I love the vid with the bloopers and an explanation afterwards, more vids like these is what is needed for us and we enjoy your human side more, thanks a million.
I also want to say thank you for being authentic. Most videos, training materials, simulations, etc edit out anything but perfection. Sometimes you know what you need to do but its something simple holding you back. While there is value in struggling and figuring something out, spending extended time on syntax issue or something small is a waste.
this video got recommended to me in the sidebar. i know almost nothing about coding or python. I sometimes watch defcon videos relating to opsec and low-tech hacking but I enjoyed your video. keep up the good work, man👌
There should be a use all option obviously its good to learn how to do things manually at first but there needs to be more automation and less fear in building automation tools
Some tools I agree this one I would not want a use all option as different modules are for different things so if I for instance wanted to crawl a website I would have to sit there and wait while it ran all the checks for that website to have profiles on Twitter etc which of course it would never find so it would cause the tool to be 10x slower and give a ton of bad results
@@stuffy24 ya that makes sense maybe have it all broken down. Automation for everything you would need in 1 tool. Automation for something else. Just a complete pen test for obviously as much as you could do for automation but ya I think we're at that point in security penetration testing. The big dogs need to come together and just kill the game with the most awesome automation tools. For times sake. Less stress. Also I've been seeing that android apk payloads are now getting a different warning by Google play now I use evil droid to make and test payloads I've tried looking up everything I could to obfuscate the apk or Android manifest code but everything I tried didn't work. I would be easier to obfuscate a windows payload it seems lol which I find hard to believe. If you have any to date tools that work for obfuscating apk payloads that would be cool im just finally at the point of trying to learn obfuscation.
@@CoryResilient I def understand this perspective but once you get into advanced pentesting you see that automation has been done in pentesting A LOT and always falls short because hacking is more an art than anything. You have to look for things a computer doesn't always see. I am actually a big advocate for less automation because of all the failed pentesting I've seen from automation lol I understand the thought though!
@@stuffy24 that's why I said only have automation for things that can allow for automation which don't really require the manual operations or a human that can solve problems intellectually uniquely in every situation lol but for things that can be automated that don't require the human touch then LET THERE BE AUTOMATION this foolishness and pride need to stop lol I can do everything manually I just can't build tools I can't code lol so to tool creating Gods of the world of pen testing lol stop being 🐯 s and let's level up and stop being so critical about it lol 😆 the big guys are scared to create real lethal automation tools because then anyone with basic Linux knowledge could be able to do things that should have taken them 10 years to do which would filter out most bad actors they want instant gratification lol the danger of effective automation tools is it opens up more risk to hackers actually easily and effortlessly getting some serious foot holds lol
@@CoryResilient so I def understand what your saying and to an extent I agree. You can hop in the discord and keep the Convo going! The main reason I don't necessarily agree is because it's been done before and the more you automate the more often those skills just get easier to detect and then become useless. This is why advanced pentesters don't use much automation bc that's what EDR tools look for and you can basically defend any automated attack given the automation. So becomes useless after a timeframe
Hey so I'm newer to the cyber side, been in physical security for over a decade, but as I look at this I wonder what is, or what are some, job titles that would encompass someone doing this for work? Thanks for the video!
Only thing that annoys me is how many different programs require API keys especially on Kali; you could spend hours compiling a list of services that require an API keys, creating accounts for each & manually putting the keys into configs, its so tedious.
I subbed & all that. Kali or Parrot? As an older learner where do I start? Can I install Kali/Parrot etc to load from a usb? Also VB or VMware? (Win 10) After surviving being shot two times, scraping by on a a disability income I’m truly hungry to learn. To improve my life. I thank you for sharing your experience. In want/need of a teacher…to be the apprentice. Your time in sharing your knowledge is as close as I’ll get. And I thank you.
@@spookhie5882 No, I moved on. About 99% of the tools pitched on you tube don't work as implied. There's always something, like they tested it against an older version of windows with defender and the firewall turned off. The setup requires a bunch of crap like api's. Thats the nature of the web though...
I'm trying to run this on kali linux but my only issue is that since i have kali install on a usb drive and i insert the command recon-ng it tells me [!] Unable to synchronize module index. (connection error). any help is well appreciated. thanks
Every time I try to run it now, it doesn't find anything because of the "Google CAPTCHA trigger. no Bypass available". Is there a quick way to solve this?
I realize this was done a year ago however, using Kali LINUX here and I can't seem to get olefile installed. I am being told it is already installed as part of python3 but recon-ng does not see or recognize it. Any helpful suggestions?
@@MajikCatSecurity it would be too difficult for me to troubleshoot over comments. Please hop in the discord and throw it in to questions with the screenshot of the error.
@@stuffy24 Luckily I am a software systems engineer with may years experience using LINUX and a pentration tester...after messing around with it for an hour (Im stubborn that way LOL) I figured it out. Thank you for the quick reply though! =)
It's about how to use the tool..I'm not going to show live pages for a site that doesn't want to show them. This is for educational purposes not to expose a real site. Therefore it's to show what the tool does and how. Hopefully you understand that. I make all of my videos using Osint on tryhackme mostly specifically for this purpose
Yes but don't act like it's done this and found this when it blatantly has not, are you a security professional or just some script kitten and decided to teach although you yourself doesn't have a clue?
@@rootmonsters lol I've addressed it in the comments below that I missed this due to worrying about the video script. You can watch my other videos and decide what I am. I'm not here to prove anything to you. I addressed that I made a mistake due to paying more attention to the video than the tool In this case. No one's forcing you to use my videos or even watch them. Feel free to find someone else you like. I appreciate the feedback but that's why I told you I addressed this in other comments
@@stuffy24 will do, sure. However because this is a common occurance for us in the learning space, making a public video to address it, if it's possible, would answer and reach your audience as apposed to re repeating your answer to all who individually ask it. My osint practices currently are primarily windows based away from terminal. But I am trying to get more proficient with the likes of parrot and kali to see if there is a way to obtain public records that generally sit behind paid to view catfish scans. I feel terminal tools might be more powerful. This captia situation is very persistent when using your socket puppet properly with layers such as tor proxy chaining and vpn jumping. Easily worked around from a browser but no idea how to counter it from terminal. See you in discord at some stage soon hopefully. Thanks again though for the great content
@@AsidsTechTipsjust run kali or parrot or any distro on a VM or dual boot or install it on a usb drive you are limited with windows and it takes no time at all to setup don’t be lazy
That's correct. I address that in multiple comments. It's me showing how the tool works and I was worried more about not messing up the video and completely didn't pay attention to the 404 error. I just have a "script" ish and I was focused on it and didnt pay attention.the video still shows how the tool works which is why I don't take it fown
Hey the profiler tool was working 2 days ago im curious if its broken now for you as well i just checked if there were updates or whatever and it doesn't seem so but the thing shits out MILES of red error code when i do run after setting a module and setting the source and running it when 2 days ago it was working fine. I am curious if you are also getting this error as well?
Hey thanks for the question. Feel free to throw it in the discord with a screenshot and I'm sure one of the people have used it in the last few days could tell you.
warning if you have a amd chip parrot os know longer works, several errors will be thrown. note parrot os does not suppport intel, kali linux how ever works
@@stuffy24 it throws several errors with python pip3 which prohibits installs of cloned githubs, or pip3 tools you need. also quite a few cammands have errors
@@stuffy24 everything is installed as need to be, ive unistall reinstalled all depenencies nothing still the same error, within pip3 an several of the commands
@@NullVoid01 not at all. 2 separate tools for 2 different purposes. Metasploit is mainly a post exploitation framework with a little bit of other modules sprinkled in.
@@stuffy24 I know this, you said something about dependencies, etc, while looking at the marketplace table, and I was saying that it tells you what the D/K column means and which module(s) it applies to.
lol i understand why that wouldnt make sense because that generally means it doesnt exist but these should never be dismissed. This is simply your osint recon phase you should always take note of what the tools find and go back and validate later.
