232 Followers
170 Following
433 Posts

Interested in cybersecurity, Linux, front end web development and technology in general. 
Privacy advocate. I love free open source software.

Father of 3. 
 
I also enjoy video games, movies, collectible card games like Magic the Gathering, Star Trek, and reading. 

#cybersecurity #Linux #technology #privacy #videogames #magicthegathering #startrek #movies #reading #FOSS #mentalhealth #learning #webdevelopment

Tools I use::linux: :linuxmint: :firefox: :html5: :css3: :python: :microsoft: :apple_inc:
Things I like::cupofcoffee:
Website:coming soon
Profile Pic by:Sam Yang

30 cybersecurity search engines for researchers:

1. Dehashed — View leaked credentials.
2. SecurityTrails — Extensive DNS data.
3. DorkSearch — Really fast Google dorking.
4. ExploitDB — Archive of various exploits.
5. ZoomEye — Gather information about targets
6. Pulsedive — Search for threat intelligence.
7. GrayHatWarfare — Search public S3 buckets.
8. PolySwarm — Scan files and URLs for threats.
9. Fofa — Search for various threat intelligence.
10. LeakIX — Search publicly indexed information.
11. DNSDumpster — Search for DNS records quickly.
12. FullHunt — Search and discovery attack surfaces.
13. AlienVault — Extensive threat intelligence feed.
14. ONYPHE — Collects cyber-threat intelligence data.
15. Grep App — Search across a half million git repos.
16. URL Scan — Free service to scan and analyse websites.
17. Vulners — Search vulnerabilities in a large database.
18. WayBackMachine — View content from deleted websites.
19. Shodan — Search for devices connected to the internet.
20. Netlas — Search and monitor internet connected assets.
21. CRT.sh — Search for certs that have been logged by CT.
22. Wigle — Database of wireless networks, with statistics.
23. PublicWWW — Marketing and affiliate marketing research.
24. Binary Edge — Scans the internet for threat intelligence.
25. GreyNoise — Search for devices connected to the internet.
26. Hunter — Search for email addresses belonging to a website.
27. Censys — Assessing attack surface for internet connected devices.
28. IntelligenceX — Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security — Browse latest vulnerabilities and exploits.
30. SearchCode — Search 75 billion lines of code from 40 million projects.

credit: https://twitter.com/danielmakelley/status/1604838895962800128

#cybersecurity #infosec #informationsecurity #searchengine #dehashed #shodan

Daniel Kelley on Twitter

“30 cybersecurity search engines for researchers: 1. Dehashed—View leaked credentials. 2. SecurityTrails—Extensive DNS data. 3. DorkSearch—Really fast Google dorking. 4. ExploitDB—Archive of various exploits. 5. ZoomEye—Gather information about targets.”

Twitter
I finally got around to starting the ‘first’ god of war on ps4. So sorry I waited this long. #videogames
Can someone from 2023 tell me if it’s any good?
I hope that you all are having a great holiday season. For those that are struggling or find themselves in a difficult situation I sincerely hope the new year brings you peace and freedom and that things improve. ❤️
If you haven’t tried vampire survivors on Xbox game pass yet, I highly recommend. Old school graphics and surprisingly addictive gameplay. It’s simplistic fun! #videogames
Do people watch pre-recorded let’s play videos still? I’m legit curious. #videogames
I know we call them breakfast cereals, but really they ought to be called nighttime snack cereals. #randomthought #itjustpoppedinthere
Who wants a bag? LOL. #SpellingMatters
I’m not sure why, but, every post with #JohnMastodon in it seems to explode.

A spectacular sight 1225m (4019 ft) beneath the waves off Baja California as E/V Nautilus encounters the amazing Halitrephes maasi jelly.

Full video: https://www.youtube.com/watch?v=9D0eyl7-XQA

#ocean #nature #science

A Burst of Deep Sea Fireworks: Halitrephes Jelly | Nautilus Live

YouTube