Cybersecurity Search Engines

Cybersecurity Search Engines

Take your security to the next level with these Cybersecurity Search Engines

Have you been compromised? DeHashed provides free deep-web scans and protection against credential leaks. Modern personal asset cyber security search engines are created for security analysts, journalists, security companies, and everyday people to help secure accounts and provide insight on compromised assets. Free breach alerts & breach notifications.

Here is a list of some cybersecurity search engines:

DeHashedFreeThePassword

SecurityTrails is a total inventory that curates comprehensive domain and IP address data for users and applications that demand clarity.

SecurityTrailsData Security, Threat Hunting, and Attack Surface Management Solutions for Security Teams

DorkSearch Misuse of Google Dorking can be viewed as hacking in some countries.

DorkSearchSpeed up your Dorking

Exploit Database Exploits for Penetration Testers, Researchers, and Ethical Hackers

Expolit DatabaseExploit Database Exploits for Penetration Testers, Researchers, and Ethical Hackers

ZoomEye is the world’s leading search engine for cyberspace surveying and mapping

ZoomEyeGlobal leader of cyberspace mapping

Pulsedive is a free threat intelligence platform. Search, scan, and enrich IPs, URLs, domains and other IOCs from OSINT feeds or submit your own.

PulsediveThreat Intelligence

GreyHatWarfare because white is boring

GreyHatWarefareGrayhatwarfare

PolySwarm is a launchpad for new technologies and innovative threat detection methods that compete to protect you in real time. Bring them together to help you better detect and respond to emerging threats, the ones that are more likely to go undetected by existing solutions.

PolySwarmCrowdsourced threat detection

LeakIX is the first platform combining a search engine indexing public information AND an open reporting platform linked to the results.

LeakIXLeakIX

DNSDumpster find dns records in order to identify the Internet footprint of an organization. Recon that enables deeper security assessments and discovery of the attack surface.

DNSDumpsterdns recon and research, find and lookup dns records

FullHunt Discover, monitor, and secure your attack surface. FullHunt delivers the best platform in the market for attack surface security.

FullHuntExpose Your Attack Surface

AlienVault learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today’s emerging threats.

AlienVaultOpen Threat Exchange

Onyphe is a Cyber Defense Search Engine for open-source and cyber threat intelligence data collected by crawling various sources available on the Internet or by listening to Internet background noise. ONYPHE does correlate this information with data gathered by performing active Internet scanning for connected devices and also by crawling Web site URLs. It then normalizes information and makes it available via an API and its query language.

OnypheCyber Defense Search Engine

Grep App search across a half million git repos. Search by regular expression.

Grep AppGIT code search

URL Scan Website scanner for suspicious and malicious URLs

URL ScanURL and website scanner

Vulners non-intrusive vulnerability assessment Deploy powerful vulnerability assessment service for internal Linux infrastructure, or as a part of MSSP offering without headache and limitations.

VulnersSearch Engine for Security Intelligence

The Wayback Machine is a digital archive of the World Wide Web founded by the Internet Archive. It contains backups of over 361 billion online pages on its servers, letting you search for content that is no longer visible on the visible web. It is one of the fascinating websites for thoroughly exploring the internet’s vast and entertaining history.

WayBackMachineWayback Machine

Shodan gives you a data-driven view of the technology that powers the Internet. More than 3 million registered users across the world are using Shodan, including: 89% of the Fortune 100.

ShodanShodan Search Engine

Netlas non-intrusive Internet Scanner Netlas.io scans every IPv4 address and crawls every known website and web application utilizing such protocols as HTTP, FTP, SMTP, POP3, IMAP and a lot more.

Netlasdiscover, research and monitor any assets available online

Crt.sh Free CT Log Certificate Search Tool from Sectigo (formerly Comodo CA)

Crt.shCertificate Search

WiGLE Maps and database of 802.11 wireless networks, with statistics, submitted by wardrivers, netstumblers, and net huggers.

WiGLEWireless Network Mapping

PublicWWW Ultimate solution for digital marketing and affiliate marketing research, PublicWWW allow you to perform searches this way, something that is not possible with other regular search engines:

PublicWWWSearch Engine for Source Code

BinaryEdge We gather data for you! We scan the entire public internet, create real-time threat intelligence streams, and reports that show the exposure of what is connected to the Internet.

Binary EdgeBinaryEdge

GreyNoise is the source for understanding internet noise.

GreyNoiseThe source for understanding internet noise

Hunter lets you find professional email addresses in seconds and connect with the people that matter for your business. Find email addresses Enter a domain name to launch the search.

HunterFind email addresses in seconds Email Hunter

Censys is the proven leader in Attack Surface Management by relentlessly searching and proactively monitoring your digital footprint far more broadly and deeply than ever thought.

CensysCensys Search

IntelligentX, the world’s first beer brewed by artificial intelligence to show the world what can be achieved with data. The reason for creating it was simple: To use data in a smarter, more strategic way.

