Update README.md

fix conflict
This commit is contained in:
Jieyab
2024-10-10 23:58:06 +07:00
committed by GitHub
parent f582fdea98
commit c21f5ab76a

View File

@@ -567,7 +567,6 @@ https[:]//www[.]google[.]com/search?q=cache:<url of interest>
- [pulsedive](https://pulsedive.com/dashboard/) - [pulsedive](https://pulsedive.com/dashboard/)
- [cuckoo](https://cuckoo.cert.ee/) - [cuckoo](https://cuckoo.cert.ee/)
- [neiki](https://tip.neiki.dev/) - [neiki](https://tip.neiki.dev/)
- [Ransomware Live and Archive](https://www.ransomware.live/)
# IoT Search Engines # IoT Search Engines
@@ -591,6 +590,7 @@ https[:]//www[.]google[.]com/search?q=cache:<url of interest>
- [Rusia pub CCTV](https://www.geocam.ru/en/) - [Rusia pub CCTV](https://www.geocam.ru/en/)
- [lIVE CAM beach Australia](https://www.livebeaches.com/australia/) - [lIVE CAM beach Australia](https://www.livebeaches.com/australia/)
- [webcamcse cipher387](https://cipher387.github.io/webcamcse/) - [webcamcse cipher387](https://cipher387.github.io/webcamcse/)
- [Sunder Survilance Cam](https://sunders.uber.space/?lat=-2.4833826&lon=117.8902853&zoom=11)
# IP Addresses # IP Addresses
@@ -631,7 +631,7 @@ Tips
You can find the file hash or other threat indicator You can find the file hash or other threat indicator
- [Ransomware Live and Archive](https://www.ransomware.live/) - [Hudson Rock Cybercrime Intelligence Free Tools](https://www.hudsonrock.com/threat-intelligence-cybercrime-tools)
- [Alien Vault](https://otx.alienvault.com/) - [Alien Vault](https://otx.alienvault.com/)
- [Exploit db](https://www.exploit-db.com/) - [Exploit db](https://www.exploit-db.com/)
- [AT&T](https://cybersecurity.att.com/resource-center#content_analyst-reports) - [AT&T](https://cybersecurity.att.com/resource-center#content_analyst-reports)
@@ -761,6 +761,7 @@ Example
- [YANDEX](https://seosly.com/blog/yandex-search-operators/) - [YANDEX](https://seosly.com/blog/yandex-search-operators/)
- [BING](https://seosly.com/blog/bing-search-operators/) - [BING](https://seosly.com/blog/bing-search-operators/)
- [mediasova](https://search.mediasova.com/en/index) - [mediasova](https://search.mediasova.com/en/index)
- [wbmii](https://webmii.com/)
# Bash Dorking Script # Bash Dorking Script
@@ -806,6 +807,7 @@ Example
- [boardreader](https://boardreader.com/) - [boardreader](https://boardreader.com/)
- [Geoint CSE search](https://cse.google.com/cse?cx=015328649639895072395:sbv3zyxzmji#gsc.tab=0&gsc.sort=) - [Geoint CSE search](https://cse.google.com/cse?cx=015328649639895072395:sbv3zyxzmji#gsc.tab=0&gsc.sort=)
- [lolarchiver](https://osint.lolarchiver.com/#) - [lolarchiver](https://osint.lolarchiver.com/#)
- [wbmii](https://webmii.com/)
# Internet Archive # Internet Archive
@@ -866,6 +868,7 @@ Example
- [sn0int pwndb-domains](https://sn0int.com/r/kpcyrd/pwndb-domains) - [sn0int pwndb-domains](https://sn0int.com/r/kpcyrd/pwndb-domains)
- [sn0int pwndb-emails](https://sn0int.com/r/kpcyrd/pwndb-emails) - [sn0int pwndb-emails](https://sn0int.com/r/kpcyrd/pwndb-emails)
- [trufflehog](https://trufflesecurity.com/trufflehog) - [trufflehog](https://trufflesecurity.com/trufflehog)
- [9ghz](https://9ghz.com/)
# Crack Jurnals # Crack Jurnals
@@ -994,6 +997,7 @@ Example
# People Searching # People Searching
- [wbmii](https://webmii.com/)
- [spokeo](http://www.spokeo.com) - [spokeo](http://www.spokeo.com)
- [123people](http://www.123people.com) - [123people](http://www.123people.com)
- [peepdb](http://www.peepdb.com) - [peepdb](http://www.peepdb.com)
@@ -1119,6 +1123,7 @@ Example
- [numlookup](https://www.numlookup.com/) - [numlookup](https://www.numlookup.com/)
- [haveibeenzuckered](https://haveibeenzuckered.com/) - [haveibeenzuckered](https://haveibeenzuckered.com/)
- [DetectDee](https://github.com/piaolin/DetectDee) - [DetectDee](https://github.com/piaolin/DetectDee)
- [espysys](https://espysys.com/)
Pro Tips Pro Tips
@@ -1595,6 +1600,9 @@ Google queries for MySpace
- [infoga](https://www.infoga.io/) - [infoga](https://www.infoga.io/)
