30 Cybersecurity Search Engines for Researchers
2 minute read
Checked Daniel Kelley’s twitter at https://twitter.com/danielmakelley. So I saw his 30 cybersecurity search engines tweets, thought it was really cool. I figured "I better record this for my own info", and what better way than to make it more widely available. This is just a reposting of his tweet, expanded to the URLs I found as of today. All hail Daniel Kelley, the true contributor of the valuable info below. Check out his twitter account, it’s useful and he has a weekly newsletter that you should sign up for, probably.
- Dehashed—View leaked credentials.
https://www.dehashed.com/ - SecurityTrails—Extensive DNS data.
https://securitytrails.com/ - DorkSearch—Really fast Google dorking.
https://dorksearch.com/ - ExploitDB—Archive of various exploits.
https://www.exploit-db.com/ - ZoomEye—Gather information about targets.
https://www.zoomeye.org/ - Pulsedive—Search for threat intelligence.
https://pulsedive.com/ - GrayhatWarfare—Search public S3 buckets.
https://buckets.grayhatwarfare.com/ - PolySwarm—Scan files and URLs for threats.
https://polyswarm.network/ - Fofa—Search for various threat intelligence.
https://fofa.info/ - LeakIX—Search publicly indexed information.
https://leakix.net/ - DNSDumpster—Search for DNS records quickly.
https://dnsdumpster.com/ - FullHunt—Search and discovery attack surfaces.
https://fullhunt.io/ - AlienVault—Extensive threat intelligence feed.
https://otx.alienvault.com/ - ONYPHE—Collects cyber-threat intelligence data.
https://www.onyphe.io/ - Grep App—Search across a half million git repos.
https://grep.app/ - URL Scan—Free service to scan and analyse websites.
https://urlscan.io/ - Vulners—Search vulnerabilities in a large database.
https://vulners.com/ - WayBackMachine—View content from deleted websites.
https://archive.org/web/ - Shodan—Search for devices connected to the internet.
https://www.shodan.io/ - Netlas—Search and monitor internet connected assets.
https://app.netlas.io/host/ - CRT sh—Search for certs that have been logged by CT.
https://crt.sh/ - Wigle—Database of wireless networks, with statistics.
https://www.wigle.net/ - PublicWWW—Marketing and affiliate marketing research.
https://publicwww.com/ - Binary Edge—Scans the internet for threat intelligence.
https://app.binaryedge.io/login - GreyNoise—Search for devices connected to the internet.
https://viz.greynoise.io/ - Hunter—Search for email addresses belonging to a website.
https://hunter.io/ - Censys—Assessing attack surface for internet connected devices.
https://search.censys.io/ - IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
https://intelx.io/ - Packet Storm Security—Browse latest vulnerabilities and exploits.
https://packetstormsecurity.com/ - SearchCode—Search 75 billion lines of code from 40 million projects.
https://searchcode.com/
I feedback.
Let me know what you think of this article on twitter @cpardue09 or leave a comment below!
Let me know what you think of this article on twitter @cpardue09 or leave a comment below!
comments powered by Disqus