Pular para o conteúdo principal

Compartilhe

Airbnb

O Airbnb possui seu próprio sistema de cadastro interno. Porém, no momento do check-in, muitos anfitriões solicitam documentos e chegam a tirar fotos do hóspede segurando o documento.  O problema é que esses dados ficam armazenados diretamente no aparelho do anfitrião, sem qualquer garantia de proteção adequada. Essa prática levanta sérias dúvidas sobre a segurança da informação e a conformidade com a LGPD (Lei Geral de Proteção de Dados) . Além disso, há relatos de que dados pessoais são enviados para portarias de condomínios, ampliando ainda mais os riscos de exposição. O Airbnb precisa aprimorar urgentemente esse tipo de conduta, estabelecendo protocolos claros de proteção e armazenamento de dados. A ausência de respostas transparentes da empresa sobre o nível de segurança dessas práticas demonstra uma falha significativa na forma como a plataforma lida com informações sensíveis de seus usuários.

Top 30 Cybersecurity Search Engines

Top 30 Cybersecurity Search Engines

Himil

5 min read

Below I have created a list of 30 Cybersecurity Search Engines that everyone should know about it now in cyber world

This list is not in a specific order, mainly based on use/preference.

1— Shodan

Search for devices connected to the internet (Shodan Website Link)

Fig-1 Shodan

Shodan.io Website

2— Wigle

Database of wireless networks, with statistics (Wigle Website Link).

Fig-2 Wigle.net

Wigle.net Website

3 — GreyNoise

Search for devices connected to the internet (GreyNoise Website Link).

Fig-3 GreyNoise.io

GreyNoise.io Website

4 — VirusTotal

Analyse suspicious files, domains, IPs, and URLs to detect malware (VirusTotal Website Link)

Fig-4 Virustotal

VirusTotal.com Website

5— URL Scan

Free service to scan and analyse websites (URL Scan Website Link).

Fig-5 URLScan.io

URLScan.io Website

6 — Vulners

Search for vulnerabilities in a large database (Vulners Website Link).

Fig-6 Vulners.com

Vulners.com Website

7 — WayBackMachine

View content from deleted websites or take a deep dive into the history of the web (WayBackMachine Website Link) [741 billion websites archived].

Fig-7 web.archive.org

web.archive.org Website

8 — Netlas

Search and monitor internet connected assets (Netlas Website Link).

Fig-8 Netlas.io

Netlas.io Website

9 — ONYPHE

Collects cyber-threat intelligence data (ONYPHE Website Link).

Fig-9 Onyphe.io

ONYPHE.io Website

10 — FullHunt

Search and discovery attack surfaces (FullHunt Website Link).

Fig-10 FullHunt.io

FullHunt.io Website

11 — GrepApp

Search across a half million git repos (GrepApp Website Link).

Fig-11 Grep.app

Grep.app Website

12 — CRT sh

Search for certs that have been logged by CT (CRT sh Website Link).

Fig-12 Crt.sh

crt.sh Website

13 — GreyHatWarfare

Search public S3 buckets (GreyHatWarfare Website Link).

Fig-13 GreyHatWarefare.com

GreyHatWarfare.com Website

14 — AlienVault

Open Threat Intelligence Community (AlienVault Website Link).

Fig-14 Oxt.alienvanult.com

oxt.alienvault.com Website

15 — BinaryEdge

Scans the internet for threat intelliegence (BinaryEdge Website Link)

Fig-15 Binaryedge.io

binaryedge.io Website

16 — TinEye

Reverse Image Search (TinEye Website Link).

Tineye.com

tineye.com Website

17 — OSINT Framework

OSINT (Open Source Intelligence) Framework website, some links don’t work anymore but it’s still a good website (OSINT Framework Website Link).

Fig-17 Osintframework.com

osintframework.com Website

18 — Hunter.io

Search for email addresses belonging to a website (Hunter.io Website Link).

Fig-18 Hunter.io

hunter.io Website

19— LeakIX

Search publicly indexed information (LeakIX Website Link).

Fig-19 Leakix.net

leakix.net Website

20— IntelligenceX

Search Tor, I2P, Data Leaks, Domains and Emails (IntelligenceX Website Link).

Fig-20 Intelx.io

intelx.io Website

21 — DNSDumpster

DNS Recon & Research, Find & Lookup DNS Records (DNSDumpster Website Link).

Fig-21 Dnsdumppster.com

dnsdumpster.com Website

22— ExploitDB

Archive of Various Exploits (ExploitDB Website Link).

Fig-22 ExploitDB

exploit-db.com Website

23 — CVE

The CVE website was created to identify, define, and catalog publicly disclosed cybersecurity vulnerabilities (CVE Website Link).

Fig-23 Cve.mitre.org

cve.mitre.org Website

24 — PulseDive

Search for threat intelligence (PulseDive Website Link).

Fig-24 Pulsedive.com

pulsedive.com Website

25 — Packet Storm Security

Browse latest vulnerabilities and exploits (Packet Storm Security Website Link).

Fig-25 Packetstormsecurity.com

packetstormsecurity.com Website

26 — Threatcops

OSINT (Open Source Intelligence) website, a good website for the osint base research it made special for the cops (Police) uses (OSINT Framework Website Link).

Fig-26 Threatcops.com

threatcops.com website

27— SeachCode

A search engine that indexes and searches source code and documentation is searchcode.

Fig-27 Searchcode

Searchcode Website

28 — FotoForensics

we can do the live image forensic online

Fig-28 FotoForensics

FotoForensics Website

29 — ZoomEye: Gather informationabout tragets

A search engine developed by Chinese company Knownsec Inc., Zoomeye uses maps to collect data and analyze fingerprints from open devices and web services. Its first version was released in 2013.

Fig-29 Zoomeye

Zoomeye Website

30 DorkSearch: Really fast Google Dorking

You can use DorkSearch to find prebuilt templates for different types of Google Dorks.

Google DorkSearch Engine Website

Comentários

Como usar um Agente OSINT IA

Pericia Digital

Ebook

Postagens mais visitadas