sudoninja book
  • sudoninja book
  • About us
  • Security Area
    • Penetration Testing Methodologies
      • 7 Layer
    • How to Find CVE
      • TOP All bugbounty pentesting CVE
      • What is CVE
      • Where I try to find vulnerability and exploit
      • How to find vulnerability (approach).
      • How to Request CVE
      • My CVE
      • My submission on exploit DB
      • Write up and CVE
      • Published CVE on website
    • DAST/SAST
    • Penetration-Testing
      • Offensive-Resources
      • pentest tool
      • Mind map
    • Web Application Penetration Testing
      • Web Pentesting Methodology
      • Video
      • Cheat sheet
      • Book
      • Lab
      • Mind Map
      • Check list
      • Blog
      • Payload
      • Report
      • Tool
    • Network Penetration Testing
      • Checklist
    • Mobile Penetration testing
      • Mobile PT methology
      • APK Penetration Testing
      • Android PT
        • Methology
        • Github
        • video
        • Report
        • Tool
        • Mind Map
        • Payload
        • Cheat sheet
        • Check list
        • Lab
        • Book
        • Blog
      • iOS PT
        • Methology
        • Check list
        • Github
        • Lab
        • Book
        • Payload
        • Report
        • Mind Map
        • Blog
        • Tool
        • Video
      • Cheatsheet
      • Mind Map
    • Active Directory penetration testing
      • Methodology
      • Note
      • Checklist
      • Mind map
      • Cheatsheet
      • Tool
      • Note
      • Lab
      • Payload
    • API Penetration Testing
      • Methodology
      • Video
      • Book
      • Mind map
      • Lab
      • Checklist
      • Blog
      • Payload
      • Report
      • Tool
    • Source Code Review
      • Mindmap
      • Link
      • Blog
    • CTF
      • Practice
        • Youtube
        • CTF
    • IOT Penetration Testing
      • Methodology
      • Cheat sheet
      • Book
      • Mind Map
      • Check list
      • Blog
      • Video
      • Report
      • Tool
    • Red Teaming
      • Mind map
      • OSINT
      • Configure your own vulnerable CTF machine
    • Cloud Security
      • Google Cloud Platform
      • Azure
      • Report
      • AWS
      • Lab
    • Bug Bounty Hunting
      • Learning Engine for Bug Hunter
      • bug bounty tips
        • Book
        • Guide
      • Cheat sheet
      • Bugbounty writeup - medium / others
      • Hackerone Report
      • Recon map
      • Writeups
      • Bug bounty Platform
      • Tool
    • Thick Client Pentesting
    • Malware Analysis
    • DevSecOps
    • Wireless Penetration Testing
      • Note
      • Cheatsheet
  • Practice and improve skills
  • list of Vulnerabilities-1
    • 2FA/OTP Bypass
    • Account Takeover
    • Apache Log Poisoning through LFI
    • Broken Links
    • Bruteforcing
    • Business Logic Flaws
    • Broken Authentication & Session Management
    • Cross Site Scripting
    • Crawl/Fuzz
    • Content Security Policy (CSP)
    • CORS
    • CSRF
    • Clickjacking
    • CRLF
    • Command Injection
    • Client Side Template Injection (CSTI)
    • cookie
    • Cookies Hacking
    • Captcha Bypass
    • Dangling Markup - HTML scriptless injection
    • Deserialization
    • Directory Browsing
    • DNS Rebinding
    • Email Header Injection
    • Email attacks
    • File Inclusion/Path traversal
    • File Upload
    • Github Recon
    • Header injections
    • HTTP Request Smuggling
    • HTTP Parameter pollution
    • HTML Injection
    • HTTP Authentication
    • HTTP Protocol
    • IDOR
    • JWT Vulnerabilities (Json Web Tokens)
    • LDAP Injection
    • NoSQL injection
    • Open Redirect
    • Online hashes cracked
    • Race Condition
    • Ruby on Rails
    • Rate Limit Bypass
    • Pastejacking
    • Path Traversal
    • Password Reset
    • Prototype Pollution
    • SQL Injection
    • SSRF (Server Side Request Forgery)
    • SSTI (Server Side Template Injection)
    • Session fixation
    • Subdomain Takeover
    • S3 Bucket
    • Unicode Normalization vulnerability
    • XPATH injection
    • XSLT Server Side Injection
    • XXE - XML External Entity
    • XS-Search
    • Web Cache Deception
    • Web Sockets
    • Webshells
  • list of Vulnerabilities-2
    • Web Application Vulnerability 2022
  • Tool
    • sqlmap
      • Sql login bypass
    • Extra
    • Github
    • Search Engine for Hackers
    • Burp Extensions
    • Dorks
    • Python
    • one line script
      • more
  • Note
  • AWAE/OSWE
    • Cherry Tree
  • Burp Suite Certified Practitioner
    • Sql Injection
  • Pentesting Bible
  • Free Certification
  • Hack The Box
  • Bookmark
  • Report
  • Lab
    • MY Machine
  • Framework
    • OWASP guide
      • Map
      • OWASP Cheatsheet
  • CheatSheet
  • Mind Map
  • Certifications
  • Research Tool
  • Learn for Fun
    • Email spoofing
  • POST
    • Here are 24 websites to learn Linux for free:
    • 39 cybersecurity news resources
    • 30 cybersecurity search engines
    • 27 ways to learn ethical hacking for free
Powered by GitBook
On this page

Was this helpful?

