From 9e70bead9ae2e164d3d2f3a44f72b92e55a8d5ce Mon Sep 17 00:00:00 2001 From: Jieyab89 Date: Mon, 22 Apr 2024 12:33:21 +0700 Subject: [PATCH] Add more resources pt 3 --- README.md | 32 ++++++++++++++++++++++++++++++++ 1 file changed, 32 insertions(+) diff --git a/README.md b/README.md index 7112b08..89f6b7c 100644 --- a/README.md +++ b/README.md @@ -408,6 +408,7 @@ Be carefull using this tool - [C2-Tracker](https://github.com/montysecurity/C2-Tracker) - [malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - [vx-underground](https://vx-underground.org/) +- [shellpub](https://n.shellpub.com/en) # IoT Search Engines @@ -501,6 +502,7 @@ You can find the file hash or other threat indicator - [zerofox](https://www.zerofox.com/platform/) - [malpedia](https://malpedia.caad.fkie.fraunhofer.de/) - [vx-underground](https://vx-underground.org/) +- [shellpub](https://n.shellpub.com/en) # Automation Dorking @@ -1017,6 +1019,7 @@ This domain will always change - [MODI ID](https://modi.esdm.go.id/portal/dataPerusahaan) - [Minerba ESDM ID Map](https://momi.minerba.esdm.go.id/public/) - [HAKI ID](https://pdki-indonesia.dgip.go.id/search?type=trademark&keyword=) +- [Email Format](https://www.email-format.com/i/search/) # People Searching @@ -1096,6 +1099,7 @@ This domain will always change - [Spam Calls](https://spamcalls.net/en/) - [inteltechniques](https://inteltechniques.com/tools/Telephone.html) - [pipl](https://pipl.com/) +- [phonebook](https://phonebook.cz/) # Public Records @@ -1482,6 +1486,7 @@ Google queries for MySpace - [Email Header Analisis Toolbox](https://toolbox.googleapps.com/apps/messageheader/) - [Sherlock Eye](https://sherlockeye.io/) - [Ghunt](https://github.com/mxrch/GHunt) +- [Email Format](https://www.email-format.com/i/search/) # Shodan Query Options @@ -2660,6 +2665,33 @@ Secure Email Gateway (SEG) for phishing email header (escape detection) - [aparoid](https://github.com/stefan2200/aparoid) Static and dynamic Android application security analysis - [Active Directory Cheat](https://github.com/esidate/pentesting-active-directory) Active Directory Pentesting Mind Map - [sploitus](https://sploitus.com/) Awesome exploit list like Exploit DB +- [BloodHound](https://github.com/SpecterOps/BloodHound) Reveal the hidden and often unintended relationships within an Active Directory or Azure environment + +Social Engineering + +- [social engineering](https://www.social-engineer.org/) +- [emkei](https://emkei.cz/) + +Credential Access + +- [LaZagne](https://github.com/AlessandroZ/LaZagne) +- [WirelessKeyView](https://www.nirsoft.net/utils/wireless_key.html) +- [Windows credential manager](https://www.nirsoft.net/utils/credentials_file_view.html) +- [Pillager](https://github.com/qwqdanchun/Pillager/) +- [searchall](https://github.com/Naturehi666/searchall) + +Post Exploitation + +- [metasploit-framework](https://github.com/rapid7/metasploit-framework) +- [CrackMapExec](https://github.com/byt3bl33d3r/CrackMapExec) +- [impacket](https://github.com/fortra/impacket) +- [wmiexec-Pro](https://github.com/XiaoliChan/wmiexec-Pro) +- [pstools](https://docs.microsoft.com/en-us/sysinternals/downloads/pstools) +- [Rubeus](https://github.com/GhostPack/Rubeus) +- [Powermad](https://github.com/Kevin-Robertson/Powermad) +- [PowerSploit](https://github.com/PowerShellMafia/PowerSploit) +- [Responder](https://github.com/lgandx/Responder) +- [Responder-Windows](https://github.com/lgandx/Responder-Windows) Password crack