Search Engines Resources: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(3 intermediate revisions by the same user not shown)
Line 16: Line 16:
* https://www.cisa.gov/known-exploited-vulnerabilities-catalog
* https://www.cisa.gov/known-exploited-vulnerabilities-catalog
* https://vulners.com [Free & Paid]
* https://vulners.com [Free & Paid]
* Nuclei template search engine: https://nuclei-templates.netlify.app


=== Internet of things search ===
=== Internet of things search ===
Line 36: Line 37:
* https://viewdns.info
* https://viewdns.info
* https://hackertarget.com [Free & Paid]
* https://hackertarget.com [Free & Paid]
* Internet analysis: https://bgp.he.net
* https://check-host.net
* https://whois.whoisxmlapi.com [Free & Paid]
* https://www.whoxy.com [Free & Paid]
* https://viewdns.info


=== Business email search ===
=== Business email search ===
* https://hunter.io [Free & Paid]
* https://hunter.io [Free & Paid]
* https://www.convertcsv.com/email-extractor.htm
* https://www.convertcsv.com/email-extractor.htm

Revision as of 14:36, 15 May 2023

Search Engines

The following search engines can be used as part of your passive recon. They are good for searching through code repositories, passive port scanning and technology analysis and looking for CVEs and exploits. To make use of their fullest potential they often require payments. Remember to conduct good OPSEC when placing any purchases with services that you're going to use in your hacktivist operations!

Many of these search engines allow the use of an API. You can integrate their API's with some of your automated tooling.

Code repository search

Exploit/CVE search

Internet of things search

Business email search