-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathInformation_Gathering_Tools
40 lines (25 loc) · 1.12 KB
/
Information_Gathering_Tools
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
Step 1 Intelligence Information Gathering Tools :- This step can be very useful if done properly can lead to severe attacks on your target
Passive Information Gathering Tools : -
1.) Maltego
2.) SHODAN Browser (https://www.shodan.io/)
3.) Zoomeye (http://www.zoomeye.org/)
4.) Google Hacking Database
5.) Whois lookups using following domains :-
ICANN - http://www.icann.org
IANA - http://www.iana.com
NRO - http://www.nro.net
AFRINIC - http://www.afrinic.net
APNIC - http://www.apnic.net
ARIN - http://ws.arin.net
LACNIC - http://www.lacnic.net
RIPE - http://www.ripe.net
6.) SCANNER-INURLBR (https://github.com/googleinurl/SCANNER-INURLBR)
7.) SearchDiggity (http://www.bishopfox.com/resources/tools/google-hacking-diggity/attack-tools/)
8.) Recon-ng
9.) PIG ( Passive Information Gathering Framework ) this is underdevelopment
10.) https://github.com/googleinurl
Active Information Gathering Tools :-
1.) Nmap swiss knife for hackers and researchers
2.) AIG ( Active Infomation Gathering Framework) https://github.com/HSIS007/AIG
3.) DNSWALK
4.) SNMPENUM