https://www.projecthoneypot.org/list_of_ips.php
https://searchdns.netcraft.com
https://www.dnsstuff.com/tools
https://sno.phy.queensu.ca/~phil/exiftool
http://www.reverse-image-search.com
http://www.faganfinder.com/filetype
https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056/
-1-StartPage:https://www.startpage.com
-2-Lukol:https://www.lukol.com
-3-Mozbot:https://www.mozbot.com
-1-Link Extractor:http://www.webtoolhub.com/tn561364-link-extractor.aspx
-2-Free URL Extractor:http://www.bulkdachecker.com/url-extractor
-3-Link Gopher:https://sites.google.com/site/linkgopher
http://www.fortypoundhead.com/tools_dpw.asp
dmitry -iwnse target.com
dmitry -p target.com -f -b
nmap -sA x.x.x.x
-useful resources:
-1-Shodan Queries.txt:
-2-Information Gathering with Shodan.pdf:
-3-Passive Data Collecting: Shodan.pdf:
https://hackertarget.com/reverse-dns-lookup
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
-1-Ahmia:http://msydqstlz2kzerdg.onion
-2-Candle:http://gjobqjj7wyczbqie.onion
-3-Torch:http://xmh57jrzrnw6insl.onion
-4-Grams:http://grams7enufi7jmdl.onion
-5-not Evil:http://hss3uro2hsxfogfq.onion
-6-DuckDuckGo:https://3g2upl4pq6kufc4m.onion
-7-Searx:http://lqdnpadpys4snom2.onion
-8-EasyCoin:http://easycoinsayj7p5l.onion
-9-WeBuyBitcoins:http://jzn5w5pac26sqef4.onion
-10-OnionWallet:http://ow24et3tetp6tvmk.onion
-11-Atlayo;http://atlayofke5rqhsma.onion
-12-BlackBook:http://blkbook3fxhcsn3u.onion
-13-Daniel’s Chat:http://danschatjr7qbwip.onion
-14-Onion Mail:http://p6x47b547s2fkmj3.onion
-15-RetroShare chat server:http://chat7zlxojqcf3nv.onion
-16-TorBox:http://torbox3uiot6wchz.onion
-17-Mail2Tor:http://mail2tor2zyjdctd.onion
-1-setup:
pip install truffleHog
-2-usage:
trufflehog --regex --entropy=False https://github.com/dxa4481/truffleHog.git
-1-setup:
git clone https://github.com/cheetz/sslScrape.git && cd sslScrape && pip install ndg-httpsclient && pip install python-masscan
-2-usage:
python sslScrape.py [CIDR Range]
https://www.openstreetcam.org/map
https://reolink.com/unsecured-ip-camera-list
http://www.the-webcam-network.com
-setup:
pip install waybackpack
-usage:
waybackpack dol.gov -d ~/Downloads/dol-wayback --to-date 1996
http://www.nationalarchives.gov.uk/webarchive/
https://citizenevidence.amnestyusa.org
-1-setup:
go get github.com/nuncan/slurp && cd slurp && go build
-2-usage:
slurp domain <-t|--target> google.com will enumerate the S3 domains for a specific target.
slurp keyword <-t|--target> linux,golang,python will enumerate S3 buckets based on those 3 key words.
https://socialbearing.com/search/followers
https://moz.com/followerwonk/analyze
https://awesomeopensource.com/project/x0rz/tweets_analyzer
https://cse.google.com/cse/publicurl?cx=001394533911082033616:tm5y1wqwmme
https://tone-analyzer-demo.mybluemix.net
https://default-password.info/
https://archive.codeplex.com/?p=oometaextractor
https://awesomeopensource.com/project/graniet/operative-framework
nmap --script dns-srv-enum --script-args dns-srv-enum.domain=facebook.com
nmap -Pn -sS -A -vvvv -p21 xx.xx.xx.xx --reason
https://awesomeopensource.com/project/GerbenJavado/LinkFinder
https://awesomeopensource.com/project/003random/getJS
nmap --script http-open-proxy -p8080 xx.xx.xx.xx
nmap -p25 --script smtp-brute xx.xx.xx.xx
https://tools.verifyemailaddress.io/
http://mailtester.com/testmail.php
https://www.email-validator.net
http://metricsparrow.com/toolkit/email-permutator
https://www.iptrackeronline.com/email-header-analysis.php
https://www.reversephonelookup.com
http://www.opentopia.com/hiddencam.php
https://www.livefromiceland.is/webcams/geysir
nmap -sV -p110,995 --script pop3-capabilities xx.xx.xx.xx --reason -vvvv
https://awesomeopensource.com/project/haccer/subjack
nikto -h https://target.com
http://www.yougetsignal.com/tools/web-sites-on-web-server/
https://awesomeopensource.com/project/techgaun/github-dorks
msf > use auxiliary/gather/searchengine_subdomains_collector
msf auxiliary(searchengine_subdomains_collector) > set TARGET yahoo.com
TARGET => yahoo.com
msf auxiliary(searchengine_subdomains_collector) > run
-1-setup:
go get github.com/anshumanbh/tko-subs
-2-usage:
./tkosubs -domains=subdomains.txt -data=providers-data.csv -output=results.csv
https://thatsthem.com/reverse-email-lookup
-1-setup:
git clone https://github.com/aboul3la/Sublist3r.git && sudo pip install dnspython
-2-usage:
python sublist3r.py -d target.com -o results.txt
-1-launching brute-force attack against:
-admin panel page
-websites login fields
-2-launching a phishing attack (against employees,random targets,specific person)
-3-password spraying attack
-4-get in to inside the company by searching for leaked info related to email addresses gathered,,,,,,,,,,,,,,,,,,,,,,etc
-1- to expand your attack surface
-2-Some subdomains can indicate the type of server it is (vpn,mail,internal,test).
-3-Subdomains can provide information about where the target is hosting their servers.
-4-Many website owners may create subdomains to test new technology before applying it to the main site(beta.target.com). Such sites are insecure because they are used in the development stage and could be left open to attack.
-5-may the main domain is protected AND well secured but this should not necessarily applied be applied to the subdomains
-6-you may discover a subdomain that have errors that may lead to vulnerabilities(leaking info,subdomain takeovers)
-7-discovering subdomains will lead to discover additional IPs ,you can port scan those subdomains and you may find some ports that should not opened that may lead to the vulnerabilities .
-8-,,,,,,,,,,,,,,,,,,,etc