mirror of
https://github.com/vitalysim/Awesome-Hacking-Resources.git
synced 2024-12-18 10:56:12 +00:00
Added OSINT
This commit is contained in:
parent
efd320adac
commit
9331c874a9
24
README.md
24
README.md
@ -268,6 +268,30 @@ Name | Description
|
|||||||
[Windows Privilege Escalation Guide](https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/) | Windows Privilege Escalation Guide
|
[Windows Privilege Escalation Guide](https://www.sploitspren.com/2018-01-26-Windows-Privilege-Escalation-Guide/) | Windows Privilege Escalation Guide
|
||||||
[Windows Privilege Escalation Methods for Pentesters](https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/) | Windows Privilege Escalation Methods for Pentesters
|
[Windows Privilege Escalation Methods for Pentesters](https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/) | Windows Privilege Escalation Methods for Pentesters
|
||||||
|
|
||||||
|
### OSINT Tools
|
||||||
|
|
||||||
|
* [XRay](https://github.com/evilsocket/xray) - XRay is a tool for recon, mapping and OSINT gathering from public networks.
|
||||||
|
* [Intel Techniques Online Tools](https://inteltechniques.com/menu.html) - Use the links to the left to access all of the custom search tools.
|
||||||
|
* [Buscador](https://inteltechniques.com/buscador/) - A Linux Virtual Machine that is pre-configured for online investigators
|
||||||
|
* [Maltego](http://www.paterva.com/web7/) - Proprietary software for open source intelligence and forensics, from Paterva.
|
||||||
|
* [theHarvester](https://github.com/laramies/theHarvester) - E-mail, subdomain and people names harvester
|
||||||
|
* [creepy](https://github.com/ilektrojohn/creepy) - A geolocation OSINT tool
|
||||||
|
* [exiftool.rb](https://github.com/mceachen/exiftool.rb) - A ruby wrapper of the exiftool, a open-source tool used to extract metadata from files.
|
||||||
|
* [metagoofil](https://github.com/laramies/metagoofil) - Metadata harvester
|
||||||
|
* [Google Hacking Database](https://www.exploit-db.com/google-hacking-database/) - a database of Google dorks; can be used for recon
|
||||||
|
* [Google-Dorks](https://github.com/arimogi/Google-Dorks) - Common google dorks and others you prolly don't know
|
||||||
|
* [GooDork](https://github.com/k3170makan/GooDork) - Command line go0gle dorking tool
|
||||||
|
* [dork-cli](https://github.com/jgor/dork-cli) - Command-line Google dork tool.
|
||||||
|
* [Shodan](https://www.shodan.io/) - Shodan is the world's first search engine for Internet-connected devices
|
||||||
|
* [recon-ng](https://bitbucket.org/LaNMaSteR53/recon-ng) - A full-featured Web Reconnaissance framework written in Python
|
||||||
|
* [github-dorks](https://github.com/techgaun/github-dorks) - CLI tool to scan github repos/organizations for potential sensitive information leak
|
||||||
|
* [vcsmap](https://github.com/melvinsh/vcsmap) - A plugin-based tool to scan public version control systems for sensitive information
|
||||||
|
* [Spiderfoot](http://www.spiderfoot.net/) - multi-source OSINT automation tool with a Web UI and report visualizations
|
||||||
|
* [DataSploit](https://github.com/upgoingstar/datasploit) - OSINT visualizer utilizing Shodan, Censys, Clearbit, EmailHunter, FullContact, and Zoomeye behind the scenes.
|
||||||
|
* [snitch](https://github.com/Smaash/snitch) - information gathering via dorks
|
||||||
|
* [Geotweet_GUI](https://github.com/Pinperepette/Geotweet_GUI) - Track geographical locations of tweets and then export to google maps.
|
||||||
|
|
||||||
|
|
||||||
### Malware Analysis
|
### Malware Analysis
|
||||||
Name | Description
|
Name | Description
|
||||||
---- | ----
|
---- | ----
|
||||||
|
Loading…
Reference in New Issue
Block a user