Loading...
Blog Post Image

Best Search Engine for Hackers

Shodan Shodan is the world's first search engine for Internet-connected devices
. Discover how Internet intelligence can help you make better decisions
http://shodan.io/
Wigle WiGLE (or Wireless Geographic Logging Engine
) is a website for collecting information about the different wireless hotspots around the world.
https://wigle.net/
Grep Search across a half million git repos.Codes Search from github https://grep.app/
Binaryedge Threat Intelligence) https://app.binaryedge.io/
ONYPHE ONYPHE is a Cyber Defense Search Engine for open-source and cyber threat intelligence data collected by crawling various sources available on the Internet or by listening to Internet background noise. ONYPHE does correlate this information with data gathered by performing active Internet scanning for connected devices and also by crawling Web site URLs. It then normalizes information and makes it available via an API and its query language https://www.onyphe.io/
Greynoice collect, analyze, and label data on IPs that scan the internet and saturate security tools with noise. This unique perspective helps analysts waste less time on irrelevant or harmless activity, and spend more time focused on targeted and emerging threats. https://viz.greynoise.io/
Censys Hacker Search Engine https://search.censys.io/
hunter Hunting Email Address https://hunter.io/
fofa Threat intelligence https://fofa.info/
zoomeye Threat intelligence https://www.zoomeye.org/
LeakIX LeakIX is the first platform combining a search engine indexing public information
 AND an 
open reporting platform
 linked to the results.
https://leakix.net/
intelx OSINT https://intelx.io/
Search code Helping you find real-world examples of functions, API and libraries in 243 languages across 10+ public code sources https://searchcode.com/
urlscan A sandbox for the web https://urlscan.io/
fullhunt Attack Surface Intelligence,
done right.
We Define Modern Attack Surface Management
https://fullhunt.io/
socradar Find deep web report https://socradar.io/
Binaryedge We have built a distributed platform of scanners and honeypots, to acquire, classify and correlate different types of data.
We use all of these datapoints to match those digital assets to an organization, allowing us to provide a global, up-to-date, view of organizations known and unknown assets.
https://binaryedge.io/
ivre Network recon framework https://ivre.rocks/
CRT Crt.sh is a site where you could find all the SSL or TLS certificates of the particular targeted domain https://crt.sh/
Vulners Your Search Engine
for Security Intelligence
https://vulners.com/
pulsedrive Threat intelligence https://pulsedive.com/
dehashed Monitor hacker activity in real-time to prevent account takeover attacks using compromised credentials. https://www.dehashed.com/
securitytrails Extensive DNS data https://securitytrails.com/
dorksearch Really fast Google Dorking https://dorksearch.com/
exploitdb Archive of various exploits. https://www.exploit-db.com/
zoomeye Gather information about targets https://www.zoomeye.org/
grayhatwarfare Search public S3 buckets https://grayhatwarfare.com/
polyswarm Scan files and URLs for threats. https://polyswarm.io/
dnsdumpster Search for DNS records quickly. https://dnsdumpster.com/
netlas Search and monitor internet-connected assets https://netlas.io/
packet Browse latest vulnerabilities and exploits. https://packetstormsecurity.com/
packettotal Online PCAP analysis tool https://packettotal.com/
apackets Online PCAP analysis tool https://apackets.com/
archive Find web archive data https://web.archive.org/
archive it takes a 'snapshot' of a webpage that will always be online even if the original page disappears.
It saves a text and a graphical copy of the page for better accuracy
and provides a short and reliable link to an unalterable record of any web page
https://archive.ph/
cachedpages Cached pages are usually saved and stored by large companies with powerful web servers. Since such servers are usually very fast, a cached page can often be accessed faster than the live page itself http://www.cachedpages.com/
store website View cached web pages/website https://stored.website/
commoncrawl build and maintain an open repository of 
web crawl data
 that can be 
accessed and analyzed by anyone
https://commoncrawl.org/
snyk Fix your vulnerability automatically https://snyk.io/
files Malicious file extension used by hacker https://filesec.io/#

PhoneBook: https://phonebook.cz/

IntelligenceX: https://intelx.io/

RocketReach: https://rocketreach.co/

Email Format: https://www.email-format.com/

EmailHippo: https://tools.emailhippo.com/

Verify Email: https://verify-email.org/

VoilaNorbert: https://www.voilanorbert.com/

SynapsInt: https://synapsint.com/

Skymem: http://www.skymem.info/

Finds Emails: https://www.findemails.com/

Experte email finder: https://www.experte.com/email-finder

EmailSherlock: https://www.emailsherlock.com/

Anymail Finder: https://anymailfinder.com/

Tomba: https://tomba.io/