- https://scans.io/
- https://commoncrawl.org/
- https://web.archive.org/ (For JS snippets this can be extremely handy. See killbox.sh below that was written for a HackerOne event.)
- https://www.shodan.io/
- https://opendata.rapid7.com/
- https://www.virustotal.com/en/documentation/public-api/ (You can fetch previously-scanned URLs via the API.)
- https://securitytrails.com/
- https://threatcrowd.org/
- https://dnsdumpster.com/
- https://crt.sh/
- https://github.com/EdOverflow/hacks (There are some services in here that I rely on that could come in handy.)
- https://github.com and other Git services are great for reconnaissance (See https://edoverflow.com/2017/github-for-bugbountyhunters/ and https://edoverflow.com/2017/github-recon/).
- https://pastebin.com/
- Google groups and Trello boards often expose valuable information about a target.
- https://github.com/infosec-au/assetnote-poc
- https://github.com/pentester-io/commonspeak
- https://github.com/arkadiyt/bounty-targets
- https://github.com/misterch0c/twitterBFTD
Forked from EdOverflow/a-recon-services-list-for-liveoverflow.md
Created
January 7, 2020 23:16
-
-
Save moodiabdoul3/6ad7975e01faa3bad5cd58039740d47c to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
GREEN='\033[0;32m' | |
YELLOW='\033[0;33m' | |
RED='\033[0;31m' | |
CYAN='\033[0;36m' | |
END='\033[0m' | |
echo -e """${CYAN} | |
██╗ ██╗██╗██╗ ██╗ ██████╗ ██████╗ ██╗ ██╗ | |
██║ ██╔╝██║██║ ██║ ██╔══██╗██╔═══██╗╚██╗██╔╝ | |
█████╔╝ ██║██║ ██║ ██████╔╝██║ ██║ ╚███╔╝ | |
██╔═██╗ ██║██║ ██║ ██╔══██╗██║ ██║ ██╔██╗ | |
██║ ██╗██║███████╗███████╗██████╔╝╚██████╔╝██╔╝ ██╗ | |
╚═╝ ╚═╝╚═╝╚══════╝╚══════╝╚═════╝ ╚═════╝ ╚═╝ ╚═╝${END} | |
${RED}~ Frogs find bugs. ~${END} | |
""" | |
for id in {0..7}; do | |
echo "[+] GET 201$id" | |
curl -Ls "https://web.archive.org/web/201${id}0301234743js_/https://www.mapbox.com/base.js/dist/base.js" > "mapbox-$id" | |
js-beautify "mapbox-$id" > "mapbox-$id-lol" | |
python /root/LinkFinder/linkfinder.py -i "mapbox-$id-lol" -o cli > "mapbox-$id-endpoints" 2> /dev/null | |
done | |
echo | |
echo "[+] Diff files." | |
for doc in {0..6}; do | |
docplus=$((doc + 1)) | |
colordiff "mapbox-$doc-endpoints" "mapbox-$docplus-endpoints" | |
done | |
echo | |
echo "[+] Grep for passwords." | |
grep --color -i "password" "mapbox-7-lol" | |
echo | |
echo "[+] Grep for tokens." | |
grep --color -i "token" "mapbox-7-lol" | |
echo "In frogs we trust." | cowsay -f bud-frogs | lolcat |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment