Cub3sec's Offensive Handbook
Ctrlk
  • πŸ–₯️Cub3sec's Offensive Handbook
  • πŸ”Enumeration
    • πŸ“΄Passive
      • Tools
      • Websites
    • πŸ“³Active
    • πŸ•ΈοΈWeb Application
  • πŸ“₯Initial Access
    • πŸ•ΈοΈCommon Web Application Attacks
    • πŸ’‰SQL Injection Attacks
    • 🧍Client-Side Attacks
    • πŸ”‘Password Attacks
    • 🐚Shells
  • βš”οΈPrivilege Escalation
    • 🐧Linux
    • πŸͺŸWindows
  • 🏍️Lateral Movement
    • 🐧Linux
    • πŸͺŸWindows
  • πŸ–οΈReporting
    • πŸ–ŠοΈReport writing
  • πŸš”AV Evasion
    • πŸ’ŠAV Detection
    • πŸ’‰Process Memory Injection
    • Defender Bypass
  • πŸ“‚Active Directory
    • πŸ”Enumeration
    • Attacking Authentication
    • Shadow Credentials
    • Targeted Kerberoasting
Powered by GitBook
On this page
  1. πŸ”Enumeration
  2. πŸ“΄Passive

Websites

In this section we will show different websites we can use to gather information without interacting with a target.


https://www.shodan.io/www.shodan.io
Shodan
LogoDNSDumpster - Find & lookup dns records for recon & researchDNSDumpster.com
DNS Dumpster
LogoAnalyse your HTTP response headerssecurityheaders
Security Headers
LogoGitHub Β· Change is constant. GitHub keeps you ahead.GitHub
GitHub
LogoSSL Server Test (Powered by Qualys SSL Labs)www.ssllabs.com
Qualys SSL Labs
LogoOffSec’s Exploit Database Archivewww.exploit-db.com
Exploit-DB

PreviousToolsNextActive

Last updated 1 year ago