like Naz.API, Collections and Antipublic but can't find it right now, i'll update this later if I do
thanks for sharing, i'll add the magnet torrents if you don't mind.
(104GB - eMail+pass)   Naz.API:
magnet:?xt=urn:btih:bcaa3b8a2371b4367bbfbdb29318beb739808c5b
(400GB - eMail+pass)  Collection #1-#5, Antipublic, Ap Myr, Zabugor:
magnet:?xt=urn:btih:5b98230857e95768693f566f0f6429b15f0e0119

have fun!
 
thanks for sharing, i'll add the magnet torrents if you don't mind.
(104GB - eMail+pass)   Naz.API:
magnet:?xt=urn:btih:bcaa3b8a2371b4367bbfbdb29318beb739808c5b
(400GB - eMail+pass)  Collection #1-#5, Antipublic, Ap Myr, Zabugor:
magnet:?xt=urn:btih:5b98230857e95768693f566f0f6429b15f0e0119

have fun!
Awesome, appreciate it.
 
  • Like
Reactions: freund
thanks for sharing, i'll add the magnet torrents if you don't mind.
(104GB - eMail+pass)   Naz.API:
magnet:?xt=urn:btih:bcaa3b8a2371b4367bbfbdb29318beb739808c5b
(400GB - eMail+pass)  Collection #1-#5, Antipublic, Ap Myr, Zabugor:
magnet:?xt=urn:btih:5b98230857e95768693f566f0f6429b15f0e0119

have fun!
Thanks, will seed once I get more disks.
 
  • Like
Reactions: freund
I have the recent SSN leak from National Public Data saved. Not sure how I would go about hosting it anywhere, but if anyone here knows a good spot, let me know. I have it on MEGA and on a private server but I'm obviously not interested in losing access to either due to TOS. If anyone know where to get info stealer logs in bulk (aside from NazAPI) I'd love to hear about it :)
 
I have the recent SSN leak from National Public Data saved. Not sure how I would go about hosting it anywhere, but if anyone here knows a good spot, let me know. I have it on MEGA and on a private server but I'm obviously not interested in losing access to either due to TOS. If anyone know where to get info stealer logs in bulk (aside from NazAPI) I'd love to hear about it :)
Make a torrent on the I2P network if you want to maintain anonymity. The official implementation comes with a minimal torrent client bundled with it, so it is very easy: https://geti2p.net/
 
Since lolcows are kinda retarded, finding all their info only requires a basic knowledge of OSINT to completely dawks them.
true in most cases but some threads still contain a lot of useful information regarding OSINT and their techniques, it's just that you'll have to actively search it out.
take stylometry for example, something that in my opinion deserves a discussion because it has been successfully applied to determine authorship on DarkNetMarkets. there have been some insightful posts on the topic throughout the years like:
The Real Slim Shady's application of Stylometry
grand larsony discussion and critique of Stylometry
i know that my post doesn't change anything about the situation Uncle Ted's Cabin but don't be discouraged if this official thread for OSINT doesn't have more participants or content. If you have topics you're curious about, search for the terms and you'll likely find high quality posts!
 
Honestly the forum should have a page of OSINT tools with input fields so it more widely available to fellow Kiwis. The template michael barbell has is pretty good, maybe hire some Chinese code farm on Fiverr for it then give it to Null so he can add it to the site.
With what's been going on lately we should probably start building our own internal infrastructure as a community.
 
Honestly the forum should have a page of OSINT tools with input fields so it more widely available to fellow Kiwis. The template michael barbell has is pretty good, maybe hire some Chinese code farm on Fiverr for it then give it to Null so he can add it to the site.
With what's been going on lately we should probably start building our own internal infrastructure as a community.

OSINT that isn't coureseware and the basic bitch "google their email address" stuff comes down to the cutting edge tools and private or quasi-private databases. What do people do with information? Exposure but also you have to consider becoming a nexus for extortion or blackmail.
 
Not sure how well-known this is but a lot of states have completely public voter registration records. Sites like this aggregate millions of records, searchable with just the target's first and last name. More states have slightly less public records, they may need name and DOB and/or phone number for example. Pretty ironic we get flak for daaawwksing lol cows when millions of American's home addresses are made public by their own state government.
 
Back