Essential Websites Every Hacker Should Know
A curated list of websites every hacker, pentester, or security enthusiast should know. Organized by category with short descriptions and suggested usage.
Essential Websites Every Hacker Should Know
Essential Websites Every Hacker Should Know
A curated list of websites every hacker, pentester, or security enthusiast should know. Organized by category with short descriptions and suggested usage.
π΅οΈ OSINT & Recon
- OSINT Framework β Collection of OSINT tools organized by category. Use for: emails, domains, social profiles, metadata.
- Shodan β Search engine for internet-connected devices. Use for: finding exposed devices/services.
- Censys β Search engine for certificates and hosts. Use for: discovering vulnerable infrastructure.
- Grep.app β Search across millions of open-source code repositories quickly.
- Have I Been Pwned β Breach data lookup. Use for: checking email/domain compromises.
- Hunter.io β Email discovery. Use for: recon on valid emails.
- crt.sh β SSL certificate transparency logs. Use for: finding subdomains.
- Ping.eu β Online tools for ping, traceroute, whois, DNS lookups, and more.
- DNSDumpster β DNS mapping. Use for: subdomains, MX records, IP ranges.
- Social Searcher β Search mentions across social media. Use for: usernames, activity tracking.
- Web Archive / Wayback Machine β Archived website versions. Use for: old endpoints, leaks.
- LeakIX β Exposed servers/devices. Use for: discovering leaks.
- FOFA β Internet asset search. Use for: ports, devices, services.
- Am I Unique? β Analyze your browser fingerprint and see how trackable you are.
- Cover Your Tracks (EFF) β Test how well your browser and privacy setup protect against tracking.
- TruePeopleSearch β People search engine. Use for: public personal info.
- FastPeopleSearch β Alternative people lookup. Use for: addresses, phone numbers.
- GreyNoise β Noise analysis. Use for: filtering harmless vs malicious IPs.
- Netlas Host Search β Network asset search. Use for: IP/domain recon.
- TinEye β Reverse image search. Use for: image origins.
- PimEyes β Facial recognition search. Use for: person image lookup.
- Redirect Checker β Trace URL redirects. Use for: identifying hidden jumps in redirects.
- WhereGoes β Visualize redirect chains. Use for: seeing full URL redirection flow.
- HTTP Status Checker β Inspect HTTP codes and headers. Use for: debugging web requests and redirects.
- Unshorten.It β Expand shortened URLs. Use for: revealing hidden destinations.
- BGPView β BGP and ASN lookup. Use for: investigating network ranges.
- Satellite Map β Satellite imagery to explore the globe, useful for OSINT investigations.
- EarthCam β Live streaming webcams from around the world, often leveraged in OSINT.
- Route Views β Access live BGP routing table data for network reconnaissance.
- Hurricane Electric BGP β BGP routing and prefix search. Use for: network-level recon.
- IPVoid β IP reputation checker. Use for: analyzing IPs for blacklists or malicious history.
- AbuseIPDB β IP abuse reporting database. Use for: checking if an IP is reported for attacks.
- NSLookup.io β DNS record lookup. Use for: inspecting DNS configuration.
- WebStatsDomain β Domain stats and metadata
- Dnschecker β Global DNS propagation checks
- PortChecker.io β Check open ports on your network or a remote host. Use for: quick port scanning and network accessibility testing.
β£οΈ Malware & Threat Analysis
- VirusTotal β Scan files, URLs, and domains. Use for: malware detection.
- Hybrid Analysis β Online malware sandbox. Use for: suspicious file analysis.
- Any.run β Interactive malware analysis. Use for: live malware behavior tracking.
- MalwareBazaar β Malware samples repo. Use for: researching malware families.
- CyberChef β Data analysis toolkit. Use for: encode/decode, hash, manipulate data.
- URLScan β URL isolation & scanning. Use for: phishing/malware site detection.
- BrowserLeaks β Test browser leaks/fingerprints. Use for: privacy & recon.
- Sucuri SiteCheck β Website scanner. Use for: infections, vulnerabilities.
- Web-Check.xyz β Website reputation check. Use for: security overview.
π Passwords & Hashes
- CrackStation β Password hash cracking. Use for: recovering plain-text passwords.
- MD5Decrypt β Hash decryption. Use for: MD5, SHA1 lookups.
- Hashes.com β Online hash cracking. Use for: multiple hash types.
π£ Vulnerability & Exploit Research
- Exploit-DB β Exploit database. Use for: public PoCs.
- CVE Details β CVE database. Use for: software/vendor vulnerabilities.
