Security Cipher

  1. Home
  2. Docs
  3. Security Resources
  4. Security Resources
  5. Search Engines for Hackers

Search Engines for Hackers

Here is a list of search engines that can be used by  Security Researchers.

Table Format

NameDescriptionURL
ShodanSearch for devices connected to the internethttps://www.shodan.io/
WayBackMachineView content from deleted websites or take a deep dive into the history of the webhttps://web.archive.org/
URL ScanFree service to scan and analyse websiteshttps://urlscan.io/
NetlasSearch and monitor internet connected assetshttps://netlas.io/
GreyNoiseSearch for devices connected to the internethttps://www.greynoise.io/
VirusTotalAnalyse suspicious files, domains, IPs, and URLs to detect malwarehttps://www.virustotal.com/gui/home/upload
WigleDatabase of wireless networks, with statistics https://www.wigle.net/
VulnersSearch for vulnerabilities in a large databasehttps://vulners.com/
Subdomain FinderA subdomain finder is a tool used to find the subdomains of a given domain.https://subdomainfinder.c99.nl/
ONYPHECollects cyber-threat intelligence datahttps://www.onyphe.io/
FullHuntSearch and discovery attack surfaceshttps://fullhunt.io/
GrepAppSearch across a half million git reposhttps://grep.app/
GreyHatWarfareSearch public S3 bucketshttps://grayhatwarfare.com/
AlienVaultOpen Threat Intelligence Communityhttps://otx.alienvault.com/
TinEyeReverse Image Searchhttps://tineye.com/
CRT shSearch for certs that have been logged by CThttps://crt.sh/
BinaryEdgeScans the internet for threat intelliegencehttps://www.binaryedge.io/
OSINT FrameworkOSINT (Open Source Intelligence) Framework website, some links don’t work anymore but it’s still a good website https://osintframework.com/
LeakIXSearch publicly indexed informationhttps://leakix.net/
Hunter.ioSearch for email addresses belonging to a websitehttps://hunter.io/
IntelligenceXSearch Tor, I2P, Data Leaks, Domains and Emailshttps://intelx.io/
DNSDumpsterDNS Recon & Research, Find & Lookup DNS Recordshttps://dnsdumpster.com/
ZoomEyeZoomeye uses maps to collect data and analyze fingerprints from open devices and web services. https://www.zoomeye.org/
DorkSearchYou can use DorkSearch to find prebuilt templates for different types of Google Dorks.https://dorksearch.com/
DehashedView leaked credentialshttps://www.dehashed.com/
0DAY.today?Find 0day exploits https://0day.today/
SecurityTrailsExtensive DNS datahttps://securitytrails.com/
PolySwarmScan files and URLs for threatshttps://polyswarm.io/
Criminal IPSearch for the information connected to the public internethttps://www.criminalip.io/
PublicWWWMarketing and affiliate marketing researchhttps://publicwww.com/
Phonebook.czPhonebook lists all domains, email addresses, or URLs for the given input domainhttps://phonebook.cz/
CensysAssessing attack surface for internet connected deviceshttps://search.censys.io/
FofaSearch for various threat intelligencehttps://en.fofa.info/
PulseDiveSearch for threat intelligencehttps://pulsedive.com/
CVEThe CVE website was created to identify, define, and catalog publicly disclosed cybersecurity vulnerabilitieshttps://cve.mitre.org/
ThreatcopsSINT (Open Source Intelligence) website, a good website for the osint base research it made special for the cops (Police) useshttps://threatcops.com/
SeachCodeA search engine that indexes and searches source code and documentation is searchcode.https://searchcode.com/
ExploitDBArchive of Various Exploitshttps://www.exploit-db.com/
FotoForensicswe can do the live image forensic onlinehttps://fotoforensics.com/
Packet Storm SecurityBrowse the latest vulnerabilities and exploits https://packetstormsecurity.com/

 

MindMap

Search Engines used by Hackers
Search Engines used by Hackers

Github

https://github.com/securitycipher/Bug-Bounty-Resources/blob/main/content/resources/Search%20engine.md

Leave a Reply