💾
👁️
CtrlK
  • infosec stuff
  • Archive
    • Kerberos
  • Cheatsheet
    • Mimikatz
    • Rubeus
  • Initial Access
    • Passwords
    • Payloads
    • Recon-AssetDiscovery
  • Linux
    • Linux Enumeration
    • Command Cheatsheet
      • TAR
    • Privilege Escalation
      • Cron Jobs
      • Kernel Exploit
      • SUID
      • Sudo
      • Weak File Permission
  • Physical
    • Basics
  • Tools
    • Impacket
    • Msfvenom
    • psexec
  • Uncategorized
    • Alternate Data Stream
    • Check applocker rules/policy
    • UACme
    • Data Exfilteration
    • Port Forwarding
    • WebDAV Exploitation
    • WinRM
    • winexe
  • Windows
    • Windows Enumeration
    • Commands
      • net
      • reg
      • sc
    • Evasion
      • Query Installed Antivirus
    • Local Privilege Escalation
      • Automated Tools
      • Enterprise Application
      • Insecure GUI Apps
      • Kernel Exploitation
      • Passwords
      • Potato
      • Registry Exploits
      • Scheduled Tasks
      • Service Exploits
      • Startup Apps
      • Vulnerable Software
      • Windows Privileges
    • Persistence
      • Adding Privileged Users
      • Backdoor Files
      • Existing Services
      • Login Screen (RDP)
      • Logon Triggered
      • Scheduled Tasks
      • Services
    • Powershell
      • Cheatsheet
      • Detections & Bypass
    • System Programming
      • Fundamentals
    • Windows Internals
      • Process & Jobs
        • Fundamentals
        • Process Internals
      • Security
        • Access Token
        • Elevation
        • Integrity Levels
        • Privilege
        • SID
        • Security Descriptor
        • User Account Control
      • System Architecture
        • Architecture Overview
        • Operating System Model
      • Uncategorized
        • DPAPI
        • LocalAccountTokenFilterPolicy
        • Privileges
        • SID
        • accesschk.exe
        • WMI
  • Active Directory
    • AD Concepts
      • Authentication
      • Authorization
      • Basics
      • Computers
      • Credentials
      • Database
      • Group Policy
      • Groups
      • Kerberos
      • Logon Types
      • NetNTLM
      • Services
      • Trusts
      • Users
    • Credential Dumping
      • Credential Manager
      • DC Sync
      • Domain Controller
      • LAPS
      • LSASS
      • Local Credentials
    • Domain Enumeration
      • CMD
      • Credential Injection
      • Defence
      • Management Console
      • Sharphound-BloodHound
      • Powershell
        • ACLs
        • Computers
        • Domain
        • Forest
        • GPOs
        • Groups
        • Organisational Unit
        • Shares and File Servers
        • Trusts
        • Powerview
        • Users
    • Exploitation
      • ACLs
    • Initial Foothold
      • ASREPRoast
      • Kerberos
    • Lateral Movement and Pivoting
      • Abusing User Behaviour
      • Kerberos
      • NTLM
      • PSEXEC
      • Remote Windows Service
      • Schedule Tasks
      • WMI-CIM
      • WimRM (PowerShell Remoting)
    • Persistence
      • ACLs
      • Custom SSP
      • DSRM
      • Diamond Ticket
      • Golden Certificates
      • Golden Tickets
      • SID History
      • Silver Tickets
      • Skeleton Key
    • Privilege Escalation
      • Constrained Delegation
      • DNSAdmins
      • Kerberoast
      • Unconstrained Delegation
    • Protocols
      • MSRPC
      • SMB
      • WinRM
  • Low Level Stuff
    • assembly
      • amd64
    • debuggers
      • GDB cheatsheet
      • windbg cheatsheet
Powered by GitBook
On this page
  • Automated OSINT.
  • Email & Password Hunting.
  • Subdomain Enumeration.
  • DNS Recon.
  • Sock Puppet
  • Search Engine
  • Image
  • Username
  • People
Edit
  1. Initial Access

Recon-AssetDiscovery

Automated OSINT.

  • Amass - In-depth Attack Surface Mapping and Asset Discovery.

  • Recon-ng - Open Source Intelligence gathering tool

  • SpiderFoot - Automates OSINT for threat intelligence and mapping your attack surface.

  • SecurityTrails - Threat Intel & Attack Surface mapping.

Email & Password Hunting.

Emails

  • Hunter

  • Phonebook

  • VoilaNorbert

  • Email-Hippo

  • Email-Checker

  • Clearbit-Connect

Passwords

  • Dehashed

  • WeLeakInfo

  • LeakCheck

  • SnusBase

  • Scylla

  • HaveIBeenPwned

Subdomain Enumeration.

  • Cert.sh

  • Sublist3r

DNS Recon.

  • DNSDumpster

Sock Puppet

  • Creating-an-Effective-Sock-Puppet-for-OSINT-Investigations-Introduction

  • The Art Of The Sock

  • Reddit

  • Fake Name Generator

  • This Person does Not Exisit

  • Privacy.com

Search Engine

  • Google

  • Google Advanced Search

  • Google Search Guide

  • Bing

  • Bing Search Guide

  • Yandex

  • Duck Duck Go

  • Duck Duck Go Search Guide

  • Baidu

Image

  • Google-Image-Search

  • Yandex

  • TinEye

  • Jeffreys-Image-Metadata-Viewer

  • GeoGuessr

  • GeoGuessr-The-Top-Tips-Tricks-and-Techniques

Username

  • NameChk

  • WhatsMyName

  • NameCheckup

People

  • WhitePages

  • truepeoplesearch.com

  • FastPeopleSearch

  • FastBackgroundCheck

  • WebMii

  • PeekYou

  • 411

  • Spokeo

  • ThatsThem

  • Voter-Records

  • TrueCaller

  • CallerIdTest

  • Infobel

Last updated 11 months ago