0% found this document useful (0 votes)
3 views3 pages

Cyber Search Engine List

The document lists various online resources and tools related to cybersecurity, threat intelligence, and data leaks, along with their descriptions and API availability. It includes links to sites for searching leaked credentials, exploits, DNS data, and more. Each entry provides a brief overview of the service offered and whether an API is available for integration.

Uploaded by

vrx73406
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODS, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views3 pages

Cyber Search Engine List

The document lists various online resources and tools related to cybersecurity, threat intelligence, and data leaks, along with their descriptions and API availability. It includes links to sites for searching leaked credentials, exploits, DNS data, and more. Each entry provides a brief overview of the service offered and whether an API is available for integration.

Uploaded by

vrx73406
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as ODS, PDF, TXT or read online on Scribd
You are on page 1/ 3

Sheet1

Address
https://www.dehashed.com/
https://www.exploit-db.com/
https://pulsedive.com/
https://otx.alienvault.com/
https://securitytrails.com/
https://www.zoomeye.org/
https://buckets.grayhatwarfare.com/
https://grep.app/
https://crt.sh/
https://dorksearch.com/
https://polyswarm.io/
https://leakix.net/
https://fullhunt.io/
https://www.onyphe.io/
https://www.shodan.io/
https://www.binaryedge.io/
https://vulners.com/
https://dnsdumpster.com/
https://searchcode.com/
https://hunter.io/
https://www.wigle.net/
https://publicwww.com/
https://censys.io/
https://netlas.io/
https://fofa.info/
https://archive.org/
https://www.greynoise.io/
https://intelx.io/
https://urlscan.io/
https://packetstormsecurity.com/
https://cse.google.com/cse?cx=006368593537057042503:efxu7xprihg#gsc.tab=0
https://lyzem.com/
https://tgstat.ru/en/
https://findadiscord.com/
https://discordservers.com/
https://osintframework.com/
https://exploit-notes.hdks.org/
https://hunter.how/

Page 1
Sheet1

Description API
View leaked credentials YES
Archive of various exploits YES
Search for threat intelligence YES
Extensive threat intelligence feed YES
Extensive DNS data YES
Gather information about targets YES
Search public S3 buckets YES
Search across a half million git repos NO
Search for certs that have been logged by CT YES
Really fast Google dorking NO
Scan files and URLs for threats YES
Search publicly indexed information YES
Search and discovery attack surfaces YES
Collects cyber-threat intelligence data YES
Search for devices connected to the internet YES
Scans the internet for threat intelligence YES
Search vulnerabilities in a large database YES
Search for DNS records quickly YES
Search 75 billion lines of code from 40 million projects YES
Search for email addresses belonging to a website YES
Database of wireless networks, with statistics YES
Marketing and affiliate marketing research YES
Assessing attack surface for internet connected devices YES
Search and monitor internet connected assets YES
Search for various threat intelligence YES
View content from deleted websites YES
Search for devices connected to the internet YES
Search Tor, I2P, data leaks, domains, and emails YES
Free service to scan and analyse websites YES
Browse latest vulnerabilities and exploits NO
Telegram Search Engine NO
Telegram Search Engine YES
Telegram Search Engine YES
Discord Search Engine NO
Discord Search Engine YES
OSINT Every Things NO
Search hacking techniques and tools for penetration testings, bug bounty, CTF
Which capable of performing fingerprint retrieval of internet-connected devices and services YES

Page 2
Sheet1

NO

Page 3

You might also like