🕶️
VICEINTELPRO
GitHub: HorrorClause
  • In Tenebris Videmus
  • 🚩CTFs
    • 💾Hack the Box
      • 🏫Academy
        • Command Injection Assessment
        • XSS Assessment
        • Web Attacks Assessment
    • Try Hack Me
      • In Progress
  • 📖Documents
  • 👨‍🏫HOW-TOs
    • Obisidian How-To
    • Setup Mandiant FLARE VM
  • 📑Security Fundamentals
    • Security Controls
      • Physical Security
      • Endpoint Security
      • Email Security
      • Network Security
      • AAA Controls
    • Networking 101
      • OSI Model
      • Network Fundamentals
      • Network Devices
      • Network Tools
      • Protocols and Ports
    • 👨‍💼Management Principles
      • Risk
      • Policies and Procedures
      • Compliance and Frameworks
      • Change and Patch Management
  • 🛡️Security Concepts
    • ⚠️Risk Assessment Models
      • DREAD Risk Assessment Model
      • STRIDE Threat Model
      • Common Vulnerability Scoring System (CVSS)
    • Pentesting
      • Common Terms
      • AV Identification-Evasion
      • Introduction to Payloads
      • Automating Payloads & Delivery with Metasploit
      • Shells Jack Us In, Payloads Deliver Us Shells
      • Web Shells
      • Pentesting Overview
      • Penetration Testing Process
    • 🐛Vulnerability Assessment
      • Common Vulnerabilities and Exposures (CVE)
      • Common Vulnerability Scoring System (CVSS)
      • Assessment Standards
      • Vulnerability Assessment
      • Vulnerability Scanning
      • Reporting
      • 🎯Nessus
        • Getting Started with Nessus
        • Nessus Scan
        • Working with Nessus Scan Output
        • Advanced Settings
        • Scanning Issues
      • 🦴OpenVAS (Greenbone)
        • Getting Started with OpenVAS
        • OpenVAS
        • Exporting Results
    • Passwords
      • Password Managers
      • Password Policies
      • Password Security Fundamentals
    • Frameworks
    • GRC
    • Logon Types
    • What is Dev-Null ?
  • ⚔️Offensive Security
    • OSINT
      • OSINT - Websites
      • Google Dorks
    • 🔫Attacking Common Services
      • The Concept of Attacks
      • Interacting with Common Services
      • Finding Sensitive Information
      • Attacking DNS
      • Attacking Email Services
      • Attacking FTP
      • Attacking RDP
      • Attacking SMB
      • Attacking SQL Databases
      • Cheat Sheet - Attacking Common Services
      • Service Misconfigurations
    • 🔪Attacking Web Apps with Ffuf
      • Web Fuzzing
      • Directory Fuzzing
      • Page Fuzzing
      • Recursive Fuzzing
      • DNS Records
      • Sub-domain Fuzzing
      • Vhost Fuzzing
      • Filtering Results
      • Parameter Fuzzing - GET
      • Parameter Fuzzing - POST
      • Value Fuzzing
    • ☁️Cloud
      • AWS
        • AWS S3 Buckets
    • 💉Command Injection
      • Command Injection Cheat Sheet
      • Intro to Command Injections
      • Detection
      • Injecting Commands
      • Other Injection Operators
      • Identifying Filters
      • Bypassing Space Filters
      • Bypassing Other Blacklisted Characters
      • Bypassing Blacklisted Commands
      • Advanced Command Obfuscation
      • Evasion Tools
      • Command Injection Prevention
    • Containers
      • Docker
    • ❌Cross-Site Scripting (XSS)
      • Introduction to XSS
      • Stored XSS
      • Reflected XSS
      • DOM XSS
      • XSS Discovery
      • Defacing
      • Phishing
      • Session Hijacking
      • XSS Prevention
    • Directory Busting
      • DirB
      • DirBuster
      • Ffuf
      • Gobuster
    • 🅰️DNS
      • DNSRecon
      • Fierce
    • File Inclusion
      • Local File Inclusion Cheatsheet
      • Intro to File Inclusion
      • Local File Inclusion (LFI)
      • Basic Bypass
      • PHP Filters
      • PHP Wrappers
      • Remote File Inclusion (RFI)
      • LFI and File Uploads
      • Log Poisoning
      • Automated Scanning
      • File Inclusion Prevention
    • File Transfers
      • Transferring Files
      • File Transfer - Quick Commands
      • Living off the Land
      • Windows File Transfer Methods
      • Linux File Transfer Methods
      • Catching Files over HTTP(S)
      • Transferring Files with Code
      • Miscellaneous File Transfer Methods
      • Protected File Transfers
      • Mounting Encrypted VHD Drives
      • Mounting VHD in Kali
      • File Transfer Detection
    • File Upload Attacks
      • File Upload Cheatsheet
      • Absent Validation
      • Upload Exploitation
      • Client-Side Validation
      • Blacklist Filters
      • Whitelist Filters
      • Type Filters
      • Limited File Uploads
      • Other Upload Attacks
      • Preventing File Upload Vulnerabilities
    • 👣Footprinting
      • Linux Remote Management Protocols
      • Windows Remote Management Protocols
      • Enumeration
        • Enumeration Methodology
        • 🖥️Host Based
          • Quick Commands
          • DNS
          • FTP
          • IMAP-POP3
          • IPMI
          • MSSQL
          • MySQL
          • NFS
          • Oracle TNS
          • SMB
  • Powershell
    • Powershell CheatSheet
  • Python
    • Map
    • Anonymous Functions
    • Recursion
      • ZipMap
      • Nested Sum
      • Recursion on a Tree
      • Count Nested Levels
      • Longest Word
    • Function Transformations
      • More Transformations
      • Why Transform?
    • Closures
    • Currying
    • Decorators
    • Sum Types
    • Enums
    • Match
    • Regex
  • Kusto (KQL)
    • SQL and KQL Comparison
    • Using the Where and Sort Operators
    • KQL Queries
  • HTML
  • Insecure File Uploads
Powered by GitBook
On this page
  1. Offensive Security
  2. OSINT