@@stuffy24 301 i validated but if you see a 404 in a dirbust thats a good sign your dirbust is bad or it has a flag where you can filter out 404(you would think it would do this by default). But in short i was saying rip causr the tool didnt actually find anything other than sitemape which can be useful sometimes and a robots.txt which no one is dumb enough to leave anything here
@@Michael_Jackson187 correct but the purpose of the video was simply to show how the tool works I'll be honest I wasn't even paying attention because I lay out the videos before hand and was more focused on doing the steps correctly since I do my videos in 1 take. So yes I would agree but with Osint always take a grain of salt due to it being possibly wrong info or old info that's still useful
@@stuffy24 please think back to the times when you were a student and you were struggling and you needed help and no one was there, that’s how i feel now
@@stuffy24 hehe bro it doesn't mean something bad don't worry ,i just said you are the little brother of the French UA-camr processus thief (cybersecurity oriented) cuz of your face similarity 👍
Lol I have a life now I should not be looking at stuff like this again. Glad I never went to jail before. SWIM managed to get away with a million in his youth. Don't do crime kids. And if you do don't get caught.
'Be safe' is not a hacker mindset, how is that going to help you in your career, or in your life? Also, hacking your brothers and sisters and hear them complain is actually pretty funny.
That's pretty simple since many new hackers don't know where the line of legal and illegal is. Not being safe in the cyber world can ruin your career before it ever gets started. Messing with someone for fun isn't hacking it's just bullying. Being safe is simple know what your doing before doing it. Don't just run tools that you see and think are cool. Understand them first
its more of a "why woudl you" since ur just blocking the console. also since ur making a vid on osint i can imagine that some skid would try to doxx u. in genneral it just seems safer to hide ur face@@stuffy24
If you are new to cybersecurity this video is not good. It’s not the fact that their are “bloopers”, it’s because the host’s will eat up your working and short term memory loads with his many mis-takes (especially in the beginning). New learners need clean prose and thoughtful teaching with a plan. Anyone who has been in the 4th grade on can tell you that. 🎉
If you want to support the channel even more and get access to even more content check out patreon.com/stuffy24
I like that you actually recorded and shared the troubleshooting process as it is very common to run into such issues. Thanks for the great tutorial.
Appreciate that!
I installed it on Kali Linux. I get the message *no modules enabled/installed. Can someone help me?
@@enma3175 You are not ready for Kali Linux
I love the vid with the bloopers and an explanation afterwards, more vids like these is what is needed for us and we enjoy your human side more, thanks a million.
Appreciate ya man
I also want to say thank you for being authentic. Most videos, training materials, simulations, etc edit out anything but perfection. Sometimes you know what you need to do but its something simple holding you back. While there is value in struggling and figuring something out, spending extended time on syntax issue or something small is a waste.
I appreciate that! I just try to be honest about it and not sell things
I appreciate the 'bloopers'. I hate when guys do videos like this and make it seem like they never have errors, and should work perfect for viewers.
I agree! 100% everyone makes mistakes especially me haha
sexy girl, beautiful girl
sexy girl, beautiful girl
sexy girl, beautiful girl
Agreed 100000%
@@MisterK-YT thank you!
On god
Thanks for great guide / instructions.
also glad you left blooper's in as it show's we all make mistakes and are always learning.
Well no one doesn't make mistakes like you said ! Why pretend we don't
I appreciate you leaving in the bloopers. I have so many of them in real life and I was beginning to think I'm the only one. 😀
Ohh trust me I have a ton everyday! Don't feel alone on that!
YT just now recommended your video for me on the homepage! Never came across your channel before and glad i did good sir!!
I appreciate you
Liked because you keep the bloopers. Makes a difference
Appreciate it
New to cyber security, love the fact you included your bloopers. Earned yourself a sub❤
Appreciate that. Just know every single person in cyber ever makes those mistakes
downloaded this long time ago and wonder why this didnt work and now this video got put on my homepage. keep up the work
Thank you!
I love that now after I clicked like on one of ur vids
All my feed is about your channel
I hope you actually really do enjoy it lol
@@stuffy24 yes man i truly am
U simply simplify all the noise and explain very well
Thank you!
Amazing man, have to do a Cyber Assignment on OSINT and this tool, seems amazing. Thank you.
Greetings from Sweden!.
You, Sir, just got yourself a new subscriber 🎉
Welcome!
this video got recommended to me in the sidebar. i know almost nothing about coding or python. I sometimes watch defcon videos relating to opsec and low-tech hacking but I enjoyed your video. keep up the good work, man👌
Appreciate it my man!
"Trying to get to 5K this year" -- Congrats on 11.4K!
Thanks so much! It def was not expected!
