security
awesome-hacker-search-engines
security | awesome-hacker-search-engines | |
---|---|---|
2 | 18 | |
74 | 6,688 | |
- | - | |
0.0 | 9.3 | |
almost 2 years ago | 15 days ago | |
Shell | Shell | |
- | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
security
-
https://securityledger.com/2021/04/deere-john-researcher-warns-ag-giants-site-provides-a-map-to-customers-equipment/
The researcher known as “Sick Codes” (@sickcodes) published two advisories on Thursday warning about the flaws in the myjohndeere.com web site and the John Deere Operations Center web site and mobile applications. In a conversation with Security Ledger, the researcher said that a he was able to use VINs (vehicle identification numbers) taken from a farm equipment auction site to identify the name and physical address of the owner. Furthermore, a flaw in the myjohndeere.com website could allow an unauthenticated user to carry out automated attacks against the site, possibly revealing all the user accounts for that site.
-
Finding a Vulnerability in Teamwork Cloud Server (NoMagic, 3DS), Which Is Used By Gov/Enterprise to Design Rockets, Missiles, and Satellites.
fix the critical file permissions as per NoMagic's updated instructions at the bottom of the article, or here: https://github.com/sickcodes/security/blob/master/advisories/SICK-2020-002.md
awesome-hacker-search-engines
-
Awesome Hacker Search Engines
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more -> https://github.com/edoardottt/awesome-hacker-search-engines.
This is the link: https://github.com/edoardottt/awesome-hacker-search-engines
- Hacker Search Engines
- A list of search engines useful during Penetration testing, Vulnerability assessments, Red Team operations, Bug Bounty and more
-
Does this exist?
Sorry to hear that. Don't know if I'll be much help but another user on this sub made a list of search engines that hackers frequently use. You might get lucky https://github.com/edoardottt/awesome-hacker-search-engines
What are some alternatives?
EDR-Testing-Script - Test the accuracy of Endpoint Detection and Response (EDR) software with simple script which executes various ATT&CK/LOLBAS/Invoke-CradleCrafter/Invoke-DOSfuscation payloads
open-semantic-search - Open Source research tool to search, browse, analyze and explore large document collections by Semantic Search Engine and Open Source Text Mining & Text Analytics platform (Integrates ETL for document processing, OCR for images & PDF, named entity recognition for persons, organizations & locations, metadata management by thesaurus & ontologies, search user interface & search apps for fulltext search, faceted search & knowledge graph)
sbt-dependency-check - SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). :rainbow:
Awesome-Telegram-OSINT - 📚 A Curated List of Awesome Telegram OSINT Tools, Sites & Resources
atomic-red-team - Small and highly portable detection tests based on MITRE's ATT&CK.
feroxbuster - A fast, simple, recursive content discovery tool written in Rust.
Sn1per - Attack Surface Management Platform
holehe - holehe allows you to check if the mail is used on different sites like twitter, instagram and will retrieve information on sites with the forgotten password function.
MultiBUGS - Multi-core BUGS for fast Bayesian inference of large hierarchical models
hackingtool - ALL IN ONE Hacking Tool For Hackers
testssl.sh - Testing TLS/SSL encryption anywhere on any port
SecLists - SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.