ยถยถ symbiote
Symbiote is a social engineering tool designed to create a phishing page and capture webcam images. IP / Device Details By requesting camera permission on the victim's device,
#ip #device #info #browser #phishing #camera #seeker #vidphisher #storm-breaker #ngrok #localhost
๐sudo apt update && upgrade
๐sudo apt install python -y
๐sudo apt install wget -y
๐sudo apt install php -y
๐sudo apt install openssh-client -y
๐sudo apt install jq -y
๐sudo ssh-keygen -q -t rsa -N '' -f ~/.ssh/id_rsa <<<y >/dev/null 2>&1
๐git clone https://github.com/hasanfirnas/symbiote
๐cd symbiote
๐python3 symbiote.py
๐cd Server
๐./loclx account login
now enter your access token from https://localxpose.io/
ยถยถ To check for cam file :
๐cd symbiote
๐cd CapturedData
๐ls
๐termux-open <file_name>
ยถยถ Youtube link :
https://youtu.be/j8rTc3CI7UA
Symbiote is a social engineering tool designed to create a phishing page and capture webcam images. IP / Device Details By requesting camera permission on the victim's device,
#ip #device #info #browser #phishing #camera #seeker #vidphisher #storm-breaker #ngrok #localhost
๐sudo apt update && upgrade
๐sudo apt install python -y
๐sudo apt install wget -y
๐sudo apt install php -y
๐sudo apt install openssh-client -y
๐sudo apt install jq -y
๐sudo ssh-keygen -q -t rsa -N '' -f ~/.ssh/id_rsa <<<y >/dev/null 2>&1
๐git clone https://github.com/hasanfirnas/symbiote
๐cd symbiote
๐python3 symbiote.py
๐cd Server
๐./loclx account login
now enter your access token from https://localxpose.io/
ยถยถ To check for cam file :
๐cd symbiote
๐cd CapturedData
๐ls
๐termux-open <file_name>
ยถยถ Youtube link :
https://youtu.be/j8rTc3CI7UA
โค6๐3
ยถยถ SWS-Recon-Tool
SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects information such as Google Dork, DNS Information, Sub Domains, PortScan, Subdomain takeovers, Reconnaissance On Github and much more vulnerability scan. #recon #osint #info #nethunter
๐sudo apt-get install libxml2-dev libxslt-dev
๐git clone https://github.com/ShobhitMishra-bot/SWS-Recon-Tool.git
๐cd SWS-Recon-Tool
๐pip3 install -r requirements.txt
๐python3 SWS-Recon.py -h
SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects information such as Google Dork, DNS Information, Sub Domains, PortScan, Subdomain takeovers, Reconnaissance On Github and much more vulnerability scan. #recon #osint #info #nethunter
๐sudo apt-get install libxml2-dev libxslt-dev
๐git clone https://github.com/ShobhitMishra-bot/SWS-Recon-Tool.git
๐cd SWS-Recon-Tool
๐pip3 install -r requirements.txt
๐python3 SWS-Recon.py -h
๐3
ยถยถphisherprice
Multi-Functional Pentest Tool, Command Them All From One Script. #recon #cracking #Th3inspector #networking #TermuxToolx #nethunter
๐git clone https://github.com/SirCryptic/phisherprice
๐cd phisherprice
๐chmod +x phisherprice.sh
๐sudo ./phisherprice.sh
or
๐sudo bash phisherprice.sh
ยถยถ Changing API Key :
ยถยถ Example : sudo nano phisherprice.sh
https://rapidapi.com/blackbunny/api/bank-card-bin-num-check
https://apilayer.com/marketplace/email_verification-api
https://apilayer.com/marketplace/number_verification-api
https://www.shodan.io
โMain Menu
โโโโโโโโโโโโโโโโโโโ
โ1 โRecon
โ2 โCracking
โ3 โAutoxSploits
โ4 โNetworking
โ5 โC.Y.O xSploits
โ6 โAutoExif
โ7 โSE Toolkit
โ8 โStart Th3inspector
โu โUpdate Script
โc โContact Information
โโโโโโโโโโโโโโโโ
Multi-Functional Pentest Tool, Command Them All From One Script. #recon #cracking #Th3inspector #networking #TermuxToolx #nethunter
๐git clone https://github.com/SirCryptic/phisherprice
๐cd phisherprice
๐chmod +x phisherprice.sh
๐sudo ./phisherprice.sh
or
๐sudo bash phisherprice.sh
ยถยถ Changing API Key :
ยถยถ Example : sudo nano phisherprice.sh
https://rapidapi.com/blackbunny/api/bank-card-bin-num-check
https://apilayer.com/marketplace/email_verification-api
https://apilayer.com/marketplace/number_verification-api
https://www.shodan.io
โMain Menu
โโโโโโโโโโโโโโโโโโโ
โ1 โRecon
โ2 โCracking
โ3 โAutoxSploits
โ4 โNetworking
โ5 โC.Y.O xSploits
โ6 โAutoExif
โ7 โSE Toolkit
โ8 โStart Th3inspector
โu โUpdate Script
โc โContact Information
โโโโโโโโโโโโโโโโ
โค4๐4
ยถยถ hound
