#OSINT: Domain Scanning and Website Owner Identification
NB:// Blurring out parts in the videos is just an ethical approach to demonstrate without exposing the owner's details. However, performing a domain scan is legal since this information is required to be made public. Be mindful of the details you provide when registering domains.
About the Demo:
Discovering details associated with a target's domain serves as a quick means to pinpoint the owner of a website project based on the domain's associated information. Additionally, it involves checking for other domains linked to the initial domain's email. This is done in order to later gather personally identifiable information (PII) through social engineering of clients of the registrar, who in most cases is the developer.
6
views
How Easy It is To Steal Cars with SARA
SARA short for Signal Amplification Relay Attack is one of the easiest and inexpensive means in which car thieves use to steal cars equiped with keyless system.
Equipments used are usually purchased in black markets as well as online. This equipments Comprises of a set of two devices; an antenna amplifier transmitter(the one in demo held near the door), and a relay receiver(the one by the individual near the car).
When the antenna picks up the radio signal from key fob(the remote car starter –small electronic device with small buttons that you see car owners use to for example open doors), it amplifies it and sends it to the relay device held near the car, that way, that car is fooled into thinking that the key fob is present and the thieves gain full control of the car and drive away.
Random tips:
- Install GPS tracking devices on your vehicle.
- Install an ignition kill switch.
- Avoid leaving personal items with e.g PII info on your cars.
- Park your car in a protected area of possible.
10
views
How to Install PHP in Windows
This a step-by-step process of how to download, install, add environment variables and check the current version of the install #php version on #windows operating system.
TIMESTAMPS
0:00 How to correctly download PHP in Windows
0:47 Extracting & Installing PHP in Windows
1:44 Adding PHP to Environment Variables in Windows
2:30 How to check the PHP version installed in Windows
3
views
Optimus humanoid robot sorting objects autonomously
Optimus, tesla's general purpose humanoid robot is now fully capable of sorting objects.
Its neural network is trained fully E2E: video in, controls out.
#teslabot #ai #optimus #elonmusk #tesla
3
views
Automatically turn still images into seemless looping videos with one click
[Generative Image Dynamics] 📄
Researchers at Google have devised a technique that facilitates the transformation of static images into dynamic videos with a smooth transition, allowing for realistic interaction with objects within still pictures.
Paper: https://arxiv.org/abs/2309.07906
Try it out: https://generative-dynamics.github.io/#demo
4
views
Discussing Home Computers in the 80s
The 1980s laid the foundation for the widespread adoption of home computers and set the stage for the digital #revolution that would follow. The advancements made during this era paved the way for the personal #computing landscape you and I are familiar with today.
In the video:
Professor Joseph Weizenbaum[https://en.wikipedia.org/wiki/Joseph_Weizenbaum]
Professor Michael Dertouzos[https://en.wikipedia.org/wiki/Michael_Dertouzos]
3
views
AI-Powered Photoshop: Elevating Editing to New Heights and Securing back the Top Spot!
Adobe's new AI-enhanced Photoshop beta is out with a notable feature being the #GenerativeFill - a magical new tool that enables you to add, extend, or remove content from your images with simple text prompts. Alot of new features still in the process of integration. Check them out.
5
views
OSINT: The ICIJ Offshore Leaks Database
OFFSHORE LEAKS DATABASE: Discover information on more than 810,000 #offshore entities that are part of the Pandora Papers, Paradise Papers, Bahamas Leaks, Panama Papers and Offshore #Leaks investigations.
About: https://offshoreleaks.icij.org/pages/database
283
views
Official WhatsApp rolls out additional privacy feature🔐
Official WhatsApp has rolled out a feature to hide specific conversations within the app(no message previews, sender ID hidden) by use of already integrated password protection to prevent your messages from being accessed by anyone.
4
views
Handle hijacking on windows | Handle ripper
Link to tool ⚙ https://github.com/ZeroMemoryEx/Handle-Ripper
2
views
How to Install Windows Sandbox
Windows Sandbox provides a secure and disposable environment completely separate from your host OS, making it ideal for testing or experimenting with new software or files without risking damage to your system.
Before trying to install it make sure you have the following:
(i) #Windows 10 or a greater version excluding the Home edition.
(ii) A 64-bit processor machine.
(iii) Virtualization enabled (You can do it via BIOS - restart your machine while pressing F2 key multiple times to enter into BIOS and head over to the feature's settings)
(iv) Adequate system resources (at least 4GB RAM & 1 GB worth of free space)
Give it a try!
1
view
How to Install 'enable' Windows Sandbox
Windows sandbox provides you with a secure and disposable environment that is completely separate from your host OS, which makes it ideal for testing or experimenting with new software or files without risking damage to your system.
Before trying to install it, make sure you have:
(i) #Windows version greater than or equal to Win 10 excluding the Home edition.
(ii) At least a 64-bit processor machine.
(iii) Virtualization enabled(you can do this on BIOS if you haven't already - simply restart your machine while pressing Esc key to enter into bios and look for the option).
(iv) At least 4 GB of RAM and adequate storage(1 GB + )
Give it a try!
3
views
WhatsApp account Takeover Prevention Feature #privacy #shorts
WhatsApp has released a new account verification feature "#DeviceVerification" that ensures that malware running on a user's mobile device doesn't impact their account.