NEXOR
OSINT specialist exploring digital footprints, automation, and privacy through ethical reconnaissance
About
I'm not a "cybersecurity expert" — I'm a curious person who spends too much time on the internet where data leaks, footprints linger, and systems whisper their secrets.
My work sits at the intersection of OSINT, automation, digital privacy. I build tools that help discover what's hidden in plain sight, always with ethics as my north star.
I believe that automation should be silent, ethical, and precise. Every tool I create is a reflection of this philosophy.
Skills & Expertise
OSINT
Automation
Privacy & Security
Development
Portfolio
OSINT Automation Suite
A comprehensive toolkit for automated digital footprint mapping. Aggregates data from multiple sources with minimal exposure.
Telegram Intelligence Bot
Real-time threat intelligence and OSINT data aggregation via Telegram. Silent, efficient, and ethical.
Privacy Audit Framework
Automated privacy assessment tool that identifies digital exposure points and recommends mitigation strategies.
Data Correlation Engine
Connects disparate data sources to identify relationships and patterns. Useful for threat analysis and investigation.
Web Reconnaissance Tool
Deep web scanning and endpoint discovery. Maps attack surface and identifies vulnerabilities from external perspective.
Intelligence Dashboard
Real-time visualization of threat intelligence, vulnerability tracking, and security metrics in one unified interface.
Latest Insights
Silent Automation: The Ethics of OSINT
Exploring the fine line between reconnaissance and invasion of privacy. How to automate responsibly without leaving traces.
Data Leaks in Plain Sight
Organizations unknowingly leak critical information through public repositories, social media, and misconfigured endpoints.
Building Your First OSINT Workflow
A practical guide to setting up efficient OSINT pipelines using open-source tools and Python automation scripts.
Understanding Digital Footprints
A deep dive into how digital traces accumulate across the internet and what they reveal about individuals and organizations.
Threat Intelligence Automation
Automating threat intelligence collection and analysis using APIs, webhooks, and intelligent data processing pipelines.
Privacy First: Designing Secure Tools
Design principles for building security tools that protect user privacy while maintaining functionality and performance.