OSINT - Websites

Category
Website

Attack Surface

Attack Surface

C2 Frameworks

Certificate Search

Certificate Search

Cloud

DNS

DNS

Dork

Dynamic Analysis

Dynamic Analysis

Dynamic Analysis

Email Addresses

Email Spoofing

Learning

OSINT

OSINT

OSINT

Offensive Tools

Offensive Tools

Offensive Tools

Offensive Tools

Offensive Tools

Offensive Tools

Offensive Tools

Payloads All The Things

Scripts

Search Code

Search Code

Search Code

Server

Server

Server

Server

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Threat Intel

Utility

Utility

Utility

Utility

Vulnerabilities

WiFi Networks

File Info

OSINT

OSINT

Dork

Offensive Tools

Offensive Tools


Threat Intel Resources

PreviousOSINTNextGoogle Dorks

Last updated 3 months ago

Darkarmour is a tool to generate and utilize obfuscated binaries for use against Windows hosts.

MSFVenom and Metasploit Framework is an extremely versatile tool for any pentester's toolkit. It serves as a way to enumerate hosts, generate payloads, utilize public and custom exploits, and perform post-exploitation actions once on the host. Think of it as a swiss-army knife.

The Mythic C2 framework is an alternative option to Metasploit as a Command and Control Framework and toolbox for unique payload generation.

Nishang is a framework collection of Offensive PowerShell implants and scripts. It includes many utilities that can be useful to any pentester.

This is a script that contains a large database of known default credentials for Services

Here, you can find many different resources and cheat sheets for payload generation and general methodology.

A curated list of Awesome Threat Intelligence resources //

A curated list of awesome threat detection and hunting resources //

A curated list of amazingly awesome open source intelligence tools and resources //

Get the latest technical details on significant advanced malware activity //

10 of the Best Open Source Threat Intelligence Feeds //

Weekly Threat Briefing—Cyber Threat Intelligence Delivered to You //

11 Cyber Threat Intelligence Tips //

Threat Intelligence Defined and Explored //

Cyber Threat Intelligence Feeds //

⚔️
https://github.com/hslatman/awesome-threat-intelligence
https://github.com/0x4D31/awesome-threat-detection
https://github.com/jivoi/awesome-osint
https://www.fireeye.com/current-threats.html
https://d3security.com/blog/10-of-the-best-open-source-threat-intelligence-feeds/
Anomali Weekly Threat Briefing
https://www.isaca.org/resources/news-and-trends/isaca-now-blog/2016/11-cyber-threat-intelligence-tips
https://www.forcepoint.com/cyber-edu/threat-intelligence
https://thecyberthreat.com/cyber-threat-intelligence-feeds/
https://app.netlas.io/
https://fullhunt.io
https://howto.thec2matrix.com/
https://crt.sh
https://app.netlas.io/certs/
https://buckets.grayhatwarfare.com/
MXToolBox DNS
DNSDumpster
GitHub - GDorks
Any.Run
Joe SandBox
Hybrid Analysis
www.hunter.io
10MinuteMail
IPPSec
https://intelx.io/
https://phonebook.cz/
Fast People Search
Source
Source
Source
Source
Nishang PowerShell Scripts
DefaultCreds - Script
Online Reverse Shell Generator
Source
Powershell Gallery
www.grep.app
https://searchcode.com/
https://publicwww.com
www.shodan.io
www.onyphe.io
www.censys.io
https://ivre.rocks
app.binaryedge.io
viz.greynoise.io
fofa.info
zoomeye.hk
https://leakix.net/
https://urlscan.io
https://socradar.io
https://pulsedive.com
VirusTotal
SPUR
Abuse IPDB
Meta Defender
CyberChef
Microsoft Error Code Check
User Agent Strings Explained
User Agent Strings List
https://vulners.com
www.wigle.net
Encoded File Types
BGP Tool Kit
Trufflehog
Google Dork Generator
Red Team Notes and Tricks
PayloadsAllTheThings Upload Insecure Files