🛠️
Ghoul's Den
WebsiteGhoulsec-Vault
  • Ghoul's Den
  • Index of Tools
  • Index of Links
  • Top Ports
  • Initial Environment Deployment
    • Python3 & Pip Installation
    • Docker 🛳
    • Setting up AWS CLI
    • Msfconsole
    • Netplan configuration & Cloudinit
    • Wordlist Generation - CEWL
    • Apache2 Server
  • Information Gathering & Recon Tools
    • GHDB : Google Hacking Database
    • Sherlock : Social Media Footprinting
    • Nslookup
    • Dig (Domain Information Groper)
    • Recon-ng
    • HTTrack & Web Data Extractor
    • Email Tracker Pro
    • Shodan
    • ARIN Website Registry
  • Network Scanning Enumaration & Vulnerability Detection Tools
    • NMAP & SuperENUM
    • Nmap
      • Target Specification
      • Host Discovery
      • Port Scanning Techniques
      • Port Specification & Scan Order
      • Service Version Detection
      • OS Detection
      • Nmap Scripting Engine
      • Timing & Performance
      • FW / IDS / IPS Evasion
      • Miscellaneous Options
    • Colasoft Packet Builder & Megaping
    • Global Network Inventory
    • LDAP Enumeration > Active Directory Explorer
    • NetBIOS Enumerator
    • SMBEagle
    • RPC Scan
    • Nikto - Web Application Scanner
    • Enum4Linux
  • File Sharing Enumeration
  • Cloud Computing
    • AAD Internals
    • AWS CLI & S3
    • Trivy Scanner
    • S3 Scanner
    • LazyS3
  • Cryptography & stegnography
    • Veracrypt
    • Cryptanalysis Tools
    • Whitespace Cryptography - Snow
    • Creating a Self signed certificate in IIS
    • Steghide & Stegcracker
    • snow
  • Wireless Attacks
    • Aircrack-ng
  • Mobile Attacks
    • PhoneSploit-Pro
    • AndroRAT
    • ADB
  • SQL Injection Vulnerability
    • SQLMap
    • DSSS
  • IOT & OT Hacking
  • Social Engineering
  • Honeypot & IDS
    • Cowrie Honeypot
  • Sniffing & DDos
    • Sniffing
      • Capturing Remote packets using Wireshark
      • Detecting Sniffing using Nmap
    • Denial of Service (Dos & DDos)
      • DDos Protection using DDos Guardian
  • Malware Attacks
  • Password Cracking & Windows exploitation tools
    • Hydra
    • John
    • Hashcat
    • CrackMapExec
    • Impacket
    • Powerview
    • BitsAdmin
    • Rubeus (Kerberoasting) & Winpeas
    • AD-DC Querying
    • mstsc - RDP
  • System hacking & buffer overflow
    • Responder
    • Reverse Shell Generator
    • Clearing Traces
  • Session Hijacking
    • Caido
    • Bettercap
  • Web Servers & Applications
  • Linux Fundamentals
    • Find Command
    • Grep Command
Powered by GitBook
On this page

Information Gathering & Recon Tools

Information Gathering & Recon (short for Reconnaissance) is a critical phase in various fields such as cybersecurity, penetration testing, intelligence gathering, and ethical hacking. It involves collecting and analyzing information about a target system, network, or individual to identify potential vulnerabilities or gain a better understanding of their structure. This process is often the first step in performing security assessments, cyber-attacks, or intelligence operations.

Tools Commonly Used in Information Gathering and Reconnaissance

Search Engine Footprinting-----------------
1. GHDB : Google Hacking Database
2. Dns Dumpster : https://dnsdumpster.com
3. Netcraft : https://www.netcraft.com/tools/
4. Pentest Tools : https://pentest-tools.com
------------------------------------------------------------

Social Media Footprinting----------------------------------
1. Sherlock (Social Media Hunting) : https://github.com/sherlock-project/sherlock
2. Spiderfoot : https://github.com/smicallef/spiderfoot
3. Maltego : https://www.maltego.com
4. Foca : https://foca.en.softonic.com
5. Photon : https://github.com/s0md3v/Photon
------------------------------------------------------------

WHOIS Footprinting------------------------------------------
1. WHOIS Lookup : https://whois.domaintools.com
2. SmartWhois : https://www.tamos.com
3. Batch IP Converter : http://www.sabsoft.com/BatchIPConverter.htm
------------------------------------------------------------

DNS Footprinting -------------------------------------------
1. Nslookup (Command Line Utility)
2. Nslookup(Web) : http://www.kloth.net/services/nslookup.php
3. Dig Lookup tool (Web) : http://www.kloth.net/services/dig.php
4. Dns Dumpster : https://dnsdumpster.com
------------------------------------------------------------

Network Footprinting----------------------------------------
1. Tracert (Windows Command line utility)
2. Traceroute (Linux Command line utility)
3. PintPlotter : https://www.pingplotter.com
4. Traceroute NG : https://www.solarwinds.com
------------------------------------------------------------

Email Footprinting------------------------------------------
1. Email Tracker PRO : https://emailtrackerpro.en.softonic.com
2. MX Toolbar : https://mxtoolbox.com
3. Social Catfish : https://socialcatfish.com
4. IP2Location : https://www.ip2location.com
------------------------------------------------------------

Other tools------------------------------------------------- 
1. Recon-ng : https://github.com/lanmaster53/recon-ng 
------------------------------------------------------------
PreviousApache2 ServerNextGHDB : Google Hacking Database

Last updated 5 months ago