Did you click it?

Welcome to my digital treasure trove! Here lies a curated collection of URLs that fuel my daily adventures in the thrilling realms of IT and cyber security. Each link is a portal to knowledge, innovation, and the cutting-edge tools that keep our virtual world secure and vibrant. Dive in, explore, and unleash your inner tech warrior as you navigate through resources that not only enhance your skills but also ignite your passion for all things tech. Get ready to level up your cyber game!

1Dehashedhttps://dehashed.comView leaked credentials
2Security trailshttps://Securitytrails.comExt dns data
3DorkSearchhttps://DorkSearch.comReally fast Google dorking
4ExploitDBhttps://ExploitDB.comArchive of various exploits
5ZoomEyehttps://ZoomEye.comGather info about targets
6Pulsedivehttps://Pulsedive.comSearch for threat intelligence
7GrayHatWarefarehttps://grayhatwarfare.comSearch public S3 buckets
8PolySwarmhttps://PolySwarm.ioScan files and URLs for threats
9Fofahttps://Fofa.comSearch for various threat intelligence
10LeakIXhttps://LeakIX.comSearch publicly indexed info
11DNSdumpsterhttps://DNSdumpster.comSearch for DNS records quickly
12Fullhunthttps://Fullhunt.ioSearch for discovery attack surface
13AlienVaulthttps://AlienVault.comExtensive threat int feed
14Onyphehttps://Onyphe.comCollects cyber-threat intelligence data
15Grep Apphttps://Grep.appSearch accross a half million git repos
16Urlscanhttps://Urlscan.ioFree service to scan and analyse websites
17IPinfohttps://IPinfo.ioFree service to lookup public IPs
18Crt.shhttps://Crt.shSearch for DNS records quickly by use of certificates
19Vulnershttps://Vulners.comSearch vulnerabilities in a large database
20Waybackmachinehttps://Waybackmachine.comView content from deleted websites
21Shodanhttps://Shodan.ioSearch for devices connected to the internet
22Netlashttps://Netlas.comSearch and monitor internet connected assets
23Wiglehttps://Wigle.netDatabase of wireless networks with stats
24PublicWWWhttps://PublicWWW.comMarketing and affiliate marketing research
25Binary Edgehttps://BinaryEdge.comScans the internet for threat intelligence
26GreyNoisehttps://GreyNoise.ioSearch for devices to the internet
27Hunterhttps://Hunter.ioSearch for email addresses belonging to a web site
28Censyshttps://Censys.comAssessing attack surface for internet connected devices
29The dfir reporthttps://thedfirreport.comReal Intrusions by Real Attackers - The Truth Behind the Intrusion
30IntelligenceXhttps://IntelligenceX.ioSearch Tor I2P - data leaks domains and emails
31Packet Storm Security.comhttps://packetstormsecurity.comBrowse latest vulnerabilities and exploits
32Pentest Toolshttps://pentest-tools.comTools for easy pentesting
33SearchCodehttps://SearchCode.comSearch 75 billion lines of code from40 million projects
34Speed Testhttp://speedtest.stockholm.linode.comBest speed test I know of