Netlas.io is a non-intrusive internet scanner, whois, domain names & SSL certs database. The Netlas database contains information about all existing IP addresses, billions of domain names and SSL certificates, and stores hundreds of millions of host responses.
Compared to competitors, Netlas.io have some features. For example, user can search by the full response of the server, it follows up to 5 HTTP redirects while scanning and use various techniques, and product tags (more than 800).
Netlas.io might be a bit more popular than Social-Engineer Toolkit. We know about 2 links to it since March 2021 and only 2 links to Social-Engineer Toolkit. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.
There's programs out there to make these malicious PDFs, word documents, etc https://github.com/trustedsec/social-engineer-toolkit. Source: about 2 years ago
Social Engineer Toolkit (SET) - Open source pentesting framework designed for social engineering featuring a number of custom attack vectors to make believable attacks quickly. - Source: dev.to / over 3 years ago
To use this utility, you'll need a Netlas API key, which can be obtained from the Netlas website. After acquiring the API key, you can run the tool, specifying the target domain, port, and API key. Source: about 2 years ago
Https://netlas.io/ - Search and monitor devices connected to the internet. Source: over 2 years ago
ZoomEye - Network mapping service
Shodan - Shodan is the world's first search engine for Internet-connected devices.
Exploit Pack - Exploit Pack is an open source project security that will help you adapt exploit codes on-the-fly.
Censys - Censys helps organizations, individuals, and researchers find and monitor every server on the Internet to reduce exposure and improve security.
Cobalt Strike - Advanced threat tactics for penetration testers.
Armitage - Armitage makes penetration testing easy by adding a GUI to the Metasploit framework