From 2744faabb9590612434197dcc98e9f8682fd8f46 Mon Sep 17 00:00:00 2001 From: edoardottt Date: Tue, 11 Apr 2023 09:35:11 +0200 Subject: [PATCH] Add engines --- README.md | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/README.md b/README.md index 3d5a517..24c47d8 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln ### Servers - [Shodan](https://shodan.io) - Search Engine for the Internet of Everything -- [Censys Search](https://search.censys.io/) - Search Engine for every server on the Internet to reduce exposure and improve security. +- [Censys Search](https://search.censys.io/) - Search Engine for every server on the Internet to reduce exposure and improve security - [Onyphe.io](https://www.onyphe.io/) - Cyber Defense Search Engine for open-source and cyber threat intelligence data - [ZoomEye](https://www.zoomeye.org/) - Global cyberspace mapping - [GreyNoise](https://viz.greynoise.io/) - The source for understanding internet noise @@ -73,7 +73,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln - [ScanFactory](https://in.scanfactory.io/cvemon.html) - Realtime Security Monitoring - [Trend Micro Zero Day Initiative](https://www.zerodayinitiative.com/advisories/published/) - Publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers - [Google Project Zero](https://bugs.chromium.org/p/project-zero/issues/list?can=1&q=&sort=-id&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary) - Vulnerabilities including Zero Days -- [Trickest CVE Repository](https://github.com/trickest/cve) - Gather and update all available and newest CVEs with their PoC. +- [Trickest CVE Repository](https://github.com/trickest/cve) - Gather and update all available and newest CVEs with their PoC ### Exploits @@ -88,7 +88,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln - [Payloads All The Things](https://swisskyrepo.github.io/PayloadsAllTheThingsWeb/) - A list of useful payloads and bypasses for Web Application Security - [XSS Payloads](http://www.xss-payloads.com/) - The wonderland of JavaScript unexpected usages, and more - [exploitalert.com](https://www.exploitalert.com/search-results.html) - Database of Exploits -- [Reverse Shell generator](https://www.revshells.com/) - Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode. +- [Reverse Shell generator](https://www.revshells.com/) - Online Reverse Shell generator with Local Storage functionality, URI & Base64 Encoding, MSFVenom Generator, and Raw Mode ### Attack Surface @@ -161,6 +161,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln - [subdomainfinder.c99.nl](https://subdomainfinder.c99.nl/) - Scanner that scans an entire domain to find as many subdomains as possible - [AnubisDB](https://jonlu.ca/anubis/) - Subdomain enumeration and information gathering tool - [WhoisXMLAPI](https://www.whoisxmlapi.com/) - Domain & IP Data Intelligence for Greater Enterprise Security +- [HypeStat](https://hypestat.com/) - Free statistics and analytics service, where you can find information about every website ### URLs @@ -188,7 +189,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln - [C99.nl](https://api.c99.nl/) - Over 57 quality API's and growing - [PassiveTotal](https://www.riskiq.com/products/passivetotal/) - Security intelligence that scales security operations and response - [wannabe1337.xyz](https://wannabe1337.xyz/) - Online Tools -- [DNSlytics](https://dnslytics.com/) - Find out everything about a domain name, IP address or provider. +- [DNSlytics](https://dnslytics.com/) - Find out everything about a domain name, IP address or provider - [dnsrepo.noc.org](https://dnsrepo.noc.org/) - DNS Database Repository Search ### Certificates @@ -214,7 +215,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln ### Device Information - [MAC Vendor Lookup](https://www.macvendorlookup.com/) - Look up the vendor for a specific MAC Address -- [macvendors.com](https://macvendors.com/) - Find MAC Address Vendors. Now. +- [macvendors.com](https://macvendors.com/) - Find MAC Address Vendors. Now - [macaddress.io](https://macaddress.io/) - MAC address vendor lookup - [maclookup.app](https://maclookup.app/) - Find the vendor name of a device by entering an OUI or a MAC address @@ -318,9 +319,9 @@ These can be useful for osint and social engineering. - [Inquest Labs](https://labs.inquest.net/) - Threat intelligence from hundreds of public, private, and internal sources to develop new FDR signatures and rules - [PhishTank](https://phishtank.org/) - Collaborative clearing house for data and information about phishing on the Internet - [IntelOwl](https://github.com/intelowlproject/IntelOwl) - Open Source Intelligence, or OSINT solution to get threat intelligence data about a specific file, an IP or a domain from a single API at scale -- [Lupovis](https://prowl.lupovis.io/) - Analyze and collect data on Internet-wide scans and attacks in real-time. We use this data to identify and classify malicious actors. -- [AbuseIPDB](https://www.abuseipdb.com/) - Check the report history of any IP address to see if anyone else has reported malicious activities. -- [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Check websites for known malware, viruses, blacklisting status, website errors, out-of-date software, and malicious code. +- [Lupovis](https://prowl.lupovis.io/) - Analyze and collect data on Internet-wide scans and attacks in real-time. We use this data to identify and classify malicious actors +- [AbuseIPDB](https://www.abuseipdb.com/) - Check the report history of any IP address to see if anyone else has reported malicious activities +- [Sucuri SiteCheck](https://sitecheck.sucuri.net/) - Check websites for known malware, viruses, blacklisting status, website errors, out-of-date software, and malicious code - [Spamhaus](https://spamhaus.com) - Protect and investigate using IP and domain reputation data ### Web History @@ -331,7 +332,7 @@ These can be useful for osint and social engineering. - [stored.website](https://stored.website/) - View cached web pages/website - [CommonCrawl](https://commoncrawl.org/) - Open repository of web crawl data - [UK Web Archive](https://www.webarchive.org.uk/ukwa/) - Collects millions of websites each year, preserving them for future generations -- [Arquivo](https://arquivo.pt/) - Non-profit service that maintains information published on the web of interest to the Portuguese community. +- [Arquivo](https://arquivo.pt/) - Non-profit service that maintains information published on the web of interest to the Portuguese community ### Unclassified