-
Notifications
You must be signed in to change notification settings - Fork 226
Open
Description
Footprinting and reconnaissance
- ARIN whois database search: Locate the network range.
- awesome-osint: A curated list of amazingly awesome OSINT.
- BuzzSumo: Find the most shared content for a topic, author, or a domain.
- Censys: Full view of every server and device exposed.
- CeWL: Gathering Wordlist from the Target Website.
- DNSRecon: Reverse DNS lookup.
- Extract Meta Data: Gather Information from Video Search Engines.
- exposing.ai: Check if your Flickr photos were used to build face recognition.
- Ghost Eye: It is an information-gathering tool written in Python 3. To run, Ghost Eye only needs a domain or IP.
- Iky I Know You: It is a tool that collects information from an email and shows results in a nice visual interface.
- NAPALM FTP Indexer: Gather Information from FTP Search Engines.
- networkappers: Reverse DNS lookup.
- Network Tools by YouGetSignal.com
- NSLOOKUP: look up and find IP addresses in the DNS
- OSINT_Collection: Maintained collection of OSINT related resources. (All Free & Actionable).
- osint-suite-tools: Repository of the toolkit for making OSINT and SOCMINT with Dante's Gates Minimal Version.
- ReconSpider: Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources.
- Reverse IP Lookup: Reverse DNS lookup.
- Sherlock.py: Search a vast number of social networking sites for a target username.
- Shodan: Search engine for Internet-connected devices.
- Social Searcher: Free Social Media Search Engine.
- Thingful: A search engine for the Internet of Things.
- wafw00f: Allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.
- Wayback Machine
- WhoIsHostingThis: Get information about the web host, IP address, name servers & more.
- Sub3 Suite: A suite of tools for intelligence gathering and target mapping.
Competitive Intelligence Gathering
What did this company begin? How did it develop?
What are the company's plans?
What expert do opinions say about the company?
Enumerate people, emails,...
- Contact Out: Get private information from LinkedIn accounts.
- ';--have i been pwned?: Check if your email address is in a data breach.
- hunter.io: Hunter lets you find email addresses in seconds and connect with the people that matter for your business.
- Instant People Search: Searching people.
- intelius: Searching people.
- peekyou: Searching people.
- pipl: Searching people.
- pwndb: Search for leaked credentials.
- Social Catfish: Searching people.
- theHarvester: E-mails, subdomains and names Harvester - OSINT.
- VerifyEmailAddress.org
Email tracking tools
- eMailTrackerPro: Trace an email using the email header.
- Infoga: Infoga is a tool gathering email accounts informations (ip,hostname,country,...) from different public source (search engines, pgp key servers and shodan) and check if emails was leaked using haveibeenpwned.com API. Is a really simple tool, but very effective for the early stages of a penetration test or just to know the visibility of your company in the Internet.
- Mailtrack: Know when your emails are opened.
- PoliteMail
- RMail E-Security
Extracting Metadata of Public Documents
- Exiftool: ExifTool meta information reader/writer.
- Metagoofil: Metadata harvester.
- Opanda IExif: It is a professional Exif viewer in Windows / IE / Firefox, From a photographer's eye, It displays the image taken from digital camera and every item of EXIF data in the image from beginning to end.
- Web Data Extractor: Web Data Extractor Pro is a web scraping tool specifically designed for mass-gathering of various data types. It can harvest URLs, phone and fax numbers, email addresses, as well as meta tag information and body text. Special feature of WDE Pro is custom extraction of structured data.
Extracting Website Links
- Link Extractor: Very simple tool which allows scrapping all the links from any web page in Internet.
- Netpeak Spider: Desktop tool for day-to-day SEO audit, fast issue check, comprehensive analysis, and website scraping.
- Octoparse: Octoparse is a free, multi-award winning web scraping software to turn websites into structured data without coding.
Find TLD's domains
- Search Web by Domain
- Sublist3r: Fast subdomains enumeration tool for penetration testers.
Footprinting
- Bill Cipher: Information Gathering tool for a Website or IP address
- FOCA
- Maltego: Maltego is an open source intelligence (OSINT) and graphical link analysis tool for gathering and connecting information for investigative tasks.
