Merge pull request #5 from FeljxFeljx/main

added tables for a better overview
This commit is contained in:
vrenzolaverace 2022-06-30 07:57:53 +02:00 committed by GitHub
commit d59c89e2e7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

112
README.md
View File

@ -34,69 +34,84 @@ A list of search engines useful during Penetration testing, vulnerability assess
### Servers ### Servers
- [Shodan](https://shodan.io) - Search Engine for the Internet of Everything
- [Onyphe.io](https://www.onyphe.io/) - Cyber Defense Search Engine for open-source and cyber threat intelligence data | name |description|
- [ZoomEye](https://www.zoomeye.org/) - Global cyberspace mapping |:---|:---|
- [GreyNoise](https://viz.greynoise.io/) - The source for understanding internet noise |[Shodan](https://shodan.io)|Search Engine for the Internet of Everything|
- [Natlas](https://natlas.io/) | [Onyphe.io](https://www.onyphe.io/) | Cyber Defense Search Engine for open-source and cyber threat intelligence data |
- [FOFA](https://fofa.info/) | [ZoomEye](https://www.zoomeye.org/) | Global cyberspace mapping |
| [GreyNoise](https://viz.greynoise.io/) | The source for understanding internet noise |
| [Natlas](https://natlas.io/) |
| [FOFA](https://fofa.info/) |
### Vulnerabilities ### Vulnerabilities
- [NIST NVD](https://nvd.nist.gov/vuln/search) - National Vulnerability Database | name |description|
- [MITRE CVE](https://cve.mitre.org/cve/search_cve_list.html) - Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities |:---|:---|
- [osv.dev](https://osv.dev/list) - Open Source Vulnerabilities |[NIST NVD](https://nvd.nist.gov/vuln/search) | National Vulnerability Database|
- [cloudvulndb.org](https://www.cloudvulndb.org/) - The Open Cloud Vulnerability & Security Issue Database | [MITRE CVE](https://cve.mitre.org/cve/search_cve_list.html) | Identify, define, and catalog |publicly disclosed cybersecurity vulnerabilities|
- [Vulners.com](https://vulners.com/) - Your Search Engine for Security Intelligence | [osv.dev](https://osv.dev/list) | Open Source Vulnerabilities|
- [opencve.io](https://www.opencve.io/cve) - Easiest way to track CVE updates and be alerted about new vulnerabilities | [cloudvulndb.org](https://www.cloudvulndb.org/) | The Open Cloud Vulnerability & Security Issue Database|
- [security.snyk.io](https://security.snyk.io/) - Open Source Vulnerability Database | [Vulners.com](https://vulners.com/) | Your Search Engine for Security Intelligence
- [Rapid7 - DB](https://www.rapid7.com/db/) - Vulnerability & Exploit Database | [opencve.io](https://www.opencve.io/cve) |Easiest way to track CVE updates and be alerted about new vulnerabilities|
- [CVEDetails](https://www.cvedetails.com/) - The ultimate security vulnerability datasource | [security.snyk.io](https://security.snyk.io/) | Open Source Vulnerability Database|
- [VulnIQ](https://vulniq.com/) | [Rapid7 - DB](https://www.rapid7.com/db/) | Vulnerability & Exploit Database|
- [SynapsInt](https://synapsint.com/) - The unified OSINT research tool | [CVEDetails](https://www.cvedetails.com/) | The ultimate security vulnerability datasource
- [Aqua Vulnerability Database](https://avd.aquasec.com/) - Vulnerabilities and weaknesses in open source applications and cloud native infrastructure |[VulnIQ](https://vulniq.com/)|
| [SynapsInt](https://synapsint.com/) | The unified OSINT research tool|
|[Aqua Vulnerability Database](https://avd.aquasec.com/) | Vulnerabilities and weaknesses in open source applications and cloud native infrastructure|
### Exploits ### Exploits
- [Exploit-DB](https://www.exploit-db.com/) - Exploit Database | name |description|
- [Sploitus](https://sploitus.com/) - Convenient central place for identifying the newest exploits |:---|:---|
- [Rapid7 - DB](https://www.rapid7.com/db/) - Vulnerability & Exploit Database | [Exploit-DB](https://www.exploit-db.com/) | Exploit Database|
| [Sploitus](https://sploitus.com/) | Convenient central place for identifying the newest exploits|
| [Rapid7 - DB](https://www.rapid7.com/db/) | Vulnerability & Exploit Database|
### Attack Surface ### Attack Surface
- [FullHunt.io](https://fullhunt.io/) - Attack surface database of the entire Internet | name |description|
- [BynaryEdge](https://www.binaryedge.io/) - We scan the web and gather data for you |:---|:---|
- [Censys](https://censys.io/) - Attack Surface Management Solutions |[FullHunt.io](https://fullhunt.io/) | Attack surface database of the entire Internet|
- [RedHunt Labs](https://redhuntlabs.com/) - Discover your Attack Surface, Continuously | [BynaryEdge](https://www.binaryedge.io/) | We scan the web and gather data for you|
- [SecurityTrails](https://securitytrails.com/) - The Total Internet Inventory | [Censys](https://censys.io/) | Attack Surface Management Solutions|
- [criminalip.io](https://www.criminalip.io/) - Cyber Threat Intelligence Search Engine and Attack Surface Management(ASM) platform | [RedHunt Labs](https://redhuntlabs.com/)| Discover your Attack Surface, Continuously|
|[SecurityTrails](https://securitytrails.com/) | The Total Internet Inventory|
| [criminalip.io](https://www.criminalip.io/) | Cyber Threat Intelligence Search Engine and |Attack Surface Management(ASM) platform|
