Martian Defense NoteBook
  • Martian Defense Notebook
  • Training and Career
    • Keeping it Real for Beginners
    • Reading and Repos
    • Media
    • Guides
      • Cybersecurity Roadmaps
      • Cybersecurity Training Topics
      • AppSec Training Pathway
      • Interview Checklist
    • Platforms
      • General
      • Offensive Security
      • Defensive Security
      • CTF Sites
      • Live Vulnerable Sites
    • Entrepreneurship Roadmaps
      • Consulting
      • Starting a Business
  • Technical Resources
    • Offensive-Cybersecurity
      • Application Security
      • General
      • Recon + OSINT
      • Infrastructure Pentesting
      • Cloud Pentesting
      • Wordlists
      • Social Engineering
      • Mobile Pentesting
      • Container Security
      • Blockchain
    • Defensive-Cybersecurity
    • General Cybersecurity
      • Cybersecurity Operating Systems
    • Coding/Programming
    • Reverse Engineering
    • AI and ML
  • Notes
    • Product Security Engineering
      • DevSecOps
        • Docker
          • How to Dockerize Applications with Docker Compose (Using SQLite and Flask)
      • SAST/SCA
        • How to setup a GitHub Action for Code Security analysis
        • JavaScript Security Analysis
        • Java Security 101
        • Tools
        • CodeQL for Beginners
      • Product Security Hardening
      • Threat Modeling
      • PHP Security
    • AppSec Testing
      • Checklists
        • WEB APP PENTESTING CHECKLIST
        • API Testing Checklist
        • Android Pentesting Checklist
        • IoS Pentesting Checklist
        • Thick Client Pentesting Checklist
        • Secure Code Review Checklist
      • Targeted Test Cases
        • Part 1
        • Part 2
      • Common Web Attack and Prevention List
      • Ports and associated Vectors
      • DNS
      • Web Tools
      • Command Injection Testing
      • JWTs and JSON
    • Security Research
      • Publishing CVEs
      • Threat Intelligence
      • Shodan Dork Cheatsheet
      • Github Dorks
      • Bug Bounty
        • Bug Bounty Programs
      • Forums
    • Coding/Programming
      • Secure Coding Practices Checklist
      • JavaScript
      • Python
        • Quick Notes
        • Python Basics for Pentesters
        • Python Snippets
        • XML Basics with Python
      • Golang
        • Theory
        • Security
        • Modules
        • Entry Points
        • File Forensics
        • Cryptography and Encoding
        • Golang Snippets
      • PHP
        • Setup
        • Syntax
        • Variables and Data Types
        • Control Structures
        • Arrays
        • Functions
        • OOP Concepts
        • Database Integration
        • Handling HTTP Methods
        • Session Management
        • File Uploads
        • Email Function
        • Error Handling
        • Advanced Topics and Best Practices
    • Network Security
      • Domain Trust Enumeration
      • Bleeding Edge Vulnerabilities
      • Post-Exploitation
      • Access Control Lists and Entries (ACL & ACE)
      • Credentialed Enumeration
      • Password Attacks
        • Internal Password Spraying
        • Remote Password Attacks
        • Linux Local Password Attacks
        • Windows Local Password Attacks
        • Windows Lateral Movement
      • PowerView
      • Pivoting, Tunneling and Forwarding
        • Advanced Tunneling Methods
        • Dynamic Port Forwarding (SSH + Socks)
        • Port Forwarding Tools
        • SoCat
      • Linux Privilege Escalation
      • Windows Privesc
        • OS Attacks
        • Windows User Privileges
        • Windows Group Privileges
        • Manual Enumeration
        • Credential Theft
      • Kerberos Attacks
        • Kerberos Quick Reference Sheet
    • Cloud Security Testing
    • Defensive Security
      • Splunk
        • Basic Queries
        • Dashboards
      • Forensics
        • Volatility
      • WireShark filters
    • Governance, Risk, Compliance
      • Vulnerability Management Lifecycle
    • Capture-the-Flag Training
      • Vulnerable Machine Checklist
      • Reverse Engineering Checklist
      • Mobile Checklist
      • Forensics Checklist
      • Binary Exploitation
      • Cryptography Checklist
    • Reporting
    • PowerShell
    • Linux Basics
    • Basic IT Tasks
  • Digital Privacy and Hygiene
    • Personal Information Removal Services
    • De-Googling Android
    • DNS Services
    • Privacy References
    • Opsec
  • RedPlanet Labs
    • PyGOAT
    • OWASP Juice Shop
Powered by GitBook
On this page
  1. Technical Resources
  2. Offensive-Cybersecurity

Recon + OSINT

PreviousGeneralNextInfrastructure Pentesting

Last updated 5 months ago

OSINT Sites

!

!

!

!

Tools

!

!

!

- perform online investigations

- Social Media OSINT

!

BuiltWith
Binary Edge (Threat Intelligence scanner)
Censys (Internet Attack Surface monitoring)
CentralOps
crt.sh (Database of certificate identities
DNSlytics
EXIF Data
FullHunt (Attack Surface Intelligence)
GPS Coordinates
GrayHatWarefare (Search public S3 buckets)
Grep App (Searching for data within git repos)
GreyNoise (Search for internet-connected devices)
Hunter (Find professional email addresses linked to a business)
IntelligenceX (Search Engine and data archive)
LeakIX (publicly indexed information)
Netlas (internet connected asset intel)
ONYPHE (Cyber Defense Search Engine)
OpenCorporates
Packet Storm Security (Latest atest security issues and exploit database)
PentestTools
PimEyes ( Face Recognition Search Engine and Reverse Image Search)
PublicWWW (Marketing and affiliate marketing research
Pulsedive—Threat intelligence search engine)
Shodan
SpiderFoot
SpyOnWeb
URL Scan (Analyse websites)
ViewDNS
VirusTotal
Wayback Machine
Vulners (Search engine for Security Intel)
Wigle (Database of wireless networks)
ZoomEye (Information Gathering for IP connected devces)
How to create sockpuppet accounts
Ultimate OSINT Handbook on Personal Information by SOCRadar
Commandergirl's suggestions - powerful OSINT Dashboard
Hatles1der's Ultimate OSINT Collection Dashboard
Ohshint Blog
Censys Search Minmap
OSINT Framework
DorkSearch
SearchCode
Shodan Search Engine
OSINT Tool Collection Repo
Awesome Shodan Queries
OWASP Maryam
Karma from @Dheerajmadhukar
sn0int
Scrummage OSINT and Threat Hunting Framework
Online OSINT Framework Reference
BlackBird
uncover
Oh365 User Finder
WeakestLink LinkedIN Tool
msDorkDump
geeMailUserFinder
Exchange Finder
Octosuite - Github user OSINT
LinkScope
sub3suite
Phoneinfoga
bbot
h8mail
Alfred
InfoHunter