Information Security

tags
Computer

bountysource/core#1586 {CRITICAL} Bountysource is Insolvent, do not use!

Tools/OSINT

bcattools: Bellingcat's directory of OSINT research tools
maia: how do i start doing the work you do tho?
Distributed Denial of Secrets: Public archive of leaked datasets
Shodan, ZoomEye: Search for Internet-connected devices
fierce: Identify non-contiguous IP space and hostnames against specified domains
CiscoCXSecurity/creddump7
Firepwn: Firebase pentester
FOCA: Metadata harvester
Ghidra: Software reverse engineering suite
laramies/metagoofil: Metadata harvester
Nmap: Network mapper (see also ZMap for very large networks)
projectdiscovery/nuclei: Template-based vulnerability scanner
lunchcat/sif: 🚀 blazing-fast pentesting suite written in Go
WhatWeb: Identify tech behind a website (see also BlindElephant for fingerprinting)

Interesting attacks

Hash flooding: DoS via collision attack on hash tables