- [findemail](https://findemail.io/) - [findemail](https://findemail.io/)
- [minelead](https://minelead.io/) - [minelead](https://minelead.io/)
- [espysys](https://espysys.com/)
- [hackcheck](https://hackcheck.io/)
- [h8mail](https://github.com/khast3x/h8mail)
# PGP or GPG Keybase # PGP or GPG Keybase
@@ -2617,6 +2625,8 @@ Social Network and blogging
- [darknetstats](https://www.darknetstats.com/) - [darknetstats](https://www.darknetstats.com/)
- [darknetlive](https://darknetlive.com/) - [darknetlive](https://darknetlive.com/)
- [Deepweb more resouces](http://whitepapers.virtualprivatelibrary.net/DeepWeb.pdf) - [Deepweb more resouces](http://whitepapers.virtualprivatelibrary.net/DeepWeb.pdf)
- [TOR map](https://tormap.org/)
- [Read Darkweb](https://github.com/0xSojalSec/read-dark-web)
# Digital Forensics # Digital Forensics
@@ -3029,7 +3039,6 @@ VIN Checker
- [Planefinder](https://planefinder.net/) - [Planefinder](https://planefinder.net/)
- [Live ATC](https://www.liveatc.net/) - [Live ATC](https://www.liveatc.net/)
- [planespotters](https://www.planespotters.net/) - [planespotters](https://www.planespotters.net/)
- [globe plane](https://globe.adsbexchange.com/)
- [theaviationist](https://theaviationist.com/) - [theaviationist](https://theaviationist.com/)
- [airrecognition](https://web.archive.org/web/20240000000000*/https://airrecognition.com/) - [airrecognition](https://web.archive.org/web/20240000000000*/https://airrecognition.com/)
- [gpsjam](https://gpsjam.org/) - [gpsjam](https://gpsjam.org/)
@@ -3072,6 +3081,9 @@ VIN Checker
- [equasis](https://www.equasis.org/EquasisWeb/public/HomePage) - [equasis](https://www.equasis.org/EquasisWeb/public/HomePage)
- [MARITIME AWARENESS PROJECT](https://map.nbr.org/interactivemap/) - [MARITIME AWARENESS PROJECT](https://map.nbr.org/interactivemap/)
- [shipspotting](https://www.shipspotting.com/) - [shipspotting](https://www.shipspotting.com/)
- [maritime DB](https://www.maritime-database.com/)
- [portfocus](https://portfocus.com/#google_vignette)
- [submarinecablemap](https://www.submarinecablemap.com/)
NOOA Incident MAP NOOA Incident MAP
@@ -3097,6 +3109,8 @@ NOOA Incident MAP
# OSINT for Red Team # OSINT for Red Team
- [Apk mirror](https://www.apkmirror.com/) Sites that provide downloads apk and version
- [apkpure](https://apkpure.com/id/) Sites that provide downloads apk and version
- [pylingual](https://pylingual.io/) PyLingual Python Decompiler - [pylingual](https://pylingual.io/) PyLingual Python Decompiler
- [Phishious](https://github.com/CanIPhish/Phishious) - [Phishious](https://github.com/CanIPhish/Phishious)
Secure Email Gateway (SEG) for phishing email header (escape detection) Secure Email Gateway (SEG) for phishing email header (escape detection)
@@ -3205,6 +3219,8 @@ Noxer is a powerful Python script designed for automating Android penetration te
- [PentestingEverything](https://github.com/m14r41/PentestingEverything) Awesome checklist for bug bounties and other - [PentestingEverything](https://github.com/m14r41/PentestingEverything) Awesome checklist for bug bounties and other
- [busybox](https://busybox.net/) Escape from docker or container machine if you have get access the target like revshell but there is no apps or programm (binary) to run command - [busybox](https://busybox.net/) Escape from docker or container machine if you have get access the target like revshell but there is no apps or programm (binary) to run command
- [toybox](https://landley.net/toybox/downloads/binaries/latest/) Escape from docker or container machine if you have get access the target like revshell but there is no apps or programm (binary) to run command - [toybox](https://landley.net/toybox/downloads/binaries/latest/) Escape from docker or container machine if you have get access the target like revshell but there is no apps or programm (binary) to run command
- [frida](https://frida.re/) Dynamic instrumentation toolkit for developers, reverse-engineers, and security researchers
- [Wireshark](https://www.wireshark.org/) Viewing and dump protocol such as signal, http and other
Social Engineering Social Engineering
@@ -3298,9 +3314,6 @@ Wordlists for all
- [wordlists](https://github.com/assetnote/wordlists) - [wordlists](https://github.com/assetnote/wordlists)
- [Hashmob](https://hashmob.net/resources/hashmob) - [Hashmob](https://hashmob.net/resources/hashmob)
- [RockYou2024](https://github.com/exploit-development/RockYou2024) - [RockYou2024](https://github.com/exploit-development/RockYou2024)
- [Rock You 2024 Archive](https://www.kaggle.com/datasets/bwandowando/original-rockyou2024-text-file-11-parts)
- [Escrow (Request your hash)](https://hashes.com/en/escrow/view)
- [Awesome Wordlist all](https://github.com/kkrypt0nn/wordlists)
Web fuzz wordlists Web fuzz wordlists
@@ -3339,7 +3352,7 @@ Default Credentials
- [portforward](https://portforward.com/router-password/) - [portforward](https://portforward.com/router-password/)
- [cleancss](https://www.cleancss.com/router-default/) - [cleancss](https://www.cleancss.com/router-default/)
- [toolmao](https://www.toolmao.com/baiduapp/routerpwd/) - [toolmao](https://www.toolmao.com/baiduapp/routerpwd/)
- [datarecovery](https://datarecovery.com/rd/default-passwords/) - [default-password](https://default-password.info/)
Local Enumeration Local Enumeration
@@ -4044,6 +4057,8 @@ This is list data broker, you can search or delete form data broker list on here
This is for you searching software alternative This is for you searching software alternative
- [alternativeto](https://alternativeto.net/) - [alternativeto](https://alternativeto.net/)
- [Apk mirror](https://www.apkmirror.com/)
- [apkpure](https://apkpure.com/id/)
# OSINT Barcode Reader # OSINT Barcode Reader
@@ -4065,11 +4080,50 @@ Analyzing for MASINT e.g your image, vidio, building, maps, simulation, sat or s
- [Microsoft powertoys](https://learn.microsoft.com/id-id/windows/powertoys/screen-ruler) - [Microsoft powertoys](https://learn.microsoft.com/id-id/windows/powertoys/screen-ruler)
- [Angle Measurement](https://www.ginifab.com/feeds/angle_measurement/) - [Angle Measurement](https://www.ginifab.com/feeds/angle_measurement/)
- [sunpath3d](https://drajmarsh.bitbucket.io/sunpath3d.html) - [sunpath3d](https://drajmarsh.bitbucket.io/sunpath3d.html)
- [rapidtables conveter calc](https://www.rapidtables.com/convert/)
# OSINT Financial (FININT)
- [CC Checker](https://dnschecker.org/credit-card-validator.php)
# OSINT Cryptography (Cipher)
Find the cipher and other conveter tools for decode
- [dcode](https://www.dcode.fr/identification-chiffrement)
- [CyberChef](https://gchq.github.io/CyberChef/)
- [base64decode](https://www.base64decode.org/)
- [hashes](https://hashes.com/en/tools/hash_identifier)
- [kali hash identifier](https://www.kali.org/tools/hash-identifier/)
Other conveter
- [rapidtables](https://www.rapidtables.com/convert/)
# OSINT Game
Search person in game
- [Steamdb](https://steamdb.info/calculator/)
- [tracker](https://tracker.gg/)
# OSINT Device for Device
Getting info for device and hardware info and emulator
- [gsmarena](https://www.gsmarena.com/)
- [hardreset](https://www.hardreset.info/)
- [3u tool](https://www.3u.com/)
- [Old Device or Phone](https://www.mobilephonemuseum.com/catalogue)
- [ifixit](https://it.ifixit.com/Device/Other_OS_Phone)
- [scrcpy](https://github.com/Genymobile/scrcpy/releases)
- [Android Studio](https://developer.android.com/studio)
# OSINT Technique Tips # OSINT Technique Tips
This is path for you learn OSINT This is path for you learn OSINT
- [Awesome guide attack vector OSINT](https://github.com/sinwindie/OSINT)
- [Bellingcat Guides Tools and Handbook](https://bellingcat.gitbook.io/toolkit/resources/guides-and-handbooks) - [Bellingcat Guides Tools and Handbook](https://bellingcat.gitbook.io/toolkit/resources/guides-and-handbooks)
- [deepdarkCTI](https://github.com/fastfire/deepdarkCTI) - [deepdarkCTI](https://github.com/fastfire/deepdarkCTI)
- [osintcombine](https://www.osintcombine.com/post/dark-web-searching) - [osintcombine](https://www.osintcombine.com/post/dark-web-searching)