Burpsuite
amass enum -passive -d dfwairport.com -o results.txt
sublist3r -d dfwairport.com
./scripts/ct.py example.com | ./bin/massdns -r ./lists/resolvers.txt -o S -w results.txt
true | openssl s_client -connect dfwairport.com:443 2>/dev/null | openssl x509 -noout -text | perl -l -0777 -ne '@names=/\bDNS:([^\s,]+)/g; print join("\n", sort @names);'
Grep domain names only
grep -oE '[a-zA-Z0-9.-]+\.com' <file_name>
Grep IP addresses only grep -oE '[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+' <file_name>
Unique items by count and descending order sort <file_name> | uniq -c | sort -nr
Remove duplicates
sort <file_name> | uniq > <output_file>
BugBounty/webapp/mobile app
Web app handbook
Real world bug hunting
Owasp testing guide
Bugbounty bootcamp
The hackers playbook 3
Breaking into information security
Hands on hacking
Bug bounty playbook 1 and 2
Try Hack me
Pentesterlab
Websecurity academy
Hackthebox
vulnub
Subscription to
HackerOne
BugCrowd
Cobalt
Synack
Integriti
Approach
Asset discovery
Scope
Subdomain enumeration
Horizontal
Vertical
Open ports and services
Web hosting softwares, misconfigurations, exploits
Application framework
Application custom codes or cots
Application libraries
Integrations
Browser plugins
wappalyzer
whatruns
Webanalyze : cli tools
Nuclie
Nuclei -l httprobe.txt -t brute-force/* -t cves/* -t basic-detections/* -t dns/* -t files/* -t panels/* -t security-misconfiguration/* -t subdomain-takeover/* -t technologies/* -t tokes/* -t vulnerabilities/*
Know vulnerabilities
Framework logins
Default creds
Jaeles scanner
Ritire.js
Vulners burp extension
Intrigue core
Sn1per by
Gofingerprint
Portscanning
Naabu
contentdiscovery tools
Trubointruder
Gobuster
Ffuf
Dirsearch
Wfuzz
Feroxbuster
Dirbuster
Wordlist and content discovery
Wordlist.Assetnote.com
Jhaddix content discovery all
Robots disallowed
RAFT
Six2detonelistforall
Jhaddix api-endpoints.txt
Source2URL by danielmessier
Scavenger 0xdexter0us
Getallurls
Wordlistgen
Trashcompactor
Do recursive scans
Apkleaks
Changedetection.io
Application testing
How app stores and send the data
How app identifies user
Spidering
Zap
Burp
Gospider
Hackrawler
xlinkfinder
Subdomain Enumeration
Sunday, May 22, 2022
2:23 PM
sublist3r -d {domainName}
amass enum -d {domainName}
amass intel -org uber
amass intel -d target.com -whois
amass enum -passive -d target.com -src
amass enum -ip -d target.com
amass viz -d3 -dir resultdirectory
amass db -dir target.com(directory) -list
amass intel -ip -src -cidr 104.154.0.0/15
amass viz -d3 domains.txt -o 443 /your/dir/
Amass -src -ip -config amass_config.ini -d
Amass -asn
amass enum -d <URL> -p 443,8080
amass enum -d <URL1>,<URL2> -active
subfinder -d {domainName}
python3 subbrute.py {domainName}
python knock.py {domainName}
gobuster dns -d tesla.com -w simple-subdomain-list.txt
Robots disallowed list
Fuzzing get parameters and values
Password spraying and rate limit
Copied!
Last updated
Was this helpful?