Tech stuff about security
site:postman.com my-domain.com
- Find postman collections for your website from Googlesubfinder -d my-domain.com -o results.txt
- Find all subdomainsping -c 1 my-domain.com -R
- send a echo request to the domain to get a return route
- Google Hacking Database: https://www.exploit-db.com/google-hacking-database
- Google dork cheatsheet: Nice queries from google for advanced search
- crt.sh: Certificate Search
- Wappalyzer: Identify technologies on websites
- EditThisCookie: Chromium extension for editing cookies
- WhatWeb: Next generation web scanner
- User-Agent Switcher: Spoofs & Mimics User-Agent strings.
- nmap: Port scanning utility for large networks
- subfinder: Fast passive subdomain enumeration tool.
- ffuf: Fast web fuzzer written in Go
- feroxbuster: A fast, simple, recursive content discovery tool written in Rust.
- OWASP Amass: In-depth attack surface mapping and asset discovery
- waybackurls: Fetch all the URLs that the Wayback Machine knows about for a domain
- getallurls (gau): Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl
- Findomain: The fastest and complete solution for domain recognition.
- Arjun: HTTP parameter discovery suite.
- Github Dorks: Find leaked secrets via github search
- httprobe: Take a list of domains and probe for working HTTP and HTTPS servers
- Script kiddie: an individual with limited knowledge of hacking and cybersecurity who uses pre-made scripts or tools to launch attacks on networks or systems. They typically lack the skills to develop their own hacking methods or to understand the intricacies of the systems they exploit. Their actions are often motivated by a desire for attention or mischief rather than sophisticated objectives. The term is derogatory, emphasizing their superficial understanding and approach to hacking.
- Web Application Firewall (WAF): a security tool that filters and monitors HTTP traffic to and from a web application to protect against web-based attacks like SQL injection, cross-site scripting (XSS), and others. It operates by applying a set of rules to identify and block malicious traffic, ensuring the security of web applications. WAFs can be implemented as hardware, software, or as a cloud service, offering versatile protection options for web applications.
- weakest link: the most vulnerable component within a security system or network that could be exploited by threats or attacks. This vulnerability could be due to a variety of factors, including outdated software, weak passwords, insufficient security policies, or human error.
- Safe harbor: a legal framework that allows for the transfer of personal data across borders while ensuring compliance with privacy laws of the originating country. It sets standards for privacy, security, and handling of personal data to facilitate international business operations, requiring adherence to principles like data integrity, security, and privacy enforcement.