Shodan | Shodan is the world's first search engine for Internet-connected devices . Discover how Internet intelligence can help you make better decisions |
http://shodan.io/ |
Wigle | WiGLE (or Wireless Geographic Logging Engine ) is a website for collecting information about the different wireless hotspots around the world. |
https://wigle.net/ |
Grep | Search across a half million git repos.Codes Search from github | https://grep.app/ |
Binaryedge | Threat Intelligence) | https://app.binaryedge.io/ |
ONYPHE | ONYPHE is a Cyber Defense Search Engine for open-source and cyber threat intelligence data collected by crawling various sources available on the Internet or by listening to Internet background noise. ONYPHE does correlate this information with data gathered by performing active Internet scanning for connected devices and also by crawling Web site URLs. It then normalizes information and makes it available via an API and its query language | https://www.onyphe.io/ |
Greynoice | collect, analyze, and label data on IPs that scan the internet and saturate security tools with noise. This unique perspective helps analysts waste less time on irrelevant or harmless activity, and spend more time focused on targeted and emerging threats. | https://viz.greynoise.io/ |
Censys | Hacker Search Engine | https://search.censys.io/ |
hunter | Hunting Email Address | https://hunter.io/ |
fofa | Threat intelligence | https://fofa.info/ |
zoomeye | Threat intelligence | https://www.zoomeye.org/ |
LeakIX | LeakIX is the first platform combining a search engine indexing public information AND an open reporting platform linked to the results. |
https://leakix.net/ |
intelx | OSINT | https://intelx.io/ |
Search code | Helping you find real-world examples of functions, API and libraries in 243 languages across 10+ public code sources | https://searchcode.com/ |
urlscan | A sandbox for the web | https://urlscan.io/ |
fullhunt | Attack Surface Intelligence, done right. We Define Modern Attack Surface Management |
https://fullhunt.io/ |
socradar | Find deep web report | https://socradar.io/ |
Binaryedge | We have built a distributed platform of scanners and honeypots, to acquire, classify and correlate different types of data. We use all of these datapoints to match those digital assets to an organization, allowing us to provide a global, up-to-date, view of organizations known and unknown assets. |
https://binaryedge.io/ |
ivre | Network recon framework | https://ivre.rocks/ |
CRT | Crt.sh is a site where you could find all the SSL or TLS certificates of the particular targeted domain | https://crt.sh/ |
Vulners | Your Search Engine for Security Intelligence |
https://vulners.com/ |
pulsedrive | Threat intelligence | https://pulsedive.com/ |
dehashed | Monitor hacker activity in real-time to prevent account takeover attacks using compromised credentials. | https://www.dehashed.com/ |
securitytrails | Extensive DNS data | https://securitytrails.com/ |
dorksearch | Really fast Google Dorking | https://dorksearch.com/ |
exploitdb | Archive of various exploits. | https://www.exploit-db.com/ |
zoomeye | Gather information about targets | https://www.zoomeye.org/ |
grayhatwarfare | Search public S3 buckets | https://grayhatwarfare.com/ |
polyswarm | Scan files and URLs for threats. | https://polyswarm.io/ |
dnsdumpster | Search for DNS records quickly. | https://dnsdumpster.com/ |
netlas | Search and monitor internet-connected assets | https://netlas.io/ |
packet | Browse latest vulnerabilities and exploits. | https://packetstormsecurity.com/ |
packettotal | Online PCAP analysis tool | https://packettotal.com/ |
apackets | Online PCAP analysis tool | https://apackets.com/ |
archive | Find web archive data | https://web.archive.org/ |
archive | it takes a 'snapshot' of a webpage that will always be online even if the original page disappears. It saves a text and a graphical copy of the page for better accuracy and provides a short and reliable link to an unalterable record of any web page |
https://archive.ph/ |
cachedpages | Cached pages are usually saved and stored by large companies with powerful web servers. Since such servers are usually very fast, a cached page can often be accessed faster than the live page itself | http://www.cachedpages.com/ |
store website | View cached web pages/website | https://stored.website/ |
commoncrawl | build and maintain an open repository of web crawl data that can be accessed and analyzed by anyone |
https://commoncrawl.org/ |
snyk | Fix your vulnerability automatically | https://snyk.io/ |
files | Malicious file extension used by hacker | https://filesec.io/# |
PhoneBook: https://phonebook.cz/
IntelligenceX: https://intelx.io/
RocketReach: https://rocketreach.co/
Email Format: https://www.email-format.com/
EmailHippo: https://tools.emailhippo.com/
Verify Email: https://verify-email.org/
VoilaNorbert: https://www.voilanorbert.com/
SynapsInt: https://synapsint.com/
Skymem: http://www.skymem.info/
Finds Emails: https://www.findemails.com/
Experte email finder: https://www.experte.com/email-finder
EmailSherlock: https://www.emailsherlock.com/
Anymail Finder: https://anymailfinder.com/
Tomba: https://tomba.io/