[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAGKQm=XUnkc=xuDHmGWDG0twfrxiynF8wXPvaZEd_2GJ4oNWXQ@mail.gmail.com>
Date: Tue, 20 Feb 2018 17:16:46 -0200
From: Gustavo Sánchez <gus70938@...il.com>
To: fulldisclosure@...lists.org
Subject: [FD] Search engine of leaks
I started working with a leaks search engine and although it has some other
bug, it is very complete.
This search engine works with such sources that it analyzes from:
1) - Github
2) - Pastebin
3) -Robtex
4) - Shodan
5) - Censys
6) - Email Sherlock
7) - Threatcrowd
8) Alienvault
9) - Netcraft
10) -Shodan
11) - Threatminer.
12) - public ftps repos search engine: filemare
13) - Archive.is: A search engine like waybackmachine but graphic xD. 14) -
Vulners: A database of exploits and organizations with bugs that have been
reported.
Tips to look for: use inurl.
For example: Sqli inurl:pastebin OR Sqli inurl:vulners
Both: Sqli inurl:pastebin OR inurl:vulners
Link:
https://cse.google.com/cse/publicurl?cx=012209864558240645678:pownmejpj5w
I await your opinions. Rootkit
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists