asteroza + recon   86

Vortimo - Beta3
OSINT software from the maker of Maltego. Document while you threat hunt. Bookmarks on steroids?
threat  hunting  logging  notetaking  software  OSINT  security  maltego  recon  topic  research  support  chrome  brwoser  addon  plugin  extension 
20 days ago by asteroza
apparently a very power facial recognition search engine, trawls all the russian SNS sites
russia  OSINT  facial  face  recognition  search  engine  SNS  recon 
august 2019 by asteroza
Yandex.Images: search for images on the internet, search by image
Yandex image search is surprisingly powerful, with unreal facial recognition matching, and place detection even when using OC
OSINT  Yandex  image  search  reverse  facial  recognition  mapping  recon  location  detection 
december 2018 by asteroza
🔍 Facebook Scanner
surface level stuff, but if you have a rough idea of the url, this works alright
OSINT  facebook  scraping  search  recon 
december 2018 by asteroza
lavalamp-/ipv666: Golang IPv6 address enumeration
Using assort tricks and statistical analysis to hunt active IPv6 addresses. Something to bolt onto masscan?
IPv6  recon  search  security  hacking  pentesting 
december 2018 by asteroza
9b/chirp: Interface to manage and centralize Google Alert information
Using google alert as an infiltration mechanism, by using the google alert system to delivery shady links directly to your targets...
google  alert  recon  OSINT  security  hacking  pentesting 
may 2018 by asteroza
Bucket Finder - DigiNinja
Use Bucket-Stream to locate buckets, then use Bucket-Finder to explore those buckets
AWS  S3  open  bucket  recon  security  hacking  pentesting  software 
april 2018 by asteroza
-= BuckHacker - The Bucket Search Engine for Hackers =-
amazon open S3 bucket search engine, AKA time to go bucket trawling...
security  hacking  pentesting  recon  open  S3  bucket  search  engine  OSINT 
february 2018 by asteroza
graphql/graphiql: An in-browser IDE for exploring GraphQL.
Useful for enumerating GraphQL API's via introspection queries, since GraphQL usually exposes your whole database...
GraphQL  javascript  API  enumerator  exploration  IDE  recon  security  hacking  pentesting 
november 2017 by asteroza
emails4corporations - corporate email address formats
Won't help with Konami, those guys get random addresses that are reassigned every 6 months...
phishing  hacking  pentesting  security  OSINT  recon  email  address  format  pattern 
october 2017 by asteroza
The Deep Sweep
This could easily have ended in tears. Also, wouldn't this show up on radar?
sousveillance  wireless  signal  scanning  balloon  recon  hacking  security  mapping  SIGINT  Delicious 
november 2015 by asteroza
Recon next-gen GPS goggles eyes-on -- Engadget
Potentially usable as a AR HUD HMD for wearable computing since it's bluetooth/android based?
recon  instruments  GPS  goggles  HMD  LCD  head  mounted  display  monitor  Android  HUD  wearable  computing  bluetooth  survival  equipment  AR  hardware  electronics  devices  eyeware  fashion  skiing  apparel  Delicious 
january 2011 by asteroza
« earlier      
per page:    204080120160

related tags

802.11  account  active  AD  addon  address  adversarial  alert  analysis  analytics  android  anonymous  antivirus  APi  API  apparel  AR  archive  attack  awareness  AWS  ball  balloon  banner  blackwater  bluetooth  bounce  browser  brute  brwoser  bucket  bulk  camera  capture  case  certificate  chain  cheatsheet  chrome  CIA  cipher  CLI  CMS  collector  combat  command  commands  common  computing  correlation  crawler  credential  CT  curl  data  Delicious  detection  device  devices  Diggity  directory  discovery  display  DNS  domain  dorking  drone  dump  egress  electronics  email  encapsulation  endpoint  engine  enumeration  enumerator  equipment  evasion  exfiltration  exploit  exploration  explorer  extension  external  eyeware  face  facebook  facial  facility  fashion  file  fingerprint  fingerprinting  flowchart  force  forensics  format  framework  FTP  go  goggles  google  GPS  graph  GraphQL  hacking  hardware  harvester  head  hidden  high  HMD  host  hoster  HTTP  HUD  hunter  hunting  IDE  identification  IDF  image  In-Q-Tel  information  infosec  instagram  instruments  intelligence  internet  intiial  investigation  IP  IPv6  israel  IT  javascript  journalism  jumpbox  kali  key  killchain  lateral  LCD  LDAP  leak  leakage  library  linking  list  location  log  logging  lookup  maltego  mapping  mass  media  metasploit  meterpreter  military  missing  monitor  monitoring  mounted  movement  name  network  networking  notetaking  NSA  office365  onesixtyone  onion  open  opensource  OSINT  outsourced  outsourding  password  pattern  payload  PC  penetration  pentest  pentesting  phishing  pivot  platform  plugin  port  powershell  project  public  python  query  recognition  recon  reconnaissance  reconnisance  record  recording  reference  relay  remote  research  reverse  robot  robotic  robotics  russia  S3  scan  scanner  scanning  scout  scouting  scraping  screenshot  search  secret  security  selector  sensing  server  service  services  SIGINT  signal  situational  skiing  snake  SNMP  SNS  social  software  sousveillance  spearfishing  speed  sphere  spider  SSL  stalking  SubBrute  subdomain  support  surveillance  survival  sysadmin  takeover  technology  testing  threat  throughput  throwbot  TIS  TLS  tools  topic  tor  tracking  transparency  twitter  typosquatting  UGV  urban  usage  utilities  version  video  view  viewer  wardriving  wearable  web  webAPI  website  whois  wifi  windows  wireless  XSS  XT  Yandex 

Copy this bookmark: