{"id":1193,"date":"2023-09-13T10:40:27","date_gmt":"2023-09-13T08:40:27","guid":{"rendered":"https:\/\/www.fabriziogiancola.eu\/?page_id=1193"},"modified":"2023-09-22T15:23:49","modified_gmt":"2023-09-22T13:23:49","slug":"cybersecurity-tools","status":"publish","type":"page","link":"https:\/\/www.fabriziogiancola.eu\/index.php\/cybersecurity-tools\/","title":{"rendered":"Cybersecurity Tools"},"content":{"rendered":"\n<p class=\"has-medium-font-size\"><strong>Web application security tools<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Burp Suite &#8211; Framework. <a href=\"https:\/\/portswigger.net\/burp\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/portswigger.net\/burp<\/a> <\/li>\n\n\n\n<li>ZAP Proxy &#8211; Framework. <a href=\"https:\/\/www.zaproxy.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.zaproxy.org\/<\/a> <\/li>\n\n\n\n<li>wfuzz &#8211; bruteforcing web <a href=\"http:\/\/www.edge-security.com\/wfuzz.php\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.edge-security.com\/wfuzz.php<\/a> <\/li>\n\n\n\n<li>Wapiti <a href=\"https:\/\/wapiti-scanner.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/wapiti-scanner.github.io\/<\/a> <\/li>\n\n\n\n<li>w3af <a href=\"http:\/\/w3af.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/w3af.org\/<\/a> <\/li>\n\n\n\n<li>Dirsearch &#8211; HTTP bruteforcing. <a href=\"https:\/\/github.com\/maurosoria\/dirsearch\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/maurosoria\/dirsearch<\/a> <\/li>\n\n\n\n<li>Nmap &#8211; Port scanning. <a href=\"https:\/\/nmap.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/nmap.org\/<\/a> <\/li>\n\n\n\n<li>Sublist3r &#8211; Subdomain discovery. <a href=\"https:\/\/github.com\/aboul3la\/Sublist3r\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/aboul3la\/Sublist3r<\/a> <\/li>\n\n\n\n<li>Amass &#8211; Subdomain discovery. <a href=\"https:\/\/github.com\/owasp-amass\/amass\" data-type=\"link\" data-id=\"https:\/\/github.com\/owasp-amass\/amass\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/owasp-amass\/amass<\/a> <\/li>\n\n\n\n<li>SQLmap &#8211; SQLi exploitation. <a href=\"http:\/\/sqlmap.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/sqlmap.org\/<\/a> <\/li>\n\n\n\n<li>Nogotifail <a href=\"https:\/\/security.googleblog.com\/2014\/11\/introducing-nogotofaila-network-traffic.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/security.googleblog.com\/2014\/11\/introducing-nogotofaila-network-traffic.html<\/a> <\/li>\n\n\n\n<li>Iron Wasp <a href=\"https:\/\/ironwasp.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ironwasp.org\/<\/a> <\/li>\n\n\n\n<li>Arachni <a href=\"https:\/\/ecsypno.com\/pages\/arachni-web-application-security-scanner-framework\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ecsypno.com\/pages\/arachni-web-application-security-scanner-framework<\/a> <\/li>\n\n\n\n<li>Metasploit &#8211; Framework. <a href=\"https:\/\/www.metasploit.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.metasploit.com\/<\/a> <\/li>\n\n\n\n<li>WPscan &#8211; WordPress exploitation. <a href=\"https:\/\/wpscan.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/wpscan.com\/<\/a> <\/li>\n\n\n\n<li>Nikto &#8211; Webserver scanning <a href=\"https:\/\/github.com\/sullo\/nikto\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/sullo\/nikto<\/a> <\/li>\n\n\n\n<li>HTTPX &#8211; HTTP probing. <a href=\"https:\/\/www.python-httpx.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.python-httpx.org\/<\/a> <\/li>\n\n\n\n<li>Nuclei &#8211; YAML based template scanning. <a href=\"https:\/\/github.com\/projectdiscovery\/nuclei\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/projectdiscovery\/nuclei<\/a> <\/li>\n\n\n\n<li>FFUF &#8211; HTTP probing. <a href=\"https:\/\/github.com\/ffuf\/ffuf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/ffuf\/ffuf<\/a> <\/li>\n\n\n\n<li>Subfinder &#8211; Subdomain discovery. <a href=\"https:\/\/github.com\/projectdiscovery\/subfinder\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/projectdiscovery\/subfinder<\/a> <\/li>\n\n\n\n<li>Masscan &#8211; Mass IP and port scanner. <a href=\"https:\/\/github.com\/robertdavidgraham\/masscan\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/robertdavidgraham\/masscan<\/a><\/li>\n\n\n\n<li>Lazy Recon &#8211; Subdomain discovery. <a href=\"https:\/\/github.com\/nahamsec\/lazyrecon\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/nahamsec\/lazyrecon<\/a> <\/li>\n\n\n\n<li>XSS Hunter &#8211; Blind XSS discovery. <a href=\"https:\/\/xsshunter.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/xsshunter.com\/<\/a> <\/li>\n\n\n\n<li>Aquatone &#8211; HTTP based recon. <a href=\"https:\/\/github.com\/michenriksen\/aquatone\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/michenriksen\/aquatone<\/a> <\/li>\n\n\n\n<li>LinkFinder &#8211; Endpoint discovery through JS files. <a href=\"https:\/\/github.com\/GerbenJavado\/LinkFinder\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/GerbenJavado\/LinkFinder<\/a> <\/li>\n\n\n\n<li>JS-Scan &#8211; Endpoint discovery through JS files. <a href=\"https:\/\/github.com\/zseano\/JS-Scan\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/zseano\/JS-Scan<\/a> <\/li>\n\n\n\n<li>Parameth &#8211; Bruteforce GET and POST parameters. <a href=\"https:\/\/github.com\/maK-\/parameth\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/maK-\/parameth<\/a> <\/li>\n\n\n\n<li>truffleHog &#8211; Find credentials in GitHub commits. <a href=\"https:\/\/github.com\/trufflesecurity\/trufflehog\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/trufflesecurity\/trufflehog<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Pentesting<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Sn1per is an automated scanner that can automate the process of collecting data for exploration and penetration testing. <a rel=\"noreferrer noopener\" href=\"https:\/\/gbhackers.com\/sn1per\/\" target=\"_blank\">https:\/\/gbhackers.com\/sn1per\/<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Cybersec&amp;Labs<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Attack-Defense &#8211;\u00a0<a href=\"https:\/\/attackdefense.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/attackdefense.com\/<\/a> <\/li>\n\n\n\n<li>Alert to win &#8211;\u00a0<a href=\"https:\/\/alf.nu\/alert1?world=alert&amp;level=alert0\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/alf.nu\/alert1?world=alert&amp;level=alert0<\/a> <\/li>\n\n\n\n<li>CTF Komodo Security &#8211;\u00a0<a href=\"https:\/\/ctf.komodosec.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ctf.komodosec.com\/<\/a> <\/li>\n\n\n\n<li>CryptoHack &#8211;\u00a0<a href=\"https:\/\/cryptohack.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cryptohack.org\/<\/a> <\/li>\n\n\n\n<li>CMD Challenge &#8211;<a href=\"https:\/\/cmdchallenge.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cmdchallenge.com\/<\/a> <\/li>\n\n\n\n<li>Exploitation Education &#8211;\u00a0<a href=\"https:\/\/exploit.education\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/exploit.education\/<\/a> <\/li>\n\n\n\n<li>Google CTF &#8211;\u00a0<a href=\"https:\/\/capturetheflag.withgoogle.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/capturetheflag.withgoogle.com\/<\/a> <\/li>\n\n\n\n<li>HackTheBox &#8211;\u00a0<a href=\"https:\/\/www.hackthebox.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.hackthebox.com\/<\/a> <\/li>\n\n\n\n<li>Hackthis &#8211;\u00a0<a href=\"https:\/\/defendtheweb.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/defendtheweb.net\/<\/a> <\/li>\n\n\n\n<li>SmashTheStack &#8211;\u00a0<a href=\"https:\/\/www.smashthestack.org\/main.html#\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.smashthestack.org\/main.html#<\/a> <\/li>\n\n\n\n<li>The Cryptopals Crypto Challenges &#8211;\u00a0<a href=\"https:\/\/cryptopals.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cryptopals.com\/<\/a> <\/li>\n\n\n\n<li>Try Hack Me &#8211;\u00a0<a href=\"https:\/\/tryhackme.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/tryhackme.com\/<\/a> <\/li>\n\n\n\n<li>Vulnhub &#8211;\u00a0<a href=\"https:\/\/www.vulnhub.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.vulnhub.com\/<\/a> <\/li>\n\n\n\n<li>W3Challs &#8211;\u00a0<a href=\"https:\/\/w3challs.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/w3challs.com\/<\/a> <\/li>\n\n\n\n<li>WeChall &#8211;\u00a0<a href=\"https:\/\/www.wechall.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.wechall.net\/<\/a> <\/li>\n\n\n\n<li>Zenk-Security &#8211;\u00a0<a href=\"https:\/\/www.zenk-security.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.zenk-security.com\/<\/a> <\/li>\n\n\n\n<li>Cyberdefenders &#8211;\u00a0<a href=\"https:\/\/cyberdefenders.org\/blueteam-ctf-challenges\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cyberdefenders.org\/blueteam-ctf-challenges\/<\/a> <\/li>\n\n\n\n<li>LetsDefend &#8211;\u00a0<a href=\"https:\/\/letsdefend.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/letsdefend.io\/<\/a> <\/li>\n\n\n\n<li>Vulnmachines &#8211;\u00a0<a href=\"https:\/\/vulnmachines.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/vulnmachines.com\/<\/a> <\/li>\n\n\n\n<li>Rangeforce &#8211;\u00a0<a href=\"https:\/\/www.rangeforce.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.rangeforce.com\/<\/a> <\/li>\n\n\n\n<li>Ctftime &#8211;\u00a0<a href=\"https:\/\/ctftime.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ctftime.org\/<\/a> <\/li>\n\n\n\n<li>Pwn college &#8211;\u00a0<a href=\"https:\/\/pwn.college\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pwn.college\/<\/a> <\/li>\n\n\n\n<li>Great CTF Chines:&nbsp;<a href=\"https:\/\/lnkd.in\/gtDyWgxE?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lnkd.in\/gtDyWgxE<\/a> <\/li>\n\n\n\n<li>Perfect CTF for Crypto X challenges:&nbsp;<a href=\"https:\/\/mysterytwister.org?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/mysterytwister.org<\/a> <\/li>\n\n\n\n<li>Hacksplaining &#8211;\u00a0<a href=\"https:\/\/www.hacksplaining.com\/lessons\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.hacksplaining.com\/lessons<\/a> <\/li>\n\n\n\n<li>Hacker101 &#8211;\u00a0<a href=\"https:\/\/ctf.hacker101.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ctf.hacker101.com\/<\/a> <\/li>\n\n\n\n<li>Hacker Security &#8211;\u00a0<a href=\"https:\/\/hackersec.com\/ctf\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/hackersec.com\/ctf\/<\/a> <\/li>\n\n\n\n<li>Hacking-Lab &#8211;\u00a0<a href=\"https:\/\/hacking-lab.com\/services\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/hacking-lab.com\/services\/<\/a> <\/li>\n\n\n\n<li>HSTRIKE &#8211;\u00a0<a href=\"https:\/\/hackersec.com\/hstrike\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/hackersec.com\/hstrike\/<\/a> <\/li>\n\n\n\n<li>NewbieContest &#8211;\u00a0<a href=\"https:\/\/www.newbiecontest.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.newbiecontest.org\/<\/a> <\/li>\n\n\n\n<li>OverTheWire &#8211;\u00a0<a href=\"https:\/\/overthewire.org\/wargames\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/overthewire.org\/wargames\/<\/a> <\/li>\n\n\n\n<li>Practical Pentest Labs &#8211;\u00a0<a href=\"https:\/\/www.amanhardikar.com\/mindmaps\/Practice.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.amanhardikar.com\/mindmaps\/Practice.html<\/a> <\/li>\n\n\n\n<li>Pentestlab &#8211;\u00a0<a href=\"https:\/\/pentesterlab.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pentesterlab.com\/<\/a> <\/li>\n\n\n\n<li>Hackaflag BR &#8211;\u00a0<a href=\"https:\/\/pentesterlab.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pentesterlab.com\/<\/a> <\/li>\n\n\n\n<li>PentestIT LAB &#8211;\u00a0<a rel=\"noreferrer noopener\" href=\"https:\/\/lab.pentestit.ru\/?trk=public_post-text\" target=\"_blank\">https:\/\/lab.pentestit.ru\/<\/a> <\/li>\n\n\n\n<li>PicoCTF &#8211;&nbsp;<a href=\"https:\/\/picoctf.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/picoctf.com\/<\/a> <\/li>\n\n\n\n<li>PWNABLE &#8211;&nbsp;<a href=\"https:\/\/pwnable.kr\/play.php\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/pwnable.kr\/play.php<\/a> <\/li>\n\n\n\n<li>Root-Me &#8211;&nbsp;<a href=\"https:\/\/www.root-me.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.root-me.org\/<\/a> <\/li>\n\n\n\n<li>Root in Jail &#8211;&nbsp;<a href=\"http:\/\/rootinjail.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/rootinjail.com\/<\/a> <\/li>\n\n\n\n<li>SANS Challenger &#8211;\u00a0<a href=\"https:\/\/www.holidayhackchallenge.com\/2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.holidayhackchallenge.com\/2022\/<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>IP &amp; URL Reputation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Virus Total :&nbsp;<a href=\"https:\/\/www.virustotal.com\/gui\/home\/upload\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.virustotal.com\/gui\/home\/upload<\/a> <\/li>\n\n\n\n<li>URL Scan :&nbsp;<a href=\"https:\/\/urlscan.io\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/urlscan.io\/<\/a> <\/li>\n\n\n\n<li>AbuseIPDB:&nbsp;<a href=\"https:\/\/www.abuseipdb.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.abuseipdb.com\/<\/a> <\/li>\n\n\n\n<li>Cisco Talos:&nbsp;<a href=\"https:\/\/www.talosintelligence.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.talosintelligence.com\/<\/a> <\/li>\n\n\n\n<li>IBM X-Force:&nbsp;<a href=\"https:\/\/exchange.xforce.ibmcloud.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/exchange.xforce.ibmcloud.com\/<\/a> <\/li>\n\n\n\n<li>URL Filtering(Palo Alto):&nbsp;<a href=\"https:\/\/urlfiltering.paloaltonetworks.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/urlfiltering.paloaltonetworks.com\/<\/a> <\/li>\n\n\n\n<li>URL Filtering(Symantec):&nbsp;<a href=\"https:\/\/sitereview.bluecoat.com\/#\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/sitereview.bluecoat.com\/#\/<\/a> <\/li>\n\n\n\n<li>IP Void:&nbsp;<a href=\"https:\/\/www.ipvoid.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.ipvoid.com\/<\/a> <\/li>\n\n\n\n<li>URL Void:&nbsp;<a href=\"https:\/\/www.urlvoid.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.urlvoid.com\/<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>File | Hash | Search | Analysis | Sandboxing<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>File Extension &gt;&gt;<a href=\"https:\/\/filesec.io\/#?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/filesec.io\/#<\/a> <\/li>\n\n\n\n<li>LOLBAS &gt;&gt;<a href=\"https:\/\/lnkd.in\/dDa8XgiM?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/lnkd.in\/dDa8XgiM<\/a> <\/li>\n\n\n\n<li>GTFOBins &gt;&gt;<a href=\"https:\/\/gtfobins.github.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/gtfobins.github.io\/<\/a> <\/li>\n\n\n\n<li>File Hash Check &gt;&gt;&nbsp;<a href=\"https:\/\/www.virustotal.com\/gui\/home\/search\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.virustotal.com\/gui\/home\/search<\/a> <\/li>\n\n\n\n<li>Hash Search &gt;&gt;&nbsp;<a href=\"https:\/\/valkyrie.comodo.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/valkyrie.comodo.com\/<\/a> <\/li>\n\n\n\n<li>Hash Search &gt;&gt;&nbsp;<a href=\"https:\/\/www.malwares.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.malwares.com\/<\/a> <\/li>\n\n\n\n<li>MetaDefender &gt;&gt;&nbsp;<a href=\"https:\/\/metadefender.opswat.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/metadefender.opswat.com\/<\/a> <\/li>\n\n\n\n<li>Kaspersky Threat Intel. &gt;&gt;&nbsp;<a href=\"https:\/\/opentip.kaspersky.com\/#search\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/opentip.kaspersky.com\/#search\/<\/a> <\/li>\n\n\n\n<li>Cuckoo Sabdbox &gt;&gt;&nbsp;<a href=\"https:\/\/cuckoosandbox.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/cuckoosandbox.org\/<\/a> <\/li>\n\n\n\n<li>AnyRun &gt;&gt; Online sandboxing &gt;&gt;&nbsp;<a href=\"https:\/\/any.run\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/any.run\/<\/a>&nbsp; <\/li>\n\n\n\n<li>Hybrid-Analysis &gt;&gt;&nbsp;<a href=\"https:\/\/www.hybrid-analysis.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.hybrid-analysis.com\/<\/a>&nbsp; <\/li>\n\n\n\n<li>Joe Sandbox &gt;&gt;&nbsp;<a href=\"https:\/\/www.joesecurity.org\/service-offline#windows\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.joesecurity.org\/service-offline#windows<\/a> <\/li>\n\n\n\n<li>VMRay Sandbox &gt;&gt;&nbsp;<a href=\"https:\/\/www.vmray.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.vmray.com\/<\/a> <\/li>\n\n\n\n<li>Triage &gt;&gt;&nbsp;<a href=\"http:\/\/tria.ge\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/tria.ge\/<\/a>&nbsp; <\/li>\n\n\n\n<li>Browser Sandbox &gt;&gt;&nbsp;<a href=\"https:\/\/www.browserling.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.browserling.com\/<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>File hash<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>HashTools&gt; Windows &gt;&nbsp;<a href=\"https:\/\/www.binaryfortress.com\/HashTools\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.binaryfortress.com\/HashTools\/<\/a> <\/li>\n\n\n\n<li>Powershell : Get-FileHash -Path C:\\path\\to\\file.txt -Algorithm MD5 Get-FileHash -InputObject &#8220;This is a string&#8221; -Algorithm MD5 <\/li>\n\n\n\n<li>QuickHash &gt; MacOS &gt;&nbsp;<a href=\"https:\/\/www.quickhash-gui.org\/\" data-type=\"link\" data-id=\"https:\/\/www.quickhash-gui.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.quickhash-gui.org\/<\/a> Terminal: shasum -a 256 filename<\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Find Suspicious Artifacts | Reverse Engineer | Debug Files<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PeStudio:&nbsp;<a href=\"https:\/\/www.winitor.com\/download\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.winitor.com\/download<\/a> <\/li>\n\n\n\n<li>CFF Explorer:&nbsp;<a href=\"https:\/\/ntcore.com\/?page_id=388\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ntcore.com\/?page_id=388<\/a> <\/li>\n\n\n\n<li>DocGuard files:&nbsp;<a href=\"https:\/\/www.docguard.io\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.docguard.io\/<\/a> <\/li>\n\n\n\n<li>File Scan:&nbsp;<a href=\"https:\/\/www.filescan.io\/scan\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.filescan.io\/scan<\/a> <\/li>\n\n\n\n<li>Ghidra &gt;&gt;&nbsp;<a href=\"https:\/\/ghidra-sre.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/ghidra-sre.org\/<\/a> <\/li>\n\n\n\n<li>IDA Pro &gt;&gt;<a href=\"https:\/\/hex-rays.com\/ida-pro\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/hex-rays.com\/ida-pro\/<\/a> <\/li>\n\n\n\n<li>Radare2\/Cutter &gt;&gt;<a href=\"https:\/\/rada.re\/n\/radare2.html\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/rada.re\/n\/radare2.html<\/a> <a href=\"https:\/\/lnkd.in\/gdb3MQn2?trk=public_post-text\">https:\/\/lnkd.in\/gdb3MQn2<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Monitor System Resources | Detect malware<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Process Hacker &gt;&gt;&nbsp;<a href=\"https:\/\/processhacker.sourceforge.io\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/processhacker.sourceforge.io\/<\/a> <\/li>\n\n\n\n<li>Process Monitor &gt;&gt;&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/procmon\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/procmon<\/a> <\/li>\n\n\n\n<li>ProcDot &gt;&gt;&nbsp;<a href=\"https:\/\/www.procdot.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.procdot.com\/<\/a> <\/li>\n\n\n\n<li>Autoruns &gt;&gt;&nbsp;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/autoruns\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/autoruns<\/a> <\/li>\n\n\n\n<li>TcpView &gt;&gt;<a href=\"https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/tcpview\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/learn.microsoft.com\/en-us\/sysinternals\/downloads\/tcpview<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Web proxy<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fiddler&nbsp;&gt;&gt;&nbsp;<a href=\"https:\/\/lnkd.in\/gnJ9BvFN?trk=public_post-text\">https:\/\/lnkd.in\/gnJ9BvFN<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Malware Samples<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Malware Samples &#8211;&nbsp;<a href=\"http:\/\/Abuse.ch?