1st phase
roots
BugCrowd/h1/intigriti
Acquisitions
https://crunchbase.com/
https://corp.owler.com/
https://acquiredby.co/
wikipidia
https://tools.whoisxmlapi.com/domain-availability-check
ASN
GUI
http://bgp.he.net/
https://ipinfo.io/
asnlookup.com
https://apps.db.ripe.net/db-web-ui/#/fulltextsearch
https://whois.arin.net/ui/query.do
http://ipv4info.com/
mxtoolbox.com
https://book.hacktricks.xyz/external-recon-methodology#asns
cmd line
https://github.com/j3ssie/metabigor
echo "tesla" | metabigor net --org -v
https://github.com/OWASP/Amass
amass intel -org tesla
amass intel -asn 8911,50313,394161
https://github.com/yassineaboukir/Asnlookup
Reverse Whois
Whoxy.com
BuiltWith
https://viewdns.info/reversewhois
https://www.reversewhois.io/
http://ipv4info.com/
https://opendata.rapid7.com/sonar.rdns_v2/
http://dnsgoodies.com/
https://domaineye.com/reverse-whois
amass : https://github.com/OWASP/Amass
amass intel -whois -d tesla.com
https://github.com/jpf/domain-profiler
./profile zee.com
https://github.com/vysecurity/DomLink
Ad/Analytics
builtwith.com
https://raw.githubusercontent.com/m4ll0k/Bug-Bounty-Toolz/master/getrelationship.py
cookie
whatweb
Reverse DNS
https://securitytrails.com/
https://www.robtex.com/dns-lookup/eff.org
https://community.riskiq.com/home
https://www.circl.lu/services/passive-dns/
dorking [Manual]
Google-Fu [manual]
https://dorks.faisalahmed.me/#
Github Dorking (manual)
TOOLS
JHaddix BS SCRIPT
https://gist.github.com/jhaddix/1fb7ab2409ab579178d2a79959909b33
github-search
https://github.com/gwen001/github-search
GitMiner
https://github.com/UnkL4b/GitMiner
GitDorker
https://github.com/obheda12/GitDorker
python3 GitDorker.py -t TOKEN -d Dorks/alldorksv3 -q DOMAIN.COM -o DOMAIN.COM.txt
git-hound
https://github.com/ezekg/git-hound
gitrob
https://github.com/michenriksen/gitrob
Searching in repos and Orgs
truffleHog
https://github.com/trufflesecurity/truffleHog
git-all-secrets
https://github.com/anshumanbh/git-all-secrets
repo-supervisor
https://github.com/auth0/repo-supervisor
Scan your code for security misconfiguration, search for passwords and secrets.
repo-security-scanner
https://github.com/UKHomeOffice/repo-security-scanner
gitleaks
https://github.com/zricethezav/gitleaks
gittyleaks
https://github.com/kootenpv/gittyleaks
.git repositories available
https://github.com/internetwache/GitTools.git
Dorks
https://github.com/gwen001/github-search/blob/master/dorks.txt
https://github.com/techgaun/github-dorks/blob/master/github-dorks.txt
GitHub Secrets Check
smtper
https://www.smtper.net/
Specialized search engines
Shodan
tools
https://github.com/incogbyte/shosubgo
https://github.com/BullsEye0/shodan-eye
https://github.com/BullsEye0/shodan-eye/blob/master/Shodan_Dorks_The_Internet_of_Sh*t.txt
https://awesomeopensource.com/projects/shodan
https://github.com/evilsocket/xray
https://github.com/random-robbie/My-Shodan-Scripts
https://t.co/BNw6JvTVH9?amp=1
q
http.html:”dev-int.bigcompanycdn.com”
org:"Tesla, Inc."