- OSINT Framework
- OSRFramework: The Open Sources Research Framework is a AGPLv3+ project by i3visio focused on providing API and tools to perform more accurate online researches.
- Raccoon: A high performance offensive security tool for reconnaissance and vulnerability scanning.
- ReconDog: Reconnaissance Swiss Army Knife.
- Recon-ng: Open Source Intelligence gathering tool aimed at reducing the time spent harvesting information from open sources.
- Th3Inspector
- Osintgram: It is a OSINT tool on Instagram. It offers an interactive shell to perform analysis on Instagram account of any users by its nickname.
IP geolocation lookup
Mirroring entire website
- Cyotek: Copy websites locally for offline browsing
- HTTrack WebSite Copier: Copy websites to your computer.
- NCollector Studio
- Social-Engineer Toolkit (SET): It is an open-source penetration testing framework designed for social engineering. SET has a number of custom attack vectors that allow you to make a believable attack quickly.
- ShellPhish: Phishing Tool for Instagram, Facebook, Twitter, Snapchat, Github.napchat, Github.
Monitoring webpages for updates and changes
- visualping: Monitor website changes… so you don't have to!
- Website-Watcher: Monitor websites for new content and changes.
Monitoring website traffic of target company
- Alexa: Find, Reach, and Convert Your Audience.
- TeamViewer Web Monitoring: Monitor the web experience (old Monitis).
- Web-Stat
Phone number
- phoneinfoga: Advanced information gathering & OSINT framework for phone numbers.
Traceroute
- IT Management Software & Remote Monitoring Tools | SolarWinds
- Path Analyzer Pro: Path Analyzer Pro delivers advanced network route-tracing with performance tests, DNS, whois, and network resolution to investigate network issues. By integrating all these powerful features into one simple graphical interface, Path Analyzer Pro has become a must-have tool for any network, systems, or security professional on Windows and Mac OS X.
- VisualRoute
- #onemilliontweetmap
- Creepy: Creepy is a geolocation OSINT tool. Gathers geolocation related information from online sources, and allows for presentation on map, search filtering based on exact location and/or date, export in csv format or kml for further analysis in Google Maps.
- First Tweet - Who Said It First on Twitter
- foller.me: Twitter analytics application that gives you rich insights about any public Twitter profile. We gather near real-time data about topics, mentions, hashtags, followers, location and more!
- Followerwonk: Help to explore and grow one's social graph by digging deeper into Twitter analytics.
- Omnisci
- tinfoleak: The most complete open-source tool for Twitter intelligence analysis.
Website footprinting
- Burp Suite
- Find Subdomains Online | Pentest-Tools.com
- Wappalyzer: Identifies technologies on websites, including content management systems, ecommerce platforms, JavaScript frameworks, analytics tools and much more.
- Website informer: Evaluates authority and popularity of websites you are visiting.
- What's that site running? | Netcraft: Find out the infrastructure and technologies used by any site using results from our internet data mining.
- Zaproxy: The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by a dedicated international team of volunteers. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications.
Website footprinting using spiders
- ParseHub: It is a free and powerful web scraping tool. With our advanced web scraper, extracting data is as easy as clicking on the data you need.
- SpiderFoot: Automates OSINT collection and helps you find what matters
- Web Data Extractor: It is a web scraping tool specifically designed for mass-gathering of various data types. It can harvest URLs, phone and fax numbers, email addresses, as well as meta tag information and body text. Special feature of WDE Pro is custom extraction of structured data.
- webscarab-ng: WebScarab-NG is a complete rewrite of the old WebScarab application, with a special focus on making the application more user-friendly.
Networks
- Angry IP Scanner: Fast and friendly network scanner
- Capsa Portable Network Analyzer: Monitor, Analyze, Troubleshoot your Wired & Wireless Network.
- Colasoft Packet Builder: Colasoft Packet Builder enables creating custom network packets; users can use this tool to check their network protection against attacks and intruders. Colasoft Packet Builder includes a very powerful editing feature. Besides common HEX editing raw data, it features a Decoding Editor allowing users to edit specific protocol field values much easier.
