- Make init version look nice
- Sort tools notes and links ( make propper links )
- Include mindmaps from own process
bgp.he.net whois.arin.net/ui/query.do apps.db.ripe.net/db-web-ui/#/fulltextsearch reverse.report shodan.io (Keyword org:"") viewdns.info
###For Acqusitions
crunchbase.com wikipedia.com
BurpSpider Builtwith Add-on -> Relationships Trademark in Google: " Tesla©2019 inurl:tesla.com"
Scraping:
Yahoo! Google Robtex! Ask.com Baidu bing censys CertDB sslmate crt.sh DNSDB Search Netcraft PassiveTotal Hacker Target F-Secure Riddler dnsdumpster.com PTRarchive.com SecurityTrails dogpile Threatminer virustotal waybackmachine threatcrowd
Tools: https://github.com/caffix/amass https://github.com/ice3man543/subfinder https://github.com/guelfoweb/knock
BruteForcing:
gobuser massdns
wordlist: https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056 penterster-io/commonspeak seclist
Auxiliary: dnssec, nsec, nsec3 walking -> ldnsutils, nsec3walker, nsec3map
github recon
dorking: ads key, priv pol, tos, aws, s3
Port Scanning: nmap masscan
masscan -> nmap service scan -oG (version scan)-> brutespray.py, credential bruteforce
Visual Identification Tool: EyeWittness, aquatone, httpscreenshot
Waybackmachine tomnomnom/waybackurls
Retire.js Wappalycer builtwith bulp-vulners-scanner
ZAP Ajax Spider JSparser Linkfinder https://github.com/GerbenJavado/LinkFinder?source=post_page-----82b7e5f62e21----------------------
To feed: burp -> engagement tools -> find scripts -> copy selected urls, and pass to tool
Gobuster github.com/maurosoria/dirsearch Burp Content Discovery danielmiessler/robotsdisallowd -> wordlist jhaddix/content_discovery_all.txt -> wordlist https://gist.github.com/jhaddix/b80ea67d85c13206125806f0828f4d10
maK-/parameth PortSwigger/backslash-powered-scanner
LewisArdern/bXSS ssl/ezXSS
jhaddix/cloud_metadata.txt -> https://gist.github.com/jhaddix/78cece26c91c6263653f31ba453e273b
Look for ids hashes emails
Check for cnames that resolve to these services, if the service has lapsed, regeister and profit EdOverflow/can-i-take-over-xyz -> Documentation wich server with what fingerprint is able
Robbing Misconfigured AWS sa7mon/S3scanner
https://digi.ninja/projects/bucket_finder.php?source=post_page-----82b7e5f62e21---------------------- https://github.com/gwen001/s3-buckets-finder?source=post_page-----82b7e5f62e21----------------------
Xmind
- Burp-Suite - (Param Miner)
- Dirsearch
- Burp-Collaborator - SSRF exploits
- sqlmap - SQLi exploits
- amass - subdomain enumeration
- Nmap & Nikto - Information Gathering
AWS CLI is useful for verifying or testing the permissions of the AWS S3 buckets, Creating Buckets and Read other buckets data. AWS Account needed to use CLI. https://aws.amazon.com/cli/?source=post_page-----82b7e5f62e21----------------------