background preloader

Toolset

Facebook Twitter

You searched for technology | Life of Pix. Life Of Pix is a community who shares free high-resolution photos with no Copyrights restrictions. Photos are for personal & commercial use. We post new photographies every week ! All images are donated to the public domain by our community. Subscribe to our newsletter to get notifications. Register to Life of Pix Log in to Life of Pix Forgot your password ? Forgot your password? Add location One or more pictures were removed because they were too small Each picture needs to be at least 1MB in size.

Maximum number of uploads reached. One or more pictures were removed because they were too big Each picture needs to be at most 25MB in size. Your picture details were saved. Upload your photos Upload more photos Or drag and drop your photos in this section We accept JPG format in high resolution, files between 1 Mo and 25 Mo. Add a location Type a tag and press Enter to add a tag Press backspace to remove a tag Generate tags Save this picture Uploading in progress . . . Filter by All category All colors. Geo Locations Tool. Find current location on Google Maps Feeling lost? Not sure where you are at preset? The `Where Am I` app shows your current geograph location, including latitude and longitude, on Google Maps. The geolocation service is available on both desktop computers and mobile phones. The location finder service uses the Google Maps Geolocation API to determine the place.

Postal Address with Reverse Lookup The app uses Reverse geocoding to determine the postal address from your current latitude and longitudecoordinates. The geocoder reveals your postal code, country, state, city, suburb and street name. How to Give Location Access You need to give Google Maps permission to access your location through the Geolocation API of the browser. In Windows, go to the Action Center and toggle the Location icon. Geolocation API The `Where Am I` app uses HTML5 geolocation API to find your current position. Youtube_dl. Where Does This Link Go? VLC for MAC - Screen Recording. Devices and Mac OS X version VLC media player requires Mac OS X 10.7.5 or later. It runs on any Mac with a 64-bit Intel processor or an Apple Silicon chip. Previous devices are supported by older releases.Note that the first generation of Intel-based Macs equipped with Core Solo or Core Duo processors is no longer supported.

Please use version 2.0.10 linked below. If you need help in finding the correct package matching your Mac's processor architecture, please see this official support document by Apple. Web browser plugin for Mac OS X Support for NPAPI plugins was removed from all modern web browsers, so VLC's plugin is no longer maintained. Older versions of Mac OS X and VLC media player We provide older releases for users who wish to deploy our software on legacy releases of Mac OS X. Mac OS X 10.6 Snow Leopard Use VLC 2.2.8.

Mac OS X 10.5 Leopard Use VLC 2.0.10. Mac OS X 10.4 Tiger Mac OS X 10.4.7 or later is required Use VLC 0.9.10. Mac OS X 10.3 Panther Use VLC 0.8.6i. Use VLC 0.8.4a. Twint. No authentication. No API. No limits. Twint is an advanced Twitter scraping tool written in Python that allows for scraping Tweets from Twitter profiles without using Twitter's API. Twint utilizes Twitter's search operators to let you scrape Tweets from specific users, scrape Tweets relating to certain topics, hashtags & trends, or sort out sensitive information from Tweets like e-mail and phone numbers. I find this very useful, and you can get really creative with it too. Twint also makes special queries to Twitter allowing you to also scrape a Twitter user's followers, Tweets a user has liked, and who they follow without any authentication, API, Selenium, or browser emulation. tl;dr Benefits Some of the benefits of using Twint vs Twitter API: Can fetch almost all Tweets (Twitter API limits to last 3200 Tweets only);Fast initial setup;Can be used anonymously and without Twitter sign up;No rate limitations.

Limits imposed by Twitter Twitter limits scrolls while browsing the user timeline. Git: Twelvesec/gasmask. Timeline Knightlab. Socialscan. Socialscan offers accurate and fast checks for email address and username usage on online platforms. Given an email address or username, socialscan returns whether it is available, taken or invalid on online platforms. Features that differentiate socialscan from similar tools (e.g. knowem.com, Namechk, and Sherlock): 100% accuracy: socialscan's query method eliminates the false positives and negatives that often occur in similar tools, ensuring that results are always accurate.Speed: socialscan uses asyncio along with aiohttp to conduct all queries concurrently, providing fast searches even with bulk queries involving hundreds of usernames and email addresses. On a test computer with average specs and Internet speed, 100 queries were executed in ~4 seconds.Library / CLI: socialscan can be executed through a CLI, or imported as a Python library to be used with existing code.Email support: socialscan supports queries for both email addresses and usernames.

Background Installation pip Usage. Setting up a "Testing Lab" of iOS and Android devices - D20 Forensics. After a student of mine recently "gently" reminded me that I hadn't updated my blog in over a year, I decided that it was time to get back into it! Whoops! So I figured I would ease myself back in with something that I've been thinking about for a while and needed to update on. In this post, I'm going to detail how to pick a couple of iOS and Android devices to build yourself a good testing lab. Disclaimer: I'm not building exploits, and I'm not testing them.

It's also important to realize that whether you're testing system-level artifacts or third-party applications, you want to grab data in a number of different ways. For my testing lab, I usually like to have a bank of four devices. Take a Byte! Let's start with everyone's favorite (or least favorite) fruit-named company, Apple. iOS is a huge leader in popularity, at least here in North America. Exploitable iOS Device: Option 1: iPhone 8/iPhone X Option 2: iPad 7th Generation (2019) Model But why an iPad? Non-Exploitable Devices iOS Setup: Securing/DumpsterDiver. Digital Corpora Downloads: corpora/scenarios/ Redditsfinder. Project description pip3 install redditsfinder A program to get reddit user post data.

Test it on a user to make sure it works. redditsfinder someusername Basic usage redditsfinder username redditsfinder [options] username_0 username_1 username_2 ... With an input file -f or --file. redditsfinder [options] -f line_separated_text_file.txt Examples - just print the summary table to stdout $ redditsfinder someusername - save data locally and print the summary table to stdout $ redditsfinder --write someusername - just save data locally without printing $ redditsfinder --write --quiet someusername - download pictures $ redditsfinder --pics someusername Optional args --pics returns URLs of image uploads -pics -d or --pics --download downloads them -quiet or -q turns off printing Download files Download the file for your platform.

Source Distribution Built Distribution. Pricing. Photon. Part 3: Step-by-step Tooling for iOS Research - mac4n6.com. This guide will help you setup your iDevice with two binaries that can greatly assist with targeted testing and analysis. My goal is to equip you to do your own research and testing to confidently answer the questions you will surely have as you learn this beautiful dance we call DFIR. If you currently rely on a commercial tool to extract your iDevice data and then parse the data for you, that is totally normal and this article is absolutely for YOU! Years ago, @iamevltwin broke my thought process on how to address mobile devices. My training and education up to that point was great, and I knew a LOT about mobile devices and strategies for finding the evidence I was looking for.

To summarize what we are about to do: 1. **If you are reading this, please make sure you have read and followed the instructions for Part 1 and Part 2 . I have both binaries you will need already made and entitled, trying to make this process as easy as possible to get you setup for testing! 1. 2. Part 2: Step-by-step iPhone Setup for iOS Research - mac4n6.com. This is a follow-on to the previous post showing how to setup your Mac for iOS testing. If you haven’t read over that one - this article draws assumptions that your Mac is setup in a certain way, or that you know what you’re doing otherwise. Feel free to go read that first, I’ll wait.. Alright, now that we are all on the same page, let’s tackle the second piece and get your iPhone setup for research and testing. This guide will be very similar to the last in its simplicity, with the assumption that you are not a command line expert.

But before we move on, let me repeat - THIS IS FOR RESEARCH AND TESTING. Please don’t read this and think it is a great idea to jailbreak, load binaries onto, or otherwise press a bunch of buttons on evidentiary devices in criminal cases, or devices being inspected for civil or corporate investigations. You will need to have setup your iOS device with an AppleID and general account stuff before you can start this process. This is not hacking. Part 1: Step-by-step macOS Setup for iOS Research - mac4n6.com. Command line interface (CLI) isn’t for everyone. Trust me; I get it. @iamevltwin forced me out of my comfort zone a few years ago and opened my eyes to the power of Terminal (command prompt on Mac). Now it is pinned to the Dock on every Mac I use, but I still struggle at times and that is okay! The internet provides plenty of support to help me along when I just can’t make something work. I use and abuse my Notes application with random commands and ways to accomplish certain tasks in Terminal that I know I will want to recall sometime in the future.

I recently bought a new MacBook Pro and the thing is a beast, but as soon as Apple setup was completed I started installing things to set it up for mobile testing. DISCLAIMER. 1. What: We are going to use it but you don’t have to understand everything we are doing to still achieve the desired outcome. How: Online converter - convert video, images, audio and documents for free. MVS 2020 CTF. MUS 2019 CTF. MiniPaint. Maldevel/EmailHarvester. m4ll0k/Infoga. Listly  |  Web to Excel - Fully-automated Web Scraping. LinkedIn Scraper. Laramies/theHarvester. Laramies/metagoofil. iOS 14 + macOS Big Sur = Lots of Images – The Binary Hick. It has taken a while, but I’m happy to announce an iOS 14 image with documentation is now publically available for download.

