Red Squad
Ctrlk
BuyMeACoffee
  • 🏠/home/red-squad
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • 🗺️Audits plan
    • 🕵️OSINT
      • 🔍Search Engines
      • 🧑User OSINT
      • 🇫🇲Domains, IP, IOT
      • 🕸️Website OSINT
      • 🗣️Breaches/Leaks
      • 💼Business OSINT
      • 🧅TOR network
      • 🔬Source Code
      • 🥸Dorks
      • ⚔️Vulnerabilities and IOC
      • 📦MISC
    • Enumeration
    • 🔗HTTP Stuff
    • 🔐Sessions / Tokens
    • 💉Injections
    • 🪱Web Vulnerabilities
    • ⛔WAF Bypass
    • ✍️Servers / CMS
    • 🖇️API
  • 🐧Linux Hacking
    • 🧗Privilege Escalation
    • 👣Cover tracks
    • 🚪Backdoors
    • ⭕Reverse Shells
    • 🔢Compiled Binaries
    • 🌊Buffer Overflow
    • 🐳Docker Escape
    • 🤝File sharing
  • 🪟Windows Hacking
    • 👥Active Directory
    • 💡Useful AD Commands
    • 🧗Privilege Escalation
    • 🐚Shells
    • 🔓Bypasses
    • 📃Office
    • 👩‍💻SCCM | MECM
    • 💎Microsoft 365
  • 💽Systems
    • 🐕‍🦺Services Enumeration
    • 🖨️Printers
    • 🛡️Fortinet
    • 📹CCTV / IP Cameras
  • 🎆Networks
    • 🌪️Pivoting
    • 🔥Firewalls
    • 🔗Proxies
  • 📱Mobile Hacking
    • 🤖Android
    • 🍏iOS
    • 📺IOT
  • Configuration
    • ChromeOS
    • Mobile
    • IBM
  • 📡Wireless Hacking
    • 🎆Wi-Fi Attacks
    • 🫐Bluetooth
  • 👨‍💻Code Audit
    • ✔️Best Practices
    • ❌Bad Practices
    • ⚒️Tools
  • 🍑Thick Client Hacking
    • 📝Thick Client Pentesting Methodology
    • 🗄️Resources
  • 🗄️MISC
    • 🔑Default Credentials
    • 🔻CVEs
    • 🦊Browser Extensions
    • 🤖AI
    • 🔭Hacking Labs
    • 🔫Exploitation Frameworks
  • 🕵️OPSEC
    • 🗝️Privacy
  • 🔑CRACKING | ENCODING
    • 🥊Bruteforce tools
    • 📝Wordlists
    • 🧨Cracking Tools
    • 🔬Encoding | Decoding Tools
    • 🔍Steganography | Cipher
  • 🔴RED TEAM
    • 📥Password Extract
    • 🕵️Spy cam
    • 🔒Lock Picking
    • 🎣Phishing
  • 🌀Whistle Blowing
    • 📹CCTV
  • 🔵BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • 🛠️Tools
    • 🍯HoneyPots
    • 🎆Networks Security
    • 🪙Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • 🖥️DEVELOPERS
    • 👨‍💻IDE
  • 📚LEARNING
    • Windows
    • SQL
    • SSL/TLS
Powered by GitBook
On this page

Was this helpful?

Edit
  1. 🌐Web Hacking
  2. 🕵️OSINT

🕸️Website OSINT

LogoDNSDumpster - Find & lookup dns records for recon & researchDNSDumpster.com
LogoSecurityTrails | SecurityTrails: Data Security, Threat Hunting, and Attack Surface Management Solutions for Security Teamssecuritytrails
LogoCensys SearchCensys
https://www.shodan.iowww.shodan.io
LogoWayback Machinearchive.org
LogoGitHub - lanmaster53/recon-ng: Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.GitHub
web-based reconnaissance
LogoGitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool for penetration testersGitHub
enumerate subdomains of websites
LogoGitHub - owasp-amass/amass: In-depth attack surface mapping and asset discoveryGitHub
network mapping of attack surfaces and external asset discovery
PreviousDomains, IP, IOTNextBreaches/Leaks

Last updated 1 year ago

Was this helpful?