- Binary Edge — Scans the internet for threat intelligence.
- Censys — Assessing attack surface for internet connected devices.
- CRT sh — Search for certs that have been logged by CT.
- Extension Total - Streamline enterprise supply chain security by quickly detecting malicious, risky, vulnerable, or non-compliant third-party extensions and software packages
- Fofa — Search for various threat intelligence.
- FullHunt — Search and discovery attack surfaces.
- GrayHatWarefare — Search public S3 buckets.
- Grep App — Search across a half million git repos.
- GreyNoise — Search for devices connected to the internet.
- Hunter — Search for email addresses belonging to a website.
- IntelligenceX — Search Tor, I2P, data leaks, domains, and emails.
- LeakIX — Search publicly indexed information.
- Netlas — Search and monitor internet connected assets.
- ONYPHE — Collects cyber-threat intelligence data.
- Packet Storm Security — Browse latest vulnerabilities and exploits.
- PublicWWW — Marketing and affiliate marketing research.
- Pulsedive — Search for threat intelligence.
- Shodan — Search for devices connected to the internet.
- URL Scan — Free service to scan and analyse websites.
- Vulners — Search vulnerabilities in a large database.
- Wigle — Database of wireless networks, with statistics.
- ZoomEye — Gather information about targets.