Censys and LeakIX are a couple options, both providing search capabilities without registering and a bit more functionality upon free registration:
Censys.io example: https://search.censys.io – ‘ip: [10.1.0.129 to 10.1.0.140]’ or ‘ip: 10.1.0.128/25’
Example IP Range Search on Censys
LeakIX.net example: https://leakix.net “Service” – ip:”10.1.0.128
... See moreBHIS • OSINT for Incident Response
HACKING: What EVERY Beginner Needs to Know (Penetration Testing, Basic Security, Wireless Hacking, Ethical Hacking, Programming Book 1)
amazon.com
cipher387/osint_stuff_tool_collection: A collection of ... - GitHub
github.com
Mostly, they seek out vulnerabilities, detect attacks, and eliminate compromises. Of course, the size of the attack surface and the sheer volume of vulnerabilities, attacks, and compromises means organizations must make tough choices; not everything gets fixed, stopped, recovered, and so forth. There will need to be some form of acceptable (tolerab
... See moreStuart McClure • How to Measure Anything in Cybersecurity Risk
Vercel Security Checkpoint
v0.dev
