Compare commits

...

9 Commits

Author SHA1 Message Date
Bengt Brodersen
260185226f
Merge f5c3fbc3ee into 25eb2bc3a0 2024-09-28 13:04:13 +02:00
Edoardo Ottavianelli
25eb2bc3a0
Update README.md 2024-09-11 10:25:34 +02:00
Edoardo Ottavianelli
57b729b23b
Update README.md 2024-09-06 08:14:16 +02:00
Edoardo Ottavianelli
92c7cb67ff
Update README.md 2024-09-02 10:24:43 +02:00
Edoardo Ottavianelli
bc377b8e91
Update README.md 2024-08-30 09:29:51 +02:00
Edoardo Ottavianelli
648bdb6242
Update README.md 2024-08-21 10:57:56 +02:00
Edoardo Ottavianelli
cffee8fc2a
Merge pull request #235 from patrickmgarrity/patch-1
Added VulnCheck XDB
2024-08-21 10:57:06 +02:00
Patrick Garrity
195df06ec3
Added VulnCheck XDB 2024-08-20 19:58:05 -04:00
Bengt Brodersen
f5c3fbc3ee
Update README.md 2024-07-11 13:44:57 +02:00

View File

@ -1,5 +1,5 @@
<h1 align="center">
<b>Awesome Hacker Search Engines</b> <img src="https://raw.githubusercontent.com/edoardottt/images/main/awesome-hacker-search-engines/awesome.svg"/>
<b>Awesome Hacker Search Engines</b> <a href="https://github.com/sindresorhus/awesome"><img src="https://raw.githubusercontent.com/edoardottt/images/main/awesome-hacker-search-engines/awesome.svg"/></a>
</h1>
<p align="center">
@ -129,6 +129,8 @@ A curated list of awesome search engines useful during Penetration testing, Vuln
- [Living Off the Pipeline](https://boostsecurityio.github.io/lotp/) - How development tools commonly used in CI/CD pipelines can be used to achieve arbitrary code execution
- [hackyx.io](https://hackyx.io/) - The aim of this project is to easily find any resource related to IT security like CTF writeups, articles or Bug Bounty reports
- [exploit.observer](https://www.exploit.observer/) - The World's Largest Exploit & Vulnerability Intelligence Database and is freely accessible to all
- [VulnCheck XDB](https://vulncheck.com/xdb/) - An index of exploit proof-of-concept code in Git repositories
- [Sploitify](https://sploitify.haxx.it/) - Interactive cheat sheet, containing a curated list of public server-side exploits (mostly)
### Attack Surface
@ -208,6 +210,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln
- [ContactOut](https://contactout.com/) - Most accurate email finder for personal and work email outreach
- [validemail.io](https://validemail.io/) - Validate email addresses for deliverability with our Email Validation API
- [Predicta Search](https://www.predictasearch.com/) - Reverse lookup search engine for email and phone numbers
- [Infoga.io](Infoga.io) - Find out all email for a certain domain using search engines
### Domains
@ -332,6 +335,7 @@ A curated list of awesome search engines useful during Penetration testing, Vuln
- [WhiteIntel](https://whiteintel.io/) - Check if a company or its customers was victim of an information stealer malware
- [ntlm.pw](https://ntlm.pw/) - Instantly look up NTLM hashes and resolve them to plaintext passwords using our database with 8B+ entries
- [Hudson Rock](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools) - Use Hudson Rocks free cybercrime intelligence tools to learn how compromised credentials are impacting your business
- [hackedlist.io](https://hackedlist.io/) - Enter your domain to find credentials compromised by info-stealer malware
### Leaks
@ -500,6 +504,7 @@ These can be useful for osint and social engineering.
- [OpSecFailure](https://opsecfail.github.io/) - Site that lists how individuals messed up their opsec, no personal info is shared on this site
- [TrailDiscover](https://traildiscover.cloud/) - An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
- [scamdb.net](https://www.scamdb.net/) - Report and Search Online Scams
- [OpenPhish](https://openphish.com/) - Actionable intelligence data on active phishing threats
### Web History