Investigator515
Investigator515

Investigator515

We write about cybersecurity, technology, managing your privacy and open source intelligence. We're passionate about giving people the tools they need to feel empowered by technology, not overwhelmed. Did we also mention we're straight up nerds at heart? Get the latest information on blog posts and production information via our telegram: t.me/investigator515


Image Analysis & OSINT: Data Sources

12 Mar 2025 4 minute read 0 comments Investigator515

Image analysis plays a critical role in open-source intelligence gathering. While the past few years have seen open-source intelligence become more commercialised and mainstream, there are still plenty of people who enjoy learning foundational OSINT...

What The Tech?! Drones

2 Mar 2025 6 minute read 0 comments Investigator515

Drone Technology would help usher in a new technological shift In the years following the Second World War, we saw the rapid development of new technology across many sectors. This would cause ongoing changes to things like life expectancy and our ov...

Social Links: Configuring Maltego Transforms

24 Feb 2025 5 minute read 0 comments Investigator515

Expand your transforms and expand your search capability. In previous articles, we looked at some of the benefits of applying open-source investigative tools to your workflow and covered why in some instances paid resources can sometimes be the best...

Jupiters $5 in 5 Years Plan

20 Feb 2025 2 minute read 0 comments Investigator515

This article was compiled from a long-form twitter thread. To read the original, visit this link: https://x.com/inv515/status/1892592548067061890 @JupiterExchange is Solana’s current DEX king. Swaps, perps & limit orders are all fire. The JUP token i...

Lights On, Hazards Off: Exploring The Dark Web

20 Feb 2025 6 minute read 4 comments Investigator515

It’s time to strip away the aura and look at Darkweb navigation for newbies. This tutorial is provided for educational purposes only. Please remember that Darkweb research may be restricted in your location. Readers are encouraged to adhere to the la...

5 Essential Reads For Tech & Cyber Fans

13 Feb 2025 4 minute read 2 comments Investigator515

If you’re into infosec or cyber, you’ve probably already realised that there’s plenty of information to get your head around. Often, this can mean trawling through lots of data or analysing code or other relevant information. One of the coolest aspec...

Historical Hacks: Operation Aurora

8 Feb 2025 5 minute read 0 comments Investigator515

In previous articles, we’ve made the point that in the early days, a lot of notable cybersecurity events weren’t exactly what we’d call malicious. While they’d certainly be damaging in terms of lost productivity or downtime, often these attacks were...

What The Tech?! Genetic Modification

2 Feb 2025 5 minute read 6 comments Investigator515

This controversial technology has now become commonplace In the post-COVID era, there’s been plenty of fresh controversy around scientific and medical procedures. This has included things like vaccines and even things like the efficacy and safety in...

Firmware Hardware & Ownership: What A Predicament

27 Jan 2025 6 minute read 0 comments Investigator515

Remote firmware upgrades provide convenience with a disturbing twist There’s no debating that there have been some absolutely epic battles regarding privacy in recent years. With social media changing the dynamic around things like privacy and owners...

Historical Hacks: On The Run With Kevin

24 Jan 2025 5 minute read 0 comments Investigator515

Kevin Mitnick achieved notoriety for his offensive hacking techniques. When you look at the early pioneers of cyber and information security, there’s no denying that there have been some controversial yet influential people in the field who helped es...