{"id":2107,"date":"2022-07-15T17:25:02","date_gmt":"2022-07-15T21:25:02","guid":{"rendered":"https:\/\/increasec.com\/?p=2107"},"modified":"2023-08-29T15:27:02","modified_gmt":"2023-08-29T19:27:02","slug":"security-search-engines","status":"publish","type":"post","link":"https:\/\/increasec.com\/?p=2107","title":{"rendered":"Security search engines"},"content":{"rendered":"\n<p><blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">\ud83d\udd0eSearch Engines for Pentesters &#8211; <a href=\"https:\/\/twitter.com\/NandanLohitaksh?ref_src=twsrc%5Etfw\">@NandanLohitaksh<\/a>\ud83d\udd0d<a href=\"https:\/\/twitter.com\/hashtag\/bugbountytips?src=hash&amp;ref_src=twsrc%5Etfw\">#bugbountytips<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/BugBounty?src=hash&amp;ref_src=twsrc%5Etfw\">#BugBounty<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Ethicalhacking?src=hash&amp;ref_src=twsrc%5Etfw\">#Ethicalhacking<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/cybersecurity?src=hash&amp;ref_src=twsrc%5Etfw\">#cybersecurity<\/a> <a href=\"https:\/\/t.co\/6GmeIHG1Py\">pic.twitter.com\/6GmeIHG1Py<\/a><\/p>&mdash; Harsh\ud83e\udde2 (@harshinsecurity) <a href=\"https:\/\/twitter.com\/harshinsecurity\/status\/1547874286710317057?ref_src=twsrc%5Etfw\">July 15, 2022<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n\n\n\n<p>External:<br><a href=\"https:\/\/www.shodan.io\/\" data-type=\"link\" data-id=\"https:\/\/www.shodan.io\/\">ShoDan<\/a>        the most popular vulnerability database<br><a href=\"https:\/\/dnsdumpster.com\/\" data-type=\"link\" data-id=\"https:\/\/dnsdumpster.com\/\">DNSDumpster<\/a>   finds attack surface, makes a nice graphic<br><a href=\"https:\/\/fullhunt.io\/\" data-type=\"link\" data-id=\"https:\/\/fullhunt.io\/\">FullHunt.io<\/a>   finds attack surface<br><a href=\"https:\/\/www.exploit-db.com\/\" data-type=\"link\" data-id=\"https:\/\/www.exploit-db.com\/\">exploit-db<\/a>   type the name of software or SaaS and get a list of vulnerabilities and CVE#s<br><a href=\"https:\/\/www.greynoise.io\/\" data-type=\"link\" data-id=\"https:\/\/www.greynoise.io\/\">GreyNoise<\/a>   type an IP address tfrom logs and verify if it is a threat actor or Benign.  useful<br><a href=\"https:\/\/intelx.io\/\" data-type=\"link\" data-id=\"https:\/\/intelx.io\/\">IntelligenceX   <\/a>enter an IP, domain, URL, email address, CIDR, Bitcoin addr  etc.   email= list of breaches<br><a href=\"https:\/\/netlas.io\/\" data-type=\"link\" data-id=\"https:\/\/netlas.io\/\">NetLas<\/a>     whoIs, AttkSurface, Responses, Certificate search<br><a href=\"https:\/\/www.onyphe.io\/\" data-type=\"link\" data-id=\"https:\/\/www.onyphe.io\/\">onyphe.io<\/a>     Attack Surface   VulnScan and RiskScan are paid only<br><a href=\"https:\/\/searchcode.com\/\" data-type=\"link\" data-id=\"https:\/\/searchcode.com\/\">SearchCode<\/a>   Source code search engine<br><a href=\"https:\/\/urlscan.io\/\" data-type=\"link\" data-id=\"https:\/\/urlscan.io\/\">UrlScan<\/a>    public website scanner<br><a href=\"https:\/\/wigle.net\/\" data-type=\"link\" data-id=\"https:\/\/wigle.net\/\">Wigle<\/a>     Maps wireless networks onto maps<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd0eSearch Engines for Pentesters &#8211; @NandanLohitaksh\ud83d\udd0d#bugbountytips #BugBounty #Ethicalhacking #cybersecurity pic.twitter.com\/6GmeIHG1Py &mdash; Harsh\ud83e\udde2 (@harshinsecurity) July 15, 2022 External:ShoDan the most popular vulnerability databaseDNSDumpster finds attack surface, makes a nice graphicFullHunt.io finds&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[199],"tags":[43],"class_list":["post-2107","post","type-post","status-publish","format-standard","hentry","category-redteam","tag-redteam"],"_links":{"self":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/2107","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2107"}],"version-history":[{"count":5,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/2107\/revisions"}],"predecessor-version":[{"id":2622,"href":"https:\/\/increasec.com\/index.php?rest_route=\/wp\/v2\/posts\/2107\/revisions\/2622"}],"wp:attachment":[{"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2107"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2107"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/increasec.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2107"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}