Inevitable Death.
OSINT Repos List, Repository with gathered from GitHub utilities for OSINT, Development and DevOps. The number of artifacts in the repository exceeded 2700: https://github.com/bormaxi8080/osint-repos-list
OSINT Tools, Services and Investigations:
Telerecon is a comprehensive OSINT reconnaissance framework for researching, investigating, and scraping Telegram. For example: Input a target username, and Telerecon efficiently crawls across multiple chats gathering profile metadata, account activity, user messages, extracting potential selectors, ideological indicators, identifying named entities, indicators of capability and violent intent, constructing a network map of possible associates, and a EXIF metadata geo-map, amongst various other analytics: https://github.com/sockysec/Telerecon
DMitry (Deepmagic Information Gathering Tool) is a UNIX/(GNU)Linux Command Line program coded purely in C with the ability to gather as much information as possible about a host: https://github.com/jaygreig86/dmitry
Tracecat. Open source Tines / Splunk SOAR alternative. All-in-one automation platform (workflows, tables, cases) for security and IT teams: https://github.com/TracecatHQ/tracecat
Subdosec is a fast, accurate subdomain takeover scanner with no false positives. It also offers a database of sites vulnerable to subdomain takeover (public results), along with detailed metadata like IP, CNAME, TITLE, and STATUS CODE for reconnaissance to identify potential new vulnerabilities: https://github.com/xcapri/subdosec
Browser Chrome extensions, to help with OSINT, OPSEC, Privacy & Obfuscation: https://github.com/The-Osint-Toolbox/OSINT-Browser-Extensions
Universal Search & AI:
Vexa AI. Self-hosted, multi-user API that drops bots into Google Meet for real-time transcripts: https://github.com/Vexa-ai/vexa
Vert. The next-generation file converter. Open source, fully local* and free forever: https://github.com/VERT-sh/vert
Software Development & APIs:
pythontk is a collection of backend utilities for Python: https://github.com/m3trik/pythontk
Prompt2Flutter. Transform text into fully functional Flutter applications using AI: https://github.com/filippofinke/Prompt2Flutter
Linux & DevOps:
Promxy is a prometheus proxy that makes many shards of prometheus appear as a single API endpoint to the user. This significantly simplifies operations and use of prometheus at scale (when you have more than one prometheus host). Promxy delivers this unified access endpoint without requiring any sidecars, custom-builds, or other changes to your prometheus infrastructure: https://github.com/jacksontj/promxy
RouterSploit - Exploitation Framework for Embedded Devices: https://github.com/threat9/routersploit
WayPoint. A fast, lightweight URL mapping and redirection system that dynamically manages URL shortcuts through YAML configuration files. Perfect for creating and managing custom URL shorteners for internal tools, documentation, or any web resources: https://github.com/NishantJoshi00/waypoint
ClickVisual. A lightweight log analytic and data visualize platform built on Clickhouse: https://github.com/clickvisual/clickvisual
Flipper Zero & Other Devices:
DTMF (Dual-Tone Multi-Frequency) dialer, Bluebox, and Redbox: https://github.com/litui/dtmf_dolphin
Mitsubishi Electric AC remote control for Flipper Zero: https://github.com/achistyakov/flipperzero-mitsubishi-ac-remote
New from CyberDetective:
OnionLand. Darknet search engine (work in simple browser) + a series of article-guides on using Tor and other methods to access the .onion domain zone:
https://onionland.io/
PageCached. A simple and free online service for finding old versions of web pages in search engine caches and web archives:
https://pagecached.com/
VK WATCH. Face photo search tool for the VK social network (over a billion profiles worldwide):
https://vk.watch/
(don't pay to view profiles, just copy ID from VKwatch's URL and open profile by ID in VK)
New from GitHub Community:
GitHub topics for Telegram Channels Scraping: https://github.com/topics/telegram-channel-scraper
bormaxi8080 OSINT timeline:
GitHub: https://github.com/bormaxi8080/osint-timeline
You can see Systematized List of my GitHub Starred OSINT Repositories
You can contact me on SubStack:
If you like the projects that I do, I will be grateful for donations in private dialogue.
WARNING! All tools, programs and techniques published in this article and repository are used for informational, educational purposes or for information security purposes. The authors are not responsible for the activities that users of these tools and techniques may carry out, and urge them not to use them to carry out harmful or destructive activities directed against other users or groups on the Internet.



