看过的不代表你会,收藏的不代表你会,只有用过的才能算会。

osint data source

navi

https://www.shentoushi.top
https://navisec.it

Recon

whois

ip

bufferover

https://dns.bufferover.run/
支持对域名的搜索,ip rdns,ip fdns,数据源基于rapid7 fdns和rdns库。
参考介绍资料:
https://blog.erbbysam.com/

company

crunchbase

ASN’s

Shodan Organization

reference

https://pentester.land/conference-notes/2018/08/02/levelup-2018-the-bug-hunters-methodology-v3.html
—-

tool

viewdns.info
who.is
desenmascara.me
net-square.com
netcraft.com
cvedetails.com
builtwith.com

explainshell.com 对于不理解的shell命令,可以辅助分析

Name Link
LinkFinder https://github.com/GerbenJavado/LinkFinder

Vuln 环境搭建

windows:

http://vulnstack.qiyuanxuetang.net/vuln/

学习路径规划

https://www.pentesteracademy.com/redteamlab
https://www.pentesteracademy.com/topics
https://huntingday.github.io

recon 相关技术研究

https://pentester.land
recon技巧和资料
https://ired.team/

security blog

渗透测试

Red Teaming Experiments

https://ired.team/

ADsecurity

https://adsecurity.org

域安全知识学习,比较全面

https://adsecurity.org

https://dirkjanm.io

https://micropoor.blogspot.com/

attackresearch.com

http://carnal0wnage.attackresearch.com

历史漏洞梳理jenkins\

sixdub

http://www.sixdub.net/

之前内网渗透参与较多,18年改做安全产品

harmj0y

https://www.harmj0y.net/blog

域安全研究较多

pentestlab

https://pentestlab.blog/

学习内网渗透知识

klion

pentest.blog

https://pentest.blog/

web漏洞相关,与具体设备相关

3gstudent

https://3gstudent.github.io/

内网渗透

specterops

https://posts.specterops.io/archive

内网渗透