Courses
  • Scholarly Journey
    • Students Reviews
  • Research
  • Student Portal
    • Student Dashboard.
    • Create Research Blog
  • Students Blog
  • About US
  • Contact Us

Research

  • Home
  • Research
13 March

“Open Source Intelligence (OSINT) Tools: Techniques, Applications, and Ethical Implications”

  • Posted by sashan-1049
  • Categories Research
  • Comments 0 comment

🔍 OSINT 101: The Superpower of Open Source Intelligence Your Guide to Becoming a Digital Detective 📝 Blog Post 👋 Hey Future Investigators! Ever wondered how hackers find information about people? Or how journalists uncover hidden truths? Or how companies protect themselves …

Read More
04 March

𝗢𝗦𝗜𝗡𝗧 𝗨𝗻𝗰𝗼𝘃𝗲𝗿𝗲𝗱

  • Posted by riham-0355
  • Categories Research
  • Comments 0 comment

𝐈𝐧𝐟𝐨𝐫𝐦𝐚𝐭𝐢𝐨𝐧 𝐢𝐬 𝐞𝐯𝐞𝐫𝐲𝐰𝐡𝐞𝐫𝐞, 𝐛𝐮𝐭 𝐢𝐧𝐭𝐞𝐥𝐥𝐢𝐠𝐞𝐧𝐜𝐞 𝐢𝐬 𝐚 𝐜𝐫𝐚𝐟𝐭. 🕵️‍♂️💻 In an era of digital information overload, the ability to find, verify, and analyze public data has become a foundational skill for cybersecurity, investigative journalism, and digital forensics. Today, I am …

Read More
17 February

AWS Security Auditor 🔐

  • Posted by farhan-1146
  • Categories Research
  • Comments 0 comment

AWS Security Auditor 🔐 An automated cloud security scanning tool that identifies misconfigurations in AWS environments before they become million-dollar breaches. 🎯 Overview AWS Security Auditor is a Python-based automated security scanning tool designed to identify common misconfigurations in Amazon …

Read More
15 February

Understanding Open Source Intelligence (OSINT)

  • Posted by warman-0367
  • Categories Research
  • Comments 0 comment

OSINT Open Source Intelligence (OSINT) is the process of collecting and analyzing publicly available information for cybersecurity investigations and research. This article explains OSINT sources, process, legal considerations, and its importance in digital investigations. Tools Covered:Google Dorking, Shodan, Maltego, Have …

Read More
13 February

OSINT HUB

  • Posted by rahmy-0015
  • Categories Research
  • Comments 0 comment

What is OSINT? Start with a hook. OSINT isn’t just “Googling”; it’s the art of gathering data from publicly available sources to create actionable intelligence. Key Concept: It’s used by journalists, cybersecurity researchers, and investigators to find the truth behind …

Read More
10 February

Top OSINT Tools for Cyber Security Students 🔍💻

  • Posted by mushrifa-1031
  • Categories Research
  • Comments 0 comment

Abstract Open-Source Intelligence (OSINT) has become a fundamental component of modern cybersecurity investigations. This article presents a structured overview of ten widely used OSINT tools and examines their relevance for cybersecurity students. The study emphasizes responsible usage, analytical development, and …

Read More
05 February

The Complete Guide to OSINT(Open Source Intelligence)

  • Posted by rukshana-0914
  • Categories Research
  • Comments 0 comment

Introduction In today’s digital world, information is everywhere. From social media and websites to publicrecords and online forums, massive amounts of data are freely available. The ability to collect,analyze, and use this information effectively is known as OSINT–Open Source Intelligence.OSINT …

Read More
03 February

Mastering Digital Forensics: A Beginner’s Guide to Image Geolocation

  • Posted by abdulla-0310
  • Categories Research
  • Comments 0 comment

In my latest blog post, “OSINT 101,” I break down the workflow professional investigators use to verify and locate images online. This project demonstrates the practical application of:✅ Observation: Using the PLWC (Plates, Landscape, Weather, Construction) method.✅ Pivoting: Leveraging multi-engine reverse image searches (Yandex, …

Read More
02 February

phishing-attack-investigation

  • Posted by farhan-1146
  • Categories Research
  • Comments 0 comment

hishing Attack Investigation – Cybersecurity Case Study Overview This project documents a real-world style phishing attack investigation conducted for educational and defensive cybersecurity purposes. The objective was to analyze a suspicious email, identify malicious infrastructure, and map the attack using …

Read More
02 February

AWS Cybersecurity Lab Journey

  • Posted by farhan-1146
  • Categories Research
  • Comments 0 comment

Cybersecurity-Lab-AWS   Step-by-step guide to building an AWS-based cybersecurity lab for hands-on learning and practice. I recently built my own AWS-based Cybersecurity Lab from scratch and documented the entire journey step by step. This lab is designed to simulate real-world …

Read More
  • 1
  • 2
  • >
  • No 103, Zahira Road, Mawanella, Sri Lanka.
  • +94 77 474 4949 / +94 72 474 4949
  • admin@marstech.lk
Facebook Twitter Youtube Linkedin
Quick Links

Home

Courses

Student Journey

Research

About Us

Contact Us

Popular Courses

Cyber Security Degree

Artificial Intelligence Degree

Certified Ethical Hacking Training Course

Artificial Intelligence & Robotics Training Course

Latest Albums

Copyright 2024 | Mars Tech. All Rights Reserved

Insert/edit link

Enter the destination URL

Or link to existing content

    No search term specified. Showing recent items. Search or use up and down arrow keys to select an item.