IntelligenceXIntelligence X

Packet Storm has been a cornerstone on the Internet since 1998 and is visited monthly by over 190 countries. The site is meant to provide a unique service to everyone on the Internet – shedding full light on real security issues that may affect them. It is home to system administrators who need to keep their network up to date, security researchers who discover and report new findings, governments and corporations that need to understand current events, security vendors that want to develop new signatures for their software, and many others.

Packet Storm SecurityPacket Storm

SearchCode Type in anything you want to find and you will be presented with the results that match with the relevant lines highlighted. Searches can filtered down using the filter panel.

SearchCodesource code search engine

4CyberSecurity Search engine and news site designed to show search results and news stories from Cyber Security websites. Search results from the rest of the web are also shown, but with lower priority.

4CyberSecurityCyber Security Search Engine

Criminal IP is a Cyber Threat Intelligence Search Engine and Attack Surface Management(ASM) platform to find everything in Cybersecurity with impressive amount data capacities, API speed, and price.

CriminalIPCybersecurity Search Engine

Spokeo is all about the people-centric nature of deep web search. Spokeo, which claims to have access to more than 12 billion public records, is an excellent place to start for reverse phone number searches. You may find precise information from over 60 social networks, internet profiles, and images.  You can find tons of information about a person from their dating site profiles.  Spokeo has developed its own deep web technology, which allows it to find material that other search engines missed.

SpokeoPeople Search | White Pages | Reverse Phone Lookup

Elephind allows family historians, genealogists, and scholars to browse historic newspaper archives from worldwide. It allows you to search for free across multiple newspaper websites at the same time, rather than having to go to each one separately. Many of the newspapers on this site can only be found on the deep web; they won’t show up on Google. There were 3.6 million newspapers available at the time of writing.

ElphindSearch the world’s historic newspaper archives

The Directory of Open Access Journals is the most comprehensive deep web search engine for finding scholarly papers. There are around 10,000 journals and 2.5 million papers in the present collection, which covers a wide range of subjects. Infrastructure Services for Freely Accessible maintains a website that offers a community-curated listing of open access journals.

Directory of Open Access JournalsDirectory of Open Access Journals – DOAJ

Warning About The Deep Web Search Engines Below

Curiosity is fantastic, but remember that it also killed a cat! Poking around on the deep web might be entertaining, but it can also be dangerous.

You could have accidentally clicked on a malicious link and infected your computer with malware before you knew it. As a result, unless you have a solid reason to go there, we urge that you avoid going there. If you wish to look around, be sure you have all of the security precautions in place to protect yourself from online attacks.

Is the deep web safe?

Accessing content on the Deep web is reasonably safe. It’s the same as if you were using a regular browser. The danger arises when you buy from illegal marketplaces or download files.

While downloads may contain spyware or keyloggers, the police can track down illegal purchases and penalize you.

What is the deep web on the internet?

Deep web search refers to areas of the Internet that are inaccessible using standard search engines such as Google, Yahoo, and Bing.

Is it free to use the deep web?

It is free to use the Deep Web websites to search the invisible web.

But it’s suggested that you use the Tor Browser using the Tor network. The Tor Browser allows you to access to both the clear and dark web. All of your traffic is automatically routed through the Tor Network.

Your traffic is relayed and encrypted three times as it passes over the Tor network. The network is comprised of thousands of volunteer run servers known as Tor relays and because of this relaying and encryption three times you will find it a bit slower than normal browsers.

But its better to stay anonymous and secure on the Deep Web.

Please be careful using the Deep Web.

The Onionland Search Engine can access the deep web information that other search engines cannot. It does not save any information about its users. It can search for Hidden Services on the Tor network and uncover the Deep Web with the onion tor search engine.

OnionLandOnionLand Search

Ahmia is unique and lets you read deep web URLs in a regular browser like Google Chrome. Although TOR is required to access the URLs obtained, this method will allow you to do so. It does, however, have an onion URL.

AhmiaSearch Tor Hidden Services

The Dark Lair began as an image hosting service only accessible with Tor. Over time, it has evolved into a social networking site to search the invisible web. Now You can share images, leave comments, and interact with other users as both registered and anonymous users.

The Dark Lairhttp://vrimutd6so6a565x.onion/index.php/Board

The Hidden Wiki is a deep web version of Wikipedia that could be edited anonymously after registering on the site. The official website served as a link directory to other onion websites. The Hidden Wiki is one of the most convenient ways to use deep web link directories. Some websites (like domain registration services) are totally legal, while others (like whistleblower tools) may be limited in your country. As a result, you should be cautious in your selection.

Hidden Wikihttp://zqktlwiuavvvqqt4ybvgvi7tyo4hjl5xgfuvpdf6otjiycgwqbym2qad.onion/wiki/index.php/Main_Page

This is a clone website of the real Facebook. You can try to be entirely anonymous by opening a Facebook account on the deep web. More crucially, this exact version of the social media network circumvents government surveillance. Some governments block or make social media inaccessible to their subjects. People can try to remain anonymous and communicate freely by using the deep web version of Facebook.

