(OSINT) workstation
ARGOS – The script will automatically configure an Open Source Workstation (OSINT) starting with a clean Ubuntu* 20.4 VM/Workstation.
Best practices recommend using a new VM for each OSInt investigation.
There are several ready-made VMs available on the Internet, such as Michael’s Bazzell Open Source Intelligence Techniques – 7th Edition (2019), about creating your own custom VM.
This script will setup the workstation by installing mostly of the scripts suggested by Michael and more and more other tools will be added in the future.
Tools included at OSINT workstation:
- Amass
- instaloader
- InstaLooter
- HTTrack
- MediaInfo
- ExifTool
- EyeWitness
- sublist3r
- Photon
- The Harvester
- Metagoofil
- recon-ng
- sherlock
- spiderfoot
- Elasticsearch-Crawler
- Ripgrep
- holehe
- kali-anonstealth
- Moriarty-Project V2.6
- maigret
- Maltego
- and more!
General Purpose tools:
- VLC
- Google Earth
- wget
- cherrytree
- Atom
- KeepassXC
- Kazam
- Audacity
- Ripgrep
- Tor Browser
- OpenShot
- Obisidian Please refer to this article 1
- Threat Intelligence Resources Please refer to those articles 1 and 2
- and more!
Happy OSINTing!
https://github.com/SOsintOps/Argos
Subscribe to our channel and do not miss new collections of tools in various areas of Information Security.
Posted by: @ESPYER
The improvement of cyber-security and threat intelligence capabilities is the primary function of Cyberint’s ARGOS platform in the field of Open Source Intelligence (OSINT). By offering capabilities like a forensic canvas for assessing entities and threat actors, intelligence on risks and vulnerabilities, dashboard and report production, and more, it helps businesses protect themselves against cyber threats. Argos’s comprehensive platform for obtaining open source information (OSINT) can assist organisations in improving their threat intelligence, operational efficiency, security posture, and cost savings.
Cyber-security intelligence
Open-source intelligence (OSINT) is the process of gathering intelligence from publicly accessible sources. Its ability to highlight potential threats and weaknesses accounts for its value in cyber-security. This facilitates the development of defensive preventative tactics.