除了hackerone和bugcrowd之外:
- https://www.openbugbounty.org/ 这个可以作为搜集一些常见被报告的网站信息
- https://yeswehack.com/programs 只有少数有bug bounty
企业的分公司,全资子公司,网站域名、手机app,微信小程序,企业专利品牌信息,企业邮箱,电话。 参考:
企查查、天眼查淘宝都有那种一天的会员。对于我们信息收集其实已经够用。
- 天眼查
- 企查查
- https://www.whois.com/whois/
- http://whois.chinaz.com/
- https://whois.aliyun.com/
- https://www.whois365.com/cn/
- https://www.aizhan.com/
- http://www.miitbeian.gov.cn/publish/query/indexFirst.action
比如收集百度: https://bgp.he.net/search?search%5Bsearch%5D=baidu&commit=Search
-
https://github.com/j3ssie/metabigor/releases 这个工具用到的API是:(http://asnlookup.com/api/lookup?org=baidu, https://bgp.he.net/search?search%5Bsearch%5D=baidu&commit=Search)
-
https://github.com/yassineaboukir/Asnlookup 这个工具其实也是用的http://asnlookup.com/api/lookup?org=baidu
然后用ASN枚举工具,枚举出某个ASN号码的IP段:
Google搜集C段:
- site:202.202.43.*
- https://img.cy/ip
- http://www.ip138.com/ips1388.asp
- http://ip.soshoulu.com/
- https://www.ipip.net/ip.html
- https://github.com/shmilylty/OneForAll 注意升级!使用代理和不使用代理都来一套。
下载地址: https://github.com/EdgeSecurityTeam/EHole 使用方法:
./Ehole-darwin -l url.txt //URL地址需带上协议,每行一个
./Ehole-darwin -f 192.168.1.1/24 //支持单IP或IP段,fofa识别需要配置fofa密钥和邮箱
./Ehole-darwin -l url.txt -json export.json //结果输出至export.json文件
下载地址: https://github.com/s7ckTeam/Glass 使用方法:
python3 Glass.py -u http://www.examples.com // 单url测试
python3 Glass.py -w domain.txt -o txt/html // url文件内
https://github.com/broken5/bscan
https://github.com/zhzyker/dismap
参考:
https://github.com/paulirish/github-email/
curl "https://api.hackertarget.com/nmap/?q=baidu.com"
- hash识别
- http://www.fileformat.info/tool/hash.htm
- http://www.cmd5.com/
- https://crackstation.net/
- https://passwordrecovery.io/sha256/
- https://www.nirsoft.net/utils/hashmyfiles-x64.zip
- https://github.com/HongLuDianXue/BaiLu-SED-Tool
- https://github.com/huyuanzhi2/password_brute_dictionary
- http://ceye.io/
- http://dnsbin.zhack.ca/
- http://dnslog.cn/
- xxx.burpcollaborator.net
- https://www.becmd.com/
- http://z-sms.com/lv?pho_num=17061084088&1
- https://www.materialtools.com/
- https://yunduanxin.net/China-Phone-Number/
- https://www.hybrid-analysis.com/
- https://www.virustotal.com/
- http://malc0de.com/database/
- https://malwr.com/analysis/search/
- https://x.threatbook.cn/
- https://koodous.com/
- https://www.tooleyes.com/app/id_photo.html
- https://www.gaitubao.com/bgcolor
- https://www.bgconverter.com/
- https://xz.aliyun.com/
- https://www.anquanke.com/
- https://www.freebuf.com/
- http://paper.seebug.org
- https://bbs.ichunqiu.com
- https://bbs.pediy.com/
- https://www.52pojie.cn
- https://archive.org/details/jdk-7u80-windows-x64_201809
- https://files-cdn.liferay.com/mirrors/download.oracle.com/otn-pub/java/jdk/7u80-b15/
"burp" site:https://xz.aliyun.com/ OR https://www.anquanke.com/ OR http://paper.seebug.org OR https://www.freebuf.com/ OR https://bbs.ichunqiu.com OR https://bbs.pediy.com/ OR https://www.52pojie.cn