www.helpnetsecurity.com Open in urlscan Pro
44.229.251.251  Public Scan

URL: https://www.helpnetsecurity.com/2023/08/29/search-engines-cybersecurity-research/
Submission: On January 19 via manual from MY — Scanned from DE

Form analysis 1 forms found in the DOM

POST

<form id="mc4wp-form-1" class="mc4wp-form mc4wp-form-244483 mc4wp-ajax" method="post" data-id="244483" data-name="Footer newsletter form">
  <div class="mc4wp-form-fields">
    <div class="hns-newsletter">
      <div class="hns-newsletter__top">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__title">
              <i>
                        <svg class="hic">
                            <use xlink:href="#hic-plus"></use>
                        </svg>
                    </i>
              <span>Cybersecurity news</span>
            </div>
          </div>
        </div>
      </div>
      <div class="hns-newsletter__bottom">
        <div class="container">
          <div class="hns-newsletter__wrapper">
            <div class="hns-newsletter__body">
              <div class="row">
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="520ac2f639" id="mcs1">
                    <label class="form-check-label text-nowrap" for="mcs1">Daily Newsletter</label>
                  </div>
                </div>
                <div class="col">
                  <div class="form-check form-control-lg">
                    <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="d2d471aafa" id="mcs2">
                    <label class="form-check-label text-nowrap" for="mcs2">Weekly Newsletter</label>
                  </div>
                </div>
              </div>
            </div>
            <div class="form-check form-control-lg mb-3">
              <input class="form-check-input" type="checkbox" name="_mc4wp_lists[]" value="28abe5d9ef" id="mcs3">
              <label class="form-check-label" for="mcs3">(IN)SECURE - monthly newsletter with top articles</label>
            </div>
            <div class="input-group mb-3">
              <input type="email" name="email" id="email" class="form-control border-dark" placeholder="Please enter your e-mail address" aria-label="Please enter your e-mail address" aria-describedby="hns-newsletter-submit-btn" required="">
              <button class="btn btn-dark rounded-0" type="submit" id="hns-newsletter-submit-btn">Subscribe</button>
            </div>
            <div class="form-check">
              <input class="form-check-input" type="checkbox" name="AGREE_TO_TERMS" value="1" id="mcs4" required="">
              <label class="form-check-label" for="mcs4">
                <span>I have read and agree to the <a href="https://www.helpnetsecurity.com/newsletter/" target="_blank" rel="noopener" class="d-inline-block">terms &amp; conditions</a>
                </span>
              </label>
            </div>
          </div>
        </div>
      </div>
    </div>
  </div><label style="display: none !important;">Leave this field empty if you're human: <input type="text" name="_mc4wp_honeypot" value="" tabindex="-1" autocomplete="off"></label><input type="hidden" name="_mc4wp_timestamp"
    value="1705632322"><input type="hidden" name="_mc4wp_form_id" value="244483"><input type="hidden" name="_mc4wp_form_element_id" value="mc4wp-form-1">
  <div class="mc4wp-response"></div>
</form>

Text Content

 * News
 * Features
 * Expert analysis
 * Videos
 * Events
 * Whitepapers
 * Industry news
 * Product showcase
 * Newsletters

 * 
 * 
 * 


Please turn on your JavaScript for this page to function normally.
Help Net Security
August 29, 2023
Share


11 SEARCH ENGINES FOR CYBERSECURITY RESEARCH YOU CAN USE RIGHT NOW



Staying ahead in cybersecurity requires constant learning and adaptation. If
you’re interested in cybersecurity research, explore the resources outlined
below.




DNSDUMPSTER

DNSdumpster is a free domain research tool that can discover hosts related to a
domain. Finding visible hosts from the attackers’ perspective is an important
part of the security assessment process.




EXPLOIT DATABASE

Exploit Database is a CVE-compliant archive of public exploits and corresponding
vulnerable software developed for use by penetration testers and vulnerability
researchers. They aim to serve the most comprehensive collection of exploits
gathered through direct submissions, mailing lists, and other public sources and
present them in a freely-available and easy-to-navigate database.




FULLHUNT

FullHunt is the attack surface database of the Internet. FullHunt enables
companies to discover their attack surfaces, monitor them for exposure, and
continuously scan them for the latest security vulnerabilities.




GREYNOISE

GreyNoise collect, analyze, and label data on IPs that scan the internet and
saturate security tools with noise. This unique perspective helps analysts spend
less time on irrelevant or harmless activity, and more time on targeted and
emerging threats.




INTELLIGENCE X

Intelligence X differentiates itself from other search engines:

 * The search works with selectors, i.e. specific search terms such as email
   addresses, domains, URLs, IPs, CIDRs, Bitcoin addresses, IPFS hashes, etc.
 * It searches in places such as the darknet, document sharing platforms, whois
   data, public data leaks and others.
 * It keeps a historical data archive of results, similar to how the Wayback
   Machine from archive.org stores historical copies of websites.




NETLAS

Netlas offers a collection of internet intelligence apps that provide accurate
technical information on IP addresses, domain names, websites, web applications,
IoT devices, and other online assets.




ONYPHE

ONYPHE is a cyber defense search engine dedicated to attack surface discovery
and attack surface management. They scan the internet and dark web for exposed
assets and crawl the links just like a web search engine. Their data is
searchable with a web form or directly from numerous APIs.




SEARCHCODE

Searchcode allows you to search 75 billion lines of code from 40 million
projects. It helps you find real-world examples of functions, APIs and libraries
in 243 languages across 10+ public code sources.




SHODAN

Shodan is a search engine for Internet-connected devices. Discover how internet
intelligence can help you make better decisions. The entire Shodan platform
(crawling, IP lookups, searching, and data streaming) is available to
developers. Use their API to understand whether users connect from a VPN,
whether the website you’re visiting has been compromised, and more.




URLSCAN.IO

urlscan.io is a free service to scan and analyse websites. When a URL is
submitted to urlscan.io, an automated process will browse to the URL like a
regular user and record the activity that this page navigation creates. This
includes the domains and IPs contacted, the resources (JavaScript, CSS, etc.)
requested from those domains, as well as additional information about the page
itself.

urlscan.io will take a screenshot of the page, record the DOM content,
JavaScript global variables, cookies created by the page, and a myriad of other
observations. If the site is targeting the users one of the more than 900 brands
tracked by urlscan.io, it will be highlighted as potentially malicious in the
scan results.




WIGLE

Wigle consolidate location and information of wireless networks world-wide to a
central database, and have user-friendly desktop and web applications that can
map, query and update the database via the web.



More resources:

 * 12 open-source penetration testing tools you might not know about
 * 20 cybersecurity projects on GitHub you should check out
 * 8 open-source OSINT tools you should try





More about
 * cybersecurity
 * dark web
 * FullHunt
 * GreyNoise
 * Intelligence X
 * Netlas
 * OffSec
 * ONYPHE
 * penetration testing
 * Shodan

Share


FEATURED NEWS

 * Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot
 * Attribute-based encryption could spell the end of data compromise
 * Ransomware negotiation: When cybersecurity meets crisis management

Discover and secure every cloud and SaaS asset



SPONSORED

 * eBook: Defending the Infostealer Threat
 * Guide: SaaS Offboarding Checklist
 * eBook: Keeping Active Directory out of hackers’ cross-hairs




DON'T MISS

 * Poorly secured PostgreSQL, MySQL servers targeted by ransomware bot
 * VMware: Plug critical Aria Automation hole immediately! (CVE-2023-34063)
 * Attribute-based encryption could spell the end of data compromise
 * Skytrack: Open-source aircraft reconnaissance tool
 * Ransomware negotiation: When cybersecurity meets crisis management




Cybersecurity news
Daily Newsletter
Weekly Newsletter
(IN)SECURE - monthly newsletter with top articles
Subscribe
I have read and agree to the terms & conditions
Leave this field empty if you're human:

© Copyright 1998-2024 by Help Net Security
Read our privacy policy | About us | Advertise
Follow us
×