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">Abuse.ch<\/a>&nbsp;<\/li>\n\n\n\n<li>MalwareBazaar ==&gt;&nbsp;<a href=\"https:\/\/bazaar.abuse.ch\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/bazaar.abuse.ch\/<\/a>&nbsp; <\/li>\n\n\n\n<li>FeodoTracker ==&gt;&nbsp;<a href=\"https:\/\/feodotracker.abuse.ch\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/feodotracker.abuse.ch\/<\/a> <\/li>\n\n\n\n<li>SSLBlacklist ==&gt;&nbsp;<a href=\"https:\/\/sslbl.abuse.ch\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/sslbl.abuse.ch\/<\/a>&nbsp; <\/li>\n\n\n\n<li>URLHaus ==&gt;&nbsp;<a href=\"https:\/\/urlhaus.abuse.ch\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/urlhaus.abuse.ch\/<\/a>&nbsp; <\/li>\n\n\n\n<li>ThreatFox ==&gt;&nbsp;<a href=\"https:\/\/threatfox.abuse.ch\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/threatfox.abuse.ch\/<\/a> <\/li>\n\n\n\n<li>YARAIfy ==&gt;&nbsp;<a href=\"https:\/\/yaraify.abuse.ch\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/yaraify.abuse.ch\/<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Sandbox Malware Analyst<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Cuckoo Sandbox: An open-source sandbox that provides automated analysis of suspicious files and behaviors. \ud83d\udd17<a href=\"https:\/\/github.com\/cuckoosandbox\/cuckoo\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/cuckoosandbox\/cuckoo<\/a> <\/li>\n\n\n\n<li><a href=\"http:\/\/Any.Run?trk=public_post-text\">Any.Run<\/a>: A web-based interactive sandbox that allows users to run and analyze malware in real-time. \ud83d\udd17&nbsp;<a href=\"https:\/\/any.run\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/any.run\/<\/a> <\/li>\n\n\n\n<li>Joe Sandbox: Community Edition of Joe Sandbox offers a free version for malware analysis. \ud83d\udd17&nbsp;<a href=\"https:\/\/www.joesecurity.org\/service-offline#windows\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.joesecurity.org\/service-offline#windows<\/a> <\/li>\n\n\n\n<li>IRMA (Incident Response &amp; Malware Analysis): An open-source platform for analyzing malware and performing incident response \ud83d\udd17&nbsp;<a href=\"https:\/\/github.com\/quarkslab\/irma\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/quarkslab\/irma<\/a> <\/li>\n\n\n\n<li>Viper: A framework for analyzing malware samples. It provides a user-friendly web interface and supports multiple analysis tools. \ud83d\udd17&nbsp;<a href=\"https:\/\/github.com\/viper-framework\/viper\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/viper-framework\/viper<\/a> <\/li>\n\n\n\n<li>Limon Sandbox: An open-source sandbox developed to automate the analysis of Linux malware. \ud83d\udd17&nbsp;<a href=\"https:\/\/github.com\/monnappa22\/Limon\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/monnappa22\/Limon<\/a> <\/li>\n\n\n\n<li>BinaruGuard: Automated malware analysis on a revolutionary bare-metal platform in the cloud. \ud83d\udd17<a href=\"http:\/\/www.binaryguard.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">http:\/\/www.binaryguard.com\/<\/a> <\/li>\n\n\n\n<li>Hybrid Analysis: A cloud-based platform that combines sandbox analysis with threat intelligence feeds. \ud83d\udd17&nbsp;<a href=\"https:\/\/www.hybrid-analysis.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.hybrid-analysis.com\/<\/a> <\/li>\n\n\n\n<li>Filescan: operating at 10x speed compared to traditional sandboxes with 90% less resource usage \ud83d\udd17&nbsp;<a href=\"https:\/\/www.filescan.io\/scan\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.filescan.io\/scan<\/a> <\/li>\n\n\n\n<li>Sandblast: Its a malware analysis system by Checkpoint \ud83d\udd17&nbsp;<a href=\"https:\/\/threatpoint.checkpoint.com\/ThreatPortal\/emulation\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/threatpoint.checkpoint.com\/ThreatPortal\/emulation<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Altri<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>WordPress admin finder \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/kancotdiq\/wpaf\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/kancotdiq\/wpaf<\/a> <\/li>\n\n\n\n<li>Smb scanner tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/TechnicalMujeeb\/smb-scanner\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/TechnicalMujeeb\/smb-scanner<\/a> <\/li>\n\n\n\n<li>Heart Bleed scanner \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/TechnicalMujeeb\/HeartBleed\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/TechnicalMujeeb\/HeartBleed<\/a> <\/li>\n\n\n\n<li>weevely php web shell \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/tom00111\/Weevely\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/tom00111\/Weevely<\/a> <\/li>\n\n\n\n<li>Webponized web shell \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/epinna\/weevely3\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/epinna\/weevely3<\/a> <\/li>\n\n\n\n<li>Nikto web scanner tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/sullo\/nikto\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/sullo\/nikto<\/a> <\/li>\n\n\n\n<li>Auto Ip or domain Attacking Tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/Bhai4You\/Ip-Attack\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Bhai4You\/Ip-Attack<\/a> <\/li>\n\n\n\n<li>Click jacking vulnerability scanner \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/D4Vinci\/Clickjacking-Tester\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/D4Vinci\/Clickjacking-Tester<\/a> <\/li>\n\n\n\n<li>All in 1 information gathering and web penetration tool DTect \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/Audi0x01\/D-TECT-1\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Audi0x01\/D-TECT-1<\/a> <\/li>\n\n\n\n<li>Detect phishing URL \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/UndeadSec\/checkURL\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/UndeadSec\/checkURL<\/a> <\/li>\n\n\n\n<li>Dos attack tool &#8211; Golden eye \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/jseidl\/GoldenEye\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/jseidl\/GoldenEye<\/a> <\/li>\n\n\n\n<li>Dos attack with hulk \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/grafov\/hulk\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/grafov\/hulk<\/a> <\/li>\n\n\n\n<li>Sql vulnerability scanner \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/grafov\/hulk\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/grafov\/hulk<\/a> <\/li>\n\n\n\n<li>hack website with sqlmap \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/sqlmapproject\/sqlmap\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/sqlmapproject\/sqlmap<\/a> <\/li>\n\n\n\n<li>information and vulnerability scanner with striker \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/s0md3v\/Striker\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/s0md3v\/Striker<\/a> <\/li>\n\n\n\n<li>web server attacking tool with dost \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/lnkd.in\/d-pcrbA8?trk=public_post-text\">https:\/\/lnkd.in\/d-pcrbA8<\/a> <\/li>\n\n\n\n<li>advanced multithreaded admin panel finder \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/s0md3v\/Breacher\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/s0md3v\/Breacher<\/a> <\/li>\n\n\n\n<li>Ssl vulnerability scanner \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/PortSwigger\/ssl-scanner\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/PortSwigger\/ssl-scanner<\/a> <\/li>\n\n\n\n<li>sublister &#8211; Subdomain enumeration \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/aboul3la\/Sublist3r\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/aboul3la\/Sublist3r<\/a> <\/li>\n\n\n\n<li>WordPress vulnerability scanner and attacker \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/wpscanteam\/wpscan\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/wpscanteam\/wpscan<\/a> <\/li>\n\n\n\n<li>Hunner scanner framework \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/b3-v3r\/Hunner\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/b3-v3r\/Hunner<\/a> <\/li>\n\n\n\n<li>Red hawk all in 1 information gathering and scanning tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/Tuhinshubhra\/RED_HAWK\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Tuhinshubhra\/RED_HAWK<\/a> <\/li>\n\n\n\n<li>Dos attack tool with Xerxes \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/sepehrdaddev\/Xerxes\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/sepehrdaddev\/Xerxes<\/a> <\/li>\n\n\n\n<li>social fish phishing tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/UndeadSec\/SocialFish\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/UndeadSec\/SocialFish<\/a> <\/li>\n\n\n\n<li>weeman phishing tool no root \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/evait-security\/weeman\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/evait-security\/weeman<\/a> <\/li>\n\n\n\n<li>WordPress