Repository: redhuntlabs/Awesome-Asset-Discovery
Branch: master
Commit: ec8ef35b3b7c
Files: 4
Total size: 20.4 KB
Directory structure:
gitextract_cly5afqe/
├── .github/
│ ├── ISSUE_TEMPLATE/
│ │ └── feature_request.md
│ └── workflows/
│ └── semgrep.yml
├── License.md
└── README.md
================================================
FILE CONTENTS
================================================
================================================
FILE: .github/ISSUE_TEMPLATE/feature_request.md
================================================
---
name: Feature request
about: Suggest an idea for this project
title: ''
labels: enhancement
assignees: SudhanshuC, upgoingstar
---
**Is your feature request related to a problem? Please describe.**
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
**Describe the solution you'd like**
A clear and concise description of what you want to happen.
**Describe alternatives you've considered**
A clear and concise description of any alternative solutions or features you've considered.
**Additional context**
Add any other context or screenshots about the feature request here.
================================================
FILE: .github/workflows/semgrep.yml
================================================
on:
workflow_dispatch: {}
pull_request: {}
push:
branches:
- main
- master
paths:
- .github/workflows/semgrep.yml
schedule:
# random HH:MM to avoid a load spike on GitHub Actions at 00:00
- cron: 57 5 * * *
name: Semgrep
jobs:
semgrep:
name: semgrep/ci
runs-on: ubuntu-20.04
env:
SEMGREP_APP_TOKEN: ${{ secrets.SEMGREP_APP_TOKEN }}
container:
image: returntocorp/semgrep
steps:
- uses: actions/checkout@v4
- run: semgrep ci
================================================
FILE: License.md
================================================
CC0 1.0 Universal
Statement of Purpose
The laws of most jurisdictions throughout the world automatically confer
exclusive Copyright and Related Rights (defined below) upon the creator and
subsequent owner(s) (each and all, an "owner") of an original work of
authorship and/or a database (each, a "Work").
Certain owners wish to permanently relinquish those rights to a Work for the
purpose of contributing to a commons of creative, cultural and scientific
works ("Commons") that the public can reliably and without fear of later
claims of infringement build upon, modify, incorporate in other works, reuse
and redistribute as freely as possible in any form whatsoever and for any
purposes, including without limitation commercial purposes. These owners may
contribute to the Commons to promote the ideal of a free culture and the
further production of creative, cultural and scientific works, or to gain
reputation or greater distribution for their Work in part through the use and
efforts of others.
For these and/or other purposes and motivations, and without any expectation
of additional consideration or compensation, the person associating CC0 with a
Work (the "Affirmer"), to the extent that he or she is an owner of Copyright
and Related Rights in the Work, voluntarily elects to apply CC0 to the Work
and publicly distribute the Work under its terms, with knowledge of his or her
Copyright and Related Rights in the Work and the meaning and intended legal
effect of CC0 on those rights.
1. Copyright and Related Rights. A Work made available under CC0 may be
protected by copyright and related or neighboring rights ("Copyright and
Related Rights"). Copyright and Related Rights include, but are not limited
to, the following:
i. the right to reproduce, adapt, distribute, perform, display, communicate,
and translate a Work;
ii. moral rights retained by the original author(s) and/or performer(s);
iii. publicity and privacy rights pertaining to a person's image or likeness
depicted in a Work;
iv. rights protecting against unfair competition in regards to a Work,
subject to the limitations in paragraph 4(a), below;
v. rights protecting the extraction, dissemination, use and reuse of data in
a Work;
vi. database rights (such as those arising under Directive 96/9/EC of the
European Parliament and of the Council of 11 March 1996 on the legal
protection of databases, and under any national implementation thereof,
including any amended or successor version of such directive); and
vii. other similar, equivalent or corresponding rights throughout the world
based on applicable law or treaty, and any national implementations thereof.
2. Waiver. To the greatest extent permitted by, but not in contravention of,
applicable law, Affirmer hereby overtly, fully, permanently, irrevocably and
unconditionally waives, abandons, and surrenders all of Affirmer's Copyright
and Related Rights and associated claims and causes of action, whether now
known or unknown (including existing as well as future claims and causes of
action), in the Work (i) in all territories worldwide, (ii) for the maximum
duration provided by applicable law or treaty (including future time
extensions), (iii) in any current or future medium and for any number of
copies, and (iv) for any purpose whatsoever, including without limitation
commercial, advertising or promotional purposes (the "Waiver"). Affirmer makes
the Waiver for the benefit of each member of the public at large and to the
detriment of Affirmer's heirs and successors, fully intending that such Waiver
shall not be subject to revocation, rescission, cancellation, termination, or
any other legal or equitable action to disrupt the quiet enjoyment of the Work
by the public as contemplated by Affirmer's express Statement of Purpose.
3. Public License Fallback. Should any part of the Waiver for any reason be
judged legally invalid or ineffective under applicable law, then the Waiver
shall be preserved to the maximum extent permitted taking into account
Affirmer's express Statement of Purpose. In addition, to the extent the Waiver
is so judged Affirmer hereby grants to each affected person a royalty-free,
non transferable, non sublicensable, non exclusive, irrevocable and
unconditional license to exercise Affirmer's Copyright and Related Rights in
the Work (i) in all territories worldwide, (ii) for the maximum duration
provided by applicable law or treaty (including future time extensions), (iii)
in any current or future medium and for any number of copies, and (iv) for any
purpose whatsoever, including without limitation commercial, advertising or
promotional purposes (the "License"). The License shall be deemed effective as
of the date CC0 was applied by Affirmer to the Work. Should any part of the
License for any reason be judged legally invalid or ineffective under
applicable law, such partial invalidity or ineffectiveness shall not
invalidate the remainder of the License, and in such case Affirmer hereby
affirms that he or she will not (i) exercise any of his or her remaining
Copyright and Related Rights in the Work or (ii) assert any associated claims
and causes of action with respect to the Work, in either case contrary to
Affirmer's express Statement of Purpose.
4. Limitations and Disclaimers.
a. No trademark or patent rights held by Affirmer are waived, abandoned,
surrendered, licensed or otherwise affected by this document.
b. Affirmer offers the Work as-is and makes no representations or warranties
of any kind concerning the Work, express, implied, statutory or otherwise,
including without limitation warranties of title, merchantability, fitness
for a particular purpose, non infringement, or the absence of latent or
other defects, accuracy, or the present or absence of errors, whether or not
discoverable, all to the greatest extent permissible under applicable law.
c. Affirmer disclaims responsibility for clearing rights of other persons
that may apply to the Work or any use thereof, including without limitation
any person's Copyright and Related Rights in the Work. Further, Affirmer
disclaims responsibility for obtaining any necessary consents, permissions
or other rights required for any use of the Work.
d. Affirmer understands and acknowledges that Creative Commons is not a
party to this document and has no duty or obligation with respect to this
CC0 or use of the Work.
For more information, please see
<http://creativecommons.org/publicdomain/zero/1.0/>
================================================
FILE: README.md
================================================
# Awesome Asset Discovery
[<img src="https://i1.wp.com/redhuntlabs.com/wp-content/uploads/2020/05/RedHunt-Logo-Without-Text-Dark.png?w=512&ssl=1" align="right" width="100">](https://redhuntlabs.com/)
Asset Discovery is the initial phase of any security assessment engagement, be it offensive or defensive. With the evolution of information technology, the scope and definition of assets has also evolved.
Earlier the servers, workstations and websites were primary IT assets of an organization, but today this definition is very limiting and should include anything and everything an organization and its entities has their data on (knowingly or unknowingly). The scope of ownership could differ, but it does not limit the attack surface, for example if an organization puts out open source code on Github, they are not the owner of Github but of the data they put under their repositories. In a scenario where some organization secret has been put on this Github account, it could pose a threat equal or more than running a vulnerable service.
We have explored this aspect of **assets** in our [blog post here](https://redhuntlabs.com/blog/redifining-assets-a-modern-perspective.html).
Through this repository, we want to put out a list of curated resources which help during asset discovery phase of a security assessment engagement. We welcome suggestions and contributions from the community in terms of resources as well as categories.
**[`To know more about our Attack Surface Management platform, check out NVADR.`](https://redhuntlabs.com/nvadr)**
## Contents
- [Content Discovery](#content-discovery)
- [IP Address Discovery](#ip-address-discovery)
- [Domain / Subdomain Discovery](#domain--subdomain-discovery)
- [Email Discovery](#email-discovery)
- [Network / Port Scanning](#network--port-scanning)
- [Business Communication Infrastructure Discovery](#business-communication-infrastructure-discovery)
- [Source Code Aggregators / Search - Information Discovery](#source-code-aggregators--search---information-discovery)
- [Cloud Infrastructure Discovery](#cloud-infrastructure-discovery)
- [Company Information and Associations](#company-information-and-associations)
- [Internet Survey Data](#internet-survey-data)
- [Social Media / Employee Profiling](#social-media--employee-profiling)
- [Data Leaks](#data-leaks)
- [Internet Scan / Archived Information](#internet-scan--archived-information)
## [↑](#contents)Content Discovery
- [rustbuster](https://github.com/phra/rustbuster): Files, directories and vhost buster written in Rust.
