Transcribed from https://twitter.com/voldimmoral/status/1698774525284884529
# | url/link | type |
---|---|---|
1. | shodan.io | (Server) |
2. | google.com | (Dorks) |
3. | wigle.net | (WiFi Networks) |
4. | grep.app | (Codes Search) |
6. | onyphe.io | (Server) |
7. | viz.greynoise.io | (Threat Intelligence) |
8. | censys.io | (Server) |
9. | hunter.io | (Email Addresses) |
10. | fofa.info | (Threat Intelligence) |
11. | zoomeye.org | (Threat Intelligence) |
12. | leakix.net | (Threat Intelligence) |
13. | intelx.io | (OSINT) |
14. | app.netlas.io | (Attack Surface) |
15. | searchcode.com | (Codes Search) |
16. | urlscan.io | (Threat Intelligence) |
17. | publicwww.com | (Codes Search) |
18. | fullhunt.io | (Attack Surface) |
19. | socradar.io | (Threat Intelligence) |
20. | ivre.rocks | (Server) |
21. | crt.sh | (Certificate Search) |
22. | vulners.com | (Vulnerabilities) |
23. | pulsdive.com | (Threat Intelligence) |
24. | app.binaryedge.io* | (Threat Intelligence) // (Attack Surface) |
(*) This app was listed twice in the original post, once as 'app.binaryedge' and once as 'app.binaryedge.io'. Since it requires a login and seems a bit dated (c) is from 2020, I took the liberty to move it at the end of the list.