30 Search Engines for Cybersecurity Researchers (Part 3 of 3)
written by anshul vyas
This is the third of the three parts of the search engines which are used by the Security Researchers.
Link to the first part: https://secpy.medium.com/30-search-engines-for-cybersecurity-researchers-part-1-of-3-faf68bfc6be8
Link to Second part: https://secpy.medium.com/30-search-engines-for-cybersecurity-researchers-part-2-of-3-3412d6a35118
21. CRT.sh: Search for certs that have been logged by CT
There is a site named crt.sh where you can find all SSL or TLS certificates of a specific domain. And the site is open-source. With the GUI format of the site, it is very easy to gather information, and the purpose is to keep the certificate logs very transparent. It is also possible to find the certificates algorithms in ciphertext format. The crt.sh name stands for “certificates.Saint Helena”.
22. Wigle: Database of wireless networks, with statistics
This website collects information about wireless hotspots around the world using WiFiGLE (Wireless Geographic Logging Engine). On the website, users can register and upload information about hotspots discovered, such as GPS coordinates, SSIDs, MAC addresses, and encryption methods. The website also displays cell tower data. WiGLE attempts to create an awareness of security by collecting information about the encryption of different hotspots
23. PublicWWW: Marketing and affiliate marketing research
Research on affiliate marketing and digital marketing is made easier with PublicWWW. The search engine allows users to conduct searches in ways other search engines cannot provide. In a web page source code, they can search for HTML, JavaScript, CSS, and plaintext and download a list of websites that contain it. In HTML code or in web pages, PublicWWW can find any alphanumeric snippet, signature or keyword.
Using it, you can find any HTML, JavaScript, CSS or plain text in the source code of a web page, find sites that share the same analytics ID, find sites that use eCommerce engines, find sites that use NGINX, find advertising networks and adsense users, find Wordpress sites with themes, and much more. As many as 200,000 results can be returned per search request, and the results can be downloaded as a CSV file.
24. Binary Edge — Scans the internet for threat intelligence
In addition to focusing on important data metrics, BinaryEdge builds products that help companies improve their information security.
25. GreyNoise: Search for devices connected to the internet
In order to separate threats from background noise, GreyNoise analyzes Internet scanning traffic.
26. Hunter: Search for email addresses belonging to a website
Connect with the people that matter to your business by finding professional email addresses in seconds with Hunter.
27. Censys: Assessing attack surface for internet connected devices
With Censys Attack Surface Management, you can assess your assets’ external security more effectively and with greater actionability.
28. IntelligenceX — Search Tor, I2P, data leaks, domains, and emails.
It searches in the darknet, document sharing platforms, whois data, public data leaks, and other places by selecting search terms such as email addresses, domains, URLs, IP addresses, CIDRs, bitcoin addresses, IPFS hashes, etc. Archive.org stores historical copies of websites through its Wayback Machine service.
29. Packet Storm Security: Browse latest vulnerabilities and exploits
Security tools, exploits, and advisories are provided by Packet Storm Security. A network of websites are used by the company to provide information to secure networks. Packet Storm Security serves security professionals, researchers, and the public.
30. SearchCode: Search 75 billion lines of code from 40 million projects
A search engine that indexes and searches source code and documentation is searchcode.