- hping: hping3 is a network tool able to send custom TCP/IP packets and to display target replies like ping do with ICMP replies. hping3 can handle fragmentation, and almost arbitrary packet size and content, using the command line interface.
- HTTPort 3.SNFM: HTTPort allows you to bypass your HTTP proxy, which is blocking you from the Internet. With HTTPort you may use various Internet software from behind the proxy, ex. e-mail, instant messengers, P2P file sharing, ICQ, News, FTP, IRC, etc.
- Jaqen: Simple DNS rebinding.
- Megaping: MegaPing is the ultimate must-have toolkit that provides essential utilities for Information System specialists, system administrators, IT solution providers or individuals.
- Metasploit Framework
- Nav: Network Administration Visualized.
- netCut: With netCut, you can know who has is or has been on your WIFI, his name, device brand, what time in, what time out.
- NetScanTools: NetScanTools Pro is an integrated collection of internet information gathering and network troubleshooting utilities for Network Professionals. Research IPv4 addresses, IPv6 addresses, hostnames, domain names, email addresses and URLs automatically** or with manual tools. It is designed for the Windows operating system GUI. **Automated tools are started interactively by the user. Include a promiscous detection scanner.
- NetSurveyor: It is an 802.11 (WiFi) network discovery tool that gathers information about nearby wireless access points in real time and displays it in useful ways. Similar in purpose to NetStumbler, it includes many more features.
- Network Topology Mapper: Network mapping software designed to automatically map your network.
- Nmap: The Network Mapper.
- Omnipeek Network Protocol Analyzer
- Ostinato: Packet/Traffic Generator and Analyzer.
- sparta: Network Infrastructure Penetration Testing Tool: NMap + hydra.
- SteelCentral Packet Analyzer
- Unicornscan
- wireshark: Wireshark is a network traffic analyzer, or "sniffer", for Linux, macOS, *BSD and other Unix and Unix-like operating systems and for Windows. It uses Qt, a graphical user interface library, and libpcap and npcap as packet capture and filtering libraries.
Android
- Fing
- netCut: With netCut, you can know who has is or has been on your WIFI, his name, device brand, what time in, what time out.
- Network IP Scanner
- Network Scanner
- Network Spoofer: Lets you change websites on other people’s computers from an Android phone. After downloading simply log onto a Wifi network, choose a spoof to use and press start.
- WHO'S ON MY WIFI - NETWORK SCANNER
ARP
ARP Poisoning
- Cain
- Ettercap: It is a comprehensive suite for man in the middle attacks. It features sniffing of live connections, content filtering on the fly and many other interesting tricks. It supports active and passive dissection of many protocols and includes many features for network and host analysis.
Protection
- ARP AntiSpoofer: A utility for detecting and resisting BIDIRECTIONAL ARP spoofing. It can anti-spoof for not only the local host, but also other hosts in the same subnet. It is as well a handy helper for gateways which don't work well with ARP.
- ArpON: It is a Host-based solution that make the ARP standardized protocol secure in order to avoid the Man In The Middle (MITM) attack through the ARP spoofing, ARP cache poisoning or ARP poison routing attack.
- arpstraw: Arp spoof detection tool.
- shARP: An anti-ARP-spoofing application software that use active and passive scanning methods to detect and remove any ARP-spoofer from the network.
- XArp – Advanced ARP Spoofing Detection: It is a security application that uses advanced techniques to detect ARP based attacks.
DHCP
DHCP starvation attack
- DHCPig: DHCP exhaustion script written in python using scapy network library.
- dhcpstarv: Is tool that implements DHCP starvation attack. It requests DHCP leases on specified interface, save them and renew on regular basis.
- Gobbler
- Hyenae: It is a highly flexible platform independent network packet generator. It allows you to reproduce several MITM, DoS and DDoS attack scenarios, comes with a clusterable remote daemon and an interactive attack assistant.
- yersinia: A framework for layer 2 attacks.