security scanner Wpseku \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/lnkd.in\/dDwTzntt?trk=public_post-text\">https:\/\/lnkd.in\/dDwTzntt<\/a> <\/li>\n\n\n\n<li>IDN homograph attack tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/UndeadSec\/EvilURL\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/UndeadSec\/EvilURL<\/a> <\/li>\n\n\n\n<li>Detect security flaws with CMS \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/Dionach\/CMSmap\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Dionach\/CMSmap<\/a> <\/li>\n\n\n\n<li>Fire crack , admin, finders,&nbsp;deface, bing dorking etc \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/Ranginang67\/Firecrack\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Ranginang67\/Firecrack<\/a> <\/li>\n\n\n\n<li>Pish web tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/Cabdulahi\/pish\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/Cabdulahi\/pish<\/a> <\/li>\n\n\n\n<li>MITM attack tool \ud83d\udd17 Link :&nbsp;<a href=\"https:\/\/github.com\/websploit\/websploit\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/websploit\/websploit<\/a> <\/li>\n\n\n\n<li>kill shot pentesting framework \ud83d\udd17 Link :<a href=\"https:\/\/github.com\/bahaabdelwahed\/killshot\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/bahaabdelwahed\/killshot<\/a><\/li>\n<\/ul>\n\n\n\n<p class=\"has-medium-font-size\"><strong>Search Engines for IoT Devices.<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Shodan \ud83d\udd17<a href=\"https:\/\/www.shodan.io\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.shodan.io\/<\/a> <\/li>\n\n\n\n<li>Censys \ud83d\udd17<a href=\"https:\/\/censys.io\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/censys.io\/<\/a> <\/li>\n\n\n\n<li>ZoomEye \ud83d\udd17<a href=\"https:\/\/www.zoomeye.org\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.zoomeye.org\/<\/a> <\/li>\n\n\n\n<li>BinaryEdge \ud83d\udd17<a href=\"https:\/\/www.binaryedge.io\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.binaryedge.io\/<\/a> <\/li>\n\n\n\n<li>Thingful \ud83d\udd17<a href=\"https:\/\/www.thingful.net\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.thingful.net\/<\/a> <\/li>\n\n\n\n<li>Wigle \ud83d\udd17<a href=\"https:\/\/wigle.net\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/wigle.net\/<\/a> <\/li>\n\n\n\n<li>Hunter.io \ud83d\udd17<a href=\"https:\/\/hunter.io\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/hunter.io\/<\/a> <\/li>\n\n\n\n<li>BuiltWith \ud83d\udd17<a href=\"https:\/\/builtwith.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/builtwith.com\/<\/a> <\/li>\n\n\n\n<li>NetDB \ud83d\udd17<a href=\"https:\/\/netdbtracking.sourceforge.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/netdbtracking.sourceforge.net\/<\/a> <\/li>\n\n\n\n<li>Recon-ng \ud83d\udd17<a href=\"https:\/\/github.com\/lanmaster53\/recon-ng\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/lanmaster53\/recon-ng<\/a> <\/li>\n\n\n\n<li>PublicWWW \ud83d\udd17<a href=\"https:\/\/publicwww.com\/?trk=public_post-text\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/publicwww.com\/<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Web application security tools Pentesting Cybersec&amp;Labs IP &amp; URL Reputation File | Hash | Search | Analysis | Sandboxing File hash Find Suspicious Artifacts | Reverse Engineer | Debug Files Monitor System Resources | Detect malware Web proxy Malware Samples Sandbox Malware Analyst Altri Search Engines for IoT Devices.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"iawp_total_views":17,"footnotes":""},"class_list":["post-1193","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/pages\/1193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/comments?post=1193"}],"version-history":[{"count":40,"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/pages\/1193\/revisions"}],"predecessor-version":[{"id":1242,"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/pages\/1193\/revisions\/1242"}],"wp:attachment":[{"href":"https:\/\/www.fabriziogiancola.eu\/index.php\/wp-json\/wp\/v2\/media?parent=1193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}