Tracking & Tracing every possible signature of the Target Application
Subsidiary & Acquisition Enumeration (Depth - Max)
Owler
Crunchbase
Wikipedia & Google Search
Reverse Lookup
Amass
Reverse IP
Subdomain Enumeration
Subfinder
Assetfinder
Sublist3r
Amass
Chaos
Sudomy
findomain
Subdomain Bruteforcing
dnsx
DNS Validator (Generate Resolver List)
Subdomain Takeover
Nuclei Templates
Subdomain Takeover (tool)
Takeover
Osmedeus Takeover Module
Probing
HTTPX
HTTProbe
Technology Fingerprinting
Wappalyzer Plugin
Whatweb
Port Scanning
NMap
Naabu
Known Vulnerabilites
https://cve.mitre.org
https://www.cvedetails.com
https://www.exploit-db.com/
https://snyk.io/
https://www.cybersecurity-help.cz/vdb/
Template Based Scanning (Nuclei / Jeales)
Nuclei
Jaeles
Misconfigured Cloud Storage
S3 Misconfig Article
Broken Link Hijacking
BurpSuite Plugin
Tool
Directory Enumeration
Dirsearch
FFUF
Wordlists
JavaScript Files for Hardcoded APIs & Secrets
Automated tools for finding hardcoded information
Automated tools for finding params, endpoints, etc.
Compare JS files (current and old)
Tools
JFScan
LinkFInder
DetectDynamicJS
Retire.js (Burp Plugin/Browser Extension/Standalone)
JSLink Finder (Burp Plugin)
SecretFinder
Domain-Specific GitHub & Google Dorking
Google Hacking DB
GitDocker
GitRob
GirHound
Interesting GitHub Dorks List
Parameter Discovery
ParamSpider
Arjun
Data Breach Analysis
Intelx
Hacking Forums
Darkweb/Darknet Analysis
Parameter Fuzzing
Search Engine Discovery
Shodan
Spyse
Censys
Fofa
BinaryEdge
IP Range Enumeration (If In Scope)
Wayback History
Wayback Machine
Waybackurls
gau
Potential Pattern Extraction with GF and automating further for XSS, SSRF , etc.
GF
GF Patterns
Heartbleed Scanning
MassBleed
General Security Misconfig. Scanning
CORS
Security Headers
SPF Record
CRLF Inection
HTTP Request Smuggling Detection (More false positives in Automation)
Automated Recon Frameworks
Project Bheem
Osmedues
ReconNote
If any outdated software is found , then check for CVEs
Reference : Harsh Bothra Mind Map
by : Software Odyssey