Research Tool

Google Hacking

" "
+
AND
OR
site:
intitle:
allintitle:
inurl:
link:
info:
related:
cache:
filetype:
dictionary:
define:
images:
book search
groups
inblogtitle:
inposttitle:
inpostauthor:
blogurl:
video search
genre:
type:
duration:
is:free
is:forsale
scholar
wildcard *
filetype:xml site:za confidential
filetype:xls site:ru login
intitle:"index of" site:kr password
site:www.jordanislamicbank.com 617..780
numrange:4567000000000000..4567999999999999 visa
filetype: doc, pdf, xls, ppt , wp, wk1 - 5, wki, wks, wku
mw, wks, wps, wdb, ps, rtf, ans, txt, swf
site:www.xyz.com inurl:database
site:www.xyz.com inurl:directory
site:www.xyz.com inurl:index
site:www.xyz.com inurl:companies

https://www.googleguide.com/advanced_operators_reference.html

Paste Bins / Forums / Boards

http://pastebin.com
http://tinywrite.com
http://pastie.org
http://dpaste.com
http://copypastecode.com
http://everfall.com/paste
http://slexy.org
http://privatepaste.com
http://aspin.com
http://zubrag.com
http://snipt.net
http://darkcoding.net
http://codelifter.com
http://gonet.biz
http://winprog.org
http://webmasterslibrary.com
http://mnot.net
http://programr.com
http://wklej.org
http://hackertyper.net
http://dynamictoolbar.com
http://mevvy.com
http://cyscape.com
http://php.org
http://learnstreet.com
http://ircap.net
http://writecodeonline.com
http://codecrap.com
http://codeproject.com
http://codeguru.com
http://codeobsessed.com
http://codersource.net
http://code-shop.com
http://usaco.org
http://progtalk.com
http://thescarms.com
http://jb51.net
http://bytes.com
http://codecademy.com
http://java2s.com
http://dreamincode.net
http://phpclasses.org
http://snipplr.com
http://bavotasan.com
http://sourcecodeonline.com
http://programmersheaven.com
http://planet-source-code.com
http://codesky.net
http://codechef.com
http://pastie.org
http://www.ehackingnews.com/
http://www.cyberwarnews.info
http://www.cyberwarnews.info/category/anonymous/
http://forum.3xp1r3.com/
http://www.webpronews.com/tag/anonymous
http://anonnews.org/
http://youranonnews.tumblr.com/
http://anonymousnews.blogs.ru/
http://www.breakingnews.com/topic/anonymous
http://anon-news.blogspot.com

Historical Websites and Archives Search

www.screenshots.com
www.archive.org
Google Search: cache:www.website.com
Network Detail Search
http://www.mcit.com.hk/nqt.php
http://www.yougetsignal.com
Pictures Search
Google Image Search
Exif tool
www.photobucket.com
Email Search
Email Search in speech marks
Email Header Analysis
Main Search Engines
Google
Yahoo
Bing
Gigablast
Ask
Baidu
Google Search
Google Image Search
Google Trends
Google Maps
Google Earth
Google Video Search
Google Search (Advanced)
Email search in speech marks
Google search in speech marks
site:twitter.com "Name"
site:www.facebook.com "Name" AND "Location"
intitle:”index of” “parent directory” john doe 

People & Company Search

http://checkusernames.com/
http://www.123people.com
https://pipl.com
http://www.pcworld.com/article/219593/how_to_do_an_online_background_check_for_free.html
www.Pandia.com
www.virtualchase.com
www.people-search-engines.com
www.peoplesearch.net
www.virtualgumshoe.com
www.searchsystems.net
www.person.langenberg.com
www.publicrecordfinder.com
www.powerreporting.com
www.nettrace.com
www.deadlineonline.com
www.peoplesearchlinks.com
http://www.peekyou.com
http://com.lullar.com
www.infospace.com
http://www.sec.gov/edgar/searchedgar/webusers.htm#.VRMr4Fy28b4
http://www.zoominfo.com

Social Media Websites

www.youtube.com
www.twitter.com
www.facebook.com
www.linkedin.com
www.flickr.com
www.myspace.com
http://plus.google.com
https://www.pinterest.com
Social Media Monitoring
http://socialmention.com/
http://topsy.com/
http://www.twazzup.com
http://www.icerocket.com

The hacker news

PreviousCertificationsNextLearn for Fun

Last updated 2 years ago

Was this helpful?