Search Engines Resources: Difference between revisions
Jump to navigation
Jump to search
mNo edit summary |
mNo edit summary |
||
Line 5: | Line 5: | ||
=== Code repository search === | === Code repository search === | ||
* https://grep.app | * https://grep.app | ||
* https://searchcode.com | * https://searchcode.com | ||
=== Exploit/CVE search === | === Exploit/CVE search === | ||
* https://www.exploit-db.com | * https://www.exploit-db.com | ||
* https://www.rapid7.com/db | * https://www.rapid7.com/db | ||
* https://sploitus.com | * https://sploitus.com | ||
* https://www.exploitalert.com/search-results.html | * https://www.exploitalert.com/search-results.html | ||
* https://vulmon.com | * https://vulmon.com | ||
* https://www.cisa.gov/known-exploited-vulnerabilities-catalog | * https://www.cisa.gov/known-exploited-vulnerabilities-catalog | ||
* https://vulners.com [Free & Paid] | * https://vulners.com [Free & Paid] | ||
Line 21: | Line 21: | ||
* https://www.zoomeye.org [Free & Paid] | * https://www.zoomeye.org [Free & Paid] | ||
* https://search.censys.io [Free & Paid] | * https://search.censys.io [Free & Paid] | ||
* https://dnsdumpster.com | * https://dnsdumpster.com | ||
* https://urlscan.io [Free & Paid] | * https://urlscan.io [Free & Paid] | ||
* https://ivre.rocks | * https://ivre.rocks | ||
* https://fullhunt.io [Free & Paid] | * https://fullhunt.io [Free & Paid] | ||
* https://pulsedive.com [Free & Paid] | * https://pulsedive.com [Free & Paid] | ||
* https://wigle.net | * https://wigle.net | ||
* https://crt.sh | * https://crt.sh | ||
* https://publicwww.com [Free & Paid] | * https://publicwww.com [Free & Paid] | ||
* https://viz.greynoise.io [Free & Paid] | * https://viz.greynoise.io [Free & Paid] | ||
* https://tls.bufferover.run [Free & Paid] | * https://tls.bufferover.run [Free & Paid] | ||
* https://www.whois.com/whois | * https://www.whois.com/whois | ||
* Passively enumerate subdomains: https://subdomainfinder.c99.nl | * Passively enumerate subdomains: https://subdomainfinder.c99.nl | ||
=== Business email search === | === Business email search === | ||
* https://hunter.io [Free & Paid] | * https://hunter.io [Free & Paid] |
Revision as of 00:16, 5 April 2023
Search Engines
The following search engines can be used as part of your passive recon. They are good for searching through code repositories, passive port scanning and technology analysis and looking for CVEs and exploits. To make use of their fullest potential they often require payments. Remember to conduct good OPSEC when placing any purchases with services that you're going to use in your hacktivist operations!
Many of these search engines allow the use of an API. You can integrate their API's with some of your automated tooling.
Code repository search
Exploit/CVE search
- https://www.exploit-db.com
- https://www.rapid7.com/db
- https://sploitus.com
- https://www.exploitalert.com/search-results.html
- https://vulmon.com
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog
- https://vulners.com [Free & Paid]
Internet of things search
- https://www.shodan.io [Free & Paid]
- https://www.zoomeye.org [Free & Paid]
- https://search.censys.io [Free & Paid]
- https://dnsdumpster.com
- https://urlscan.io [Free & Paid]
- https://ivre.rocks
- https://fullhunt.io [Free & Paid]
- https://pulsedive.com [Free & Paid]
- https://wigle.net
- https://crt.sh
- https://publicwww.com [Free & Paid]
- https://viz.greynoise.io [Free & Paid]
- https://tls.bufferover.run [Free & Paid]
- https://www.whois.com/whois
- Passively enumerate subdomains: https://subdomainfinder.c99.nl
Business email search
- https://hunter.io [Free & Paid]