- NVD β Official CVE database. Use for: CVE lookups, scoring.
- Packet Storm Security β Exploits, advisories, tools. Use for: PoCs & security research.
- Pentest Tools Website Scanner β Web vuln scanner. Use for: quick online scans.
π Recon & Infrastructure Info
- IPinfo β IP & ASN lookup. Use for: mapping network infrastructure.
- ZoomEye β IoT/device search engine. Use for: exposed services.
- JWT Auditor β JWT inspection. Use for: token misconfig checks.
- JWT Lens β JWT analyzer. Use for: quick token decoding.
βοΈ Reverse Shells & Exploitation
- Reverse Shells β Reverse shell generator. Use for: payload creation.
- GTFOBins β Unix privilege escalation tricks. Use for: post-exploitation.
- LOLBAS β Windows binaries abuse. Use for: Windows privilege escalation.
- Linux Smart Enumeration β Linux enum script. Use for: privilege escalation recon.
- PEASS-ng β Privilege escalation tools. Use for: Linux/Windows post-exploitation.
π Phishing & Privacy
- PhishTank β Phishing database. Use for: URL phishing checks.
- Boostfluence Instagram Viewer β Anonymous Instagram viewing. Use for: social OSINT.
- Temp-Mail β Disposable emails. Use for: anon registrations.
- SMS24 β Temporary phone numbers. Use for: SMS verification bypass.
- Globfone β Free online SMS, calls, and file sharing. Use for: temporary messaging, anonymous communication.
π Hacking & Security References
- HackTricks β Hacking techniques & cheatsheets. Use for: pentest guidance.
- 0xdfβs Blog β High-quality HTB & CTF writeups
- Awesome-Hacking β Massive collection of hacking tools and resources.
- awesome-bug-bounty β Curated list of bug bounty resources.
- TBHM β The Bug Hunterβs Methodology (Jason Haddix).
- pwnhub β A growing collection of hacking writeups, scripts, and resources.
- Awesome Red Team Cheatsheet β A massive collection of red team tactics, tools, and references.
- Ghostpack Compiled Binaries β Precompiled Ghostpack binaries useful for red team operations.
- HackerTyper β Fun website to βlook likeβ youβre coding like a hacker.
- Hacker News β Daily tech, security, and startup news.
- The Hacker Recipes β A comprehensive knowledge base of offensive security techniques, tactics, and playbooks.
- 0day.today β Exploit and vulnerability database.
- HackerRepo β Curated repository of hacking and security resources.
- SQLi Pentest Toolkit β SQL Injection exploitation utilities
- LostSec β A great collection of offensive security knowledge and techniques.
- KC7 Cyber β Cybersecurity wargame for students
- Codingame β Solve programming puzzles and compete through gamified coding challenges.
- Microcorruption β A gamified reverse engineering CTF with embedded systems focus.
- Crackmes.one β A huge archive of crackmes to train your reverse engineering and binary exploitation skills.
- PayloadsAllTheThings β Attack payloads collection. Use for: XSS, SQLi, LFI, RCE.
- Bug Bounty Cheatsheet β Bug bounty methodology. Use for: hunting workflow.
- IntelX β Leak search engine. Use for: leaked docs, emails, creds.
- Notes by Ben Heater β Security notes repo. Use for: learning material.
- Patorjk.com β Text & ASCII utilities. Use for: ASCII art, text manipulation.
π°οΈ Threat Modeling & Frameworks
- MITRE ATT&CK β Knowledge base of adversary TTPs. Use for: detection, attack mapping.
π OSINT GitHub Repositories
- Telegram OSINT
- Data Acquisition OSINT
- Social Media OSINT
- Website OSINT
- People OSINT
- Geo-Location OSINT
- Image OSINT
- Email Username OSINT
- YouTube Video OSINT
- GitHub OSINT Resources
- OSINT Peripherals
- OSINT Practitioners
π Search Tools & Techniques
π― Specific OSINT Areas
π‘οΈ Privacy & OPSEC
π Dark Web Resources β οΈ
β οΈ Warning: Requires Tor Browser. Use only for legal OSINT & research.
- The Hidden Wiki
- Onion Wiki Mirror
- Onion Links Archive
- ProPublica Onion
- Sci-Hub Onion
- Dark Web Q&A
- Library Genesis Onion
- Facebook Onion
- Archive.org Onion
- CIA Onion
Tip:Bookmark and organize these resources by category. Always use them ethically in labs, CTFs, or authorized pentests only.
This post is licensed under CC BY 4.0 by the author.