Rogue DHCP attack
DoS
- hping3: hping3 is a network tool able to send custom TCP/IP packets and to display target replies like ping do with ICMP replies. hping3 can handle fragmentation, and almost arbitrary packet size and content, using the command line interface.
- High Orbit Ion Cannon (HOIC)
- Low Orbit Ion Cannon (LOIC): An open source network stress tool, written in C#. Based on Praetox's LOIC project.
Protection
- Anti DDoS Software: Monitors each incoming and outgoing packet in Real-Time. It displays the local address, remote address, and other information of each network flow. Anti DDoS Guardian limits network flow number, client bandwidth, client concurrent TCP connection number, and TCP connection rate. It also limits the UDP bandwidth, UDP connection rate, and UDP packet rate.
- DDoS-GUARD
- DOSarrest’s DDoS protection service
- Cloudflare
- ID Ransomware: Upload a ransom note and/or sample encrypted file to identify the ransomware that has encrypted your data.
- Imperva Incapsula DDoS Protection
MAC address
MAC flood attack
MAC Spoofing
- SMAC: FREE MAC Address Spoofing Tool.
- Technitium MAC Address Changer (TMAC): A freeware utility to spoof MAC address instantly.
Enumeration
- Active Directory Explorer: It is an advanced Active Directory (AD) viewer and editor. You can use AD Explorer to easily navigate an AD database, define favorite locations, view object properties and attributes without having to open dialog boxes, edit permissions, view an object's schema, and execute sophisticated searches that you can save and re-execute.
- Advanced IP Scanner: Reliable and free network scanner to analyse LAN. The program shows all network devices, gives you access to shared folders, provides remote control of computers (via RDP and Radmin), and can even remotely switch computers off. It is easy to use and runs as a portable edition. It should be the first choice for every network admin.
- Amass: The OWASP Amass Project performs network mapping of attack surfaces and external asset discovery using open source information gathering and active reconnaissance techniques.
- dig: Network admin tool for querying DNS servers.
- dirsearch: Web path scanner.
- dnsrecon: DNS Enumeration Script.
- dnswalk: A DNS database debugger.
- domained: Multi Tool Subdomain Enumeration.
- Engineer's Toolset: Network software with over 60 must-have tools.
- enum4linux: It is a Linux alternative to enum.exe for enumerating data from Windows and Samba hosts.
- EyeWitness: EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.
- Global Network Inventory: Global Network Inventory is a powerful and flexible software and hardware inventory system that can be used as an audit scanner in an agent-free and zero deployment environments. If used as an audit scanner, it only requires full administrator rights to the remote computers you wish to scan. Global Network Inventory can audit remote computers and even network appliances, including switches, network printers, document centers, etc.
- gobuster: Directory/File, DNS and VHost busting tool written in Go.
- google-url-extractor.js: Small script that extracts all URLs from a Google search result.
- httprobe: Take a list of domains and probe for working HTTP and HTTPS servers.
- Hurricane Electric BGP Toolkit
- jxplorer: It is a cross platform LDAP browser and editor. It is a standards compliant general purpose LDAP client that can be used to search, read and edit any standard LDAP directory, or any directory service with an LDAP or DSML interface.
- Knock: Knockpy is a python tool designed to enumerate subdomains on a target domain through a wordlist. It is designed to scan for DNS zone transfer and to try to bypass the wildcard DNS record automatically if it is enabled. Now knockpy supports queries to VirusTotal subdomains, you can setting the API_KEY within the config.json file.
- LDAP Account Manager
- LDAP Admin
- LDAP Administrator
- massdns: A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration).
- NetBIOS Enumerator: This application was suggested to show how to use remote network support and how to deal with some other interesting web technics like SMB.
- NetScanTools: NetScanTools Pro is an integrated collection of internet information gathering and network troubleshooting utilities for Network Professionals. Research IPv4 addresses, IPv6 addresses, hostnames, domain names, email addresses and URLs automatically** or with manual tools. It is designed for the Windows operating system GUI. **Automated tools are started interactively by the user.
Metadata
Metadata
Assignees
Labels
No labels