Jump to content

Search the Community

Showing results for tags 'osint'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Cyber Security
    • Application Security
    • Information Security
    • Network Security
    • Penetration Testing
    • Social Engineering
  • Computer Science
    • Hardware
    • Software
    • Operating Systems
    • Programming
    • IT, Engineering, Mathematics
    • Design, Modeling, Animation
  • General
    • Other Discussions
    • Linktionary
    • Media & Games

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...

Found 10 results

  1. Sn1per is an opensource AIO offensive security framework that includes features such as: Attack Surface Discovery Penetration Testing Visual Recon IT Asset Inventory Vulnerability Management Web Application Scans Reporting OSINT Collection Continuous Scan Coverage Domain Takeover Tools There are also many help topics and integration guides listed directly in the README. Link to repository: https://github.com/1N3/Sn1per
  2. Shodan is an Internet of Things search engine that allows you to search and scan a wide variety of devices using a wide array of filters. Some will limit their information gathering to things that they see on the web. You can go beyond this, and Shodan is a tool to help with that: phones, controllers, refrigerators, etc. Shodan has powerful dashboards, community curated filters, and a powerful API to let you plug right into their platform. Here is a HackerSploit video covering some of the basics of Shodan: And if you want to check out the engine for yourself...well, here you go! Link to website: https://www.shodan.io/
  3. URLCrazy is a domain typo generator that looks useful for testing domain typos and variations, which can have a ton of uses: typo squatting, URL hijacking, phishing, etc. Other use cases might include detecting who is using variations of your domain name (to inform your users), which can help protect your brand and inform your users. Link to the repository: https://github.com/urbanadventurer/urlcrazy
  4. The Recon-ng Framework provides a web-based environment to conduct reconnaissance quickly and easily. It is written in python and has a look similar to Metasploit, is modular, and has a development guide for building new modules. Here is an included video introduction to help you learn more about and get started with Recon-ng: Link to the repository: https://github.com/lanmaster53/recon-ng
  5. emailrep.io is a simple tool with a nice API that will tell you information about an email address, including: Reputation Level Is it suspicious? References Is it blacklisted? Has its credentials been leaked? Has it been part of any data breach? Is it a spammer? Is it spoofable? And much more. A further description from their website states: As this is posted in pentesting, some of the offensive usecases of this tool might include: Conduct recon on a target to prepare for credential bruteforcing Constructing targeted phishing attacks Avoid the spam folder There are also defenses ways in which this tool might be used, like to detect phishing attacks, prevent fraud, require additional layer of verification during registration, etc. Check it out! Link to site: https://emailrep.io/
  6. Similar to the data breach search engine called "Have I Been Pwned", which you can learn more about here, DEHASHED is more granular with it's approach to exploring compromised assets. You are able to search on various types of fields behind just an email address or phone number, They also have monitoring services and an API, but what I especially like compared to "Have I Been Pwned" is their collection of data wells. Instead of listing all of the breaches on one static page, they allow you to search on them and display more analytics. According to DEHASHED, some benefits of using their service includes: Helps Prevent Account Compromise Aids in Identity Fraud Investigations Affordability Private Datasets Integrity Powerful Integrations You can learn more by checking out their site. Link to site: https://dehashed.com/
  7. Having your data being exposed via a breach that is no fault of your own is not fun. Luckily, there are some useful breach detection engines out there that you can utilize to see if your name or email address is associated with any known breaches from major sites. "Have I Been Pwned" is one of those engines. They keep a collection of all the large breaches that have happened and also allow you to subscribe to notifications if you are ever impacted by a future breach. They also have a restful API that you can integrate into your applications, should you wish to offer a feature that allows people to search for breaches. You can check if your email or phone has been in a data breach at their homepage. Link to site: https://haveibeenpwned.com/
  8. What are some dorks and APIs that you find useful for username/profile gathering? Post them all here! Here's a couple to get started. Amazon Usernames: https://www.google.com/search?q=site:amazon.com+%3Cusername%3E Github Usernames: https://api.github.com/users/%3Cusername%3E/events/public
  9. cwade12c

    Email Permutator+

    The email permutator is a quick tool used to generate permutations of common email addresses. You specify a first name, last name, optional middle name, optional nick name, and one or more domain names. It uses these inputs to generate permutations, which you can then use for.....whatever you'd like. Their site also suggests the following: Link: http://metricsparrow.com/toolkit/email-permutator/#
  10. This is a nice and quick information gathering tool to perform a reverse email lookup, to see who owns an email address and gather more information about them. From their site: Link: https://thatsthem.com/reverse-email-lookup
  • Create New...