## [↑](#contents)IP Address Discovery
- [Mxtoolbox](https://mxtoolbox.com/BulkLookup.aspx): Bulk Domain/IP lookup tool
- [Domaintoipconverter](http://domaintoipconverter.com/): Bulk domain to IP converter
- [Massdns](https://github.com/blechschmidt/massdns): A DNS resolver utility for bulk lookups
- [Googleapps Dig](https://toolbox.googleapps.com/apps/dig/): Online Dig tool by Google
- [DataSploit (IP Address Modules)](https://github.com/DataSploit/datasploit/tree/master/ip): An OSINT Framework to perform various recon techniques
- [Domain Dossier](https://centralops.net/co/domaindossier.aspx): Investigate domains and IP addresses
- [Bgpview](https://bgpview.io/): Search ASN, IPv4/IPv6 or resource name
- [Hurricane Electric BGP Toolkit](https://bgp.he.net/): Keyword to ASN lookup
- [Viewdns](https://viewdns.info/): Multiple domain/IP tools
- [Ultratools ipv6Info](https://www.ultratools.com/tools/ipv6Info): Multiple information related to IPv6 address
- [Whois](https://manpages.debian.org/jessie/whois/whois.1.en.html): Command line utility usually used to find information about registered users/assignees of an Internet resource.
- [ICANN Whois](https://whois.icann.org/en): Whois service by Internet Corporation for Assigned Names and Numbers (ICANN)
- Nslookup [Linux](https://manpages.debian.org/jessie/dnsutils/nslookup.1.en.html) / [Windows](https://docs.microsoft.com/en-us/windows-server/administration/windows-commands/nslookup): Command line utility usually used for querying the DNS records
- [bgp](https://bgp.he.net/) : Internet Backbone and Colocation Provider ... Hurricane Electric IP Transit. Our Global Internet Backbone provides IP Transit with low latency, access to thousands of networks, and dual-stack
## [↑](#contents)Domain / Subdomain Discovery
- [RedHunt Labs Attack Surface Recon API](https://devportal.redhuntlabs.com/home): RedHunt Labs' Recon API offers comprehensive domain intelligence and reconnaissance capabilities. With access to their extensive in-house database of over 6 billion records, including domains, subdomains, third-party SaaS, data leaks, and intelligent correlations, this API empowers you to enhance your Attack Surface Management and InfoSec workflows.
- [SubFinder](https://github.com/subfinder/subfinder): SubFinder is a subdomain discovery tool that discovers valid subdomains for websites. Designed as a passive framework to be useful for bug bounties and safe for penetration testing.
- [Amass](https://github.com/OWASP/Amass): A subdomain enumeration utility
- [Sublist3r](https://github.com/aboul3la/Sublist3r): Subdomains enumeration tool with multiple sources
- [Aiodnsbrute](https://github.com/blark/aiodnsbrute): Asynchronous DNS brute force utility
- [LDNS](https://github.com/NLnetLabs/ldns): A DNS library useful for DNS tool programming
- [Dns-nsec3-enum](https://nmap.org/nsedoc/scripts/dns-nsec3-enum.html): Nmap NSE Script for NSEC3 walking
- [Nsec3map](https://github.com/anonion0/nsec3map): A tool to NSEC and NSEC3 walking
- [Crt.sh](https://crt.sh/?a=1): Domain certificate Search
- [Ct-exposer](https://github.com/chris408/ct-exposer): A tool to discovers sub-domains by searching Certificate Transparency logs
- [Certgraph](https://github.com/lanrat/certgraph): A tool to crawl the graph of certificate Alternate Names
- [Appsecco - The art of subdomain enumeration](https://github.com/appsecco/the-art-of-subdomain-enumeration): The supplement material for the book "The art of sub-domain enumeration"
- [SSLScrape](https://github.com/jhaddix/sslScrape): A scanning tool to scrape hostnames from SSL certificates
- [Wolframalpha](https://www.wolframalpha.com/): Computational knowledge engine
- [Project Sonar](https://opendata.rapid7.com/sonar.fdns_v2/): Forward DNS Data
- [Project Sonar](https://opendata.rapid7.com/sonar.rdns_v2/): Reverse DNS Data
- [GoBuster](https://github.com/OJ/gobuster): Directory/File, DNS and VHost busting tool written in Go
- [Bluto](https://github.com/darryllane/Bluto): Recon, Subdomain Bruting, Zone Transfers
## [↑](#contents)Email Discovery
- [Hunter](https://hunter.io/): Email search for a domain
- [Skrapp](https://www.skrapp.io/): Browser addon to find emails on Linkedin
- [Email Extractor](https://chrome.google.com/webstore/detail/email-extractor/jdianbbpnakhcmfkcckaboohfgnngfcc?hl=en): Chrome extension to extract emails from web pages
- [Convertcsv](http://convertcsv.com/email-extractor.htm): Online tool to extract email addresses in text, web pages, data files etc.
