{"id":22800,"date":"2021-07-24T21:15:55","date_gmt":"2021-07-24T21:15:55","guid":{"rendered":"https:\/\/www.devopsschool.com\/blog\/?p=22800"},"modified":"2021-07-24T21:18:49","modified_gmt":"2021-07-24T21:18:49","slug":"top-101-free-open-source-tools-for-mass-scanners-search-engines","status":"publish","type":"post","link":"https:\/\/www.devopsschool.com\/blog\/top-101-free-open-source-tools-for-mass-scanners-search-engines\/","title":{"rendered":"Top 101 free open source tools for Mass scanners &#038; search engines"},"content":{"rendered":"\n<h5 class=\"wp-block-heading\">Mass scanners (search engines)<\/h5>\n\n\n\n<p>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/censys.io\/\" target=\"_blank\" rel=\"noopener\"><strong>Censys<\/strong><\/a>\u00a0&#8211; platform that helps information security practitioners discover, monitor, and analyze devices.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.shodan.io\/\" target=\"_blank\" rel=\"noopener\"><strong>Shodan<\/strong><\/a>\u00a0&#8211; the world&#8217;s first search engine for Internet-connected devices.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/2000.shodan.io\/#\/\" target=\"_blank\" rel=\"noopener\"><strong>Shodan 2000<\/strong><\/a>\u00a0&#8211; this tool looks for randomly generated data from Shodan.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/viz.greynoise.io\/table\" target=\"_blank\" rel=\"noopener\"><strong>GreyNoise<\/strong><\/a>\u00a0&#8211; mass scanner such as Shodan and Censys.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.zoomeye.org\/\" target=\"_blank\" rel=\"noopener\"><strong>ZoomEye<\/strong><\/a>\u00a0&#8211; search engine for cyberspace that lets the user find specific network components.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/netograph.io\/\" target=\"_blank\" rel=\"noopener\"><strong>netograph<\/strong><\/a>\u00a0&#8211; tools to monitor and understand deep structure of the web.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/fofa.so\/\" target=\"_blank\" rel=\"noopener\"><strong>FOFA<\/strong><\/a>\u00a0&#8211; is a cyberspace search engine.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.onyphe.io\/\" target=\"_blank\" rel=\"noopener\"><strong>onyphe<\/strong><\/a>\u00a0&#8211; is a search engine for open-source and cyber threat intelligence data collected.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/intelx.io\/\" target=\"_blank\" rel=\"noopener\"><strong>IntelligenceX<\/strong><\/a>\u00a0&#8211; is a search engine and data archive.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/app.binaryedge.io\/\" target=\"_blank\" rel=\"noopener\"><strong>binaryedge<\/strong><\/a>\u00a0&#8211; it scan the entire internet space and create real-time threat intelligence streams and reports.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/spyse.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Spyse<\/strong><\/a>\u00a0&#8211; Internet assets registry: networks, threats, web objects, etc.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/wigle.net\/\" target=\"_blank\" rel=\"noopener\"><strong>wigle<\/strong><\/a>\u00a0&#8211; is a submission-based catalog of wireless networks. All the networks. Found by Everyone.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/publicwww.com\/\" target=\"_blank\" rel=\"noopener\"><strong>PublicWWW<\/strong><\/a>\u00a0&#8211; find any alphanumeric snippet, signature or keyword in the web pages HTML, JS and CSS code.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/inteltechniques.com\/index.html\" target=\"_blank\" rel=\"noopener\"><strong>IntelTechniques<\/strong><\/a>\u00a0&#8211; this repository contains hundreds of online search utilities.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/hunter.io\/\" target=\"_blank\" rel=\"noopener\"><strong>hunter<\/strong><\/a>\u00a0&#8211; lets you find email addresses in seconds and connect with the people that matter for your business.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/ghostproject.fr\/\" target=\"_blank\" rel=\"noopener\"><strong>GhostProject?<\/strong><\/a>\u00a0&#8211; search by full email address or username.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.databreaches.live\/\" target=\"_blank\" rel=\"noopener\"><strong>databreaches<\/strong><\/a>\u00a0&#8211; was my email affected by data breach?