Blog

Open Source Intelligence(OSINT): Scraping Cryptocurrency Wallet Addresses and Balances

Welcome back, my aspiring OSINT investigators! With the growth of the cryptocurrency market in recent years, has come the growth of cryptocurrency scams and thefts. As a result, there is tremendous demand for investigators conversant in crypto investigations. This is the first of many posts on how to investigate cryptocurrencies from an OSINT perspective.   In […]

Continue Reading

Command & Control Series Part III (Installing your Redirector)

In the dynamic landscape of cybersecurity operations, the use of Command and Control (C2) servers stands as a critical component for orchestrating coordinated tasks across compromised systems. However, directly interacting with a C2 can often leave an operator exposed to detection and countermeasures. This is where the strategic implementation of a redirector plays a pivotal […]

Continue Reading