{"id":22800,"date":"2021-07-24T21:15:55","date_gmt":"2021-07-24T21:15:55","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=22800"},"modified":"2021-07-24T21:18:49","modified_gmt":"2021-07-24T21:18:49","slug":"top-101-free-open-source-tools-for-mass-scanners-search-engines","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/top-101-free-open-source-tools-for-mass-scanners-search-engines\/","title":{"rendered":"Top 101 free open source tools for Mass scanners &#038; search engines"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Mass scanners (search engines)<\/h5>\n\n\n\n<p>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/censys.io\/\"><strong>Censys<\/strong><\/a>\u00a0&#8211; platform that helps information security practitioners discover, monitor, and analyze devices.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.shodan.io\/\"><strong>Shodan<\/strong><\/a>\u00a0&#8211; the world&#8217;s first search engine for Internet-connected devices.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/2000.shodan.io\/#\/\"><strong>Shodan 2000<\/strong><\/a>\u00a0&#8211; this tool looks for randomly generated data from Shodan.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/viz.greynoise.io\/table\"><strong>GreyNoise<\/strong><\/a>\u00a0&#8211; mass scanner such as Shodan and Censys.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.zoomeye.org\/\"><strong>ZoomEye<\/strong><\/a>\u00a0&#8211; search engine for cyberspace that lets the user find specific network components.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/netograph.io\/\"><strong>netograph<\/strong><\/a>\u00a0&#8211; tools to monitor and understand deep structure of the web.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/fofa.so\/\"><strong>FOFA<\/strong><\/a>\u00a0&#8211; is a cyberspace search engine.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.onyphe.io\/\"><strong>onyphe<\/strong><\/a>\u00a0&#8211; is a search engine for open-source and cyber threat intelligence data collected.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/intelx.io\/\"><strong>IntelligenceX<\/strong><\/a>\u00a0&#8211; is a search engine and data archive.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/app.binaryedge.io\/\"><strong>binaryedge<\/strong><\/a>\u00a0&#8211; it scan the entire internet space and create real-time threat intelligence streams and reports.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/spyse.com\/\"><strong>Spyse<\/strong><\/a>\u00a0&#8211; Internet assets registry: networks, threats, web objects, etc.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/wigle.net\/\"><strong>wigle<\/strong><\/a>\u00a0&#8211; is a submission-based catalog of wireless networks. All the networks. Found by Everyone.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/publicwww.com\/\"><strong>PublicWWW<\/strong><\/a>\u00a0&#8211; find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/inteltechniques.com\/index.html\"><strong>IntelTechniques<\/strong><\/a>\u00a0&#8211; this repository contains hundreds of online search utilities.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/hunter.io\/\"><strong>hunter<\/strong><\/a>\u00a0&#8211; lets you find email addresses in seconds and connect with the people that matter for your business.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/ghostproject.fr\/\"><strong>GhostProject?<\/strong><\/a>\u00a0&#8211; search by full email address or username.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.databreaches.live\/\"><strong>databreaches<\/strong><\/a>\u00a0&#8211; was my email affected by data breach?<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/weleakinfo.com\/\"><strong>We Leak Info<\/strong><\/a>\u00a0&#8211; world&#8217;s fastest and largest data breach search engine.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/pulsedive.com\/\"><strong>Pulsedive<\/strong><\/a>\u00a0&#8211; scans of malicious URLs, IPs, and domains, including port scans and web requests.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/buckets.grayhatwarfare.com\/\"><strong>Buckets by Grayhatwarfar<\/strong><\/a>\u00a0&#8211; database with public search for Open Amazon S3 Buckets and their contents.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/vigilante.pw\/\"><strong>Vigilante.pw<\/strong><\/a>\u00a0&#8211; the breached database directory.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/builtwith.com\/\"><strong>builtwith<\/strong><\/a>\u00a0&#8211; find out what websites are built with.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/nerdydata.com\/\"><strong>NerdyData<\/strong><\/a>\u00a0&#8211; search the web&#8217;s source code for technologies, across millions of sites.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/zorexeye.com\/\"><strong>zorexeye<\/strong><\/a>\u00a0&#8211; search for sites, images, apps, softwares &amp; more.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.mmnt.net\/\"><strong>Mamont&#8217;s open FTP Index<\/strong><\/a>\u00a0&#8211; if a target has an open FTP site with accessible content it will be listed here.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/osintframework.com\/\"><strong>OSINT Framework<\/strong><\/a>\u00a0&#8211; focused on gathering information from free tools or resources.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.maltiverse.com\/search\"><strong>maltiverse<\/strong><\/a>\u00a0&#8211; is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/leakedsource.ru\/main\/\"><strong>Leaked Source<\/strong><\/a>\u00a0&#8211; is a collaboration of data found online in the form of a lookup.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/search.weleakinfo.com\/\"><strong>We Leak Info<\/strong><\/a>\u00a0&#8211; to help everyday individuals secure their online life, avoiding getting hacked.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/pipl.com\/\"><strong>pipl<\/strong><\/a>\u00a0&#8211; is the place to find the person behind the email address, social username or phone number.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/abuse.ch\/\"><strong>abuse.ch<\/strong><\/a>\u00a0&#8211; is operated by a random swiss guy fighting malware for non-profit.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/malc0de.com\/database\/\"><strong>malc0de<\/strong><\/a>\u00a0&#8211; malware search engine.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/cybercrime-tracker.net\/index.php\"><strong>Cybercrime Tracker<\/strong><\/a>\u00a0&#8211; monitors and tracks various malware families that are used to perpetrate cyber crimes.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/github.com\/eth0izzle\/shhgit\/\"><strong>shhgit<\/strong><\/a>\u00a0&#8211; find GitHub secrets in real time.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/searchcode.com\/\"><strong>searchcode<\/strong><\/a>\u00a0&#8211; helping you find real world examples of functions, API&#8217;s and libraries.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/www.insecam.org\/\"><strong>Insecam<\/strong><\/a>\u00a0&#8211; the world biggest directory of online surveillance security cameras.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/index-of.es\/\"><strong>index-of<\/strong><\/a>\u00a0&#8211; contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/opendata.rapid7.com\/\"><strong>Rapid7 Labs Open Data<\/strong><\/a>\u00a0&#8211; is a great resources of datasets from Project Sonar.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/webtechsurvey.com\/common-response-headers\"><strong>Common Response Headers<\/strong><\/a>\u00a0&#8211; the largest database of HTTP response headers.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Mobile apps scanners<\/h5>\n\n\n\n<p>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.immuniweb.com\/mobile\/\"><strong>ImmuniWeb\u00ae Mobile App Scanner<\/strong><\/a>\u00a0&#8211; test security and privacy of mobile apps (iOS &amp; Android).<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/vulnerabilitytest.quixxi.com\/\"><strong>Quixxi<\/strong><\/a>\u00a0&#8211; free Mobile App Vulnerability Scanner for Android &amp; iOS.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.ostorlab.co\/scan\/mobile\/\"><strong>Ostorlab<\/strong><\/a>\u00a0&#8211; analyzes mobile application to identify vulnerabilities and potential weaknesses.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Private Search Engines<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.startpage.com\/\"><strong>Startpage<\/strong><\/a>&nbsp;&#8211; the world&#8217;s most private search engine.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/searx.me\/\"><strong>searX<\/strong><\/a>&nbsp;&#8211; a privacy-respecting, hackable metasearch engine.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/darksearch.io\/\"><strong>darksearch<\/strong><\/a>&nbsp;&#8211; the 1st real Dark Web search engine.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.qwant.com\/\"><strong>Qwant<\/strong><\/a>&nbsp;&#8211; the search engine that respects your privacy.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/duckduckgo.com\/\"><strong>DuckDuckGo<\/strong><\/a>&nbsp;&#8211; the search engine that doesn&#8217;t track you.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/swisscows.com\/\"><strong>Swisscows<\/strong><\/a>&nbsp;&#8211; privacy safe web search<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/search.disconnect.me\/\"><strong>Disconnect<\/strong><\/a>&nbsp;&#8211; the search engine that anonymizes your searches.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/metager.org\/\"><strong>MetaGer<\/strong><\/a>&nbsp;&#8211; the search engine that uses anonymous proxy and hidden Tor branches.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mass scanners (search engines) \u00a0\u00a0\ud83d\udd38\u00a0Censys\u00a0&#8211; platform that helps information security practitioners discover, monitor, and analyze devices.\u00a0\u00a0\ud83d\udd38\u00a0Shodan\u00a0&#8211; the world&#8217;s first search engine for Internet-connected devices.\u00a0\u00a0\ud83d\udd38\u00a0Shodan 2000\u00a0&#8211; this tool&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-22800","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=22800"}],"version-history":[{"count":2,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22800\/revisions"}],"predecessor-version":[{"id":22804,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22800\/revisions\/22804"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=22800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=22800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=22800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}