<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
     xmlns:admin="http://webns.net/mvcb/"
     xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:media="http://search.yahoo.com/mrss/">
<channel>
<title>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : OSINT</title>
<link>https://blog.intelligencex.org/rss/category/Open-Source-Intelligence</link>
<description>IntelligenceX Cybersecurity Blog &#45; Latest Cyber News, AI &amp;amp; Security Updates &#45; : OSINT</description>
<dc:language>en</dc:language>
<dc:rights>© 2026 IntelligenceX Blog. All rights reserved.</dc:rights>

<item>
<title>Google Dorking Mastery: From Passive OSINT to Finding Your Next $10,000 Bug Bounty</title>
<link>https://blog.intelligencex.org/google-dorking-bug-bounty-penetration-testing-osint-guide</link>
<guid>https://blog.intelligencex.org/google-dorking-bug-bounty-penetration-testing-osint-guide</guid>
<description><![CDATA[ Master Google dorking from basics to advanced techniques. Learn passive reconnaissance using 100+ search operators, discover exposed credentials and configurations, find hidden admin panels, and locate high-impact vulnerabilities without touching the target server. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202601/image_870x580_695ec9e33e2e5.webp" length="36940" type="image/jpeg"/>
<pubDate>Thu, 08 Jan 2026 02:33:19 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>Google dorking, Google hacking, OSINT, bug bounty reconnaissance, search operators, inurl, filetype, intitle, site operator, subdomain enumeration, exposed credentials, security testing, penetration testing dorks</media:keywords>
</item>

<item>
<title>Cloud Reconnaissance: How to Gather Intelligence from Cloud Services</title>
<link>https://blog.intelligencex.org/cloud-reconnaissance-gather-intelligence-from-cloud-services</link>
<guid>https://blog.intelligencex.org/cloud-reconnaissance-gather-intelligence-from-cloud-services</guid>
<description><![CDATA[ Cloud services often expose valuable intelligence through misconfigurations, metadata, and publicly accessible endpoints. This article explains how attackers and OSINT researchers perform cloud reconnaissance to identify assets, services, and potential security risks across major cloud platforms. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_6942a30ce3a28.webp" length="62320" type="image/jpeg"/>
<pubDate>Wed, 17 Dec 2025 18:02:47 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>cloud reconnaissance, cloud osint, cloud security, aws reconnaissance, azure reconnaissance, gcp reconnaissance, cloud asset discovery, cloud misconfiguration, osint cloud services, cloud attack surface</media:keywords>
</item>

<item>
<title>0&#45;Day Hunting Guide: Recon Techniques Nobody Talks About</title>
<link>https://blog.intelligencex.org/zero-day-hunting-advanced-recon-techniques-2025</link>
<guid>https://blog.intelligencex.org/zero-day-hunting-advanced-recon-techniques-2025</guid>
<description><![CDATA[ Master zero-day vulnerability hunting through advanced reconnaissance techniques that elite bug bounty hunters use but rarely share: JavaScript mining, ASN enumeration, cloud bucket discovery, GitHub secret scanning, and behavioral anomaly detection, the underground methods separating the top 1% from everyone else. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_693b4c10f0d7f.webp" length="24268" type="image/jpeg"/>
<pubDate>Fri, 12 Dec 2025 04:26:31 +0530</pubDate>
<dc:creator>sbow</dc:creator>
<media:keywords>zero-day hunting, advanced recon techniques, bug bounty recon, JavaScript endpoint discovery, ASN enumeration, cloud bucket hunting, GitHub secrets, behavioral detection, OSINT techniques, vulnerability discovery</media:keywords>
</item>

<item>
<title>React2Shell Ultimate &#45; The First Autonomous Scanner for Next.js RSC RCE (CVE&#45;2025&#45;66478)</title>
<link>https://blog.intelligencex.org/react2shell-ultimate-nextjs-rce-scanner-cve-2025-66478</link>
<guid>https://blog.intelligencex.org/react2shell-ultimate-nextjs-rce-scanner-cve-2025-66478</guid>
<description><![CDATA[ React2Shell Ultimate is a red-team-grade scanner built to detect and validate the critical Next.js React Server Components remote code execution vulnerability (CVE-2025-66478). This article breaks down how the exploit works, how the tool operates, and why it matters for engineering, DevSecOps, and offensive security teams. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202512/image_870x580_69346563e06f3.webp" length="51678" type="image/jpeg"/>
<pubDate>Sat, 06 Dec 2025 22:49:08 +0530</pubDate>
<dc:creator>Jack Barlow</dc:creator>
<media:keywords>Next.js, React, RCE, CVE-2025-66478, Offensive Security, Red Team Tools, RSC Vulnerability, JS Security, Scanners</media:keywords>
</item>

<item>
<title>Using OSINT and Reconnaissance to Strengthen Malware Analysis</title>
<link>https://blog.intelligencex.org/osint-reconnaissance-malware-analysis</link>
<guid>https://blog.intelligencex.org/osint-reconnaissance-malware-analysis</guid>
<description><![CDATA[ Discover how cybersecurity analysts leverage OSINT (Open Source Intelligence) and reconnaissance techniques to uncover the story behind malware. Learn how open data, domain research, and threat intelligence transform static malware indicators into actionable insights for defense and attribution. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202511/image_870x580_6926bc2d000ba.webp" length="48944" type="image/jpeg"/>
<pubDate>Fri, 07 Nov 2025 02:26:00 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>OSINT, malware analysis, cyber threat intelligence, reconnaissance, IOC enrichment, malware research, threat hunting, cybersecurity blog, MITRE ATT&amp;CK</media:keywords>
</item>

<item>
<title>&amp;quot;Isn’t OSINT Just Glorified Googling?&amp;quot;</title>
<link>https://blog.intelligencex.org/osint-more-than-googling</link>
<guid>https://blog.intelligencex.org/osint-more-than-googling</guid>
<description><![CDATA[ Many people think OSINT (Open-Source Intelligence) is just “fancy Googling,” but it’s much more than that. OSINT is a structured way of gathering and analyzing information from many sources — not just Google. It covers the surface web, social media, public records, the deep web, and even parts of the dark web. Unlike casual searching, OSINT involves careful verification, spotting patterns, connecting dots, and using advanced tools like Maltego or SpiderFoot. This makes it a powerful method for investigations such as cybercrime, human rights, and war crimes. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e767e7aef81.webp" length="58106" type="image/jpeg"/>
<pubDate>Fri, 29 Aug 2025 17:03:34 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords>“OSINT isn’t just glorified Googling — it uses deep, systematic methods, verification, and advanced tools to uncover intelligence across the surface, deep, and dark web.”</media:keywords>
</item>

<item>
<title>How I Found Multiple Bugs On Dell Technology Using Reconnaissance (OSINT)</title>
<link>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</link>
<guid>https://blog.intelligencex.org/dell-reconnaissance-osint-bug-bounty</guid>
<description><![CDATA[ A detailed bug bounty write-up on how I discovered multiple vulnerabilities in Dell by leveraging reconnaissance and OSINT techniques. This article explains the methodology, tools, and thought process behind identifying exposed assets, misconfigurations, and sensitive information during recon. ]]></description>
<enclosure url="https://blog.intelligencex.org/uploads/images/202510/image_870x580_68e76474ae174.webp" length="45534" type="image/jpeg"/>
<pubDate>Thu, 28 Aug 2025 17:33:27 +0530</pubDate>
<dc:creator>Root</dc:creator>
<media:keywords></media:keywords>
</item>

</channel>
</rss>