- [linkedin2username](https://github.com/initstring/linkedin2username): OSINT Tool: Generate username lists for companies on LinkedIn
- [Office365UserEnum](https://bitbucket.org/grimhacker/office365userenum/src/master/): Enumerate valid usernames from Office 365 using ActiveSync.
## [↑](#contents)Network / Port Scanning
- [Zmap](https://github.com/zmap/zmap): A fast network scanner designed for Internet-wide network surveys
- [Masscan](https://github.com/robertdavidgraham/masscan): An asynchronously TCP port scanner
- [ZMapv6](https://github.com/tumi8/zmap): A modified version of Zmap with IPv6 support.
- [Nmap](https://nmap.org/): A free and open source utility for network discovery. The most popular port scanner.
## [↑](#contents)Business Communication Infrastructure Discovery
- [Mxtoolbox](https://mxtoolbox.com/): Online tool to check mail exchanger (MX) records
- [MicroBurst](https://github.com/NetSPI/MicroBurst): PowerShell based Azure security assessment scripts
- [Lyncsmash](https://github.com/nyxgeek/lyncsmash): Tools to enumerate and attack self-hosted Lync/Skype for Business
- [Enumeration-as-a-Service](https://github.com/sosdave/Enumeration-as-a-Service): Script for SaaS offering enumeration through DNS queries
- [ruler](https://github.com/sensepost/ruler) : A tool to abuse Exchange services
## [↑](#contents)Source Code Aggregators / Search - Information Discovery
- [Github](https://github.com/search/advanced): Github Advanced Search
- [Bitbucket](https://www.google.com/search?q=site:bitbucket.org&q=<keyword>): Bitbucket Search using Google
- [Gitrob](https://github.com/michenriksen/gitrob): Reconnaissance tool for GitHub organizations
- [Gitlab](https://gitlab.com/explore/projects): Search Gitlab projects
- [Publicwww](https://publicwww.com/): Source Code Search Engine
- [builtwith](https://builtwith.com/test.com) : Web technology information profiler tool. Find out what a website is built with.
## [↑](#contents)Cloud Infrastructure Discovery
- [CloudScraper](https://github.com/jordanpotti/CloudScraper): A tool to spider websites for cloud resources (S3 Buckets, Azure Blobs, DigitalOcean Storage Space)
- [InSp3ctor](https://github.com/brianwarehime/inSp3ctor): AWS S3 Bucket/Object finder
- [Buckets Grayhatwarfare](https://buckets.grayhatwarfare.com/): Search for Open Amazon s3 Buckets and their contents
- [Spaces-finder](https://github.com/appsecco/spaces-finder): A tool to hunt for publicly accessible DigitalOcean Spaces
- [GCPBucketBrute](https://github.com/RhinoSecurityLabs/GCPBucketBrute): A Google Storage buckets enumeration script
- [CloudStorageFinder](https://github.com/digininja/CloudStorageFinder): Tools to find public data in cloud storage systems
## [↑](#contents)Company Information and Associations
- [Crunchbase](https://www.crunchbase.com/): Information about companies (funding, acquisition, merger etc.) and the people behind them
- [Companieshouse](https://beta.companieshouse.gov.uk/): United Kingdom's registrar of companies
- [OverSeas Registries](https://www.gov.uk/government/publications/overseas-registries/overseas-registries): List of company registries located around the world
- [Opencorporates](https://opencorporates.com): Open database of companies in the world
## [↑](#contents)Internet Survey Data
- [Project Resonance](https://redhuntlabs.com/project-resonance): RedHunt Labs’s Internet wide surveys to study and understand the security state of the Internet.