There should be a use all option obviously its good to learn how to do things manually at first but there needs to be more automation and less fear in building automation tools
Some tools I agree this one I would not want a use all option as different modules are for different things so if I for instance wanted to crawl a website I would have to sit there and wait while it ran all the checks for that website to have profiles on Twitter etc which of course it would never find so it would cause the tool to be 10x slower and give a ton of bad results
@@stuffy24 ya that makes sense maybe have it all broken down. Automation for everything you would need in 1 tool. Automation for something else. Just a complete pen test for obviously as much as you could do for automation but ya I think we're at that point in security penetration testing. The big dogs need to come together and just kill the game with the most awesome automation tools. For times sake. Less stress. Also I've been seeing that android apk payloads are now getting a different warning by Google play now I use evil droid to make and test payloads I've tried looking up everything I could to obfuscate the apk or Android manifest code but everything I tried didn't work. I would be easier to obfuscate a windows payload it seems lol which I find hard to believe. If you have any to date tools that work for obfuscating apk payloads that would be cool im just finally at the point of trying to learn obfuscation.
@@CoryResilient I def understand this perspective but once you get into advanced pentesting you see that automation has been done in pentesting A LOT and always falls short because hacking is more an art than anything. You have to look for things a computer doesn't always see. I am actually a big advocate for less automation because of all the failed pentesting I've seen from automation lol I understand the thought though!
@@stuffy24 that's why I said only have automation for things that can allow for automation which don't really require the manual operations or a human that can solve problems intellectually uniquely in every situation lol but for things that can be automated that don't require the human touch then LET THERE BE AUTOMATION this foolishness and pride need to stop lol I can do everything manually I just can't build tools I can't code lol so to tool creating Gods of the world of pen testing lol stop being 🐯 s and let's level up and stop being so critical about it lol 😆 the big guys are scared to create real lethal automation tools because then anyone with basic Linux knowledge could be able to do things that should have taken them 10 years to do which would filter out most bad actors they want instant gratification lol the danger of effective automation tools is it opens up more risk to hackers actually easily and effortlessly getting some serious foot holds lol
@@CoryResilient so I def understand what your saying and to an extent I agree. You can hop in the discord and keep the Convo going! The main reason I don't necessarily agree is because it's been done before and the more you automate the more often those skills just get easier to detect and then become useless. This is why advanced pentesters don't use much automation bc that's what EDR tools look for and you can basically defend any automated attack given the automation. So becomes useless after a timeframe
Really sick how you sinked the glowing of the buttons and the video!!!!! Hell yeah you get my like!
I appreciate it! Wish I could take credit but UA-cam started doing it automatically
@@stuffy24 🤫🤫🤫🤫🤣
Hey so I'm newer to the cyber side, been in physical security for over a decade, but as I look at this I wonder what is, or what are some, job titles that would encompass someone doing this for work?
Thanks for the video!
There are many jobs that utilize osint for sure! Including investigating
Ethical Hacking
"SOC Analyst" or "Threat Intelligence" as a starting point.
Pentesting as well right
Pen Tester.
hacker: sometimes i open files without paying attention. 😂
Reality is everyone is guilty of this at some point in their busy days lol
Only thing that annoys me is how many different programs require API keys especially on Kali; you could spend hours compiling a list of services that require an API keys, creating accounts for each & manually putting the keys into configs, its so tedious.
@wtconroe879 yes but atleast you only have to once
Do you have a playlist of you explaining more about this tool? Like how to set up the api keys and get them? I’m very interested now
I can do a short video this weekend on adding API keys for sure!
You my man just got a new follower for that
I uploaded the guide for it today for you
While bloopers are great, so would the efforts to troubleshoot would have been for us newbies! Thank you!
I agree with you on this one i think i missed the mark because in my head it was simple fix but i didnt show it.
Very great idea?! I dont think ive ever seen that implemented in a post
Been trying for 2 hours now to try and install the packages but it just doesn't seem to work.
Try creating a virtual environment for the recon-ng and using pip install
When would "first things first" be anything but first?
That's a good point
Do it for 3 days in a row, easiest to start/stop a habit. I read that someplace!
Def is a start
I subbed & all that. Kali or Parrot? As an older learner where do I start? Can I install Kali/Parrot etc to load from a usb? Also VB or VMware? (Win 10) After surviving being shot two times, scraping by on a a disability income I’m truly hungry to learn. To improve my life. I thank you for sharing your experience. In want/need of a teacher…to be the apprentice. Your time in sharing your knowledge is as close as I’ll get. And I thank you.
