Asset inventory of over 800 public bug bounty programs.
-
Updated
Jun 6, 2024 - Shell
OSINT is defined in the United States of America by Public Law 109-163 as cited by both the U.S. Director of National Intelligence and the U.S. Department of Defense (DoD), as intelligence "produced from publicly available information that is collected, exploited, and disseminated in a timely manner to an appropriate audience for the purpose of addressing a specific intelligence requirement." As defined by NATO, OSINT is intelligence "derived from publicly available information, as well as other unclassified information that has limited public distribution or access."
Asset inventory of over 800 public bug bounty programs.
🔨 List all IP ranges from: Google (Cloud & GoogleBot), Bing (Bingbot), Amazon (AWS), Microsoft, Oracle (Cloud), GitHub, Facebook (Meta), OpenAI (GPTBot) and other with daily updates.
TweetFeed collects Indicators of Compromise (IOCs) shared by the infosec community at Twitter. Here you will find malicious URLs, domains, IPs, and SHA256/MD5 hashes.
Machine-readable .txt blocklist of scam URLs and IP Addresses from the Global Anti Scam Organization (https://www.globalantiscam.org) website, updated once a day.
[DEFUNCT w.e.f. 20 March 2023] Machine-readable .txt blocklist of malicious URLs from ipsniper.info, updated once a day.
A recursive internet scanner for hackers.
Open Cyber Threat Intelligence Platform
An auto-updating list of shodan dorks with info on the amount of results they return!
Machine-readable .txt blocklist of phishing URLs and IP Addresses from the Chống Lừa Đảo (https://chongluadao.vn) project, updated once a day.
Machine-readable .txt blocklist of fraudulent URLs and IP Addresses from the Ukrainian Interbank Payment Systems Member Association "EMA" (https://www.ema.com.ua) website, updated once a day.
The Intelligence Analyst's Workstation
Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.
X-osint fork. X-osint is an osint tool which gathers valid information about a targets phone number and email address. It can also perform VIN Osint, subdomain enumeration, and much more...
Modules for expansion services, enrichment, import and export in MISP and other tools.
Search and browse documents and data; find the people and companies you look for.
Live Feed of C2 servers, tools, and botnets
The repository is a valuable resource for individuals looking to enhance their knowledge and skills in cybersecurity. It provides in-depth materials and guides for various cybersecurity domains.
A powerful tool designed to harvest and collect a wide range of windows system data for forensics.