- [Project Sonar](https://opendata.rapid7.com/): Rapid7’s internet-wide surveys data across different services and protocols
- [Scans.io](https://scans.io): Internet-Wide Scan Data Repository, hosted by the ZMap Team
- [Portradar](https://portradar.packet.tel/): Free and open port scan data by packet.tel
## [↑](#contents)Social Media / Employee Profiling
- [LinkedInt](https://github.com/mdsecactivebreach/LinkedInt): A LinkedIn scraper for reconnaissance
- [Glassdoor](https://www.glassdoor.co.in/Reviews/index.htm): Company review and rating search
- [SocialBlade](https://socialblade.com/): Track user statistics for different platforms including YouTube and Twitter
- [Social-Searcher](https://www.social-searcher.com/): Social Media Search Engine
- [Checkuser](https://checkuser.org): Social existence checker
## [↑](#contents)Data Leaks
- [Dumpmon](https://twitter.com/dumpmon): A twitter bot which monitors multiple paste sites for password dumps and other sensitive information
- [Pastebin_scraper](https://github.com/Critical-Start/pastebin_scraper): Automated tool to monitor pastebin for interesting information
- [Scavenger](https://github.com/rndinfosecguy/Scavenger): Paste sites crawler (bot) looking for leaked credentials
- [Pwnbin](https://github.com/kahunalu/pwnbin): Python based Pastebin crawler for keywords.
- [PwnedOrNot](https://github.com/thewhiteh4t/pwnedOrNot): Tool to find passwords for compromised accounts
## [↑](#contents)Internet Scan / Archived Information
- [Cachedviews](https://cachedviews.com/): Cached view of pages on the Internet from multiple sources
- [Wayback Machine](http://web.archive.org/): Internet Archive
- [Shodan](http://shodan.io/): Search engine for Internet-connected devices
- [Censys](https://censys.io/): Another search engine for internet-connected devices
- [Zoomeye](https://www.zoomeye.org/): Cyberspace Search Engine
***
## Contributing
In case you would like to add information to this repository or suggest some ideas, please use one of the following options:
- [Create an Issue](https://github.com/redhuntlabs/Awesome-Asset-Discovery/issues/new/choose).
- [Send us Pull Requests](https://github.com/redhuntlabs/Awesome-Asset-Discovery/pulls)
- Drop an email to contact@redhuntlabs.com
## Connect
To connect with us:
- [Website](https://redhuntlabs.com)
- [Twitter](https://twitter.com/redhuntlabs)
- [Facebook](https://www.facebook.com/redhunt.labs)
## License
This work is licensed under [**CC0 1.0 Universal**](https://github.com/redhuntlabs/Awesome-Asset-Discovery/blob/master/License.md)
***
gitextract_cly5afqe/ ├── .github/ │ ├── ISSUE_TEMPLATE/ │ │ └── feature_request.md │ └── workflows/ │ └── semgrep.yml ├── License.md └── README.md
Condensed preview — 4 files, each showing path, character count, and a content snippet. Download the .json file or copy for the full structured content (21K chars).
[
{
"path": ".github/ISSUE_TEMPLATE/feature_request.md",
"chars": 625,
"preview": "---\nname: Feature request\nabout: Suggest an idea for this project\ntitle: ''\nlabels: enhancement\nassignees: SudhanshuC, u"
},
{
"path": ".github/workflows/semgrep.yml",
"chars": 498,
"preview": "on:\n workflow_dispatch: {}\n pull_request: {}\n push:\n branches:\n - main\n - master\n paths:\n - .github/wo"
},
{
"path": "License.md",
"chars": 6555,
"preview": "CC0 1.0 Universal\n\nStatement of Purpose\n\nThe laws of most jurisdictions throughout the world automatically confer\nexclus"
},
{
"path": "README.md",
"chars": 13218,
"preview": "# Awesome Asset Discovery\n[<img src=\"https://i1.wp.com/redhuntlabs.com/wp-content/uploads/2020/05/RedHunt-Logo-Without-T"
}
]
About this extraction
This page contains the full source code of the redhuntlabs/Awesome-Asset-Discovery GitHub repository, extracted and formatted as plain text for AI agents and large language models (LLMs). The extraction includes 4 files (20.4 KB), approximately 5.1k tokens. Use this with OpenClaw, Claude, ChatGPT, Cursor, Windsurf, or any other AI tool that accepts text input. You can copy the full output to your clipboard or download it as a .txt file.
Extracted by GitExtract — free GitHub repo to text converter for AI. Built by Nikandr Surkov.