๐ New: Sign up with Email โ no Telegram required
Intelligence Security now supports dual login.
Register with email + password, Telegram, or link bot to one account.
Search 500 billion+ indexed records from public breaches, dark web sources & infected devices.
Every free account gets:
โ ๐ 1 search across breach databases
โ ๐ฆ 1 file download (credentials, cookies, sessions)
โ ๐ Full access to all search types
What you can search:
โ Leaked credentials & passwords
โ Browser data from compromised systems
โ Session cookies
โ Paste sites & dark web mentions
Your email might already be in a breach.
Search it and find out โ takes 30 seconds.
๐ intelligencesecurity.io#OSINT#CyberSecurity#ThreatIntelligence#InfoSec#BreachIntelligence#BugBount
๐ EMAIL RECON: nasa.gov โ 46,000+ Emails & 22,000+ Subdomains From One Query
NASA builds rockets. But their digital footprint is just as massive.
We ran Email Recon + Domain Recon on nasa.gov using only publicly indexed sources.
๐ Results:
โโ ๐ง 46,000+ corporate emails indexed
โโ ๐ 22,000+ subdomains discovered
โโ ๐ข 12 NASA centers identified
โโ ๐ 630+ mailing lists & distribution groups
๐ 12 NASA centers โ mapped from email patterns alone:
โโ ๐ฐ๏ธ JPL (Jet Propulsion Lab) โ 8,100+ emails
โโ ๐ Goddard Space Flight Center โ 3,700+
โโ โ๏ธ Ames Research Center โ 1,900+
โโ ๐ฌ Langley Research Center โ 1,500+
โโ โก Glenn Research Center โ 1,200+
โโ ๐งโ๐ Johnson Space Center โ 1,200+
โโ ๐ Marshall Space Flight Center โ 1,000+
โโ ๐๏ธ Kennedy Space Center โ 840+
โโ โ๏ธ Armstrong Flight Research โ 840+
โโ ๐๏ธ NASA HQ (Washington DC) โ 570+
โโ ๐ป NASA Supercomputing Division โ 250+
โโ ๐ฅ Stennis Space Center โ 150+
๐๏ธ Subdomain analysis reveals:
โโ ๐ง Hundreds of mail server configurations
โโ ๐ง 1,000+ development & testing environments
โโ ๐ก 100+ API endpoints
โโ ๐ Documentation & wiki platforms
โโ ๐ Admin & monitoring infrastructure
โ ๏ธWhy this matters:
Email patterns reveal organizational structure, team sizes, naming conventions, and internal project names โ all without accessing a single system.
For security teams: if an attacker can map your entire organization from public sources, so should you.
All data sourced from publicly indexed breach databases.
๐ intelligencesecurity.io/en/search
๐ค t.me/intelligenceseโฆ#OSINT#CyberSecurity#InfoSec#NASA
GitHub - suuhm/CVE-2026-21509-handler: PowerShell script to check, apply, and test the Kill-Bit protection for the CVE-2026-21509 Microsoft Office zero-day vulnerability affecting Office 2016/2019/LTSC. github.com/suuhm/CVE-2026โฆ
๐ How Bug Bounty Researchers Use Stealer Intelligence
T-Mobile has been breached 9 times since 2018.
Before touching a single endpoint, we queried publicly indexed breach data through our platform.
One query returned:
โโ ๐๏ธ Internal engineering environments ]
โโ ๐ SSO & authentication portals
โโ ๐ Project management systems
โโ ๐ฆ Source code platforms
โโ ๐ VPN access points
โโ ๐ช Post-auth session data
โโ ๐ง Thousands of corporate emails across 6 subsidiary brands
This is how modern recon works in bug bounty:
You don't scan. You don't bruteforce.
You search what's already been indexed from infected machines.
Stealer logs show you what employees accessed โ internal tools, admin panels, staging environments โ all visible before writing a single exploit.
No hacking. Just intelligence.
๐ intelligencesecurity.io/en/search
๐ค t.me/intelligenceseโฆ#OSINT#BugBounty#InfoSec
Odyssey Stealer (macOS) malware being spread through Kimi chatbot AI artefact:
kimi[.]com/share/19c6bb6c-c172-82d9-8000-0000b6baa613
Base64 encoded curl to: kayeart[.]com
โผ๏ธ๐บ๐ธ A threat actor is allegedly selling scraped Polymarket user data, including 93K username lines with wallet IDs, usernames, X/Twitter accounts, deposit volumes, PnL, and exchange funding sources.
The full 180K scrape is also available. The dataset is being offered to a single buyer for $4,999.
๐ EMAIL RECON: uber.com โ 10,000+ Corporate Emails From One Query
In 2022, Uber was breached by a teenager using stolen contractor credentials + MFA fatigue.
We ran a single Email Recon query on uber.com through our platform.
๐ Results: 10,000+ corporate emails indexed
๐ What Email Recon reveals:
โโ ๐ฅ 7,227 employee emails (firstname.lastname pattern)
โโ ๐ 2,773 external contractor emails (@ext.uber.com)
โโ ๐ 12+ distribution/group lists
โโ ๐งช 20+ test accounts
โโ ๐ Regional emails from 8+ countries
๐ข Organizational structure visible:
โโ ๐ Security teams
โโ โ๏ธ Legal & Compliance
โโ ๐ฐ Finance & Billing
โโ ๐ Uber Eats operations
โโ ๐ด Jump/mobility teams
โโ ๐ Regional support (LATAM, Europe, Asia)
โ ๏ธ Why this matters:
The 2022 breach started with ONE contractor credential.
Today, 2,773 contractor emails are publicly indexed.
Email patterns reveal:
โโ Naming conventions (predictable)
โโ Team structures
โโ Third-party partnerships
โโ Internal project names
โโ Geographic operations
๐ก Recommendations for organizations:
โโ Monitor your domain in breach intelligence databases
โโ Audit which emails are publicly indexed
โโ Implement stricter email exposure policies
โโ Train contractors on security awareness
โโ Review distribution list visibility
10,000+ emails. Team structures. Naming patterns. All from one query.
The data exists. The question is: do you know your exposure?
๐ intelligencesecurity.io
๐ค t.me/intelligenceseโฆ#OSINT#CyberSecurity#InfoSec
๐ CASE STUDY: jeff@amazon.com โ What 796 Records Reveal About a Billionaire's Email
We searched Jeff Bezos' known corporate email jeff@amazon.com on Intelligence Security.
๐ RESULTS: 796 records found
๐ Breakdown:
โโ ๐ leaks.restricted (312) โ Credential dumps with jeff@amazon.com
โโ ๐ leaks.logs (207) โ Compromised systems referencing this address
โโ ๐ web.public (233) โ Cached references and mentions
โโ ๐ง darknet.tor (24) โ Tor marketplace & forum mentions
โโ ๐ฐ usenet/pastes/docs (20+)
๐ 207 Leak Logs from 25+ Countries:
โโ ๐ณ๐ฌ Nigeria: 25 โโ ๐บ๐ธ USA: 21
โโ ๐ฎ๐ณ India: 10 โโ ๐น๐ท Turkey: 10
โโ ๐ฟ๐ฆ South Africa: 8 โโ ๐ง๐ฉ Bangladesh: 8
โโ ๐จ๐ฆ Canada: 7 โโ ๐ซ๐ท France: 5
โโ ๐ง๐ท Brazil: 5 โโ ๐ต๐ฐ Pakistan: 4
โโ ๐ฒ๐ฆ Morocco: 3 โโ ๐ป๐ณ Vietnam: 3
โโ ๐ฌ๐ญ Ghana: 2 โโ ๐จ๐ณ China: 2
โโ 76 unidentified
โ ๏ธ Why are 207 compromised systems linked to jeff@amazon.com?
These aren't breaches against Jeff Bezos personally.
They're systems where users:
โโ Typed jeff@amazon.com in a form
โโ Had it saved in browser autofill
โโ Listed it in email databases for outreach
โโ Stored it in contact lists or CRM exports
โโ Used it as a "test email" in configurations
๐ The restricted leaks tell a bigger story:
312 credential dumps containing this email:
โโ Large compilation files (Nov-Dec 2025)
โโ Multi-million record combo lists
โโ Private channel distributions
โโ Actively traded in 2025-2026
๐ง 24 Darknet Tor references:
โโ Tor mirrors of news articles about Amazon
โโ Forum discussions about Amazon security
โโ Underground marketplace mentions
๐ฏ The lesson:
You don't need to be "breached" for your email to appear in 796 records.
Every service you signed up for, every form you filled, every database that was compromised โ it all accumulates.
Even the world's richest man has 207 leak logs linked to his email.
How many do YOU have?
๐ intelligencesecurity.io/search
๐ค t.me/intelligenceseโฆ#OSINT#CyberSecurity#InfoSec
๐B2B Data Brokers - The Industry Trading Your Information
Did you know companies exist solely to collect and sell professional data?
