Cybersecurity Search Engines

List of Cybersecurity Search Engines


Internet-wide scan platforms, threat intelligence engines, and OSINT databases.

OSINT

Shodan

Search exposed devices connected to the internet — the de facto standard for attack surface discovery.

Visit →
OSINT

Censys

Assess attack surfaces of internet-connected devices and services.

Visit →
Threat Intel

GreyNoise

Contextualizes background noise from internet-wide scanning — filters signal from the noise.

Visit →
Vuln

Vulners

Vulnerability search engine with CVE indexing and exploit tracking.

Visit →
Threat Intel

Pulsedive

Threat intelligence feeds, enrichment, and community-sourced IOC searches.

Visit →
OSINT

IntelligenceX

Search Tor, data leaks, domains, emails, and historical internet records.

Visit →
OSINT

Hunter

Find and verify email addresses associated with any domain.

Visit →
OSINT

URLScan

Scan and analyze websites — inspect behavior, resources, and outbound connections.

Visit →
OSINT

GrayHatWarfare

Search publicly exposed Amazon S3 buckets for accidental data exposure.

Visit →
Threat Intel

LeakIX

Search exposed services and publicly indexed sensitive data.

Visit →
OSINT

crt.sh

Search certificates logged by Certificate Transparency — great for subdomain discovery.

Visit →
OSINT

Netlas

Search and monitor external internet-facing assets and attack surfaces.

Visit →
Threat Intel

Binary Edge

Scans the internet for threat intelligence and exposes attack surface data.

Visit →
Code

Grep App

Search across open-source GitHub repositories for code patterns and secrets.

Visit →
OSINT

PublicWWW

Search websites by HTML, JavaScript, and CSS source code fingerprints.

Visit →
OSINT

ZoomEye

Internet-wide scanner for threat research and device fingerprinting.

Visit →

← Back to Blue Team Tools