This repository is designed to be a collection of resources to aid the weary sec traveller
Ability to lessen weaknesses in security architects, plans, mobile apps, web-based apps, and entrenched systems
- Dehashed - Leaked creds, DNS data
- Summary: Searches databases for various leaked info and dns info. Good for personal monitoring but costs for anything else
- Paid service with some free features
- 15 a month or 180 a year
- Free
- Create up to 10 monitoring rules (Name, email, phone)
- Deliver to up to 2 channels for when a rule is triggered (Email or SMS)
- Paid
- Api
- Deep Whois data. 4 bucks for 100 searches
- SecurityTrails - DNS data
- Summary: Great resource for DNS data. A records and host, MX, NS, SOA, TXT, CNAME, and subdomains
- Free and paid. Paid unlocks pretty much unlimited searches per month and API. Free is 50 searches a month
- Summary: Great resource for DNS data. A records and host, MX, NS, SOA, TXT, CNAME, and subdomains
- DorkSearch - Google dorking
- ExploitDB - Archive of various exploits
- ZoomEye - Gather info on targets
- Pulsedive - Threat intel searching
- GrayHatWarefare - Search public S3 buckets
- PolySwarm - Scan files and urls for threats
- VirusTotal - Scan files, urls, and hashes for threats
- Fofa - Threat intelligence searching
- LeakIX - Publicly indexed information
- DNSDumpster - Search DNS records
- FullHunt - Search and discover attack surfaces
- AlienVault - Threat intel feed
- Onyphe - Cyber-threat intel data
- Grep App - Search git repos
- URL Scan - Scan and analyze websites
- Vulners - Search vulns
- WayBackMachine - View website deleted content
- Shodan - Search devices connected to the internet
- Netlas - Search and monitor connected assets
- CRT sh - Search for certs that have been logged by CT
- Wigle - Database of wireless networks and stats
- Binary Edge - Threat intel
- GreyNoise - Devices connected to the internet
- Hunter - Search for email addresses belonging to a website
- Censys - Assessing an attack surface for internet connected devices
- IntelligenceX - Search Tor, I2p, data leaks, domains, and emails
- Packet Storm Security - Browse latest vulns and exploits
- SearchCode - 75 billion lines of code from 40 million projects
- ShouldICallBack - Skiptracing on phone numbers
- VirusTotal - Primary file and url scanning tool.
- CheckPhish - Malicious site validation. Provides live view for visual aid where virustotal does not
- Intelx - Find leaked info on websites