Project Discovery Tools
subfinder -d {domain} -allbbot -t evilcorp.com -p kitchen-sinkshuffledns -d {domain} -list {subdomain_list} -mode resolvecat {subdomain_list} | alterxcat {subdomain_list} | dnsxcat subdomains.txt | naabu -top-ports 100katana -u {subdomain} -jcProject Discovery’s Tool Manager can install all of the above go tools in one shot
go install -v github.com/projectdiscovery/pdtm/cmd/pdtm@latest
investigate chaos-client
crt.sh, merklemap.com, censys, Shodan, Gau, Whoxy, LinkedIn scraping, Google Dorks, Crunchbase, Zoominfo (zoomeye?)
Awesome censys queries: https://github.com/thehappydinoa/awesome-censys-queries
Neat new domain-based search engine: https://chaos.projectdiscovery.io/
GoWitness
gowitness scan cidr --write-db --cidr {IP_range} --write-db
gowitness scan file --write-db -f {file_with_ips}gowitness scan cidr --write-db --cidr-file {file_with_cidrs}gowitness report server in the same directory (with gowitness.sqlite3)EyeBaller
Finding user information and passwords:
sudo python3 dehashed.py -q {domain_name} -pShodan
shodan init {API_key}shodan download --limit 5000 {out_file} "port:37777"
product, ip_str, and portshodan parse
shodan parse --fields ip_str,product {out_file}.json.gzSearch documentation/internal resources for:
net use
psexec
.pfx
AsPlainText
Authorization: Basic
Authorization: Bearer
NetworkCredential
password
root
passwd
credential
putty
logins
connectionstring
securestring
samaccountname
ldap
sudo
scp
ssh
.vmd
clientdomain\
@clientdomain.com
id_dsa
id_rsa
ghp_
AWS_SECRET_ACCESS_KEY + AKIA/ASIA
ssh_password
net user