Your generous donations will keep me motivated.
https://www.projecthoneypot.org/list_of_ips.php
TIP:-2- you can visite this website if you want To see a list of websites that have been hacked before:
TIP:-4-Netcraft is a popular security scanner site that gives detailed information(IPv6, domain register, name server, DNS admin,(SPF),Site technology,hosting provider) about target website:
https://searchdns.netcraft.com
https://www.dnsstuff.com/tools
TIP:-6-This website gives you as a hacker a detailed DNS information about a target domain name such as:DNS lookup,MX lookup,WHOIS lookup,Sender Policy Framework (SPF)lookup,and DNS propagation,authoritative name server of the target domain name
TIP:-9-This is a global network of live cameras providing live streaming video from different countries in the world for free:
https://sno.phy.queensu.ca/~phil/exiftool
TIP:-11- TinEye is a reverse image search engine,You can search by image or URL,more than 24 billion images have already been indexed:
http://www.reverse-image-search.com
http://www.faganfinder.com/filetype
TIP:-20- you can use this awesome search engine to locate different file types online ,using 11 file-hosting websites + You can select the file type:
TIP:-21- you can use this awesome search engine to locate different file types online,60 file-hosting sites simultaneously + download 500MB daily:
https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056/
TIP:-25- This is the largest database of airport webcams, Watch free livestreams from airport webcams around the world 24/7:
-1-StartPage:https://www.startpage.com
-2-Lukol:https://www.lukol.com
-3-Mozbot:https://www.mozbot.com
-1-Link Extractor:http://www.webtoolhub.com/tn561364-link-extractor.aspx
-2-Free URL Extractor:http://www.bulkdachecker.com/url-extractor
-3-Link Gopher:https://sites.google.com/site/linkgopher
TIP:-29- this is a free search engine that allow you to find people by their name, phone number, and email address:
http://www.fortypoundhead.com/tools_dpw.asp
TIP:-32- Search for all the possible email addresses + subdomains + Get information from netcraft + Perform a Whois lookup:
dmitry -iwnse target.com
dmitry -p target.com -f -b
TIP:-35- this awesome service will allow you to discover, monitor, and analyze publicly available devices:
TIP:-36- you can use this scan The ACK scan to show unfiltered and filtered ports instead of open and closed ports:
nmap -sA x.x.x.x
TIP:-37- you can Use Shodan to find internet connected devices,it scan for common ports + performs banner grabbing then displays devices accessible over the web,including routers + network device + webcams + surveillance device + traffic cams + SCADA systems:
-useful resources:
-1-Shodan Queries.txt:
-2-Information Gathering with Shodan.pdf:
-3-Passive Data Collecting: Shodan.pdf:
https://hackertarget.com/reverse-dns-lookup
TIP:-39-hidden wiki:
http://zqktlwi4fecvo6ri.onion/wiki/index.php/Main_Page
-1-Ahmia:http://msydqstlz2kzerdg.onion
-2-Candle:http://gjobqjj7wyczbqie.onion
-3-Torch:http://xmh57jrzrnw6insl.onion
-4-Grams:http://grams7enufi7jmdl.onion
-5-not Evil:http://hss3uro2hsxfogfq.onion
-6-DuckDuckGo:https://3g2upl4pq6kufc4m.onion
-7-Searx:http://lqdnpadpys4snom2.onion
-8-EasyCoin:http://easycoinsayj7p5l.onion
-9-WeBuyBitcoins:http://jzn5w5pac26sqef4.onion
-10-OnionWallet:http://ow24et3tetp6tvmk.onion
-11-Atlayo;http://atlayofke5rqhsma.onion
-12-BlackBook:http://blkbook3fxhcsn3u.onion
-13-Daniel’s Chat:http://danschatjr7qbwip.onion
-14-Onion Mail:http://p6x47b547s2fkmj3.onion
-15-RetroShare chat server:http://chat7zlxojqcf3nv.onion
-16-TorBox:http://torbox3uiot6wchz.onion
-17-Mail2Tor:http://mail2tor2zyjdctd.onion
TIP:-41-Searches through git repositories for high entropy strings and secrets,digging deep into commit history:
-1-setup:
pip install truffleHog
-2-usage:
trufflehog --regex --entropy=False https://github.com/dxa4481/truffleHog.git
-1-setup:
git clone https://github.com/cheetz/sslScrape.git && cd sslScrape && pip install ndg-httpsclient && pip install python-masscan
-2-usage:
python sslScrape.py [CIDR Range]
https://www.openstreetcam.org/map
https://reolink.com/unsecured-ip-camera-list
http://www.the-webcam-network.com
-setup:
pip install waybackpack
-usage:
waybackpack dol.gov -d ~/Downloads/dol-wayback --to-date 1996
TIP:-50- this website capture,preserve,and make accessible UK central government information published on the web.since 1996 to the present.The archived contents include videos, tweets, and web pages.:
http://www.nationalarchives.gov.uk/webarchive/
TIP:-51- extract hidden information from videos uploaded to YouTube,like the upload date/time and thumbnails:
https://citizenevidence.amnestyusa.org
-1-setup:
go get github.com/nuncan/slurp && cd slurp && go build
-2-usage:
slurp domain <-t|--target> google.com will enumerate the S3 domains for a specific target.
slurp keyword <-t|--target> linux,golang,python will enumerate S3 buckets based on those 3 key words.
TIP:-53- View all tweets from any Twitter user on one page. Fast, Free and Easy. Great for viewing, searching and archiving old tweets:
TIP:-54- Trendsmap is a mashup of location-based tweets and a map interface. You can zoom, pan, and jump to locales to see what the trending topics are:
TIP:-55- Foller.me is a Twitter analytics application that gives you rich insights about any public Twitter profile:
TIP:-56- Want to know the source of a quote? The app will help you find out who was the first person who shared a link, video, quote or any piece of text :
TIP:-57- View your followers & discover follower insights of any twitter user.Filter & sort followers by their follower count,interest scores, key words,language & more (a maximum of 10,000 followers can be loaded).):
https://socialbearing.com/search/followers
https://moz.com/followerwonk/analyze
https://github.com/x0rz/tweets_analyzer
https://cse.google.com/cse/publicurl?cx=001394533911082033616:tm5y1wqwmme
TIP:-63- Tone Analyzer. This service uses linguistic analysis to detect joy, fear, sadness, anger, analytical, confident and tentative tones found in text:
https://tone-analyzer-demo.mybluemix.net
TIP:-64- 411 is a leading white pages directory with phone numbers,people,addresses,and more. Find the person you're looking for and search public records ,you can search for people within the United States:
https://default-password.info/
https://archive.codeplex.com/?p=oometaextractor
TIP:-68- this is a very useful and important site in the world of osint because it allows you to browse certificate transparency logs so you can find subdomains associated with certificates:
TIP:-69-:operative framework is a OSINT investigation framework, you can interact with multiple targets, execute multiple modules, create links with target, export rapport to PDF file, add note to target or results, interact with RESTFul API, write your own modules:
https://github.com/graniet/operative-framework
TIP:-71- Enumerates various common service (SRV) records for a given domain name.exposing internal server endpoints:
nmap --script dns-srv-enum --script-args dns-srv-enum.domain=facebook.com
nmap -Pn -sS -A -vvvv -p21 xx.xx.xx.xx --reason
https://github.com/GerbenJavado/LinkFinder
https://github.com/003random/getJS
TIP:-75-The World's largest gravesite collection. Contribute, create and discover gravesites from all over the world. Find A Grave - Millions of Cemetery Records.:
nmap --script http-open-proxy -p8080 xx.xx.xx.xx
nmap -p25 --script smtp-brute xx.xx.xx.xx
TIP:-78-Username Search for the most popular Social Media and Social Networking sites. Check for your brand, trademark, product or user name on 160 Social networks:
TIP:-79-Use Namechk to search for an available username or domain and secure your brand across the internet as well as username registration:
TIP:-81- Username Search - Search username, email or phone number to find the identity across billions of profiles in all social networks:
https://tools.verifyemailaddress.io/
TIP:-84- Email Checker is a free email verification tool. It helps you validate any email address online for free:
TIP:-85- Check if an e-mail address is valid or not. Find out why a mail bounces. Get technical information about a mail account and it's mail (SMTP) server:
http://mailtester.com/testmail.php
TIP:-86- Improve your email sender reputation and reduce bounce rates: real-time email validation API and bulk email list cleaning. Free trial & 100% accuracy:
https://www.email-validator.net
http://metricsparrow.com/toolkit/email-permutator
TIP:-89- ipTRACKERonline's email header analysis tool allows you to track where that email actually originated from. This is a totally free email tracking tool:
https://www.iptrackeronline.com/email-header-analysis.php
TIP:-90- ZLOOKUP is world's best Reverse Phone Lookup tool. Identify all incoming calls. Find out who called. Enter Phone, get full name:
https://www.reversephonelookup.com
TIP:-92- Validate number format and look up provider & device type to reach verified users via voice & text. Free to use:
TIP:-93- Spy Dialer is the totally 100% seriously free reverse phone number lookup used by millions of people. NO membership required!:
TIP:-95-Creepy. A Geolocation OSINT Tool. Offers geolocation information gathering through social networking platforms:
TIP:-96- Browse Opentopia's vast webcam database, containing thousands of live webcam views from around the world:
http://www.opentopia.com/hiddencam.php
https://www.livefromiceland.is/webcams/geysir
nmap -sV -p110,995 --script pop3-capabilities xx.xx.xx.xx --reason -vvvv
https://github.com/haccer/subjack
TIP:-100- Find information on any domain name or website. Large database of whois information, DNS, domain names, name servers, IPs, and tools:
TIP:101- We can enumerate an HTTP target using the nikto,Nikto outputs information on the HTTPS certificate,the server banner,any security-related HTTP headers that may be missing:
nikto -h https://target.com
http://www.yougetsignal.com/tools/web-sites-on-web-server/
https://github.com/techgaun/github-dorks
msf > use auxiliary/gather/searchengine_subdomains_collector
msf auxiliary(searchengine_subdomains_collector) > set TARGET yahoo.com
TARGET => yahoo.com
msf auxiliary(searchengine_subdomains_collector) > run
-1-setup:
go get github.com/anshumanbh/tko-subs
-2-usage:
./tkosubs -domains=subdomains.txt -data=providers-data.csv -output=results.csv
TIP:-107- BreachAlarm scan the Internet for stolen password data posted by hackers & lets you know if your email & password combination has been compromised:
TIP:-108- BriteVerify is an email verification platform that allows users to ensure addresses exist before sending their emails:
https://thatsthem.com/reverse-email-lookup
TIP:-112- Sublist3r is a Python-based script that can be utilized during domain harvesting.Some companies have very unique subdomains that can't be found in common word lists. this tool uses different "google dork" style search queries to gather subdomains .+The tool utilize APIs such as Google, Bing, Baidu, and ASK search engines. It also searches in NetCraft,Virustotal,ThreatCrowd,DNSdumpster,and reverseDNS.this tool also performs brute force attack using a specific wordlist:
-1-setup:
git clone https://github.com/aboul3la/Sublist3r.git && sudo pip install dnspython
-2-usage:
python sublist3r.py -d target.com -o results.txt
-1-launching brute-force attack against:
-admin panel page
-websites login fields
-2-launching a phishing attack (against employees,random targets,specific person)
-3-password spraying attack
-4-get in to inside the company by searching for leaked info related to email addresses gathered,,,,,,,,,,,,,,,,,,,,,,etc
-1- to expand your attack surface
-2-Some subdomains can indicate the type of server it is (vpn,mail,internal,test).
-3-Subdomains can provide information about where the target is hosting their servers.
-4-Many website owners may create subdomains to test new technology before applying it to the main site(beta.target.com). Such sites are insecure because they are used in the development stage and could be left open to attack.
-5-may the main domain is protected AND well secured but this should not necessarily applied be applied to the subdomains
-6-you may discover a subdomain that have errors that may lead to vulnerabilities(leaking info,subdomain takeovers)
-7-discovering subdomains will lead to discover additional IPs ,you can port scan those subdomains and you may find some ports that should not opened that may lead to the vulnerabilities .
-8-,,,,,,,,,,,,,,,,,,,etc