mirror of
https://github.com/The-Art-of-Hacking/h4cker
synced 2024-11-22 10:53:03 +00:00
Update README.md
This commit is contained in:
parent
c19d919f6d
commit
6b988f83ac
1 changed files with 24 additions and 6 deletions
|
@ -2,12 +2,7 @@
|
||||||
|
|
||||||
Open-source intelligence (OSINT) is data collected from open source and publicly available sources. The following are a few OSINT resources and references:
|
Open-source intelligence (OSINT) is data collected from open source and publicly available sources. The following are a few OSINT resources and references:
|
||||||
|
|
||||||
- [GOSINT](https://github.com/ciscocsirt/gosint) - a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence.
|
## Passive Recon Tools:
|
||||||
- [Awesome Threat Intelligence](https://github.com/santosomar/awesome-threat-intelligence) - A curated list of awesome Threat Intelligence resources. This is a great resource and I try to contribute to it.
|
|
||||||
- [Umbrella (OpenDNS) Popularity List](http://s3-us-west-1.amazonaws.com/umbrella-static/index.html) - most queried domains based on passive DNS usage across our Umbrella global network of more than 100 Billion requests per day with 65 million unique active users, in more than 165 countries.
|
|
||||||
- [Findsubdomains](https://findsubdomains.com/) - comprehensive subdomain gathering tool which collects subdomains from many sources, validates the output through various tools and enriches the data.
|
|
||||||
|
|
||||||
# Other Passive Recon Tools:
|
|
||||||
- [Maltego](https://www.paterva.com/web7/)
|
- [Maltego](https://www.paterva.com/web7/)
|
||||||
- [Shodan](https://shodan.io)
|
- [Shodan](https://shodan.io)
|
||||||
- [Recon-NG](https://github.com/lanmaster53/recon-ng)
|
- [Recon-NG](https://github.com/lanmaster53/recon-ng)
|
||||||
|
@ -22,4 +17,27 @@ Open-source intelligence (OSINT) is data collected from open source and publicly
|
||||||
- [Exiftool](https://www.sno.phy.queensu.ca/~phil/exiftool/)
|
- [Exiftool](https://www.sno.phy.queensu.ca/~phil/exiftool/)
|
||||||
- [Web Data Extractor](http://www.webextractor.com)
|
- [Web Data Extractor](http://www.webextractor.com)
|
||||||
- [IntelTechniques](https://inteltechniques.com)
|
- [IntelTechniques](https://inteltechniques.com)
|
||||||
|
- [Findsubdomains](https://findsubdomains.com/)
|
||||||
|
|
||||||
|
## Open Source Threat Intelligence
|
||||||
|
|
||||||
|
- [GOSINT](https://github.com/ciscocsirt/gosint) - a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs). GOSINT allows a security analyst to collect and standardize structured and unstructured threat intelligence.
|
||||||
|
- [Awesome Threat Intelligence](https://github.com/santosomar/awesome-threat-intelligence) - A curated list of awesome Threat Intelligence resources. This is a great resource and I try to contribute to it.
|
||||||
|
|
||||||
|
|
||||||
|
## IP address and DNS Lookup Tools
|
||||||
|
- [bgp](https://bgp.he.net/)
|
||||||
|
- [Bgpview](https://bgpview.io/)
|
||||||
|
- [DataSploit (IP Address Modules)](https://github.com/DataSploit/datasploit/tree/master/ip)
|
||||||
|
- [Domain Dossier](https://centralops.net/co/domaindossier.aspx)
|
||||||
|
- [Domaintoipconverter](http://domaintoipconverter.com/)
|
||||||
|
- [Googleapps Dig](https://toolbox.googleapps.com/apps/dig/)
|
||||||
|
- [Hurricane Electric BGP Toolkit](https://bgp.he.net/)
|
||||||
|
- [ICANN Whois](https://whois.icann.org/en)
|
||||||
|
- [Massdns](https://github.com/blechschmidt/massdns)
|
||||||
|
- [Mxtoolbox](https://mxtoolbox.com/BulkLookup.aspx)
|
||||||
|
- [Ultratools ipv6Info](https://www.ultratools.com/tools/ipv6Info)
|
||||||
|
- [Viewdns](https://viewdns.info/)
|
||||||
|
- [Umbrella (OpenDNS) Popularity List](http://s3-us-west-1.amazonaws.com/umbrella-static/index.html)
|
||||||
|
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue