www.helpnetsecurity.com
Open in
urlscan Pro
44.229.251.251
Public Scan
URL:
https://www.helpnetsecurity.com/2023/08/29/search-engines-cybersecurity-research/
Submission: On January 19 via manual from MY — Scanned from DE
Submission: On January 19 via manual from MY — Scanned from DE
Form analysis
1 forms found in the DOMPOST
<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
<div class="mc4wp-form-fields">
<div class="hns-newsletter">
<div class="hns-newsletter__top">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__title">
<i>
<svg class="hic">
<use xlink:href="#hic-plus"></use>
</svg>
</i>
<span>Cybersecurity news</span>
</div>
</div>
</div>
</div>
<div class="hns-newsletter__bottom">
<div class="container">
<div class="hns-newsletter__wrapper">
<div class="hns-newsletter__body">
<div class="row">
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
<label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
</div>
</div>
<div class="col">
<div class="form-check form-control-lg">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
<label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
</div>
</div>
</div>
</div>
<div class="form-check form-control-lg mb-3">
<input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
<label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
</div>
<div class="input-group mb-3">
<input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
<button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
</div>
<div class="form-check">
<input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
<label class="form-check-label" for="mcs4">
<span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms & conditions</a>
</span>
</label>
</div>
</div>
</div>
</div>
</div>
</div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
value="1705632322"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
<div class="mc4wp-response"></div>
</form>
Text Content
* News * Features * Expert analysis * Videos * Events * Whitepapers * Industry news * Product showcase * Newsletters * * * Please turn on your JavaScript for this page to function normally. Help Net Security August 29, 2023 Share 11 SEARCH ENGINES FOR CYBERSECURITY RESEARCH YOU CAN USE RIGHT NOW Staying ahead in cybersecurity requires constant learning and adaptation. If you’re interested in cybersecurity research, explore the resources outlined below. DNSDUMPSTER DNSdumpster is a free domain research tool that can discover hosts related to a domain. Finding visible hosts from the attackers’ perspective is an important part of the security assessment process. EXPLOIT DATABASE Exploit Database is a CVE-compliant archive of public exploits and corresponding vulnerable software developed for use by penetration testers and vulnerability researchers. They aim to serve the most comprehensive collection of exploits gathered through direct submissions, mailing lists, and other public sources and present them in a freely-available and easy-to-navigate database. FULLHUNT FullHunt is the attack surface database of the Internet. FullHunt enables companies to discover their attack surfaces, monitor them for exposure, and continuously scan them for the latest security vulnerabilities. GREYNOISE GreyNoise collect, analyze, and label data on IPs that scan the internet and saturate security tools with noise. This unique perspective helps analysts spend less time on irrelevant or harmless activity, and more time on targeted and emerging threats. INTELLIGENCE X Intelligence X differentiates itself from other search engines: * The search works with selectors, i.e. specific search terms such as email addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc. * It searches in places such as the darknet, document sharing platforms, whois data, public data leaks and others. * It keeps a historical data archive of results, similar to how the Wayback Machine from archive.org stores historical copies of websites. NETLAS Netlas offers a collection of internet intelligence apps that provide accurate technical information on IP addresses, domain names, websites, web applications, IoT devices, and other online assets. ONYPHE ONYPHE is a cyber defense search engine dedicated to attack surface discovery and attack surface management. They scan the internet and dark web for exposed assets and crawl the links just like a web search engine. Their data is searchable with a web form or directly from numerous APIs. SEARCHCODE Searchcode allows you to search 75 billion lines of code from 40 million projects. It helps you find real-world examples of functions, APIs and libraries in 243 languages across 10+ public code sources. SHODAN Shodan is a search engine for Internet-connected devices. Discover how internet intelligence can help you make better decisions. The entire Shodan platform (crawling, IP lookups, searching, and data streaming) is available to developers. Use their API to understand whether users connect from a VPN, whether the website you’re visiting has been compromised, and more. URLSCAN.IO urlscan.io is a free service to scan and analyse websites. When a URL is submitted to urlscan.io, an automated process will browse to the URL like a regular user and record the activity that this page navigation creates. This includes the domains and IPs contacted, the resources (JavaScript, CSS, etc.) requested from those domains, as well as additional information about the page itself. urlscan.io will take a screenshot of the page, record the DOM content, JavaScript global variables, cookies created by the page, and a myriad of other observations. If the site is targeting the users one of the more than 900 brands tracked by urlscan.io, it will be highlighted as potentially malicious in the scan results. WIGLE Wigle consolidate location and information of wireless networks world-wide to a central database, and have user-friendly desktop and web applications that can map, query and update the database via the web. More resources: * 12 open-source penetration testing tools you might not know about * 20 cybersecurity projects on GitHub you should check out * 8 open-source OSINT tools you should try More about * cybersecurity * dark web * FullHunt * GreyNoise * Intelligence X * Netlas * OffSec * ONYPHE * penetration testing * Shodan Share FEATURED NEWS * Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot * Attribute-based encryption could spell the end of data compromise * Ransomware negotiation: When cybersecurity meets crisis management Discover and secure every cloud and SaaS asset SPONSORED * eBook: Defending the Infostealer Threat * Guide: SaaS Offboarding Checklist * eBook: Keeping Active Directory out of hackers’ cross-hairs DON'T MISS * Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot * VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063) * Attribute-based encryption could spell the end of data compromise * Skytrack: Open-source aircraft reconnaissance tool * Ransomware negotiation: When cybersecurity meets crisis management Cybersecurity news Daily Newsletter Weekly Newsletter (IN)SECURE - monthly newsletter with top articles Subscribe I have read and agree to the terms & conditions Leave this field empty if you're human: © Copyright 1998-2024 by Help Net Security Read our privacy policy | About us | Advertise Follow us ×