- Joined
- 31.10.19
- Messages
- 1,051
- Reaction score
- 2,149
- Points
- 113

All targeted hacking attacks begin with reconnaissance. Social engineers, red teams and individual pentesters also gather information about their targets before moving on to active actions. They are aided by dozens of tools, so below are links to some of them. Since this is only about searching, numerous scanners and other tools for active network exploration have been excluded, except for those capable of passive searches through open sources. The post consists of 8 sections, divided into categories for convenience:
- metasearch engines and search aggregators;
- tools for working with dorks;
- email and login searches;
- phone number searches;
- searches in the TOR network;
- searches for Internet of Things data, IPs, domains and subdomains;
- searches for vulnerability data and indicators of compromise;
- source code searches.