30 Best cybersecurity search engines

Here are 30 cybersecurity search engines

Cybersecurity search engines are specialized search engines that focus on indexing and retrieving information related to cybersecurity topics. These search engines are designed to help cybersecurity professionals, researchers, analysts, and enthusiasts find specific information related to threats, vulnerabilities, security tools, news, advisories, research papers, and other relevant resources within the cybersecurity domain.

These search engines may differ from general-purpose search engines like Google or Bing in that they often crawl and index websites, forums, blogs, and other online resources that are specifically related to cybersecurity. They may also offer advanced search features tailored to cybersecurity professionals, such as the ability to search for specific vulnerabilities, malware samples, exploit code, security advisories, and more.

Examples of common cybersecurity search engines include:

1. Shodan: Shodan is a search engine that indexes internet-connected devices and services. It allows users to search for specific devices, such as webcams, routers, servers, and more, and provides information about their configurations and vulnerabilities.

2. Censys: Censys is another search engine that focuses on internet-wide scanning and indexing. It provides information about SSL certificates, website configurations, and other data related to internet-connected devices.

3. VirusTotal: VirusTotal is a free online service that aggregates antivirus scan engines to analyze files and URLs for potential malware. It allows users to search for specific files, URLs, IP addresses, and domains to check for malicious activity.

4. ZoomEye: ZoomEye is a search engine that focuses on scanning and indexing internet-connected devices, including IoT devices, web servers, databases, and more. It provides information about device configurations, vulnerabilities, and potential security issues.

5. Recorded Future: Recorded Future is a threat intelligence platform that offers a search engine to discover and analyze information about threats, vulnerabilities, actors, and attack techniques. It provides access to a vast database of threat intelligence feeds, dark web sources, and open-source intelligence.

These are just a few examples, and there are many other cybersecurity search engines and platforms available, each with its own set of features and capabilities tailored to different cybersecurity use cases.


1. Dehashed—View leaked credentials.
2. SecurityTrails—Extensive DNS data.
3. DorkSearch—Really fast Google dorking.
4. ExploitDB—Archive of various exploits.
5. ZoomEye—Gather information about targets.
6. Pulsedive—Search for threat intelligence.
7. GrayHatWarefare—Search public S3 buckets.
8. PolySwarm—Scan files and URLs for threats.
9. Fofa—Search for various threat intelligence.
10. LeakIX—Search publicly indexed information.
11. DNSDumpster—Search for DNS records quickly.
13. FullHunt—Search and discovery attack surfaces.
14. AlienVault—Extensive threat intelligence feed.
12. ONYPHE—Collects cyber-threat intelligence data.
15. Grep App—Search across a half million git repos.
17. URL Scan—Free service to scan and analyse websites.
18. Vulners—Search vulnerabilities in a large database.
19. WayBackMachine—View content from deleted websites.
16. Shodan—Search for devices connected to the internet.
21. Netlas—Search and monitor internet connected assets.
22. CRT sh—Search for certs that have been logged by CT.
20. Wigle—Database of wireless networks, with statistics.
23. PublicWWW—Marketing and affiliate marketing research.
24. Binary Edge—Scans the internet for threat intelligence.
25. GreyNoise—Search for devices connected to the internet.
26. Hunter—Search for email addresses belonging to a website.
27. Censys—Assessing attack surface for internet connected devices.
28. IntelligenceX—Search Tor, I2P, data leaks, domains, and emails.
29. Packet Storm Security—Browse latest vulnerabilities and exploits.
30. SearchCode—Search 75 billion lines of code from 40 million projects.