• Home
  • Training Support
    • Training Support OVERVIEW
    • LEO & Security Training
    • OSINT & Hacker Tools
    • Church/Pre-School Safety
    • Elderly Protection
    • Crypto Intelligence REF
    • Constitution & Law REF
  • Facilities Support
    • Facility Support OVERVIEW
    • Facility Maintenance
    • Grounds Maintenance
  • Operational Support
    • Oper. Support OVERVIEW
  • Contact Us
  • More
    • Home
    • Training Support
      • Training Support OVERVIEW
      • LEO & Security Training
      • OSINT & Hacker Tools
      • Church/Pre-School Safety
      • Elderly Protection
      • Crypto Intelligence REF
      • Constitution & Law REF
    • Facilities Support
      • Facility Support OVERVIEW
      • Facility Maintenance
      • Grounds Maintenance
    • Operational Support
      • Oper. Support OVERVIEW
    • Contact Us
  • Home
  • Training Support
    • Training Support OVERVIEW
    • LEO & Security Training
    • OSINT & Hacker Tools
    • Church/Pre-School Safety
    • Elderly Protection
    • Crypto Intelligence REF
    • Constitution & Law REF
  • Facilities Support
    • Facility Support OVERVIEW
    • Facility Maintenance
    • Grounds Maintenance
  • Operational Support
    • Oper. Support OVERVIEW
  • Contact Us

It's a sticky WEB, and it's WORLD WIDE...

OSINT: Open-source intelligence with various social media and data icons.

OSINT

Open

Source

Intelligence


In layman's terms, the art of gathering useful information from stuff that’s already out there for anyone to see—no hacking, no secret spy gear.  Using the internet, public data, and people to gain the information you are seeking.

Hackers will use multiple tools that are not "weapons" as we would think of...

Code & Scripts: These are the bread and butter for community engagement education in cybersecurity. Think Python scripts, PowerShell commands, or Bash tools that automate attacks or scan for vulnerabilities. Software Tools: Programs like Wireshark (for sniffing network traffic), Metasploit (for exploiting vulnerabilities), or Nmap (for scanning networks) are staples in the hacker’s toolkit, essential for law enforcement training and Emergency Preparedness. Malware: Viruses, worms, trojans, ransomware—these are all software-based weapons used to infiltrate systems, which can be a significant concern for Facility Services. Browser Exploits & Phishing Kits: Often just clever HTML, JavaScript, and backend code designed to trick users or steal credentials, these tactics highlight the need for Security Professional Training.

Binary code skull and crossbones with 'Hacking Tools' text. OSINT

In addition to software solutions, there are also physical tools that can be used in various aspects of community engagement education and Emergency Preparedness. USB-based devices like Rubber Ducky and Bash Bunny can inject malicious code when plugged into a computer, posing risks during law enforcement training scenarios. Wi-Fi Pineapples simulate legitimate networks to intercept traffic, which can be crucial for Security Professional Training sessions. Hardware keyloggers can be physically attached to keyboards to record keystrokes, and RFID/NFC cloners are capable of copying access cards or badges, highlighting the importance of Facility Services in safeguarding sensitive areas. Check out some images of these items below.

DIGITAL INTRUSION GEAR

    Copyright © 2026 mulberrygroup.org - All Rights Reserved.

    • Contact Us

    Powered by

    This website uses cookies.

    We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

    Accept