This image contains forty-two (42) third party apps. The list includes the same apps as my iOS 13 images, but with some noteable additions: Garmin, GroupMe, Microsoft Teams, Slack, and Threema. Health data was also generated for this image using an AppleWatch, Fitbit Versa 3, and a Garmin Forerunner 35. Stock iOS apps were also populated with data. For a complete app listing, please see the documentation. The extraction comes as a .tar file, but, if the tool you are using can not ingest a .tar file, 7-Zip can be used in a Windows environment to extract the content for a manual examination.

There is also an accociated encrypted iTunes backup (password is in the documentation), and set of SysDiagnose logs for the device. There is an accompanying macOS Big Sur image, which used the same iCloud account as the iOS device. There are two additional images. Enjoy! Like this: Digital Corpora Downloads: corpora/mobile/ios_13_4_1/ Digital Corpora Downloads: corpora/mobile/ios_13_3_1/ Instalooter. Project description Not all treasure’s silver and gold, mate. InstaLooter is a program that can download any picture or video associated from an Instagram profile, without any API access.

It can be seen as a re-implementation of the now deprecated InstaRaider developed by @akurtovic. v1.0.0 was completely rewrote from scratch, and as such, will probably break compatibility with your homemade scripts. Meanwhile, great care was taken to keep the CLI as consistent as possible with the previous versions, so it’ll hopefully feel like home. Installation InstaLooter is available on PyPI to install with pip. Pip install --user instalooter --pre Usage instalooter comes with its CLI: $ instalooter user <username> [<directory>] [options] $ instalooter hashtag <hashtag> [<directory>] [options] $ instalooter post <post_token> [<directory>] [options] $ instalooter batch [<batch_file>] See instalooter --usage for all possible uses, or instalooter --help for a complete usage guide.

Logging in and out Examples. Instaloader. How to Automatically Download Pictures from Instagram To download all pictures and videos of a profile, as well as the profile picture, do instaloader profile [profile ...] where profile is the name of a profile you want to download. Instead of only one profile, you may also specify a list of profiles. To later update your local copy of that profiles, you may run instaloader --fast-update profile [profile ...] If --fast-update is given, Instaloader stops when arriving at the first already-downloaded picture. Alternatively, you can use --latest-stamps to have Instaloader store the time each profile was last downloaded and only download newer media: instaloader --latest-stamps -- profile [profile ...] With this option it’s possible to move or delete downloaded media and still keep the archive updated. When updating profiles, Instaloader automatically detects profile name changes and renames the target directory accordingly.

Instaloader can also be used to download private profiles. Supporters. Holehe. Hashkiller.io. h8mail. Project description Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamous Breached Compilation torrent Free software: BSD license Features Email pattern matching (reg exp), useful for reading from other tool outputsLoosey patterns for local searchs (“john.smith”, “evilcorp”)Painless install. Download files Download the file for your platform. Source Distribution Built Distribution. Colaboratory. Utkusen/shotlooter: a recon tool that finds sensitive data inside the screenshots uploaded to prnt.sc. SpiderLabs/HostHunter: HostHunter a recon tool for discovering hostnames using OSINT techniques.

Mxrch/darkshot: Lightshot scraper on steroids with OCR. Free Fax • Online Fax Service. FortyNorthSecurity/EyeWitness. Firefox Send. Feeder RSS Feeds. EmailHarvester. EmailHarvester [! [Codacy Badge]( * A tool to retrieve Domain email addresses from Search Engines * Check the [License]( This project was inspired by:* theHarvester( from laramies.* search_email_collector( from Carlos Perez. Requirements============* Python 3.x* termcolor* colorama* requests* validators Installation=====================Using pip (Preferd method) :----------------------------...pip install EmailHarvester... Using git :-----------...git clone EmailHarvestercd EmailHarvesterpython setup.py install... Elceef/dnstwist. Digital Forensic Challenge Images (Datasets) - Ali Hadi.

Datalux/Osintgram. Currency Converter. Crowdfire. Cometdocs File Converter. Convert Excel to Word and more. Challenges/CTFs - AboutDFIR. Case 001 - The Stolen Szechuan Sauce - DFIR Madness. Camstudio.org/ - Desktop Recording. Bulk-extractor. Build Your Own Methodology (In Mobile Forensics) - Mattia Epifani. Android 7-10 - Digital Corpora. Android 11 - TheBinaryHick. Amass. Aboul3la/Sublist3r.