### Code Search Engines ### Code Search Engines
- [GitHub Code Search](https://cs.github.com/) | name |description|
- [grep.app](https://grep.app/) - Search across a half million git repos |:---|:---|
- [publicwww.com](https://publicwww.com/) - Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code | [GitHub Code Search](https://cs.github.com/)|
- [SearchCode](https://searchcode.com/) - Search 75 billion lines of code from 40 million projects | [grep.app](https://grep.app/) | Search across a half million git repos|
- [NerdyData](https://www.nerdydata.com/) - Find companies based on their website's tech stack or code | [publicwww.com](https://publicwww.com/) | Find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code|
- [RepoSearch](http://codefinder.org/) - Source code search engine that helps you find implementation details, example usages or just analyze code | [SearchCode](https://searchcode.com/) | Search 75 billion lines of code from 40 million projects|
| [NerdyData](https://www.nerdydata.com/) | Find companies based on their website's tech stack or code|
| [RepoSearch](http://codefinder.org/) | Source code search engine that helps you find implementation details, example usages or just analyze code |
### Mail addresses ### Mail addresses
- [Hunter.io](https://hunter.io/) - Find professional email addresses in seconds | name |description|
- [PhoneBook](https://phonebook.cz/) - Lists all domains, email addresses, or URLs for the given input domain |:---|:---|
- [IntelligenceX](https://intelx.io/) - Search engine and data archive | [Hunter.io](https://hunter.io/) | Find professional email addresses in seconds|
- [Reacher.email](https://reacher.email/) - Open-Source Email Verification | [PhoneBook](https://phonebook.cz/) | Lists all domains, email addresses, or URLs for the given input domain|
- [RocketReach](https://rocketreach.co/) | [IntelligenceX](https://intelx.io/) | Search engine and data archive|
- [email-format.com](https://www.email-format.com/) - Find the email address formats in use at thousands of companies | [Reacher.email](https://reacher.email/) | Open-Source Email Verification|
- [EmailHippo](https://tools.emailhippo.com/) - Email address verification technology | [RocketReach](https://rocketreach.co/)|
- [ThatsThem](https://thatsthem.com/reverse-email-lookup) - Reverse email lookup | [email-format.com](https://www.email-format.com/) | Find the email address formats in use at thousands of companies|
- [verify-email.org](https://verify-email.org/) | [EmailHippo](https://tools.emailhippo.com/) | Email address verification technology|
- [Melissa - Emailcheck](https://www.melissa.com/v2/lookups/emailcheck/email/) | [ThatsThem](https://thatsthem.com/reverse-email-lookup) | Reverse email lookup|
- [VoilaNorbert](https://www.voilanorbert.com/) - I can find anyone's email address | [verify-email.org](https://verify-email.org/)|
- [SynapsInt](https://synapsint.com/) - The unified OSINT research tool | [Melissa - Emailcheck](https://www.melissa.com/v2/lookups/emailcheck/email/)|
- [skymem.info](http://www.skymem.info/) - Find email addresses of companies and people | [VoilaNorbert](https://www.voilanorbert.com/) | I can find anyone's email address|
| [SynapsInt](https://synapsint.com/) | The unified OSINT research tool|
| [skymem.info](http://www.skymem.info/) | Find email addresses of companies and people|
### Domains ### Domains
| name |description|
|:---|:---|
- [PhoneBook](https://phonebook.cz/) - Lists all domains, email addresses, or URLs for the given input domain - [PhoneBook](https://phonebook.cz/) - Lists all domains, email addresses, or URLs for the given input domain
- [IntelligenceX](https://intelx.io/) - Search engine and data archive - [IntelligenceX](https://intelx.io/) - Search engine and data archive
- [Omnisint](https://omnisint.io/subdomain-enumeration) - Subdomain enumeration - [Omnisint](https://omnisint.io/subdomain-enumeration) - Subdomain enumeration
@ -132,6 +147,8 @@ A list of search engines useful during Penetration testing, vulnerability assess
### DNS ### DNS
| name |description|
|:---|:---|
- [DNSDumpster](https://dnsdumpster.com/) - [DNSDumpster](https://dnsdumpster.com/)
- [RapidDNS](https://rapiddns.io/) - [RapidDNS](https://rapiddns.io/)
- [DNSdb](https://docs.farsightsecurity.com/#dnsdb) - [DNSdb](https://docs.farsightsecurity.com/#dnsdb)
@ -146,6 +163,8 @@ A list of search engines useful during Penetration testing, vulnerability assess
### Certificates ### Certificates
| name |description|
|:---|:---|
- [Crt.sh](https://crt.sh/) - [Crt.sh](https://crt.sh/)
- [CTSearch](https://ui.ctsearch.entrust.com/ui/ctsearchui) - [CTSearch](https://ui.ctsearch.entrust.com/ui/ctsearchui)
- [TLS.BufferOver.run](https://tls.bufferover.run/) - [TLS.BufferOver.run](https://tls.bufferover.run/)
@ -159,6 +178,7 @@ A list of search engines useful during Penetration testing, vulnerability assess
### Credentials ### Credentials
- [Have I Been Pwned](https://haveibeenpwned.com/) - [Have I Been Pwned](https://haveibeenpwned.com/)
- [Dehashed](https://www.dehashed.com/) - [Dehashed](https://www.dehashed.com/)
- [Leak-Lookup](https://leak-lookup.com/) - [Leak-Lookup](https://leak-lookup.com/)