<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/weleakinfo.com\/\" target=\"_blank\" rel=\"noopener\"><strong>We Leak Info<\/strong><\/a>\u00a0&#8211; world&#8217;s fastest and largest data breach search engine.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/pulsedive.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Pulsedive<\/strong><\/a>\u00a0&#8211; scans of malicious URLs, IPs, and domains, including port scans and web requests.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/buckets.grayhatwarfare.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Buckets by Grayhatwarfar<\/strong><\/a>\u00a0&#8211; database with public search for Open Amazon S3 Buckets and their contents.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/vigilante.pw\/\" target=\"_blank\" rel=\"noopener\"><strong>Vigilante.pw<\/strong><\/a>\u00a0&#8211; the breached database directory.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/builtwith.com\/\" target=\"_blank\" rel=\"noopener\"><strong>builtwith<\/strong><\/a>\u00a0&#8211; find out what websites are built with.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/nerdydata.com\/\" target=\"_blank\" rel=\"noopener\"><strong>NerdyData<\/strong><\/a>\u00a0&#8211; search the web&#8217;s source code for technologies, across millions of sites.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/zorexeye.com\/\" target=\"_blank\" rel=\"noopener\"><strong>zorexeye<\/strong><\/a>\u00a0&#8211; search for sites, images, apps, softwares &amp; more.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.mmnt.net\/\" target=\"_blank\" rel=\"noopener\"><strong>Mamont&#8217;s open FTP Index<\/strong><\/a>\u00a0&#8211; if a target has an open FTP site with accessible content it will be listed here.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/osintframework.com\/\" target=\"_blank\" rel=\"noopener\"><strong>OSINT Framework<\/strong><\/a>\u00a0&#8211; focused on gathering information from free tools or resources.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.maltiverse.com\/search\" target=\"_blank\" rel=\"noopener\"><strong>maltiverse<\/strong><\/a>\u00a0&#8211; is a service oriented to cybersecurity analysts for the advanced analysis of indicators of compromise.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/leakedsource.ru\/main\/\" target=\"_blank\" rel=\"noopener\"><strong>Leaked Source<\/strong><\/a>\u00a0&#8211; is a collaboration of data found online in the form of a lookup.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/search.weleakinfo.com\/\" target=\"_blank\" rel=\"noopener\"><strong>We Leak Info<\/strong><\/a>\u00a0&#8211; to help everyday individuals secure their online life, avoiding getting hacked.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/pipl.com\/\" target=\"_blank\" rel=\"noopener\"><strong>pipl<\/strong><\/a>\u00a0&#8211; is the place to find the person behind the email address, social username or phone number.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/abuse.ch\/\" target=\"_blank\" rel=\"noopener\"><strong>abuse.ch<\/strong><\/a>\u00a0&#8211; is operated by a random swiss guy fighting malware for non-profit.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/malc0de.com\/database\/\" target=\"_blank\" rel=\"noopener\"><strong>malc0de<\/strong><\/a>\u00a0&#8211; malware search engine.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/cybercrime-tracker.net\/index.php\" target=\"_blank\" rel=\"noopener\"><strong>Cybercrime Tracker<\/strong><\/a>\u00a0&#8211; monitors and tracks various malware families that are used to perpetrate cyber crimes.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/github.com\/eth0izzle\/shhgit\/\" target=\"_blank\" rel=\"noopener\"><strong>shhgit<\/strong><\/a>\u00a0&#8211; find GitHub secrets in real time.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/searchcode.com\/\" target=\"_blank\" rel=\"noopener\"><strong>searchcode<\/strong><\/a>\u00a0&#8211; helping you find real world examples of functions, API&#8217;s and libraries.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/www.insecam.org\/\" target=\"_blank\" rel=\"noopener\"><strong>Insecam<\/strong><\/a>\u00a0&#8211; the world biggest directory of online surveillance security cameras.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"http:\/\/index-of.es\/\" target=\"_blank\" rel=\"noopener\"><strong>index-of<\/strong><\/a>\u00a0&#8211; contains great stuff like: security, hacking, reverse engineering, cryptography, programming etc.