Project Discovery Tools
subfinder -d {domain} -allbbot -t evilcorp.com -p kitchen-sinkshuffledns -d {domain} -list {subdomain_list} -mode resolvecat {subdomain_list} | alterxcat {subdomain_list} | dnsxcat subdomains.txt | naabu -top-ports 100katana -u {subdomain} -jcProject Discovery’s Tool Manager can install all of the above go tools in one shot
go install -v github.com/projectdiscovery/pdtm/cmd/pdtm@latestMisc tools
Search tools
GoWitness
gowitness scan file --write-db -f {file_with_ips}gowitness scan cidr --write-db --cidr-file {file_with_cidrs}gowitness report server in the same directory (with gowitness.sqlite3)EyeBaller
Finding user information and passwords:
sudo python3 dehashed.py -q {domain_name} -pShodan
shodan init {API_key}shodan download --limit 5000 {out_file} "port:37777"
product, ip_str, and portshodan parse
shodan parse --fields ip_str,product {out_file}.json.gzBurp
Email security
host -t txt {domain} and host -t a {domain}https://emkei.cz/ to actually send the spoofed emailSubdomain takeovers
baddns {domain}python3 cloud_enum.py -k {keyword_to_search_for} --quickscanAADInternals
https://github.com/Gerenios/AADInternals - Install-Module AADInternals, then Import-Module -Name "AADInternals"Invoke-AADIntReconAsOutsider -Domain company.com | Format-Table
Invoke-AADIntReconAsOutsider -UserName "{username}@{domain}" | Format-TableGet-Content {username_file} | Invoke-AADIntUserEnumerationAsOutsider -Method LoginO365
Password spraying
python3 o365spray.py --spray -U {email_list} -p {password_list} --proxy-url {fireproxy_url} -d {domain} --sleep 15 --jitter 30o365spray does have an --adfs-url optionOneDrive
Semaphore can cause issues, so echo "$(grep -v "Semaphore" requirements.txt)" > requirements.txtpython3 onedrive_enum.py -d {domain} (-u {username})Github
noseyparker scan --github-org={org}Rotating IPs
https://xxxx.execute-api.us-east-1.amazonaws.com/fireprox)fireproxng with pip install fireproxng and get an AWS API access and secret key
lxml, so we need to do python3.12 -m venv venv before installingsudo apt install -y libxml2-dev libxslt-dev python3-dev build-essentialfireproxng URL with fireproxng -ak {access_key} -sk {secret_key} create https://{login_portal}Documentation/Wikis Search documentation/internal wikis for:
net use
psexec
.pfx
AsPlainText
Authorization: Basic
Authorization: Bearer
NetworkCredential
password
root
passwd
credential
putty
logins
connectionstring
securestring
samaccountname
ldap
sudo
scp
ssh
.vmd
clientdomain\
@clientdomain.com
id_dsa
id_rsa
ghp_
AWS_SECRET_ACCESS_KEY + AKIA/ASIA
ssh_password
net user