ABCDEFGHIJKLMNOPQRSTUVWXYZ
1
Search Engines for Cybersecurity Researchers
2
ABCDEFGHI
3
1Search Engines for Cybersecurity Researchers
4
2
5
3AddressDescriptionAPI
6
4https://www.dehashed.com/View leaked credentialsYES
7
5https://www.exploit-db.com/Archive of various exploitsYES
8
6https://pulsedive.com/Search for threat intelligenceYES
9
7https://otx.alienvault.com/Extensive threat intelligence feedYES
10
8https://securitytrails.com/Extensive DNS dataYES
11
9https://www.zoomeye.org/Gather information about targetsYES
12
10https://buckets.grayhatwarfare.com/Search public S3 bucketsYES
13
11https://grep.app/Search across a half million git reposNO
14
12https://crt.sh/Search for certs that have been logged by CTYES
15
13https://dorksearch.com/Really fast Google dorkingNO
16
14https://polyswarm.io/Scan files and URLs for threatsYES
17
15https://leakix.net/Search publicly indexed informationYES
18
16https://fullhunt.io/Search and discovery attack surfacesYES
19
17https://www.onyphe.io/Collects cyber-threat intelligence dataYES
20
18https://www.shodan.io/Search for devices connected to the internetYES
21
19https://www.binaryedge.io/Scans the internet for threat intelligenceYES
22
20https://vulners.com/Search vulnerabilities in a large databaseYES
23
21https://dnsdumpster.com/Search for DNS records quicklyYES
24
22https://searchcode.com/Search 75 billion lines of code from 40 million projectsYES
25
23https://hunter.io/Search for email addresses belonging to a websiteYES
26
24https://www.wigle.net/Database of wireless networks, with statisticsYES
27
25https://publicwww.com/Marketing and affiliate marketing researchYES
28
26https://censys.io/Assessing attack surface for internet connected devicesYES
29
27https://netlas.io/Search and monitor internet connected assetsYES
30
28https://fofa.info/Search for various threat intelligenceYES
31
29https://archive.org/View content from deleted websitesYES
32
30https://www.greynoise.io/Search for devices connected to the internetYES
33
31https://intelx.io/Search Tor, I2P, data leaks, domains, and emailsYES
34
32https://urlscan.io/Free service to scan and analyse websitesYES
35
33https://packetstormsecurity.com/Browse latest vulnerabilities and exploitsNO
36
34https://cse.google.com/cse?cx=006368593537057042503:efxu7xprihg#gsc.tab=0Telegram Search EngineNO
37
35https://lyzem.com/Telegram Search EngineYES
38
36https://tgstat.ru/en/Telegram Search EngineYES
39
37https://findadiscord.com/Discord Search EngineNO
40
38https://discordservers.com/Discord Search EngineYES
41
39https://osintframework.com/OSINT Every ThingsNO
42
40https://exploit-notes.hdks.org/Search hacking techniques and tools for penetration testings, bug bounty, CTFNO
43
41https://hunter.how/Which capable of performing fingerprint retrieval of internet-connected devices and servicesYES
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100