30 Cybersecurity Search Engines
- Dehashed: A search engine for leaked credentials or exposed data from breaches.
- Security Trails: A tool for analyzing DNS data and tracking a domain’s DNS history.
- DorkSearch: Uses Google Dorking techniques to find sensitive information on the internet.
- ExploitDB: A database of known security exploits for vulnerability analysis.
- ZoomEye: Provides information on internet-connected devices and services.
- Pulsedive: A platform for gathering and analyzing cyber threat intelligence.
- GrayHatWarfare: A search engine for publicly exposed S3 buckets.
- PolySwarm: A tool for scanning files and URLs to detect threats.
- Fofa: A threat intelligence platform for identifying assets and vulnerabilities.
- LeakIX: A search engine for publicly exposed data from web servers.
- DNSDumpster: A DNS reconnaissance tool for identifying subdomains and risks.
- FullHunt: A tool for mapping attack surfaces and identifying vulnerable systems.
- AlienVault: A platform for detecting malicious cyber activities.
- Onyphe: A threat intelligence tool gathering data from various sources.
- Grep App: A search engine for finding specific code in Git repositories.
- URL Scan: A tool for scanning and analyzing website security.
- Vulners: A vulnerability database for analyzing known security threats.
- WayBackMachine: An internet archive storing historical versions of websites.
- Shodan: A search engine for internet-connected devices like servers and webcams.
- Netlas: A platform for discovering devices and services on the internet.
- CRT.sh: A search engine for SSL certificates to find domain-related information.
- Wigle: A wireless networks database for locating Wi-Fi networks geographically.
- PublicWWW: A search engine for HTML and JavaScript content, often used for research.
- Binary Edge: A threat intelligence tool mapping connected devices and open data.
- GreyNoise: Detects and filters harmful internet activity to reduce noise.
- Hunter: A tool to find email addresses and contact information for domains.
- Censys: A platform for scanning internet-connected devices and assessing security.
- IntelligenceX: A search engine for leaked data from Tor, I2P, and other sources.
- Packet Storm: A resource for security exploits and vulnerability information.
- SearchCode: A search engine for finding specific source code in various projects.
https://www.linkedin.com/company/ethical-hacks-academy/posts?lipi=urn%3Ali%3Apage%3Ad_flagship3_detail_base%3BWnXso4KSSiiRGf4EMMBVwQ%3D%3D