A somewhat curated list of links to various topics in application security.
Link | Excerpt | Word Count |
---|---|---|
Thingful (2014) | Thingful was a search engine for the Internet of Things, providing a unique geographical index of real-time data from connected objects around the world, including energy, radiation, weather, and air quality devices as well as seismographs, iBeacons, ships, aircraft and even animal trackers. | 405 |
Capture, organize, and preserve information from online research, safely, quickly, and easily. | Capture, organize, and preserve information from online research, safely, quickly, and easily. | 73 |
OSINT Framework | OSINT Framework (T) - Indicates a link to a tool that must be installed and run locally (D) - Google Dork, for more information: Google Hacking (R) - Requires registration (M) - Indicates a URL that contains the search term and the URL itself must be edited manually Notes OSINT framework focused on | 191 |
DataSploit/datasploit | Performs OSINT on a domain / email / username / phone and find out information from different sources. Correlate and collaborate the results, show them in a consolidated manner. Tries to find out credentials, api-keys, tokens, subdomains, domain history, legacy portals, etc. related to the target. | 162 |
IVMachiavelli/OSINT_Team_Links | For the Hackers, Threat Intelligence, Journalists, Private Investigators, Sleuths, Sherlocks, Business Intelligence and everyone in between. Slack Team Signup: https://openosint.signup.team Slack Team: https://openosint.slack.com | 1428 |
Gathering Open Source Intelligence | One constant throughout my career has been my fascination with what can be learned about an organization from basic public records. The aggregation of a multitude of small pieces of information can paint a picture that is sometimes startling in its completeness. | 4612 |
sinwindie/OSINT | Feel free to add to your own investigative toolkit, however you may NOT sell or host this without obtaining prior permission. | 51 |