Posts

Showing posts from December, 2025

From Local Code to PyPI: Publishing My First Tool

Image
In my previous post , I shared the story of building my first OSINT tool — UserRecon . In this post, I want to share something equally important: how I published this tool on PyPI , and why that journey felt like a tragedy-based comedy . “What Should I Do Next?” As soon as I finished building the tool, I did what most of us do nowadays. I opened ChatGPT and asked: “I have made this tool. What should I do next?” The answer was simple: “Publish it on GitHub.” So I did exactly that. Then I asked again: “I also want to publish it on the apt store. Give me step-by-step guidance.” After reading the response, I realised something important. Publishing on apt would be too heavy for me right now . For a beginner, PyPI was a much better starting point . And that’s how my PyPI journey began. Tragedy + Comedy = PyPI The first step was extremely simple: Sign up on pypi.org The real journey started after that. Before anything else, I needed to understand the project structure required ...

From OSINT Theory to Building My First Tool

Image
I recently finished documenting my learning of OSINT in a series of posts. But honestly? I was not satisfied. Most of what I had written felt like theory dumps — definitions, lists of tools, and what each tool does. Useful, yes… but something was missing. It didn’t feel like engineering. And then I realised something: Knowing tools is not the same as building something. So, to satisfy the engineer inside me, I decided to do something different. The Turning Point I opened ChatGPT and asked a simple question: “What OSINT tools can I make as a beginner?” I got a list of ideas. I read through them, picked one, and decided: this is the one I’m going to build. But choosing the tool was only the beginning. The next question naturally followed: “What do I need to learn to build this tool? Give me a day-to-day learning plan.” And honestly — that response changed everything. Learning What Was Actually Needed ChatGPT suggested: Python basics (loops, conditionals, functions, recursion...

Network & Domain OSINT – Final OSINT Post ( Part 7)

Image
Network OSINT: Mapping the Digital Infrastructure Network OSINT is the discipline of collecting, analyzing, and leveraging information about networks, domains, and internet-facing assets using publicly available sources. Unlike People or Social Media OSINT, this area feels more technical and closer to real cybersecurity work , which is why it plays an important role in vulnerability research and bug bounty hunting. Why Network OSINT Matters Network OSINT helps us understand: how an organization is exposed on the internet what services are running publicly how different assets are connected This information is often the starting point for deeper security testing . Common Tools Used in Network OSINT Search & Reconnaissance These tools help discover publicly indexed assets: Google Dorking Used to find exposed files, directories, login pages, and misconfigurations indexed by search engines. Shodan A search engine for internet-connected devices. It reveals open ports, ...

GEOINT: Seeing the World Through Coordinates (Part 6)

Image
 In our previous post we discussed about Video OSINT . In this blog we will discuss about GEOINT.

Video OSINT: Extracting Truth from Moving Frames (Part 5)

Image
In the previous post, we discussed Image OSINT . In this one, we’ll move a step further and look at Video OSINT . What is Video OSINT? Video OSINT is the process of extracting intelligence from video content. Unlike images, videos provide movement, sound, and time , which makes them extremely powerful — and sometimes dangerous if misinterpreted. Through video OSINT, we try to answer questions like: Geolocation: Where was the video recorded? Chronolocation: When was it recorded? Person Identification: Who appears in the video? Context Analysis: What is actually happening? Authentication: Is the video real or manipulated? Metadata Extraction Before watching the video closely, always check its metadata. Essential Tools ExifTool – full metadata extraction MediaInfo – technical specifications (codec, bitrate, duration) Online EXIF viewers – quick web-based checks FFmpeg – frame extraction and deep analysis Key Metadata Fields to Review Creation date...

Image OSINT: Finding Clues Hidden in Plain Sight (Part 4)

Image
In the previous post, we discussed Social Media OSINT . In this one, I’ll share what I’ve been learning about Image OSINT . What is Image OSINT? Image OSINT involves extracting intelligence from images to gather information about: people locations activities context Image OSINT is less about tools and more about observational thinking . You’ve probably seen this in detective movies — someone zooms into a photo to notice a building in the background, a shop name, a ring on a finger, or unfamiliar people standing nearby. Those tiny details often tell a bigger story. What to Look for in an Image Before touching any tool, look at the image carefully: Background landmarks (buildings, parks, shops) Clothing, accessories, rings (social or cultural hints) Other people in the frame (friends, family, patterns) Time of day, lighting, shadows Sometimes, just looking closely already gives useful clues. Tools That Go Beyond Zooming Some tools can reveal information that ...

Social Media OSINT: Platforms, Process, and Ethics ( Part 3)

Image
 In my previous blog, I have written about People OSINT  . Hope you found it useful. Social Media OSINT is one of the most powerful and accessible forms of digital investigation. It involves collecting and analyzing available information from social media platforms to  build profiles understand connections  uncover insights 

People OSINT: Finding Information Ethically (Part 2)

Image
Disclaimer: All the tools and methods discussed in this blog are part of what I am learning in a   safe and legal environment . This content is strictly for   educational purposes only   and is not intended to harm any individual or organization.   In our previous post, we discussed about fundamental of OSINT .  From this post onwards, we will be begin applying those ideas- starting with People OSINT.

OSINT Basics: Introduction, Scope, and Ethical Boundaries (Part 1)

Image
Disclaimer: All the tools and methods discussed in this blog are part of what I am learning in a safe and legal environment . This content is strictly for educational purposes only and is not intended to harm any individual or organization. Even though we all know that theoretical knowledge alone is not enough, most of my learning so far has been on the theory side. From now on, I’ll try to balance both theory and practical understanding — slowly and responsibly. That brings us to today’s topic: OSINT . What is OSINT? OSINT stands for Open Source Intelligence . As the name suggests, it is about gathering information from publicly available sources such as: the internet social media news articles public records OSINT has nothing to do with hacking . It focuses on collecting and analyzing information that is already exposed — often unintentionally. Why OSINT matters in cybersecurity OSINT helps us understand the human attack surface , which is often the weakest link in sec...

Cybersecurity devices and technologies - Part 2

Image
Firewall: A firewall is like a security guard 💂🏻‍♀️ standing at the gate of your device or network. It decides which communication is allowed and which should be blocked. Firewalls come in different types, depending on how deep they inspect traffic. 1. Network Layer Firewall (Layer 3) This firewall works at the Network Layer of the OSI model. It filters traffic based on packet headers — mainly IP addresses, ports, and protocols . Limitation: It cannot see what is inside the packet. So if a packet contains malware or harmful data, this firewall cannot detect it. It only sees the envelope, not the letter inside. 2. Transport Layer Firewall (Layer 4) Also called a Layer 4 firewall , it filters based on information in the transport layer — especially TCP/UDP ports and connection states . Primary Functions: • Port Filtering: Allows or blocks traffic to specific ports. • Stateful Inspection: Tracks active connections to ensure incoming packets belong to legitimate sessions. • TCP...