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/opendata.rapid7.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Rapid7 Labs Open Data<\/strong><\/a>\u00a0&#8211; is a great resources of datasets from Project Sonar.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/webtechsurvey.com\/common-response-headers\" target=\"_blank\" rel=\"noopener\"><strong>Common Response Headers<\/strong><\/a>\u00a0&#8211; the largest database of HTTP response headers.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Mobile apps scanners<\/h5>\n\n\n\n<p>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.immuniweb.com\/mobile\/\" target=\"_blank\" rel=\"noopener\"><strong>ImmuniWeb\u00ae Mobile App Scanner<\/strong><\/a>\u00a0&#8211; test security and privacy of mobile apps (iOS &amp; Android).<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/vulnerabilitytest.quixxi.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Quixxi<\/strong><\/a>\u00a0&#8211; free Mobile App Vulnerability Scanner for Android &amp; iOS.<br>\u00a0\u00a0\ud83d\udd38\u00a0<a href=\"https:\/\/www.ostorlab.co\/scan\/mobile\/\" target=\"_blank\" rel=\"noopener\"><strong>Ostorlab<\/strong><\/a>\u00a0&#8211; analyzes mobile application to identify vulnerabilities and potential weaknesses.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Private Search Engines<\/h5>\n\n\n\n<p>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.startpage.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Startpage<\/strong><\/a>&nbsp;&#8211; the world&#8217;s most private search engine.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/searx.me\/\" target=\"_blank\" rel=\"noopener\"><strong>searX<\/strong><\/a>&nbsp;&#8211; a privacy-respecting, hackable metasearch engine.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/darksearch.io\/\" target=\"_blank\" rel=\"noopener\"><strong>darksearch<\/strong><\/a>&nbsp;&#8211; the 1st real Dark Web search engine.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/www.qwant.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Qwant<\/strong><\/a>&nbsp;&#8211; the search engine that respects your privacy.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/duckduckgo.com\/\" target=\"_blank\" rel=\"noopener\"><strong>DuckDuckGo<\/strong><\/a>&nbsp;&#8211; the search engine that doesn&#8217;t track you.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/swisscows.com\/\" target=\"_blank\" rel=\"noopener\"><strong>Swisscows<\/strong><\/a>&nbsp;&#8211; privacy safe web search<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/search.disconnect.me\/\" target=\"_blank\" rel=\"noopener\"><strong>Disconnect<\/strong><\/a>&nbsp;&#8211; the search engine that anonymizes your searches.<br>&nbsp;&nbsp;\ud83d\udd38&nbsp;<a href=\"https:\/\/metager.org\/\" target=\"_blank\" rel=\"noopener\"><strong>MetaGer<\/strong><\/a>&nbsp;&#8211; the search engine that uses anonymous proxy and hidden Tor branches.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mass scanners (search engines) \u00a0\u00a0\ud83d\udd38\u00a0Censys\u00a0&#8211; platform that helps information security practitioners discover, monitor, and analyze devices.\u00a0\u00a0\ud83d\udd38\u00a0Shodan\u00a0&#8211; the world&#8217;s first search engine for Internet-connected devices.\u00a0\u00a0\ud83d\udd38\u00a0Shodan 2000\u00a0&#8211; this tool looks for randomly&#8230; <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_joinchat":[],"footnotes":""},"categories":[2],"tags":[],"class_list":["post-22800","post","type-post","status-publish","format-standard","hentry","category-uncategorised"],"_links":{"self":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/comments?post=22800"}],"version-history":[{"count":2,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22800\/revisions"}],"predecessor-version":[{"id":22804,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/posts\/22800\/revisions\/22804"}],"wp:attachment":[{"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/media?parent=22800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/categories?post=22800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.devopsschool.com\/blog\/wp-json\/wp\/v2\/tags?post=22800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}