Sat. Jul 20th, 2024

Top Search Engines for Hackers

Hacker Search Engines

Posted by  source and BY  source

List of Best Hacker – Friendly Search Engines

General Search Engines


  • Shodan – Search Engine for the Internet of Everything.Shodan is popular for the identification of IoT infrastructure across the globe. If you are a security analyst and performing pentest on the IoT infrastructure, Shodan is a must tool in your arsenal. This tool provides a basic search for free, but if you want to use it further, you need to pay a minimal amount to get the subscription.
  • Censys Search – Search Engine for every server on the Internet to reduce exposure and improve security. Censys is basically used to identify subdomains of the IT infrastructure. As Censys list out all the available subdomains for the attacker. Attackers collect those IPs and start fresh recon to identify vulnerabilities.
  • – Cyber Defense Search Engine for open-source and cyber threat intelligence data.The web-based search engine tool is used to collect geo-information, active scans, lookups of threat lists, etc.
  • ZoomEye – Global cyberspace mapping
  • GreyNoise – The source for understanding internet noise
  • Natlas – Scaling Network Scanning
  • – Discover, Research and Monitor any Assets Available Online
  • FOFA – Cyberspace mapping
  • Hunter Hunter is helpful when a security analyst wanted to extract an official email id related to the company.
  • IVRE IVRE is an open-source network recon framework that includes the famous port scanner tool Nmap. This tool helps in parsing output from the results of tools such as Argus, Zeek, etc. You can either use the CLI tools, the Python API or the Web interface to browse the scanning results.
  • Binaryedge Binaryedge is a search engine for acquiring, analyzing, and classifying a company’s data available on the internet. This tool provides a basic search for free, but if you want to use it further, you need to pay a minimal amount. This tool is available in the Free, Starter, Business, and Enterprise editions.
  • Google Google is the ultimate source of knowledge to gain information about anything available in the universe. If you are looking for existing or new vulnerabilities, a lot of google dorks are available to identify problems with the application.
  • Spyse is a web-based tool to provide information about the target. Information collected in the previous step is usually used for penetration testing and cyber investigations. This tool is paid tool and is available based on a time limit subscription.


  • NIST NVD – National Vulnerability Database
  • MITRE CVE – Identify, define, and catalog publicly disclosed cybersecurity vulnerabilities
  • GitHub Advisory Database – Security vulnerability database inclusive of CVEs and GitHub-originated security advisories
  • – The Open Cloud Vulnerability & Security Issue Database
  • – Open Source Vulnerabilities
  • – Your Search Engine for Security Intelligence
  • – Easiest way to track CVE updates and be alerted about new vulnerabilities
  • – Open Source Vulnerability Database
  • Mend Vulnerability Database – The largest open-source vulnerability DB
  • Rapid7 – DB – Vulnerability & Exploit Database
  • CVEDetails – The ultimate security vulnerability data source
  • VulnIQ – Vulnerability intelligence and management solution
  • SynapsInt – The unified OSINT research tool
  • Aqua Vulnerability Database – Vulnerabilities and weaknesses in open source applications and cloud-native infrastructure
  • Vulmon – Vulnerability and exploit search engine
  • VulDB – Number one vulnerability database
  • ScanFactory – Realtime Security Monitoring
  • Trend Micro Zero Day Initiative – Publicly disclosed vulnerabilities discovered by Zero Day Initiative researchers
  • Google Project Zero – Vulnerabilities including Zero Days


  • Exploit-DB – Exploit Database
  • Sploitus – Convenient central place for identifying the newest exploits
  • Rapid7 – DB – Vulnerability & Exploit Database
  • Vulmon – Vulnerability and exploit search engine
  • – Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
  • – Ultimate database of exploits and vulnerabilities
  • LOLBAS – Living Off The Land Binaries, Scripts and Libraries
  • GTFOBins – Curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
  • Payloads All The Things – A list of useful payloads and bypasses for Web Application Security
  • XSS Payloads – The wonderland of JavaScript unexpected usages, and more
  • – Database of Exploits

Attack Surface

Code Search Engines

  • GitHub Code Search – Search globally across all of GitHub, or scope your search to a particular repository or organization
  • – Search across a half million git repos
  • – Find any alphanumeric snippet, signature or keyword in the web page’s HTML, JS and CSS code
  • SearchCode – Search 75 billion lines of code from 40 million projects
  • NerdyData – Find companies based on their website’s tech stack or code
  • RepoSearch – Source code search engine that helps you find implementation details, example usages or just analyze code
  • SourceGraph – Understand and search across your entire codebase
  • HotExamples – Search code examples from over 1 million projects
  • WP Directory – Lightning-fast regex searching of code in the WordPress Plugin and Theme Directories

Mail Addresses




  • DNSDumpster – DNS recon & research, find & lookup DNS records
  • Chaos – Enhance research and analyse changes around DNS for better insights
  • RapidDNS – dns query tool which makes querying subdomains or sites of the same ip easy
  • DNSdb – Passive DNS historical database
  • Omnisint – Reverse DNS lookup
  • HackerTarget – Collect information about IP Addresses, Networks, Web Pages and DNS records
  • – Web interface for querying passive DNS data collected in our malware lab
  • – Over 230 billion reverse DNS entries from 2008 to the present
  • – Domain Name System Historical Record Archive
  • DNSTwister – The anti-phishing domain name search engine and DNS monitoring service
  • DNSviz – Tool for visualizing the status of a DNS zone
  • – Over 57 quality APIs and growing
  • PassiveTotal – Security intelligence that scales security operations and response
  • – Online Tools


WiFi Networks

  • – Maps and database of 802.11 wireless networks with statistics
  • – Connect to all Free WiFi Hotspots using WiFi Map App all over the World!
  • – Free WiFi Cafe Spots
  • – Free map of Wi-Fi passwords anywhere you go!
  • – HTML5 map with OpenWiFiMap data
  • – Public API implementation of Wi-Fi Geo-Location database

Device Information


Hidden Services

Social Networks

These can be useful for osint and social engineering.

Phone Numbers

Threat Intelligence

  • MITRE ATT&CK – Globally-accessible knowledge base of adversary tactics and techniques
  • PulseDive – Threat intelligence made easy
  • ThreatCrowd – A Search Engine for Threats
  • ThreatMiner – Data Mining for Threat Intelligence
  • VirusTotal – Analyze suspicious files, domains, IPs and URLs to detect malware and other breaches
  • – Malware library
  • – Malware sample database
  • – List of botnet Command&Control servers
  • – All malicious SSL certificates
  • – Propose new malware urls
  • – Indicator Of Compromise (IOC) database
  • – Scan suspicious files such as malware samples or process dumps against a large repository of YARA rules
  • Rescure – Curated cyber threat intelligence for everyone
  • otx.alienvault – The World’s First Truly Open Threat Intelligence Community
  • – Service for detecting and analyzing web-based malware
  • – Extension to your SOC team
  • VirusShare – System currently contains 48 million malware samples
  • WikiLeaks – News leaks and classified media provided by anonymous sources
  • PassiveTotal – Security intelligence that scales security operations and response
  • – Windows APIs used for malicious purposes
  • – Latest file extensions being used by attackers
  • – Search engine indexing public information and an open reporting platform linked to the results
  • – Fully automated solution for high-volume malware analysis using advanced sandboxing technology
  • Polyswarm – Launchpad for new technologies and innovative threat detection methods
  • Cisco Talos – The threat intelligence organization at the center of the Cisco Security portfolio
  • – Find your scammer online & report them
  • CyberCampaigns – Threat Actor information and Write-Ups

Web History

  • Web Archive – Explore more than 702 billion web pages saved over time
  • – Create a copy of a webpage that will always be up even if the original link is down
  • CachedPages – Get the cached page of any URL
  • – View cached web pages/website
  • CommonCrawl – Open repository of web crawl data
  • UK Web Archive – Collects millions of websites each year, preserving them for future generations


  • NetoGraph – Captures and indexes detailed, low-level snapshots of website behaviour
  • DorkSearch – Speed up your Dorking
  • – Find someone by username or email on Social Networks, Dating Sites, Forums, Crypto