Dancho Danchev’s Second Edition of “Cybercrime Forum Data Set for 2022” Available – 113GB Direct Torrent Download Available! Grab a Free Copy Today!

Here we go. https://academictorrents.com/details/131080b57d568ca3d05794cde5a3d7774f890373 – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/details/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201 – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – Second Edition – Direct Torrent Download Available! https://academictorrents.com/download/131080b57d568ca3d05794cde5a3d7774f890373.torrent – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/download/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201.torrent – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – SecondRead More

Dancho Danchev’s Second Edition of “Cybercrime Forum Data Set for 2022” Available – 113GB Direct Torrent Download Available! Grab a Free Copy Today!

Here we go. https://academictorrents.com/details/131080b57d568ca3d05794cde5a3d7774f890373 – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/details/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201 – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – Second Edition – Direct Torrent Download Available! https://academictorrents.com/download/131080b57d568ca3d05794cde5a3d7774f890373.torrent – Dancho Danchev’s Research Compilation 2005-2022 – Direct Torrent Download Available! https://academictorrents.com/download/e1b755efb9cb7ec5d5bcea4e60911e2a70a86201.torrent – Dancho Danchev’s Cybercrime Forum Data Set for 2022 – SecondRead More

Exposing FBI’s Most Wanted Cybercriminal Mujtaba Raza from Forwarderz and SecondEye Solution – An OSINT Analysis – Maltego Technical Details Video Demonstration

Google is your best friend! Here’s the original analysis. Check out the actual Maltego technical details video demonstration here: Enjoy!

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s  Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More

Profiling a Currently Active Personal Email Address Portfolio of Members of Iran’s Ashiyane Digital Security Team – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active personal email portfolio belonging to members of Iran’s  Ashiyane Digital Security Team with the idea to assist everyone in their cyber attack or cyber threat actor attribution campaigns. Sample currently active personal emails known to belong to members of Iran’s Ashiyane Digital SecurityRead More

Exposing Behrooz Kamalian’s Ashiyane ICT Company – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone some practical and actionable threat intelligence information regarding members of the Ashiyane Digital Security Team also known as Behrooz Kamalian’s Ashiyane ICT Company for the purpose of assisting everyone in their cyber attack and cyber attack attribution campaigns. Name: Behrooz Kamalian Postal address: Tajrish Sq, FanaRead More

Profiling the Liberty Front Press Network Online – An OSINT Analysis

Note: This OSINT analysis has been originally published at my current employer’s Web site – https://whoisxmlapi.com where I’m currently acting as a DNS Threat Researcher since January, 2021. We’ve decided to take a closer look at the Internet-connected infrastructure of the Liberty Front Press Network part of a recent takedown and domain seizure part of an ongoing lawRead More

Exposing a Currently Active List of Iran-Based Hacker and Hacker Team’s Handles – An OSINT Analysis

Dear blog readers, I’ve decided to share with everyone a currently active list of Iran-based hacker and hacker team’s handles which could greatly assist in possible cyber attack attribution campaigns including cyber threat actor attribution campaigns. Sample currently active Iran-based hacker and hacker team’s handles currently used in massive or targeted Web site defacement campaigns:Read More

Unit-123.org E-shop Owner Information

Who is Dancho Danchev?

Unit-123.org

Focused on delivering daily batches of personally-produced never-ending supply of high-quality and never-published and released before classified and sensitive Intelligence Deliverables.

Latest Products