×

Lorem Ipsum is simply dummy text of the printing and typesetting industry.

The Attack & Reconnaissance Engines

TyperTech

Regular Member
Joined
Feb 26, 2024
Posts
44
Reaction score
0
Status
Offline
Last Seen
Servers


Shodan⚠️ - Search Engine for the Internet of Everything
Censys Search⚠️ - Search Engine for every server on the Internet to reduce exposure and improve security.
Onyphe.io - Cyber Defense Search Engine for open-source and cyber threat intelligence data
ZoomEye - Global cyberspace mapping
GreyNoise - The source for understanding internet noise
Natlas - Scaling Network Scanning
Netlas.io - Discover, Research and Monitor any Assets Available Online
FOFA - Cyberspace mapping


Vulnerabilities


NIST NVD - National Vulnerability Database
MITRE CVE - Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities
GitHub Advisory Database - Security vulnerability database inclusive of CVEs and GitHub originated security advisories
cloudvulndb.org - The Open Cloud Vulnerability & Security Issue Database
osv.dev - Open Source Vulnerabilities
Vulners.com - Your Search Engine for Security Intelligence
opencve.io - Easiest way to track CVE updates and be alerted about new vulnerabilities
security.snyk.io - Open Source Vulnerability Database
Mend Vulnerability Database - The largest open source vulnerability DB
Rapid7 - Vulnerability & Exploit Database
CVEDetails - The ultimate security vulnerability datasource
VulnIQ - Vulnerability intelligence and management solution
SynapsInt - The unified OSINT research tool
Aqua Vulnerability Database - Vulnerabilities and weaknesses in open source applications and cloud native infrastructure
Vulmon - Vulnerability and exploit search engine
VulDB - Number one vulnerability database


Attack Surface


FullHunt.io - Attack surface database of the entire Internet
BynaryEdge - We scan the web and gather data for you
Censys ASM - Attack Surface Management Solutions
RedHunt Labs - Discover your Attack Surface, Continuously
SecurityTrails - The Total Internet Inventory
criminalip.io - Cyber Threat Intelligence Search Engine and Attack Surface Management(ASM) platform
overcast-security.com - We make tracking your external attack surface easy


Exploits


Exploit-DB - Exploit Database
Sploitus - Convenient central place for identifying the newest exploits
Rapid7 - DB - Vulnerability & Exploit Database
Vulmon - Vulnerability and exploit search engine
packetstormsecurity.com - Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
LOLBAS - Living Off The Land Binaries, Scripts and Libraries
GTFOBins - Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
Payloads All The Things - A list of useful payloads and bypasses for Web Application Security


Threat Intelligence


MITRE ATT&CK - Globally-accessible knowledge base of adversary tactics and techniques
PulseDive - Threat intelligence made easy
ThreatCrowd - A Search Engine for Threats
ThreatMiner - Data Mining for Threat Intelligence
VirusTotal - Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches
vx-underground.org - Malware library
bazaar.abuse.ch - Malware sample database
feodotracker.abuse.ch - List of botnet Command&Control servers
sslbl.abuse.ch - All malicious SSL certificates
urlhaus.abuse.ch - Propose new malware urls
threatfox.abuse.ch - Indicator Of Compromise (IOC) database
yaraify.abuse.ch - Scan suspicious files such as malware samples or process dumps against a large repository of YARA rules
Rescure - Curated cyber threat intelligence for everyone
otx.alienvault - The World's First Truly Open Threat Intelligence Community
urlquery.net - Service for detecting and analyzing web-based malware
socradar.io - Extension to your SOC team
VirusShare - System currently contains 48 million malware samples
WikiLeaks - News leaks and classified media provided by anonymous sources
PassiveTotal - Security intelligence that scales security operations and response
malapi.io - Windows APIs used for malicious purposes
filesec.io - Latest file extensions being used by attackers
leakix.net - Search engine indexing public information and an open reporting platform linked to the results
tria.ge - Fully automated solution for high-volume malware analysis using advanced sandboxing technology
Polyswarm - Launchpad for new technologies and innovative threat detection methods
Cisco Talos - The threat intelligence organization at the center of the Cisco Security portfolio
 
Top