Search Engines Resources: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Created page with "=== Search Engines === https://www.shodan.io/ https://www.zoomeye.org/ https://search.censys.io/ https://hunter.io/ https://fullhunt.io/ https://www.onyphe.io/ https://binaryedge.io/ https://ivre.rocks/ https://vulners.com/ https://pulsedive.com/ https://www.exploit-db.com https://wigle.net/ https://grep.app/ https://www.onyphe.io/ https://intelx.io/ https://dehashed.com/ https://github.com/khast3x/h8ma...")
 
No edit summary
 
(22 intermediate revisions by 2 users not shown)
Line 1: Line 1:
=== Search Engines ===
== Search Engines ==
The following search engines can be used as part of your passive recon. They are good for searching through code repositories, passive port scanning and technology analysis and looking for CVEs and exploits. To make use of their fullest potential they often require payments. Remember to conduct good OPSEC when placing any purchases with services that you're going to use in your hacktivist operations!


    https://www.shodan.io/
Many of these search engines allow the use of an API. You can integrate their API's with some of your automated tooling.
    https://www.zoomeye.org/
 
    https://search.censys.io/
=== Web ===
    https://hunter.io/
* https://www.google.com
    https://fullhunt.io/
* https://duckduckgo.com
    https://www.onyphe.io/
* https://www.bing.com
    https://binaryedge.io/
* https://yandex.com
    https://ivre.rocks/
* https://metager.de/
    https://vulners.com/
* https://searxng.nicfab.eu/
    https://pulsedive.com/
* https://search.carrot2.org/#/search/web
    https://www.exploit-db.com
* https://github.com
    https://wigle.net/
** https://github.com/gwen001/github-subdomains
    https://grep.app/
*** https://github.com/gwen001/github-endpoints
    https://www.onyphe.io/
**** https://github.com/gwen001/github-regexp
    https://intelx.io/
 
    https://dehashed.com/
=== Code repository search ===
    https://github.com/khast3x/h8mail
* https://grep.app
    https://crt.sh/
* https://searchcode.com
    http://vulners.com/
 
    https://ivre.rocks/
=== Exploit/CVE search ===
    https://urlscan.io/
* https://www.exploit-db.com
    https://searchcode.com/
* https://www.rapid7.com/db
    https://publicwww.com/
* https://sploitus.com
    https://app.netlas.io/
* https://www.exploitalert.com/search-results.html
    https://viz.greynoise.io/
* https://vulmon.com
    https://dnsdumpster.com/
* https://www.cisa.gov/known-exploited-vulnerabilities-catalog
    https://usersearch.org/
* https://vulners.com [Free & Paid]
    https://haveibeenpwned.com/
* Nuclei template search engine: https://nuclei-templates.netlify.app
    https://leak-lookup.com/
 
    https://snusbase.com/
=== Internet of things search ===
    https://leakcheck.io/
* https://www.shodan.io [Free & Paid]
    https://synapsint.com/
* https://www.zoomeye.org [Free & Paid]
    https://tls.bufferover.run/
* https://search.censys.io [Free & Paid]
    https://vulmon.com/
* https://dnsdumpster.com
    https://www.exploitalert.com/search-results.html
* https://urlscan.io [Free & Paid]
    https://sploitus.com/
* https://ivre.rocks
    https://www.rapid7.com/db/
* https://fullhunt.io [Free & Paid]
    https://vuldb.com/
* https://pulsedive.com [Free & Paid]
* https://wigle.net
* https://crt.sh
* https://publicwww.com [Free & Paid]
* https://viz.greynoise.io [Free & Paid]
* https://tls.bufferover.run [Free & Paid]
* https://www.whois.com/whois
* Passively enumerate subdomains: https://subdomainfinder.c99.nl
* https://host.io [Free & Paid]
* https://viewdns.info
* https://hackertarget.com [Free & Paid]
* Internet analysis: https://bgp.he.net
* https://check-host.net
* https://whois.whoisxmlapi.com [Free & Paid]
* https://www.whoxy.com [Free & Paid]
* https://viewdns.info
 
=== Business e-mail search ===
* https://hunter.io [Paid]
* https://rocketreach.co [Paid]

Latest revision as of 08:02, 27 November 2023

Search Engines

The following search engines can be used as part of your passive recon. They are good for searching through code repositories, passive port scanning and technology analysis and looking for CVEs and exploits. To make use of their fullest potential they often require payments. Remember to conduct good OPSEC when placing any purchases with services that you're going to use in your hacktivist operations!

Many of these search engines allow the use of an API. You can integrate their API's with some of your automated tooling.

Web

Code repository search

Exploit/CVE search

Internet of things search

Business e-mail search