1 | Dehashed | https://dehashed.com | View leaked credentials
|
2 | Security trails | https://Securitytrails.com | Ext dns data
|
3 | DorkSearch | https://DorkSearch.com | Really fast Google dorking
|
4 | ExploitDB | https://ExploitDB.com | Archive of various exploits
|
5 | ZoomEye | https://ZoomEye.com | Gather info about targets
|
6 | Pulsedive | https://Pulsedive.com | Search for threat intelligence
|
7 | GrayHatWarefare | https://grayhatwarfare.com | Search public S3 buckets
|
8 | PolySwarm | https://PolySwarm.io | Scan files and URLs for threats
|
9 | Fofa | https://Fofa.com | Search for various threat intelligence
|
10 | LeakIX | https://LeakIX.com | Search publicly indexed info
|
11 | DNSdumpster | https://DNSdumpster.com | Search for DNS records quickly
|
12 | Fullhunt | https://Fullhunt.io | Search for discovery attack surface
|
13 | AlienVault | https://AlienVault.com | Extensive threat int feed
|
14 | Onyphe | https://Onyphe.com | Collects cyber-threat intelligence data
|
15 | Grep App | https://Grep.app | Search accross a half million git repos
|
16 | Urlscan | https://Urlscan.io | Free service to scan and analyse websites
|
17 | IPinfo | https://IPinfo.io | Free service to lookup public IPs
|
18 | Crt.sh | https://Crt.sh | Search for DNS records quickly by use of certificates
|
19 | Vulners | https://Vulners.com | Search vulnerabilities in a large database
|
20 | Waybackmachine | https://Waybackmachine.com | View content from deleted websites
|
21 | Shodan | https://Shodan.io | Search for devices connected to the internet
|
22 | Netlas | https://Netlas.com | Search and monitor internet connected assets
|
23 | Wigle | https://Wigle.net | Database of wireless networks with stats
|
24 | PublicWWW | https://PublicWWW.com | Marketing and affiliate marketing research
|
25 | Binary Edge | https://BinaryEdge.com | Scans the internet for threat intelligence
|
26 | GreyNoise | https://GreyNoise.io | Search for devices to the internet
|
27 | Hunter | https://Hunter.io | Search for email addresses belonging to a web site
|
28 | Censys | https://Censys.com | Assessing attack surface for internet connected devices
|
29 | The dfir report | https://thedfirreport.com | Real Intrusions by Real Attackers - The Truth Behind the Intrusion
|
30 | IntelligenceX | https://IntelligenceX.io | Search Tor I2P - data leaks domains and emails
|
31 | Packet Storm Security.com | https://packetstormsecurity.com | Browse latest vulnerabilities and exploits
|
32 | Pentest Tools | https://pentest-tools.com | Tools for easy pentesting
|
33 | SearchCode | https://SearchCode.com | Search 75 billion lines of code from40 million projects
|
34 | Speed Test | http://speedtest.stockholm.linode.com | Best speed test I know of
|
|