Facebookhttps://www.facebookcorewwwi.onion

SecureDrop is an anonymity tool for journalists, lawyers, and whistleblowers. As a source, you can use the SecureDrop installation to submit documents to the organization as a source anonymously. Lawyers use SecureDrop to receive source materials and communicate with anonymous contacts securely.

SecureDrop – https://secrdrop5wyphb5x.onion

Soylent News is an onion deep web search engine to search the invisible web that delivers the news. SoylentNews, an open-source and community-driven news aggregator, provides a breath of fresh air.

This site is run entirely by volunteers and covers various topics such as science, technology, business, code, digital liberty, and politics. Its material is updated daily, and you can submit stories, comments, and even monitor.

SoylentNewshttp://7rmath4ro2of2a42.onion

Torch is the earliest and most well-known deep web search engine to search the hidden web. It presently has over 290,000 .onion pages indexed and serves over 80,000 requests daily. It’s really simple to use and comprises merely a search box into which you can enter your search phrases.

Torch is the ultimate all-in-one deep web browser, combining the power of powerful browsing with media download and sharing. The torch search engine is one of the most established defaults search engines, well-known, and difficult-to-understand websites, and it is accessible through any VPN program (Tor Search = Torch).

Torchhttp://xmh57jrzrnw6insl.onion

Searx is another onion search engine that works on both the public and private internet. The benefit of SearX is that you can be extremely specific with your search queries. You can search for documents, images, maps, music, news, science, social media posts, and videos, among other types of content. As a result, SearX is the search engine to use if you’re seeking something specific. 

SearXhttp://ulrn6sryqaifefld.onion

Some countries and governments impose severe online censorship, preventing individuals from accessing international news websites. The BBC website is an excellent news source restricted in some authoritarian states. At the very least, not on the web’s surface. This is where Tor enters the picture.

The BBC has built a deep web-only Tor mirror of their news page. The idea is to allow users to visit the BBC website anonymously and without limitation, regardless of where they are. The BBC News website on the deep web is a global version. This means that it covers news from the United Kingdom and news from worldwide.

BBC Tor Mirrorhttp://bbcnewsv2vjtpsuy.onion

ProPublica is an investigative journalism organization with a presence on the surface web as well as a link to the deep web. This way, website visitors can remain anonymous if they so desire. This could be advantageous for those living under oppressive regimes, for example. After all, ProPublica isn’t afraid to take on controversial topics like child labor and political corruption. ProPublica provides news stories in both English and Spanish.

ProPublicahttps://www.propub3r6espa33w.onion

On the deep web, Hidden Answers is comparable to Reddit or Quora. You may ask whatever question you like without fear of being censored. Others in the community will try to respond to your inquiries. It’s also enjoyable to simply stroll around on this platform. Remember that this is an unfiltered area of the internet, and you may come across discussions that you do not want to be a part of.

If you are unfamiliar with the deep web, this is also a great place to ask questions. However, for specialized deep web questions, it is safer to consult a specific deep web subreddit.

Hidden Answershttp://answerstedhctbek.onion

Are you looking for music to accompany your exploration of the deep web links included in this article? You’ve come to the right place because the deep web has its own digital radio station. With Deep Web Radio, you can listen to various music streams via Tor. When we checked, we selected eleven distinct channels, each playing a different genre of music.

Deep Web Radiohttp://76qugh5bey5gum7l.onion

Similar to the Comic Book Library, the Imperial Library houses an extensive collection of digital books. In the case of the Imperial Library, this extends beyond comic books: it contains a variety of other types of content. At the time of writing, this online library had over 400,000 readers. Again, take care not to infringe on copyright.

Imperial Libraryhttp://xfmro77i3lixucja.onion

Are you a fan of comic books? Thousands of comic books, ranging from highly popular to incredibly esoteric publications, are available for download through the Comic Book Library. Simply be wary of any copyright violations when using the Comic Book Library to access comics.

Comic Book Libraryhttp://r6rfy5zlifbsiiym.onion

Although ZeroBin is not an email service, it is a great way to securely share information discovered over the Tor network with friends and other contacts. It’s a straightforward yet effective messaging tool that works by entering text or images into a text field and emailing them to the designated recipient.

After all, your data is encrypted before it reaches ZeroBin’s server. You can also add a password to your message and set the message’s expiration date. As a result, this communication tool provides a high level of privacy and confidentiality.

ZeroBinhttp://zerobinqmdqd236y.onion

ProtonMail is an encrypted email service located in Switzerland that is widely recognized as one of the best email clients available. They use end-to-end encryption and keep no logs. 

Furthermore, it is not necessary to give personal information to create an account. Notably, ProtonMail includes a web-based interface.  According to ProtonMail, using Tor to access ProtonMail provides security and freedom benefits.

After all, using Tor – the most popular and secure way to access the invisible web – makes it much more difficult for third parties to view the websites or (mail) services you visit.

ProtonMailhttps://protonirockerxow.onion

Share Websitecyber