Phenomenati
Phenomenati
  • Home
  • Phenomena
    • Predictions from 1998
    • Cyber Entropy™
    • The Cyber Reckoning
    • Risk Discipline
    • InfoSec Maturity Model
    • The 5 What Imperatives™
    • The Decisive SOC
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • Analytics
    • Incident Response
    • DFIR Resources
  • More
    • Home
    • Phenomena
      • Predictions from 1998
      • Cyber Entropy™
      • The Cyber Reckoning
      • Risk Discipline
      • InfoSec Maturity Model
      • The 5 What Imperatives™
      • The Decisive SOC
      • A SOC Taxonomy
    • Services
      • Cyber101 for the Board
      • Cyber Risk Assessments
      • Cyber ShadowBreaker™
      • Cybersecurity Strategy
      • Cybersecurity Design
      • Risk Level Agreements
      • SecOps Communications
      • Case Studies
    • Partners
      • Technology Vendors
      • Service Providers
    • About
      • Leadership
      • Contact Us
    • Resource Center
      • Frameworks, Standards
      • Threat Intel & Dashboards
      • Cyber Reconnaissance
      • Vulnerability Management
      • Scanning & Pen Testing
      • Monitoring, IDS, SIEM
      • Analytics
      • Incident Response
      • DFIR Resources
  • Home
  • Phenomena
    • Predictions from 1998
    • Cyber Entropy™
    • The Cyber Reckoning
    • Risk Discipline
    • InfoSec Maturity Model
    • The 5 What Imperatives™
    • The Decisive SOC
    • A SOC Taxonomy
  • Services
    • Cyber101 for the Board
    • Cyber Risk Assessments
    • Cyber ShadowBreaker™
    • Cybersecurity Strategy
    • Cybersecurity Design
    • Risk Level Agreements
    • SecOps Communications
    • Case Studies
  • Partners
    • Technology Vendors
    • Service Providers
  • About
    • Leadership
    • Contact Us
  • Resource Center
    • Frameworks, Standards
    • Threat Intel & Dashboards
    • Cyber Reconnaissance
    • Vulnerability Management
    • Scanning & Pen Testing
    • Monitoring, IDS, SIEM
    • Analytics
    • Incident Response
    • DFIR Resources

Resource Center

A collection of useful Resources for Cyber Security Operations practitioners, or those building/evolving a SOC.

Cyber Reconnaissance

Shodan Search Engine

Censys

Fierce DNS Recon

mnemonic DNS Recon

Google Hacking Database (GHDB)

theHarvester Recon

BuiltWith Website Recon

WP Theme Check Website Recon

Wappalyzer Website Recon

Fingerprinting Orgs (FOCA)

Find Usernames on Social Networks

BeenVerified Public Record Search

have i been pwned?

The Internet map

Map of the Internet

CAIDA tools

Copyright © 2023 Phenomenati - All Rights Reserved.


This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept