- https://scans.io/
- https://commoncrawl.org/
- https://web.archive.org/ (For JS snippets this can be extremely handy. See killbox.sh below that was written for a HackerOne event.)
- https://www.shodan.io/
- https://opendata.rapid7.com/
- https://www.virustotal.com/en/documentation/public-api/ (You can fetch previously-scanned URLs via the API.)
- https://securitytrails.com/
- https://threatcrowd.org/
- https://dnsdumpster.com/
- https://crt.sh/
- https://github.com/EdOverflow/hacks (There are some services in here that I rely on that could come in handy.)
- https://github.com and other Git services are great for reconnaissance (See https://edoverflow.com/2017/github-for-bugbountyhunters/ and https://edoverflow.com/2017/github-recon/).
- https://pastebin.com/
- Google groups and Trello boards often expose valuable information about a target.
- https://github.com/infosec-au/assetnote-poc
- https://github.com/pentester-io/commonspeak
- https://github.com/arkadiyt/bounty-targets
- https://github.com/misterch0c/twitterBFTD
Forked from EdOverflow/a-recon-services-list-for-liveoverflow.md
Created
December 2, 2020 00:48
-
-
Save 0-vortex/97e74eb6ee72971e0836bd9f0bda8a9c to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
GREEN='\033[0;32m' | |
YELLOW='\033[0;33m' | |
RED='\033[0;31m' | |
CYAN='\033[0;36m' | |
END='\033[0m' | |
echo -e """${CYAN} | |
██╗ ██╗██╗██╗ ██╗ ██████╗ ██████╗ ██╗ ██╗ | |
██║ ██╔╝██║██║ ██║ ██╔══██╗██╔═══██╗╚██╗██╔╝ | |
█████╔╝ ██║██║ ██║ ██████╔╝██║ ██║ ╚███╔╝ | |
██╔═██╗ ██║██║ ██║ ██╔══██╗██║ ██║ ██╔██╗ | |
██║ ██╗██║███████╗███████╗██████╔╝╚██████╔╝██╔╝ ██╗ | |
╚═╝ ╚═╝╚═╝╚══════╝╚══════╝╚═════╝ ╚═════╝ ╚═╝ ╚═╝${END} | |
${RED}~ Frogs find bugs. ~${END} | |
""" | |
for id in {0..7}; do | |
echo "[+] GET 201$id" | |
curl -Ls "https://web.archive.org/web/201${id}0301234743js_/https://www.mapbox.com/base.js/dist/base.js" > "mapbox-$id" | |
js-beautify "mapbox-$id" > "mapbox-$id-lol" | |
python /root/LinkFinder/linkfinder.py -i "mapbox-$id-lol" -o cli > "mapbox-$id-endpoints" 2> /dev/null | |
done | |
echo | |
echo "[+] Diff files." | |
for doc in {0..6}; do | |
docplus=$((doc + 1)) | |
colordiff "mapbox-$doc-endpoints" "mapbox-$docplus-endpoints" | |
done | |
echo | |
echo "[+] Grep for passwords." | |
grep --color -i "password" "mapbox-7-lol" | |
echo | |
echo "[+] Grep for tokens." | |
grep --color -i "token" "mapbox-7-lol" | |
echo "In frogs we trust." | cowsay -f bud-frogs | lolcat |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment