• Home
  • Training
    • LEO & Security Training
    • OSINT & Hacker Tools
    • Church/Pre-School Safety
  • Financial Data Group
    • Elderly Protection
    • Crypto Intelligence
    • Fin. Audits & Case Review
  • Mulberry Press
    • Constitution & Law REF
    • Police & Wellness
    • Photos & Storytelling
  • More
    • Home
    • Training
      • LEO & Security Training
      • OSINT & Hacker Tools
      • Church/Pre-School Safety
    • Financial Data Group
      • Elderly Protection
      • Crypto Intelligence
      • Fin. Audits & Case Review
    • Mulberry Press
      • Constitution & Law REF
      • Police & Wellness
      • Photos & Storytelling
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • Training
    • LEO & Security Training
    • OSINT & Hacker Tools
    • Church/Pre-School Safety
  • Financial Data Group
    • Elderly Protection
    • Crypto Intelligence
    • Fin. Audits & Case Review
  • Mulberry Press
    • Constitution & Law REF
    • Police & Wellness
    • Photos & Storytelling

Account

  • My Account
  • Sign out

  • Sign In
  • My Account

It's a sticky WEB, and it's WORLD WIDE...

OSINT

Open

Source

Intelligence


In layman's terms, the art of gathering useful information from stuff that’s already out there for anyone to see—no hacking, no secret spy gear.  Using the internet, public data, and people to gain the information you are seeking.

Hackers will use multiple tools that are not "weapons" as we would think of...

 

  • Code & Scripts: These are the bread and butter. Think Python scripts, PowerShell commands, or Bash tools that automate attacks or scan for vulnerabilities.
  • Software Tools: Programs like Wireshark (for sniffing network traffic), Metasploit (for exploiting vulnerabilities), or Nmap (for scanning networks) are staples in the hacker’s toolkit2.
  • Malware: Viruses, worms, trojans, ransomware—these are all software-based weapons used to infiltrate systems.
  • Browser Exploits & Phishing Kits: Often just clever HTML, JavaScript, and backend code designed to trick users or steal credentials.

 

But there are physical tools too:

  • USB-based devices like Rubber Ducky or Bash Bunny can inject malicious code when plugged into a computer.
  • Wi-Fi Pineapples mimic legitimate networks to intercept traffic.
  • Keyloggers (hardware versions) can be physically attached to a keyboard to record keystrokes.
  • RFID/NFC cloners can copy access cards or badges.


Check out some images of these items below.

DIGITAL INTRUSION GEAR

    Copyright © 2025 mulberrygroup.org - All Rights Reserved.


    Powered by

    This website uses cookies.

    We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

    Accept