10.3. Information Collection¶
10.3.1. Whois¶
10.3.2. Website filing¶
10.3.3. CDN query¶
10.3.4. Subdomain Blasting¶
altdns Generates permutations, alterations and mutations of subdomains and then resolves them
10.3.5. Domain Name Acquisition¶
10.3.6. Weak Password Blasting¶
10.3.7. Git information leakage¶
shhgit Find GitHub secrets in real time
GitHound GitHound pinpoints exposed API keys on GitHub using pattern matching, commit history searching, and a unique result scoring system. A batch-catching, pattern-matching, patch-attacking secret snatcher
x patrol Github leaked patrol
GitDorker scrape secrets from GitHub through usage of a large repository of dorks
10.3.8. Github Monitoring¶
Github Monitor Github Sensitive Information Leakage Monitor
gitGraber monitor GitHub to search and find sensitive data in real time for different online services
10.3.9. Path and file scanning¶
10.3.10. Path Crawlers¶
crawlergo A powerful dynamic crawler for web vulnerability scanners
10.3.11. Fingerprint recognition¶
JA3 is a standard for creating SSL client fingerprints in an easy to produce and shareable way
JARM active Transport Layer Security (TLS) server fingerprinting tool
fingerprintjs Browser fingerprinting library with the highest accuracy and stability
10.3.12. Waf Fingerprint¶
10.3.13. Port Scanning¶
10.3.14. DNS data query¶
10.3.15. DNS Association¶
10.3.16. Cloud Services¶
10.3.17. Data query¶
10.3.18. Password¶
Probable Wordlists Wordlists sorted by probability originally created for password generation and testing
DefaultCreds cheat sheet One place for all the default credentials to assist the pentesters during an engagement
10.3.19. CI Information Disclosur¶
secretz minimizing the large attack surface of Travis CI
10.3.20. Profile of personal data¶
GHunt Investigate Google Accounts with emails
10.3.21. Mailbox Collection¶
10.3.22. Others¶
Quake Command-Line Application 360 Cyberspace Mapping System