Name What Where
Dehashed View leaked credentials [Dehashed](https://dehashed.com)
SecurityTrails Extensive DNS data [SecurityTrails](https://securitytrails.com)
DorkSearch Really fast Google dorking [DorkSearch](https://dorksearch.com)
ExploitDB Archive of various exploits [ExploitDB](https://www.exploit-db.com)
ZoomEye Gather information about targets [ZoomEye](https://www.zoomeye.org)
Pulsedive Search for threat intelligence [Pulsedive](https://pulsedive.com)
GrayHatWarfare Search public S3 buckets [GrayHatWarfare](https://buckets.grayhatwarfare.com)
PolySwarm Scan files and URLs for threats [PolySwarm](https://polyswarm.io)
Fofa Search for various threat intelligence [Fofa](https://fofa.so)
LeakIX Search publicly indexed information [LeakIX](https://leakix.net)
DNSDumpster Search for DNS records quickly [DNSDumpster](https://dnsdumpster.com)
FullHunt Search and discovery attack surfaces [FullHunt](https://fullhunt.io)
AlienVault Extensive threat intelligence feed [AlienVault](https://www.alienvault.com)
ONYPHE Collects cyber-threat intelligence data [ONYPHE](https://www.onyphe.io)
Grep App Search across a half million git repos [Grep App](https://grep.app)
URL Scan Free service to scan and analyse websites [URL Scan](https://urlscan.io)
Vulners Search vulnerabilities in a large database [Vulners](https://vulners.com)
WayBackMachine View content from deleted websites [WayBackMachine](https://archive.org/web)
Shodan Search for devices connected to the internet [Shodan](https://www.shodan.io)
Netlas Search and monitor internet connected assets [Netlas](https://netlas.io)
CRT sh Search for certs that have been logged by CT [CRT sh](https://crt.sh)
Wigle Database of wireless networks, with statistics [Wigle](https://wigle.net)
PublicWWW Marketing and affiliate marketing research [PublicWWW](https://publicwww.com)
Binary Edge Scans the internet for threat intelligence [Binary Edge](https://binaryedge.io)
GreyNoise Search for devices connected to the internet [GreyNoise](https://greynoise.io)
Hunter Search for email addresses belonging to a website [Hunter](https://hunter.io)
Censys Assessing attack surface for internet connected devices [Censys](https://censys.io)
IntelligenceX Search Tor, I2P, data leaks, domains, and emails [IntelligenceX](https://intelx.io)
Packet Storm Security Browse latest vulnerabilities and exploits [Packet Storm Security](https://packetstormsecurity.com)
SearchCode Search 75 billion lines of code from 40 million projects [SearchCode](https://searchcode.com)
Web-Check Enumerate everything possible from a domain https://web-check.as93.net/
Driftnet.io Internet Footprint https://driftnet.io/