Built a small OSINT-based tool using Python to extract publicly available phone numbers from websites. Focused on: Automated scanning across common endpoints Regex-based data extraction Clean and reusable structure This is part of my journey into cybersecurity and security automation. GitHub: https://lnkd.in/dFVEwhkC More improvements coming next.
Python OSINT Tool Extracts Public Phone Numbers
More Relevant Posts
-
Day 92 of 100 Days Cybersecurity Challenge with Victor Akinode & The Victor Akinode Initiatives Topic: Building a Simple Port Scanner Using Python Understanding how security tools work internally is essential for building strong technical foundations. Today’s focus was on developing a basic network port scanner using Python’s socket library, highlighting the mechanics behind TCP-based scanning. Key Areas Covered: Socket-Based Connection Logic TCP Connect scanning was explored using socket.connect_ex(). This method returns system-level status codes: •0: Successful connection (open port) •Non-zero values: Closed or filtered ports This demonstrates how port scanners determine service availability at a low level. Automation and Contextual Intelligence A structured scanning approach can include: •Service Mapping: Associating open ports with common services (e.g., SSH – 22, HTTP – 80, HTTPS – 443) using dictionary-based lookups •Flexible Scanning Options: Supporting individual ports, custom port lists, or predefined common port ranges •Input Validation: Ensuring only valid IP addresses are processed to maintain script stability Handling Real-World Network Conditions Reliable tools must account for unpredictable environments: •Timeouts: Prevent the scanner from stalling on unresponsive hosts •Error Handling: Using try-except blocks to manage interruptions (e.g., manual termination) and runtime issues gracefully Key Takeaway Understanding low-level networking concepts such as TCP connections and port states provides deeper insight into how tools like Nmap operate. Building these capabilities from scratch strengthens both offensive and defensive security skills. Learn more here: https://lnkd.in/eisag2uE #CyberSecurity #Networking #PortScanning #InfoSec #Automation #CyberSecurityLearning #SecureCoding #100DaysCybersecurityChallenge
LESSON 92: Building a Simple Port Scanner Using Python (Python for Cybersecurity)
https://www.youtube.com/
To view or add a comment, sign in
-
#100DaysofCyberSecurity with Victor Akinode LESSON 93: Building Network Packet Sniffer with Scapy Today I worked on building a network packet sniffer using Scapy in Python. It was a deep dive into how network traffic actually moves and how we can inspect it at the packet level. I learned how Scapy can capture live packets directly from a network interface and break them down into layers like Ethernet, IP, TCP, UDP, and DNS. What stood out to me was how each packet carries structured information that can be extracted and analyzed in real time. Another key lesson was understanding how promiscuous mode works. This allows the network interface to capture all traffic, not just what is meant for the device. I also explored how raw sockets give low level access to network data, which is why administrator privileges are required. Filtering with BPF rules was also interesting. It makes packet capture efficient by allowing us to focus only on traffic we care about, such as HTTP or DNS traffic. I also saw how different protocols behave differently, like TCP being connection oriented while UDP is connectionless. This lesson made me appreciate how tools like Wireshark work behind the scenes and how much control Python can give us when working with networks. https://lnkd.in/ekNBerZH
LESSON 93: Building Network Packet Sniffer with Scapy (Python for Cybersecurity)
https://www.youtube.com/
To view or add a comment, sign in
-
Server-side logs only tell half the security story. The other half lives in the wire traffic your application never reports on. I just published a walkthrough on using mitmproxy as a scriptable security regression harness. Not packet inspection for its own sake; a programmable test layer that automates what you would otherwise do manually. The Python addon I built does three things: - Flags missing security headers on every response - Detects bearer tokens leaking in query strings - Simulates a hostile network by stripping HSTS You can build the whole harness in 30 minutes on a local proxy. I also cover where it breaks down: certificate pinning, HTTP/2 multiplexing, and QUIC paths are real constraints you will hit. If you are responsible for proving your security controls actually work, not just assuming they do, this might be useful. Have you ever caught something in wire traffic that your server logs completely missed? https://lnkd.in/d2_JzW3V
To view or add a comment, sign in
-
-
Day 93 of the Cybersecurity Challenge with Victor Akinode & The Victor Akinode Initiatives Topic: Basic Network Packet Sniffer with Python & Scapy Understanding network traffic at the packet level provides deep visibility into how systems communicate. Today’s focus was on analyzing how a packet sniffer can be built using Python and Scapy to capture and interpret network traffic. Key Areas Covered: Promiscuous Mode and Packet Capture Packet sniffing relies on accessing raw network data. By leveraging raw sockets and enabling promiscuous mode, a network interface can capture all packets on a segment, not just those addressed to the host system. This level of access typically requires elevated (root) privileges. Layer-by-Layer Packet Analysis Captured packets can be analyzed across multiple layers: •IP Layer: Identifies source and destination addresses •TCP Layer: Examines flags such as SYN and ACK to understand connection states •Application Layers (DNS/HTTP): Extracts domain queries and web-related metadata for deeper insight into network activity Efficient Filtering with BPF Berkeley Packet Filters (BPF) allow traffic filtering at the kernel level using expressions such as tcp port 80 or udp port 53. This reduces overhead and ensures that only relevant packets are processed. Memory Management in Packet Capture Continuous packet capture can quickly consume system resources. Using parameters like store=False ensures packets are processed in real time and not stored in memory, enabling longer and more stable monitoring sessions. Key Takeaway Packets represent the most accurate source of truth in network analysis. Understanding how to capture and interpret them programmatically strengthens capabilities in threat detection, network troubleshooting, and incident response. Learn more here: https://lnkd.in/e2Ki_Awb #CyberSecurity #Networking #EthicalHacking #InfoSec #NetworkSecurity #CyberSecurityLearning #100DaysCybersecurityChallenge
LESSON 93: Building Network Packet Sniffer with Scapy (Python for Cybersecurity)
https://www.youtube.com/
To view or add a comment, sign in
-
Day 92 of my 100 days cybersecurity journey with Victor Akinode and The Victor Akinode Initiatives This marks another important milestone in our continuous learning process in the field of cybersecurity. Today we focused on building a network port scanner using Python socket programming which helped us understand how devices communicate over a network at a lower level. Through this exercise we explored how TCP connections are established and how different ports respond when probed. We also learned how to design a basic scanning logic that iterates through multiple ports and checks their availability on a target system. This gave us deeper insight into how security professionals identify exposed services on a network. One of the key lessons from today was understanding how scanning tools work under the hood rather than just relying on external tools. Writing the logic helped us appreciate how sockets handle connection attempts and how response times can indicate the state of a service. I hope you find this Informative. Join Us and ensure to keep practicing as you continue to watch. https://lnkd.in/e56-hprx #100DaysCybersecurityChallenge #100DaysWithVictorAkinode #100DaysWithVA #100DaysWithVAI #100DaysCybersecuritywithVA #100DaysWithVictorAkinodeInitiatives
LESSON 92: Building a Simple Port Scanner Using Python (Python for Cybersecurity)
https://www.youtube.com/
To view or add a comment, sign in
-
90% of data breaches involve exploitable vulnerabilities that could have been caught with automated scanning. I just built my own AI-powered security scanner using Google's Gemini API - it analyzes Python code and flags issues by severity. Check out my documentation for the step-by-step process 👇 ✅ Connected to Gemini API for AI-powered code analysis ✅ Detects SQL injection, hardcoded secrets, weak cryptography ✅ Scans any input from files I send it Huge thanks to @NextWork for this awesome project guide. https://lnkd.in/dmrJ85rK #Security #Python #AI #Gemini #CyberSecurity #NextWork
To view or add a comment, sign in
-
FinalRecon: Boost Web Recon, 10X Faster Results FinalRecon the "Swiss Army Knife" of web reconnaissance. FinalRecon is an all-in-one Python framework that automates everything from SSL certificate analysis and WHOIS lookups to directory searching and port scanning. It’s built for the professional who needs a fast, accurate overview of a target's digital footprint without the bloat. Inside the new masterclass: ✅ 360-Degree Recon: How to use the --full flag for a complete tactical overview. ✅ Modular Intelligence: Deep dives into the Crawler, DNS Enumeration, and Traceroute modules. ✅ High-Speed Discovery: Leveraging async Python for rapid directory searching and port scanning. ✅ Export Readiness: Generating structured reports in Text, XML, or CSV for seamless handoffs. Stop executing tools. Start executing a strategy with FinalRecon. Read more: [https://lnkd.in/gqFxYTVe] #WebSecurity #FinalRecon #OSINT #BugBounty #CyberSecurity #RedTeaming #InfoSec #Pentesting #Python
To view or add a comment, sign in
-
-
🛡️ Scanning Isn’t a Tool. It’s a Technique. In my previous posts, I automated reconnaissance using Nmap. But this time, I challenged myself: 👉 Can I build a scanner from scratch? So I did — using only Python’s socket module. No shortcuts. 🧠 What I implemented: ✔ Manual TCP connection scanning ✔ Multi-threaded port discovery ✔ Banner grabbing for service fingerprinting ✔ Structured JSON logging ✔ Robust error handling (timeouts, unreachable hosts) And this changed how I think about security. Because now I don’t just see: “Port 80 is open” I understand: “How that connection is established” “What the service returns” “How detection could work” 🚨 Real defensive value: • Validate firewall rules • Detect unexpected services • Support incident response • Build lightweight internal scanners This is the shift: From using tools → to building them. And that’s where real blue-team capability starts. 📌 Full implementation available in my GitHub https://lnkd.in/gyZqM2Hd More defensive tooling coming soon. #CyberSecurity #BlueTeam #Python #SOC #ThreatDetection #SecurityAutomation #DefensiveEngineering
To view or add a comment, sign in
-
CAPTCHAs are a common defense against automated attacks, but sophisticated actors can bypass them programmatically using Python-based tools and machine learning techniques. In this video, Neurix demonstrates how automated tools can undermine common security measures on web forms. By leveraging Python libraries for optical character recognition and session management, the tutorial explores the technical vulnerabilities that arise when platforms rely solely on basic verification tests to prevent unauthorized access. #penetrationtesting #CAPTCHA #cybersecurity https://lnkd.in/gceKMKaM
How Hackers Bypass CAPTCHAs with Python
https://www.youtube.com/
To view or add a comment, sign in
Explore related topics
Explore content categories
- Career
- Productivity
- Finance
- Soft Skills & Emotional Intelligence
- Project Management
- Education
- Technology
- Leadership
- Ecommerce
- User Experience
- Recruitment & HR
- Customer Experience
- Real Estate
- Marketing
- Sales
- Retail & Merchandising
- Science
- Supply Chain Management
- Future Of Work
- Consulting
- Writing
- Economics
- Artificial Intelligence
- Employee Experience
- Workplace Trends
- Fundraising
- Networking
- Corporate Social Responsibility
- Negotiation
- Communication
- Engineering
- Hospitality & Tourism
- Business Strategy
- Change Management
- Organizational Culture
- Design
- Innovation
- Event Planning
- Training & Development