ssl:"Tesla Motors"
resources
https://equatorial-soldier-1bb.notion.site/Hegazy-Group-c7b83ba0e7d540a19db6f55e9884aace
https://github.com/shifa123/shodandorks/blob/master/shodandorks
https://www.youtube.com/results?reload=9&app=desktop&search_query=shodan+dorking+for+bug+bounty
Cencys
https://github.com/yamakira/censys-enumeration
https://github.com/appsecco/the-art-of-subdomain-enumeration/blob/master/censys_subdomain_enum.py
ZoomEye
https://www.zoomeye.org/
FOFA
https://fofa.so/
Check List
2nd phase
Finding Subdomains
Subdomain Scraping
Search Engines
Infrastructure Sources
https://www.netcraft.com/
https://censys.io/
https://dnsdumpster.com/
http://ptrarchive.com/
Certificate Sources
https://crt.sh/
sslmate
certpotter
https://spyse.com/tools/ssl-lookup
https://github.com/yassineaboukir/sublert
https://github.com/eslam3kl/crtfinder
https://developers.facebook.com/tools/ct/
https://google.com/transparencyreport/https/ct/
Security Sources
https://securitytrails.com/
https://www.virustotal.com/
https://www.threatcrowd.org/
https://www.threatminer.org/
Amass
https://github.com/OWASP/Amass
cheat sheet
https://blog.intigriti.com/2021/06/08/hacker-tools-amass-hunting-for-subdomains/?cn-reloaded=1
commands
amass intel -active -addr 8.8.8.8
amas intel -org “google”
amass intel -active -asn 15169
amass intel -timeout 60 -d google.com
amass enum -passive -d owasp.org -src -config config.ini
amass enum -active -d owasp.org -src -config config.ini
amass enum -aw <PATH> -d owasp.org
amass enum -df domains.txt
amass track -d owasp.org
amass enum -brute -d twitch.tv -rf resolvers.txt -w bruteforce.list
assetfinder
https://github.com/tomnomnom/assetfinder
assetfinder -subs-only DOMAIN.COM -o subdomains-asset
Subfinder v2
https://github.com/projectdiscovery/subfinder
subfinder -dL scope -all -silent >> subdomains
subfinder -d DOMAIN.COM -all
github-subdomains.py
https://github.com/gwen001/github-search/blob/master/github-subdomains.py
python3 github-subdomains.py -t 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 -d DOMAIN.COM > c-sub-github.txt
Knock.py
https://github.com/guelfoweb/knock
python3 ~/Tools/knock/knockpy/knockpy.py -o knock DOMAIN.COM
Sublist3r
https://github.com/aboul3la/Sublist3r
sublist3r -d DOMAIN.COM -b -t 100 -o sublister.txt
Turbolist3r
https://github.com/fleetcaptain/Turbolist3r
python3 ~/Tools/Turbolist3r/turbolist3r.py -d DOMAIN.COM -b -t 100 -o ~/recon/thesun.co.uk/turbolist3r.txt
OneForAll
https://github.com/shmilylty/OneForAll
Findomain
https://github.com/Findomain/Findomain
findomain -f scope -u find-sub.txt
findomain -t thesun.co.uk
Sudomy
https://github.com/screetsec/Sudomy
~/Tools/Sudomy/./sudomy -o ~/recon/thesun.co.uk/sudomy -d thesun.co.uk
API
https://github.com/Screetsec/Sudomy
DB
https://github.com/xrootshell/chaospy
Subdomain Bruteforce
Gobuster
https://github.com/OJ/gobuster
Subdomain Bruting Lists
https://gist.github.com/jhaddix/86a06c5dc309d08580a018c66354a056
https://github.com/assetnote/commonspeak2
https://book.hacktricks.xyz/external-recon-methodology#dns-brute-force-v2
DNS enum [ips / cdir]
https://rapiddns.io/
https://github.com/darkoperator/dnsrecon
dnsrecon -r 157.240.221.35/24 -n 8.8.8.8 #Using google dns
dnsrecon -r 157.240.221.35/24 -n 1.1.1.1 #Using cloudflares dns
dnsrecon -d facebook.com -r 157.240.221.35/24 #Using facebooks dns
dnsrecon -r <DNS Range> -n <IP_DNS> #DNS reverse of all of the addresses
https://github.com/evilsocket/dnssearch
aiodnsbrute
https://github.com/blark/aiodnsbrute
shuffleDNS
https://github.com/projectdiscovery/shuffledns
altdns
https://github.com/infosec-au/altdns
dnsx
https://github.com/projectdiscovery/dnsx
puredns.
https://github.com/d3mondev/puredns
dnsvalidator
https://github.com/vortexau/dnsvalidator
https://public-dns.info/nameservers-all.txt
https://dnsdumpster.com/
https://otx.alienvault.com/
https://github.com/jonluca/Anubis-DB
VHost Scan [ips / cdir]
https://github.com/SpiderLabs/HostHunter
resources
https://book.hacktricks.xyz/external-recon-methodology#brute-force
https://twitter.com/Th3G3nt3lman/status/1171826399956676609
Cloud Assets
S3 buckets
https://github.com/nahamsec/lazys3
https://digi.ninja/projects/bucket_finder.php
https://github.com/gwen001/s3-buckets-finder
https://github.com/sa7mon/S3Scanner
https://github.com/ghostlulzhacks/s3brute
https://github.com/bbb31/slurp
https://github.com/kromtech/s3-inspector
writeups
https://medium.com/techiepedia/misconfigured-3-bucket-a-semi-opened-environment-9cfb9dee782d
https://medium.com/@janijay007/s3-bucket-misconfiguration-from-basics-to-pawn-6893776d1007
https://notifybugme.medium.com/how-i-was-able-find-mass-leaked-aws-s3-bucket-from-js-file-6064a5c247f8
https://githubmemory.com/repo/0x0sec/awesome-bugbounty-tools
cloud_enum
https://github.com/initstring/cloud_enum
python3 cloud_enum.py -k meraki.com -k ikarem.io
CloudScraper
https://github.com/jordanpotti/CloudScraper
https://github.com/jordanpotti/CloudScraper
cloudlist
https://github.com/projectdiscovery/cloudlist
Cloudflare_enum
https://github.com/appsecco/the-art-of-subdomain-enumeration/blob/master/cloudflare_subdomain_enum.py
https://github.com/jordanpotti/AWSBucketDump
4th phase
Content Discovery and fuzzing
WFUZZ
https://github.com/xmendez/wfuzz/
https://www.youtube.com/watch?v=iLFkxAmwXF0
https://www.youtube.com/watch?v=aN3Nayvd7FU
FFuF
https://github.com/ffuf/ffuf
ffuf -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt -u http://MACHINE_IP/FUZZ
https://github.com/maurosoria/dirsearch
https://github.com/OJ/gobuster
gobuster dir --url http://MACHINE_IP/ -w /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
https://github.com/KajanM/DirBuster
https://github.com/devanshbatham/ParamSpider
dirb
dirb http://MACHINE_IP/ /usr/share/wordlists/SecLists/Discovery/Web-Content/common.txt
waybackurls
https://github.com/tomnomnom/waybackurls
gau
https://github.com/lc/gau
Linked and JS Discovery
Endpoint Linked and GET JS Files
Burp Suite Pro
https://github.com/tomnomnom/waybackurls
https://github.com/hakluke/hakrawler
https://github.com/lc/gau
https://github.com/jaeles-project/gospider
https://github.com/003random/getJS
https://github.com/GerbenJavado/LinkFinder
https://github.com/lc/subjs
https://github.com/KathanP19/JSFScan.sh
Search JS Files
https://github.com/nsonaniya2010/SubDomainizer
https://github.com/Cillian-Collins/subscraper
https://github.com/jobertabma/relative-url-extractor
https://github.com/m4ll0k/SecretFinder
3rd phase
Favicon Analysis
https://github.com/devanshbatham/FavFreak
https://github.com/m4ll0k/Bug-Bounty-Toolz/blob/master/favihash.py
Port Analysis
masscan
https://danielmiessler.com/study/masscan/
nmap
naabu
https://github.com/projectdiscovery/naabu
https://github.com/x90skysn3k/brutespray
dnmasscan
https://github.com/rastating/dnmasscan
Service Scanning
https://github.com/x90skysn3k/brutespray
subresolve
https://github.com/melvinsh/subresolve
https://github.com/x90skysn3k/brutespray
Screenshotting
Good
https://github.com/michenriksen/aquatone
https://github.com/FortyNorthSecurity/EyeWitness
Bad
https://github.com/breenmachine/httpscreenshot
https://github.com/maaaaz/webscreenshot
https://github.com/mdhama/lazyshot
https://shutter-project.org/downloads/
https://bitbucket.org/al14s/rawr/wiki/Home
https://bitbucket.org/LaNMaSteR53/peepingtom/src
https://github.com/dafthack/PowerWebShot
https://github.com/1N3/Sn1per
https://github.com/streaak/keyhacks