Hacker's Notes
search
⌘Ctrlk
The Hacker's Notes
Hacker's Notes
  • THE HACKER'S NOTES
  • Fundamentals
    • Learning Process
    • Computer Fundamentals
    • Network Fundamentals
    • Unix Fundamentals
    • Hacking Fundamentals
  • Pentesting Cheatsheets
    • Pentesting Cheatsheets
    • SQL Injection & XSS Playground
  • offensive security
    • Red Team Infrastructure
    • MITRE ATT&CK
    • Initial Access
    • Code Execution
    • Code & Process Injection
    • Defense Evasion
    • Enumeration and Discovery
    • Privilege Escalation
    • Credential Access & Dumping
    • Lateral Movement
    • Persistence
    • Exfiltration
  • Active Directory
    • Active Directory & Kerberos Abuse
  • Reversing, forensics & misc
    • Internals
    • AWS Accounts, Users, Groups, Roles, Policies
    • Neo4j
    • Dump Virtual Box Memory
    • AES Encryption Using Crypto++
    • Reversing Password
  • HACKING MANUEL
    • Hacking Methodology
    • Pentesting Web checklist
  • RECONNAISSANCE
    • OSINT
      • OSINT (Open Source Intelligence)
      • GitHub Dorks
      • Google Dorks
      • IMINT (Image Intelligence) and GEOINT (Geospatial Intelligence)
    • Public info gathering
    • Basic recon
    • Root domains
    • Subdomain Enum
    • DNS (Domain Name Systems) Pentesting
    • MDNS (Multicast DNS) Pentesting
    • Port Scan
    • Network Scanning
    • Host Scanning
    • Packet Scanning
    • Find Leaked API Keys
    • Email Analysis
    • Webs recon
    • Web Basic Pentesting
    • Windows Forensics
    • Active Directory Pentesting
    • AD CS (Active Directory Certificate Services) Pentesting
    • Cloud Info Gathering
    • Dark-Web Search
    • Social Engineering
  • Enumeration
    • 🟢Information Gathering
    • Files
    • SSL/TLS
    • Ports
    • WEB App Technologies
    • Unix Enum
    • Windows Enum
  • Exploitation
    • 🟢Pre-Exploitation
    • 🟢Exploitation
    • WEB App Attacks
    • Payloads
    • Reverse Shells
    • File transfer
    • Unix Exploit
    • Window Exploit
  • Privilege Escalation
    • 🟢Post-Exploitation
    • Linux Priv Esca
    • Unix Priv Esca
    • Window Priv Esca
  • PIVOTING/LATERAL MOVEMENT
    • 🟢Lateral Movement
    • 🟢Pivoting
    • Unix Piv/Lateral
    • Pivoting in Linux
    • Window Piv/Lateral
  • DATA EXFILTRATION
    • Unix Data Exfilt
    • Backdoors in Linux
    • Window Data Exfilt
  • PERSISTENCE
    • Unix Persist
    • Cover Your Tracks in Linux
    • Window Persist
  • NETWORK HACKING
    • Apache Hadoop Pentesting
    • ARP (Address Resolution Protocol) Spoofing
    • EthernetIP Pentesting
    • FastCGI Pentesting
    • Firewall
    • GRPC Pentesting
    • ReDoS (Regular Expression Denial of Service)
    • Rsync Pentesting
    • Protocols
  • WIRELESS HACKING
    • Wifi Enum
    • Wifi Exploit
    • Wifi Priv
    • Bluetooth
    • VPN
    • Audio/Tv Hacking
  • EMAIL HACKING
    • IMAP Pentesting
    • POP Pentesting
    • Receive Email as Another Address
    • SMTP Pentesting
  • DATABASE HACKING
    • CouchDB Pentesting
    • InfluxDB Pentesting
    • MongoDB Pentesting
    • MSSQL (Microsoft SQL) Pentesting
    • MySQL Pentesting
    • Neo4j Pentesting
    • PostgreSQL Pentesting
    • Redis Pentesting
    • SQLite Pentesting
  • CLOUD HACKING
    • General
    • AWS
    • Azure
    • GCP
    • CDN - Comain Fronting
    • Docker && Kubernetes
    • Virtual Machine
    • Git Pentesting
    • Gitea Pentesting
    • Gogs Pentesting
  • AI HACKING
    • AI Prompt Injection
    • Attack_techniques
    • Attack_evasions
    • Attack_intents
    • Ai_enabled_app_defense_checklist
    • Ai_sec_questionnaire
    • Ai_threat_model_questions
    • LLM/AI/ML/prompt testing
  • MACHINE LEARNING HACKS
    • Jupyter Notebook Pentesting
    • Orange Data Mining
    • Read HDF5 (H5) File
    • Read PT File
    • Read PT File
    • Computer Vision
    • Data Processing
    • Create Malicious ML Model
  • CODE HACKING
    • Code review
    • Sinks
  • MOBILE HACKING
    • General
    • Android
    • iOS
  • BLOCKCHAIN HACKING
    • Ethereum
    • Attack Methodology
  • CRYPTOGRAPHY HACKING
    • Cryptography Basic
    • Password Safe Pentesting
    • PowerShell Credentials
    • John the Ripper
    • Algorithim Pentesting
    • Key Derivation
    • Math
  • IOT HACKING
    • Printer Pentesting
    • IPP (Internet Printing Protocol) Pentesting
  • HARDWARE HACKING
    • Flipper Zero
    • Firmware Analysis
    • Gerber (GBR) Files
    • MQTT Pentesting
    • NETGEAR Pentesting
    • SAL Logic Analysis
  • WRITEUPS
    • THM Walkthroughs
    • HTB Walkthroughs
    • OSCP Preparation
    • CRTP Prepration
    • Labs writeups
    • Blogs/Gitbooks Links
    • Portswigger writeups
  • BugBounty
    • BugBounty Methodology
    • BugBounty Resources
  • Tools
    • Privacy
    • Steganography
    • Password cracking
    • Windows Tools
    • Burp Suite
    • Scripting
    • Red Team Resources
    • Hacking Tools
    • Internal Pentest
    • Report template
    • Random
    • Wireshark Cheat Sheet
    • Tshark Cheat Sheet
    • Master assessment mindmaps
    • Convert PuTTY Key to OpenSSH Key
    • Decrypt SolarPuTTY Sessions Files
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
githubEdit
  1. RECONNAISSANCEchevron-right
  2. OSINT

OSINT (Open Source Intelligence)

Open-soruce intelligence is the collection and analysis of data gathered from open sources to produce actionable intelligence.

  • AbuseIPDBarrow-up-right

  • Censys Searcharrow-up-right

  • Cloudflare Radararrow-up-right

  • Cisco Talosarrow-up-right

  • DeHashedarrow-up-right

  • DigitalSidearrow-up-right

  • Feodo Trackerarrow-up-right

  • FOFAarrow-up-right

  • Have I Been Pwnedarrow-up-right

  • HudsonRock Free Toolsarrow-up-right

  • Hunterarrow-up-right

  • IP2Location.ioarrow-up-right

  • IP2WHOISarrow-up-right

  • ipinfo.ioarrow-up-right

  • MAC Address Lookuparrow-up-right

  • MITRE ATT&CKarrow-up-right

  • MetaDefender Cloudarrow-up-right

  • NerdyDataarrow-up-right

  • Nmmapperarrow-up-right

  • Qualysarrow-up-right

  • Security Headersarrow-up-right

  • Shodanarrow-up-right

  • SSLBLarrow-up-right

  • Threat Intelligence Platformarrow-up-right

  • threatfeeds.ioarrow-up-right

  • ThreatFoxarrow-up-right

  • URLhausarrow-up-right

  • urlscan.ioarrow-up-right

  • ViewDNS.infoarrow-up-right

  • Wappalyzerarrow-up-right

  • Web Checkarrow-up-right

  • Whoxyarrow-up-right

  • WhoisXMLarrow-up-right

hashtag
Web Archives

  • Wayback Machinearrow-up-right

hashtag
Vulnerabilities (CVE)

  • Exploit DBarrow-up-right

  • GitHub Advisory Databasearrow-up-right

  • Hacktivity (HackerOne)arrow-up-right

  • Hacktivity (Huntr)arrow-up-right

  • Sploitusarrow-up-right

hashtag
Malware

  • MalSharearrow-up-right

  • MalwareBazaararrow-up-right

PreviousOSINTchevron-leftNextGitHub Dorkschevron-right

Last updated 1 month ago

  • Web Archives
  • Vulnerabilities (CVE)
  • Malware