Cybersecurity Search Tools

Technology professionals rely on a variety of tools to stay up-to-date and informed about the latest cyber threats. From DeHashed, which allows users to view leaked credentials, to Shodan which searches for devices connected to the internet, these resources are invaluable in protecting against malicious actors. 

In conclusion there are many resources available for cybersecurity professionals use when researching new cyber threats they may encounter during their day job role(s). Each resource mentioned here can provide valuable insight into what's happening 'behind closed doors' helping protect organisations business assets as well individuals alike - ultimately making our digital world safer place everyone involved!

1. DeHashed—View leaked credentialsTo start with DeHashed is an online service that enables users access leaked credentials from various sources such as darkweb forums and data breaches.

2. SecurityTrails—Extensive DNS data.  SecurityTrails provides extensive DNS data

3. DorkSearch—Really fast Google dorking.  DorkSearch is a tool used by security experts for Google dorking; this involves using search queries against websites or web applications in order identify vulnerabilities or sensitive information stored within them

4. ExploitDB—Archive of various exploits.  ExploitDB contains an archive of various exploits;

5. ZoomEye—Gather information about targets.

6. Pulsedive—Search for threat intelligence.

7. GrayHatWarfare—Search public S3 buckets.

8. PolySwarm—Scan files and URLs for threats.

9. Fofa—Search for various threat intelligence.

10. LeakIX—Search publicly indexed information.

11. DNSDumpster—Search for DNS records quickly.

12. FullHunt—Search and discovery attack surfaces.

13. AlienVault—Extensive threat intelligence feed.

14. ONYPHE—Collects cyber-threat intelligence data.

15. Grep App—Search across a half million git repos.

16. URL Scan—Free service to scan and analyse websites.

17. Vulners—Search vulnerabilities in a large database.

18. WayBackMachine—View content from deleted websites.

19. Shodan—Search for devices connected to the internet.

20. Netlas—Search and monitor internet connected assets.

21. CRT sh—Search for certs that have been logged by CT.

22. Wigle—Database of wireless networks, with statistics.

23. PublicWWW—Marketing and affiliate marketing research.

24. Binary Edge—Scans the internet for threat intelligence.

25. GreyNoise—Search for devices connected to the internet.

26. Hunter—Search for email addresses belonging to a website.

27. Censys—Assessing attack surface for internet connected devices.

28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.

29. Packet Storm Security—Browse latest vulnerabilities and exploits.

30. SearchCode—Search 75 billion lines of code from 40 million projects.

31. ThreatCrowd: Search for malware, hashes, IP addresses, and domain names.

32. ThreatMiner: Search for threats, indicators of compromise, and domain information.

33. ThreatIntel: Search for threats, indicators of compromise, and domain information.

34. ThreatLookup: Search for threats, indicators of compromise, and domain information.

35. WhoisXML API: Search for domain information and WHOIS records.

36. Have I Been Pwned: Check if your personal data has been compromised in a data breach.

37. Binary Edge: Search for internet-connected devices and associated vulnerabilities.

38. ThreatCage: Search for threats, indicators of compromise, and domain information.

39. Anubis Labs: Search for threats, indicators of compromise, and domain information.

40. ThreatDefend: Search for threats, indicators of compromise, and domain information.

41. snusbase.com: Very useful database search engine that has provided great insight during previous OSINT investigations.

42: https://hudsonrock.com/free-tools The industry's most robust compromised computers data source

43 Conpot - ICS/SCADA honeypot.

44. Cowrie - SSH honeypot, based on Kippo.

45. DemoHunter - Low interaction Distributed Honeypots.

46. Dionaea - Honeypot designed to trap malware.

47. Viewdns.info

48. Spybot Identity Monitor

49. LeakCheck

50. Personal Data Leak Checker

51. Leakwatch

52. F-Secure Leak Checker

53. Mypwd

54. Inoitsu

55. Firefox Monitor

56. Sophos UTM

57. Nuclear Leaks

58. WeLeakInfo

59. Bitwarden

60. BreachDirectory.org

61. FamilyTreeNow

62. Melissa Data

63. Zeek

64. AC Hunter