Hound is a simple and light tool for information gathering and capture exact GPS coordinates and can also grab basic information about the system and ISP. This tool can be very helpful in information gathering
#track #ip #location #isp #browser
Longitude
Latitude
Device Model
Operating System
Number of CPU Cores
Screen Resolution
User agent
Public IP Address
Browser Name
ISP Information
ยถยถ Install on kali/termux
๐apt-get -y install php unzip git wget
๐git clone https://github.com/techchipnet/hound
๐cd hound
๐bash hound.sh
Hound is a simple and light tool for information gathering and capture exact GPS coordinates and can also grab basic information about the system and ISP. This tool can be very helpful in information gathering
#track #ip #location #isp #browser
Longitude
Latitude
Device Model
Operating System
Number of CPU Cores
Screen Resolution
User agent
Public IP Address
Browser Name
ISP Information
ยถยถ Install on kali/termux
๐apt-get -y install php unzip git wget
๐git clone https://github.com/techchipnet/hound
๐cd hound
๐bash hound.sh
๐6โค2
Rebomb2AppWithProxies (2).zip
18.6 MB
ยถยถ ReBomb2 - TikTok Mass Report Bot
THIS DOES NOT GAURANTEE A BAN. STILL UP TO TIKTOK, THIS JUST INCREASES THE CHANCES OF THE RIGHT PERSON SEEING THE REPORT OR CONFUSING THE AI THAT SUPPOSEDLY CONTROLS THE REPORTING.
ยถยถ DOWNLOAD THE ZIP FILE "REBOMB2APPWITHPROXIES" Scroll down to the "Rebomb2App"
https://github.com/Sadyyn/ReBomb2
ยถยถ TUTORIAL WITH ADDED PROXIES: https://youtu.be/J5nxUckD7Wk
https://youtu.be/MdQrD_H8ZoI
THIS DOES NOT GAURANTEE A BAN. STILL UP TO TIKTOK, THIS JUST INCREASES THE CHANCES OF THE RIGHT PERSON SEEING THE REPORT OR CONFUSING THE AI THAT SUPPOSEDLY CONTROLS THE REPORTING.
ยถยถ DOWNLOAD THE ZIP FILE "REBOMB2APPWITHPROXIES" Scroll down to the "Rebomb2App"
https://github.com/Sadyyn/ReBomb2
ยถยถ TUTORIAL WITH ADDED PROXIES: https://youtu.be/J5nxUckD7Wk
https://youtu.be/MdQrD_H8ZoI
๐2โค1
ยถยถ Fluxion
#wifihacking #fluxion #kali #nethunter
#Eviltwinattack most of the time we have to use two adapters to work with eviltwin attack on tools like fluxion and wifiphisher . We changed internel wifi card to a realtek which will work on wlan0 ( supports monitor mode & packet injection ) You can buy On ebay & aliexpress for around 2 to 4usd (2.4ghz & 5ghz supports )
wlan1 will be externel wifi adapter
#Wifihacking
#fluxion
ยถยถ How to install Fluxion on kali linux
1) https://youtu.be/oGpM48NeLdc
2) https://youtu.be/OBwHhmfuvzQ
ยถยถ for android Device must be rooted & Ur device must have nethunter Supported Kernel & externel wifi adapter like showed on this video : https://t.me/termuxtoolx/2268
ยถยถ Fluxion on android zip file
https://t.me/termuxtoolx/2273
ยถยถ For wifi adapters search on channel #adapter
#wifihacking #fluxion #kali #nethunter
#Eviltwinattack most of the time we have to use two adapters to work with eviltwin attack on tools like fluxion and wifiphisher . We changed internel wifi card to a realtek which will work on wlan0 ( supports monitor mode & packet injection ) You can buy On ebay & aliexpress for around 2 to 4usd (2.4ghz & 5ghz supports )
wlan1 will be externel wifi adapter
#Wifihacking
#fluxion
ยถยถ How to install Fluxion on kali linux
1) https://youtu.be/oGpM48NeLdc
2) https://youtu.be/OBwHhmfuvzQ
ยถยถ for android Device must be rooted & Ur device must have nethunter Supported Kernel & externel wifi adapter like showed on this video : https://t.me/termuxtoolx/2268
ยถยถ Fluxion on android zip file
https://t.me/termuxtoolx/2273
ยถยถ For wifi adapters search on channel #adapter
โค3๐3๐ฅฐ1
Media is too big
VIEW IN TELEGRAM
#stryker #termux #wifi #deauth #handshakecapture #wordlist #router #scan #vuln #wps #androidwarrior #rooted #kernel #drivers #nethunter #wifite
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
โค3๐3
#stryker #termux #wifi #deauth #handshakecapture #wordlist #router #scan #vuln #wps #androidwarrior #rooted #kernel #drivers #nethunter #wifite
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
ยถยถ open Stryker after that plug in your wifi adapter ..We used MT7601U adapter ..but awus1900 & 1200 also works and do check if wlan0 works to scan for network before set to wlan1
ยถยถ Open Es file Explorer go to Stryker folder / in wordlist -- simply add ( past ) all the wordlist file u want ..
ยถยถ Device = Samsung Note9 /SMN960F -V9
https://t.me/termuxtoolx/2268
ยถยถ To check for adapter details u can use simpleUSB.apk link & video below
https://t.me/termuxtoolx/2236 (apk)
https://t.me/termuxtoolx/2235 (video )
ยถยถ To check for nearby routers details Use Wigle wifi https://play.google.com/store/apps/details?id=net.wigle.wigleandroid
ยถยถ IP Tool (wifi Analyzer) https://play.google.com/store/apps/details?id=com.ddm.iptools
ยถยถ Rockyou wordlist starting from 8 to 15 mix words
https://t.me/termuxtoolx/2064?single
ยถยถ Stryker Official Telegram Channel
https://t.me/strykerapp
https://t.me/strykereng
Application link = Stryker = https://strykerdefence.com/
you can use free version to scan for wps enabled networks ..deauth & capture handshake file
ยถยถ open Stryker after that plug in your wifi adapter ..We used MT7601U adapter ..but awus1900 & 1200 also works and do check if wlan0 works to scan for network before set to wlan1
ยถยถ Open Es file Explorer go to Stryker folder / in wordlist -- simply add ( past ) all the wordlist file u want ..
ยถยถ Device = Samsung Note9 /SMN960F -V9
https://t.me/termuxtoolx/2268
ยถยถ To check for adapter details u can use simpleUSB.apk link & video below
https://t.me/termuxtoolx/2236 (apk)
https://t.me/termuxtoolx/2235 (video )
ยถยถ To check for nearby routers details Use Wigle wifi https://play.google.com/store/apps/details?id=net.wigle.wigleandroid
ยถยถ IP Tool (wifi Analyzer) https://play.google.com/store/apps/details?id=com.ddm.iptools
ยถยถ Rockyou wordlist starting from 8 to 15 mix words
https://t.me/termuxtoolx/2064?single
ยถยถ Stryker Official Telegram Channel
https://t.me/strykerapp
https://t.me/strykereng
๐3โค2
https://play.google.com/store/apps/details?id=net.mullvad.mullvadvpn
#vpn
5747419652653217 | Exp: 2024-04-01
7852649333043112 | Exp: 2024-04-07
8027322517304568 | Exp: 2023-09-10
5747419652653217 | Exp: 2024-04-01
4699270063653137 | Exp: 2024-07-01
5238755285272851 | Exp: 2023-09-28
8905290060954193 | Exp: 2023-09-20
5127015189953973 | Exp: 2023-10-21
4699270063653137 | Exp: 2024-07-01
4835531754372127 | Exp: 2023-09-20
8228520508576744 | Exp: 2023-09-12
8334931305943361 | Exp: 2023-09-09
8417294887534090 | Exp: 2023-11-04
8450446473114539 | Exp: 2024-07-24
8486345592979924 | Exp: 2023-09-12
8629413833130556 | Exp: 2023-09-13
8637393848336174 | Exp: 2023-12-15
8888584861349251 | Exp: 2024-01-08
8027322517304568 | Exp: 2023-09-10
ยถยถ Telegram Channel : https://t.me/hmavpn_1
#vpn
5747419652653217 | Exp: 2024-04-01
7852649333043112 | Exp: 2024-04-07
8027322517304568 | Exp: 2023-09-10
5747419652653217 | Exp: 2024-04-01
4699270063653137 | Exp: 2024-07-01
5238755285272851 | Exp: 2023-09-28
8905290060954193 | Exp: 2023-09-20
5127015189953973 | Exp: 2023-10-21
4699270063653137 | Exp: 2024-07-01
4835531754372127 | Exp: 2023-09-20
8228520508576744 | Exp: 2023-09-12
8334931305943361 | Exp: 2023-09-09
8417294887534090 | Exp: 2023-11-04
8450446473114539 | Exp: 2024-07-24
8486345592979924 | Exp: 2023-09-12
8629413833130556 | Exp: 2023-09-13
8637393848336174 | Exp: 2023-12-15
8888584861349251 | Exp: 2024-01-08
8027322517304568 | Exp: 2023-09-10
ยถยถ Telegram Channel : https://t.me/hmavpn_1
โค2๐2
ยถยถ A Curated list of Awesome Python Scripts that Automate Stuffs.
https://github.com/hastagAB/Awesome-Python-Scripts
https://github.com/hastagAB/Awesome-Python-Scripts
GitHub
GitHub - hastagAB/Awesome-Python-Scripts: A Curated list of Awesome Python Scripts that Automate Stuffs.
A Curated list of Awesome Python Scripts that Automate Stuffs. - hastagAB/Awesome-Python-Scripts
โค1
๐จโ๐ป Now, I'm sharing my code and notes to help You!!๐ฏ
๐ Check out
#nmap
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods
nmap --script http-methods --script-args
http-methods. url-path='/webs ite '
###
sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==
WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================
c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==
===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30
===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====
==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"
===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"
๐ Learn, practice, and let's achieve OSCP success together! ๐ช๐
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp
๐ Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp
๐Google dork for searching these filenames on Google:
intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR
https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
๐ Check out
#nmap
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTP-Methods
nmap --script http-methods --script-args
http-methods. url-path='/webs ite '
###
sed IPs:
grep -oE '((1? [0-9] [0-9]? |2[0-4] [0-
9] |25[0-5])\.){3} (1? [0-9] [0-9]? |2 [0-4]
[0-9] |25 [0-5] ) ' FILE
--Script smb-enum-shares
=EE=======
=E==EE====E============E==
EEE=E==E==:
=========:
==
WPScan & SSL
wpscan--url $URL --disable-tls-checks -
-enumerate p --enumerate t --enumerate u
===WPScan Brute Forceing:
wpscan --url $URL --disable-t ls-checks -
U users -P
/usr/share/wordlists/ rockyou. txt
==Aggressive Plugin Detection:
wpscan --url $URL
plugins-detection aggressive
--enumerate p
========================================
c==Nikto with SSL and Evasion
nikto --host $IP -ssl -evasion 1
SEE EVASION MODALITIES.
E===================================
==dns_recon
dnsrecon -d yourdomain. com
==
===9obuster directory
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/ raft-medium-directories. txt -k -
t 30
===gobuster files
gobuster dir -u $URL -W
/opt/SecLists/Dis covery/Web-
Content/raft-medium-files. txt -k -t 30
==00buster for SubDoma in brute forcing:
gobuster dns -d doma in.org -w
/opt/SecLists/Discovery/DNS/subdomains-
toplmillion-110000. txt -t 30
"just make sure any DNS name you find
resolves to an in-scope address before
you test it!
====E=======:
=H==E====E====E===E====
==Extract IPs from a text file.
grep -o '[0-9]\{1, 3\}\. [0-9]\{1,3\}\. [0-
9]\{1,3\}\. [0-9]\{1, 3\}' nmapfile. txt
===Wfuzz XSS
Fuzzing===:
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/XSS,/XSS-
BruteLogic. txt "$URL"
wfuzz -C -Z
file, /opt/SecLists/ Fuzzing/XSS,/XSS-
JhaddiX. txt "$URL"
===C0MMAND INJECTION WITH POST DATA
wfuzz -C -Z
file, /opt/SecLists/Fuzzing/command-
injection-commix. txt -d "doi=FUZZ"
"$URL"
===Test for Paramter Existence!
wfuzz -C -Z
file, /opt/SecLists/Dis covery /Web-
Content/burp-parameter-names. txt "$URL"
===AUTHENTICATED FUZZING DIRECTORIES:
wfuzz -C -Z
file, /opt/SecLists/Dis cove ry/Web-
Content/ raft-medium-directories . txt --hc
404 -d "SESSIONID=value" "$URL"
=AUTHENTICATED FILE FUZZING:
wfuzz -C -Z
file, /opt/SecLists/Discove ry/Web-
Content/ raft-med ium-files . txt --hc 404 -
d "SESSIONID=value" "$URL"
===FUZZ Directories :
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-d irectories. txt --hc
404 "$URL"
===FUZZ FILES:
wfuzz -C -Z
file, /opt/SecLists/Dis covery/Web-
Content/ raft-la rge-files . txt --hc 404
"$URL"
๐ Learn, practice, and let's achieve OSCP success together! ๐ช๐
#OSCP #Cybersecurity #EthicalHacking #TwisterMachine #InfoSec #GitHub #LearnToHack @SaveToNotion @threadreaderapp
๐ Searching for sensitive files on the web? Here's a Google dork to find filenames that might contain sensitive information. Use it responsibly! #InfoSec #Security #GoogleDork #bugbountytips @SaveToNotion @threadreaderapp
๐Google dork for searching these filenames on Google:
intext:"filename:config.php" OR
intext:"filename:config.inc.php" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:configuration.php" OR
intext:"filename:.sh_history" OR
intext:"filename:shadow" OR
intext:"filename:proftpdpasswd" OR
intext:"filename:.psafe3" OR
intext:"filename:.pgpass" OR
intext:"filename:manifest.xml" OR
intext:"filename:travis.yml" OR
intext:"filename:vim_settings.xml" OR
intext:"filename:database" OR
intext:"filename:prod.exs" OR
intext:"filename:prod.secret.exs" OR
intext:"filename:.npmrc _auth" OR
intext:"filename:.dockercfg" OR
intext:"filename:WebServers.xml" OR
intext:"filename:.bash_history" OR
intext:"filename:sftp-config.json" OR
intext:"filename:sftp.json" OR
intext:"filename:secrets.yml" OR
intext:"filename:.esmtprc" OR
https://twitter.com/TheMsterDoctor1/status/1754409763914354705?s=19
X (formerly Twitter)
X (@TheMsterDoctor1) on X
๐ Exciting News! ๐ I've just conquered the Twister machine in my OSCP journey!
#Day7๐ต๏ธโโ๏ธ๐ป
๐จโ๐ป Now, I'm sharing my code and notes to help You!!๐ฏ
๐ Check out
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTPโฆ
#Day7๐ต๏ธโโ๏ธ๐ป
๐จโ๐ป Now, I'm sharing my code and notes to help You!!๐ฏ
๐ Check out
==-Nmap====
nmap -p- -sT -sV -A $IP
nmap -p- -sC -sV $IP --0pen
nmap -p- --script=vuln $IP
###HTTPโฆ
๐8โค6
#osint #Recon #info #phone #socialmedia
ยถยถ Osint Resources:
https://www.osintessentials.com/
https://www.spokeo.com/
https://randhome.io/blog/2019/01/05/2019-osint-guide/
https://www.beenverified.com/
https://www.fastpeoplesearch.com/
https://www.aware-online.com/en/osint-tools/
https://osintframework.com/
https://haveibeenpwned.com/
https://www.osintcurio.us/
https://www.dehashed.com/
https://www.whocalledme.com/
ยถยถ Few more tools i found :
https://www.shodan.io/
https://cleanup.pictures/
https://instantusername.com/#/
https://facecheck.id/
https://tineye.com/
https://urlscan.io/
https://pimeyes.com/en
https://github.com/sorenlouv/fb-sleep-stats
https://github.com/laramies/theHarvester
https://github.com/lanmaster53/recon-ng
https://github.com/smicallef/spiderfoot
https://inteltechniques.com/
https://twitter.com/search-advanced?lang=en
https://www.maltego.com/
ยถยถ Osint Resources:
https://www.osintessentials.com/
https://www.spokeo.com/
https://randhome.io/blog/2019/01/05/2019-osint-guide/
https://www.beenverified.com/
https://www.fastpeoplesearch.com/
https://www.aware-online.com/en/osint-tools/
https://osintframework.com/
https://haveibeenpwned.com/
https://www.osintcurio.us/
https://www.dehashed.com/
https://www.whocalledme.com/
ยถยถ Few more tools i found :
https://www.shodan.io/
https://cleanup.pictures/
https://instantusername.com/#/
https://facecheck.id/
https://tineye.com/
https://urlscan.io/
https://pimeyes.com/en
https://github.com/sorenlouv/fb-sleep-stats
https://github.com/laramies/theHarvester
https://github.com/lanmaster53/recon-ng
https://github.com/smicallef/spiderfoot
https://inteltechniques.com/
https://twitter.com/search-advanced?lang=en
https://www.maltego.com/
๐6โค1
How to use GoBuster for OSINT?. A couple of weeks ago, I published anโฆ | by cyb_detective | OSINT TEAM
https://osintteam.blog/how-to-use-gobuster-for-osint-905bc9360024
https://osintteam.blog/how-to-use-gobuster-for-osint-905bc9360024
โค10๐1๐ฅฐ1