Kali or parrot is preference, both can be USB boot, vb or VMware again preference. Appreciate the support
@@stuffy24 Which is best for a “newb” like myself? In your opinion? Kali or P?
@@BluesStraightFromTheHarp probably Kali. I love parrot but Kali comes with a few more things
@@stuffy24 Thank you!!
Broo said he wanted to get 5k subs last year and is now at 13k🙌🙌
Really appreciate the support!!
ERROR: No matching distribution found for pydf3 in kali
Have you found a fix for this?
@@spookhie5882 No, I moved on. About 99% of the tools pitched on you tube don't work as implied. There's always something, like they tested it against an older version of windows with defender and the firewall turned off. The setup requires a bunch of crap like api's. Thats the nature of the web though...
Subscribed because you showed how to solve the problem you ran into
I appreciate that!
once i get results what do i do with them
how do i check the file
Feel free to join the discord and throw your questions in there with screenshots pls we have a questions channel
Thanks for show the troubleshooting a are a real bro
Nice touch lighting up the like button
I literally have no clue how that's done lol
Mine won’t install any modules. Updated and upgraded
@jeremytaylor4576 I would need a lot more information to realistically help you troubleshooting. Feel free to join the discord and ask questions
I'm trying to run this on kali linux but my only issue is that since i have kali install on a usb drive and i insert the command recon-ng it tells me [!] Unable to synchronize module index. (connection error). any help is well appreciated. thanks
I would try to reinstall recon-ng and update the system
Every time I try to run it now, it doesn't find anything because of the "Google CAPTCHA trigger. no Bypass available". Is there a quick way to solve this?
Im getting the same error too, so hoping to find a solution. Google didnt seem to helpful sadly!
I realize this was done a year ago however, using Kali LINUX here and I can't seem to get olefile installed. I am being told it is already installed as part of python3 but recon-ng does not see or recognize it. Any helpful suggestions?
@@MajikCatSecurity it would be too difficult for me to troubleshoot over comments. Please hop in the discord and throw it in to questions with the screenshot of the error.
@@stuffy24 Luckily I am a software systems engineer with may years experience using LINUX and a pentration tester...after messing around with it for an hour (Im stubborn that way LOL) I figured it out. Thank you for the quick reply though! =)
@@MajikCatSecurity yo how did you do it? i'm also having issues with installing olefile
==> 404 error is page not found, Not you've found the admin directories.
I've responded to those comments already.
It's about how to use the tool..I'm not going to show live pages for a site that doesn't want to show them. This is for educational purposes not to expose a real site. Therefore it's to show what the tool does and how. Hopefully you understand that. I make all of my videos using Osint on tryhackme mostly specifically for this purpose
Yes but don't act like it's done this and found this when it blatantly has not, are you a security professional or just some script kitten and decided to teach although you yourself doesn't have a clue?
@@rootmonsters lol I've addressed it in the comments below that I missed this due to worrying about the video script. You can watch my other videos and decide what I am. I'm not here to prove anything to you. I addressed that I made a mistake due to paying more attention to the video than the tool In this case. No one's forcing you to use my videos or even watch them. Feel free to find someone else you like. I appreciate the feedback but that's why I told you I addressed this in other comments
Hey stuffy24 you know a bypass for the error Google CAPTCHA triggerd error?
Would appreciate a answer.
Yes i do. I purposely make these videos for professionals. To ensure kids cant use these techniques i leave out those details.
info says metacrawler "disabled" how to enable it?
Feel free to join the discord and throw your questions in there
The best tool is the tool that does what has not been done already.
Well let me know lol
When we measure any kind of things we do it in the realm of reality not fantasy stories.
When we measure any kind of things we do it in the realm of reality not fantasy stories.
Awesome tool dude!!! Thanks for the vid
Thank you!
KEEP GOING ON, FRIEND.
Thank you!
how do you get around the "google CAPTCHA triggered, no bypass available?
Thanks for the comment! Feel free to hop in the Discord and ask your specific questions and I can answer them when I get a chance
@@stuffy24 will do, sure. However because this is a common occurance for us in the learning space, making a public video to address it, if it's possible, would answer and reach your audience as apposed to re repeating your answer to all who individually ask it. My osint practices currently are primarily windows based away from terminal. But I am trying to get more proficient with the likes of parrot and kali to see if there is a way to obtain public records that generally sit behind paid to view catfish scans. I feel terminal tools might be more powerful. This captia situation is very persistent when using your socket puppet properly with layers such as tor proxy chaining and vpn jumping. Easily worked around from a browser but no idea how to counter it from terminal. See you in discord at some stage soon hopefully. Thanks again though for the great content
@@AsidsTechTips appreciate the suggestion.
@@AsidsTechTipsjust run kali or parrot or any distro on a VM or dual boot or install it on a usb drive you are limited with windows and it takes no time at all to setup don’t be lazy
have you solved it?
incredible stuffs, how i become soc analyst?
Feel free to join the discord and join the Livestreams
can we find out an email for a snapchat account by its username? Is there any tool like this ?
Where an I download that tool?
Depends on the distro but just GitHub
will this work for public and private accounts??
cool video, thank you for your time and for sharing ✌
Thanks so much!
Great osint video keep up the osint videos 🤝
Thanks so much!
Dont you think 404 means admin console was not found?
That's correct. I address that in multiple comments. It's me showing how the tool works and I was worried more about not messing up the video and completely didn't pay attention to the 404 error. I just have a "script" ish and I was focused on it and didnt pay attention.the video still shows how the tool works which is why I don't take it fown
Hey the profiler tool was working 2 days ago im curious if its broken now for you as well i just checked if there were updates or whatever and it doesn't seem so but the thing shits out MILES of red error code when i do run after setting a module and setting the source and running it when 2 days ago it was working fine. I am curious if you are also getting this error as well?
Hey thanks for the question. Feel free to throw it in the discord with a screenshot and I'm sure one of the people have used it in the last few days could tell you.
I'm gonna try it, but can you set IP's as source?
warning if you have a amd chip parrot os know longer works, several errors will be thrown. note parrot os does not suppport intel, kali linux how ever works
I'll have to look into this and see. Appreciate the heads up
@@stuffy24 it throws several errors with python pip3 which prohibits installs of cloned githubs, or pip3 tools you need. also quite a few cammands have errors
@@hacked-ze1nn make sure you install all dependencies
@@stuffy24 everything is installed as need to be, ive unistall reinstalled all depenencies nothing still the same error, within pip3 an several of the commands
i moved back to kali
This chanel is on 🔥🔥🔥
Thank you so much!! Hopefully we continue to grow and get you all more content!
What are we exactly doing here can someone please summarise ,thank you.
Just gathering information about a website.
can I use this tool on Mac or PC aswell?
You can run a vm on either
@7:29 you know that 404 is page not found.............right?
You didn't read the other comments where I explained that did you?
I didn't see any other comments mentioning anything @@stuffy24
Your so under rated bro
Thank you!
this is an alternative for metasploit?
@@NullVoid01 not at all. 2 separate tools for 2 different purposes. Metasploit is mainly a post exploitation framework with a little bit of other modules sprinkled in.
Good video thanks 😊 🤘
Thanks
greatvid bro
do you have any privite tool?
I don't publish my own tools no
Didn't even notice 17 minutes had gone by lol
the like button literally started glowing in rgb when you said hit that like button! How does this work?
I'll be honest with you I have no clue! I didn't set that up
Do you have a telegram channel
I do not because I have no reason to hide what I'm doing. I have a discord channel
idk how to do on windows
Read the documentation please
@@stuffy24 yeah i found out right after i posted and then realized you were on parrot os and now im getting parrot os
Fantastic video. Thank you
Thanks so much
it says it on the output **D=has dependencies** **K=requires keys**
Yea that means you have to install the dependencies or add an API key
@@stuffy24 I know this, you said something about dependencies, etc, while looking at the marketplace table, and I was saying that it tells you what the D/K column means and which module(s) it applies to.
@@WilliamLDeRieuxIV ohh gotcha sorry misunderstood! Thank you
how to download
Just use apt-get
7:06, saying that with a 404 RIP
lol
lol i understand why that wouldnt make sense because that generally means it doesnt exist but these should never be dismissed. This is simply your osint recon phase you should always take note of what the tools find and go back and validate later.
@@stuffy24 301 i validated but if you see a 404 in a dirbust thats a good sign your dirbust is bad or it has a flag where you can filter out 404(you would think it would do this by default). But in short i was saying rip causr the tool didnt actually find anything other than sitemape which can be useful sometimes and a robots.txt which no one is dumb enough to leave anything here
@@Michael_Jackson187 correct but the purpose of the video was simply to show how the tool works I'll be honest I wasn't even paying attention because I lay out the videos before hand and was more focused on doing the steps correctly since I do my videos in 1 take. So yes I would agree but with Osint always take a grain of salt due to it being possibly wrong info or old info that's still useful
this world is geting dangerous go for paper mail guys
lol its been dangerous!
Don’t worry people won’t be able to handle ai video you won’t be alive in 4 years unfortunately
Brother you hack just like I do!
It was like watching myself, except there’s normally a bit more cussing… 🤬😂
Haha ohh plenty of cussing just not on camera
When i am watching this video,the like button will come with special effect how do you do that
UA-cam Auto does it when you say hit the like button.
good stuff
gg on 5k
Thanks so much;
@@stuffy24 yessssssir
jesus already 6k?!?@@stuffy24
Subbed. 👍
Welcome aboard!
hey can you help me with an assignment please it is due very soon
@thatniqqakevin644 appreciate it but unfortunately I'm extremely busy. I am a cyber professional not a student.
@@stuffy24 is there any way you could take some time to hear me out
@@stuffy24 i’m sure it’s not a hard assignment for you i just would like for you to access my computer teamviewer so you can get an idea of
@@stuffy24 or however you feel comfortable
@@stuffy24 please think back to the times when you were a student and you were struggling and you needed help and no one was there, that’s how i feel now
it will never be as good as Shodan
Appreciate your opinion
And I which I get your reply I really need a bro that I can run to when am having problems smh 😢
❤🔥❤🔥❤🔥❤🔥
c'est le petit frereya processus thief ça 😂
Not sure what this means but appreciate ya
@@stuffy24 hehe bro it doesn't mean something bad don't worry ,i just said you are the little brother of the French UA-camr processus thief (cybersecurity oriented) cuz of your face similarity 👍
@@osmanlisback219 ohh gotcha never heard of him. Will have to check him out!
And I wish I get your reply I really need a bro that I can run to when am having problems smh 😢
1:23
Video starts at 1:23
Thank you. I'm sure it helps a lot of ppl who don't wanna hear me blabber on about subbing lol
@@stuffy24I love hearing you blab I watch the whole thing every time
Lol I have a life now I should not be looking at stuff like this again. Glad I never went to jail before. SWIM managed to get away with a million in his youth. Don't do crime kids. And if you do don't get caught.
Or just do this legally ethically and professionally and make a lot of money
og name❤
Definitely helped me thanks my nigga
não entendi porra nenhuma
I like "like"
$
Nah you goated my nigga
u got tele gang?
This is not OSINT. This is 17 min of bullshit!
i love hacking
'Be safe' is not a hacker mindset, how is that going to help you in your career, or in your life? Also, hacking your brothers and sisters and hear them complain is actually pretty funny.
That's pretty simple since many new hackers don't know where the line of legal and illegal is. Not being safe in the cyber world can ruin your career before it ever gets started. Messing with someone for fun isn't hacking it's just bullying. Being safe is simple know what your doing before doing it. Don't just run tools that you see and think are cool. Understand them first
Looks completely pointless
This is a POC the tool is quite useful if you install all the modules and keys
as soon as i see kali or parrot i know you know nothing more than copy paste
Lol thanks for the comment.
> makes vid about OSINT
> showes face
> huh
Why would I hide my face ?
its more of a "why woudl you" since ur just blocking the console. also since ur making a vid on osint i can imagine that some skid would try to doxx u. in genneral it just seems safer to hide ur face@@stuffy24
If you are new to cybersecurity this video is not good. It’s not the fact that their are “bloopers”, it’s because the host’s will eat up your working and short term memory loads with his many mis-takes (especially in the beginning). New learners need clean prose and thoughtful teaching with a plan. Anyone who has been in the 4th grade on can tell you that. 🎉
Parrot pwns kali esp when run as a qube
It's just a preference