We searched apollo.io on Intelligence Security:
โ 6,940 results found
๐ What's exposed:
โโ ๐ Passwords: 403 files
โโ ๐ช Cookies: 537 files
โโ โจ๏ธ Autofills: 114 files
โโ ๐ Browser data: 990 files
โโ ๐ Combo lists: 2,164 files
โโ ๐ Other: 2,696 files
๐ข B2B platforms commonly found in leaks:
โโ Apollo.io โ 200M+ professional contacts
โโ Clearbit โ Business data enrichment
โโ Exactis โ 340M records leaked (2018)
โโ People Data Labs โ 1.2B records exposed
๐ What these databases contain:
โโ Corporate & personal emails
โโ Direct phone numbers
โโ Job titles & departments
โโ Employment history
โโ Linked social profiles
โโ Company revenue estimates
โโ Technology stack information
โ ๏ธ The risk:
When data brokers get breached, professional intel becomes accessible beyond sales teams:
โโ Detailed org charts exposed
โโ Executive contact info circulating
โโ Corporate structures mapped
โโ Years of enriched data in one place
๐ก๏ธ How to protect your organization:
โโ Search your corporate domain regularly
โโ Request data removal from brokers (GDPR/CCPA)
โโ Monitor executive exposure
โโ Train employees on data sharing risks
โโ Implement email obfuscation policies
Your professional data is a product. Know where it's circulating.
๐ intelligencesecurity.io/search
๐ค t.me/intelligenceseโฆ#OSINT#InfoSec#B2BData
๐ The Epstein Flight Logs: Publicly Unsealed Records
In January 2024, 950+ court documents were unsealed, including flight manifests from Epstein's private aircraft.
We indexed these public records in our database.
๐ Top passengers by documented flight count:
โโ Ghislaine Maxwell: 520 flights
โโ Bill Clinton: 25 flights
โโ Alan Dershowitz: 12 flights
โโ Kevin Spacey: 11 flights
โโ Chris Tucker: 11 flights
โโ Naomi Campbell: 5 flights
โโ Prince Andrew: 1 flight
โโ Donald Trump: 1 flight
๐ What's indexed:
โโ Flight_Logs/ โ Passenger manifests
โโ Names/ โ Cross-referenced individuals
โโ Jan-03-2024-Documents/ โ Court filings
โโ Names-vs-Docs/ โ Document correlations
โโ 721 files total from darknet.i2p archives
๐ก Why this matters:
Public court documents often end up fragmented across multiple sources. Intelligence Search consolidates them into a single searchable database.
Flight logs. Court filings. Name correlations. Seconds to search.
โ ๏ธ Note: Flight records indicate travel only, not involvement in any crimes. All data from publicly unsealed court documents.
๐ intelligencesecurity.io
๐ค t.me/intelligenceseโฆ#OSINT#Epstein#PublicRecords#CourtDocuments#Investigation
๐ The Epstein Flight Logs: Publicly Unsealed Records
In January 2024, 950+ court documents were unsealed, including flight manifests from Epstein's private aircraft.
We indexed these public records in our database.
๐ Top passengers by documented flight count:
โโ Ghislaine Maxwell: 520 flights
โโ Bill Clinton: 25 flights
โโ Alan Dershowitz: 12 flights
โโ Kevin Spacey: 11 flights
โโ Chris Tucker: 11 flights
โโ Naomi Campbell: 5 flights
โโ Prince Andrew: 1 flight
โโ Donald Trump: 1 flight
๐ What's indexed:
โโ Flight_Logs/ โ Passenger manifests
โโ Names/ โ Cross-referenced individuals
โโ Jan-03-2024-Documents/ โ Court filings
โโ Names-vs-Docs/ โ Document correlations
โโ 721 files total from darknet.i2p archives
๐ก Why this matters:
Public court documents often end up fragmented across multiple sources. Intelligence Search consolidates them into a single searchable database.
Flight logs. Court filings. Name correlations. Seconds to search.
โ ๏ธ Note: Flight records indicate travel only, not involvement in any crimes. All data from publicly unsealed court documents.
๐ intelligencesecurity.io/search
๐ค t.me/intelligenceseโฆ#OSINT#Epstein#Investigation
Intelligence Security
Discover If your data has been leaked. 1 email/domain search day/free.
Top Leak URLs
Subdomains
Related Domains
Sample Credentials
Risk Factors
intelligencesecurity.io#osint
๐ Why Cookies Can Be More Critical Than Passwords
We found in leak logs active sessions from enterprise services:
โ๏ธ AWS Console
โโ JWT tokens with session identifiers
โโ Console session cookies
โโ Allow access without re-authentication
๐ฌ Slack
โโ Corporate workspaces exposed
โโ Session cookies from multiple organizations
๐ Okta (SSO Provider)
โโ Employee session tokens
โโ Access to federated portals
๐ Salesforce
โโ CRM instances exposed
โโ Active session cookies
๐ท Microsoft 365
โโ login.microsoftonline.com cookies
โโ Persistent session tokens
โ ๏ธ Why Cookies Are Critical:
With a valid session cookie:
โโ โ No password required
โโ โ MFA not triggered (already validated)
โโ โ Session already authenticated
โโ โ Valid until expiration or logout
๐ก๏ธ How to Protect Yourself:
โโ Log out of sensitive services when done
โโ Use "Sign out all devices" periodically
โโ Enable login alerts
โโ Review active sessions regularly
โโ Clear browser cookies periodically
๐ข For Organizations:
โโ Implement session timeout policies
โโ Monitor access from unusual locations
โโ Force re-authentication for sensitive actions
One exposed cookie = full account access.
๐ Limited time: Up to 17% OFF on all plans โ ends in 3 days
intelligencesecurity.io/subscriptions/โฆ
Check your exposure:
๐ intelligencesecurity.io/search
๐ค t.me/intelligenceseโฆ#SessionSecurity#CyberSecurity#InfoSec#SecurityEducation#CloudSecurity
Weekly OSINT: February 2026 Vulnerabilities & Threat Activity
In the first week of February 2026, security researchers and national CERTs disclosed over 40 new product vulnerabilities across consumer and enterprise platforms, while multiple threat actors ramped up active exploitation and phishing campaigns. CISA updated its Known Exploited Vulnerabilities catalog, and inspections revealed supply-chain compromises, advanced ransomware evasion modules, and new RAT deployments. This report summarizes key disclosures, exploited flaws, emerging campaigns, and associated indicators.
CVE-2026-20841 - Windows Notepad App Remote Code Execution Vulnerability
For nearly thirty years, notepad.exe was treated as a simple utility. It functioned as a basic Win32 text editor designed solely to display text. A CVSS score of 8.8 for an application intended only for viewing data is a departure from the principle of least privilege.
The vulnerability allows an attacker to trick a user into clicking a malicious link embedded in a Markdown file opened in Notepad. Doing so can trigger untrusted protocols, leading to the download and execution of remote content.
#dfir#blueteam#pentest#redteam#cve#notepad
๐ API Keys in Leak Logs - The Hidden Exposure
Your API keys might be in exposed browser data right now.
When a system gets compromised, malware captures:
โโ Browser history (URLs with keys in query params)
โโ AutoFill data (saved API endpoints)
โโ Cookies (session tokens)
โโ Downloaded files (configs, .env files)
We searched for major API endpoints in leak logs:
๐ Live Data Search Results:
๐ต api.stripe.com
โโ Found in: AutoFill data from multiple browsers
โโ Context: Payment API endpoints saved in forms
๐ api.github.com
โโ Found in: Browser cookies
โโ Context: Session tokens + user fingerprints
๐ฑ api.telegram.org
โโ Found in: Chrome/Edge AutoFill data
โโ Context: Bot API endpoints saved in forms
๐ api.twilio.com
โโ Found in: Downloaded source files
โโ Context: Code with API configuration
โ๏ธ amazonaws.com
โโ Found in: Database dumps
โโ Context: AWS SES email configurations
๐ Where API Keys Hide in Leak Logs:
โโ ๐ Browser History
โ โโ api.service.com/?key=sk_live_xโฆ
โ
โโ โจ๏ธ AutoFill Data
โ โโ Saved API endpoints from dev tools
โ
โโ ๐ช Cookies
โ โโ Session tokens for API dashboards
โ
โโ ๐ FileGrabber
โ โโ .env files with API_KEY=xxx
โ โโ config.json with credentials
โ โโ Source code with hardcoded keys
โ
โโ ๐ฅ Downloads
โโ API documentation, SDK configs
โ ๏ธ Why This Is Critical:
Exposed API keys can lead to:
โโ Unauthorized access to paid services
โโ Data exposure from connected systems
โโ Financial impact from service abuse
โโ Reputation damage from compromised integrations
โโ Compliance violations (PCI, SOC2)
๐ก๏ธ How to Protect Your Keys:
โโ Never hardcode keys in source code
โโ Use environment variables properly
โโ Rotate keys regularly
โโ Monitor API usage for anomalies
โโ Use key vaults (AWS Secrets Manager, HashiCorp Vault)
โโ Implement IP allowlists where possible
๐ How to Check Your Exposure:
Search for:
โโ Your company domain (api.yourcompany.com)
โโ Service endpoints you use
โโ Email domains associated with APIs
Your keys are only as secure as every device that's touched them.
๐ SEARCH intelligencesecurity.io/search
๐ค t.me/intelligenceseโฆ#CyberSecurity#DevSecOps#InfoSec