banner
leaf

leaf

It is better to manage the army than to manage the people. And the enemy.
follow
substack
tg_channel

24 Top OSINT Search Engines Recommended + Practical Tutorial (with Links)

This article is carefully organized for open-source intelligence (OSINT) enthusiasts and is recommended for collection!

In the fields of cybersecurity and open-source intelligence (OSINT), information gathering is the most fundamental and critical step in penetration testing, red team operations, and security analysis.
This article will comprehensively outline 24 highly practical OSINT search engines, covering various directions such as server detection, vulnerability mining, email searching, code searching, and attack surface discovery, along with simple tutorials.


📌 Tool Category Navigation#

Type
Tool Examples
🌐 Server / Asset Search
Shodan, Censys, Onyphe, IVRE
🔍 Threat Intelligence Collection
GreyNoise, FOFA, ZoomEye, LeakIX, Pulsedive
🛡️ Vulnerability and Weakness Mining
Vulners, BinaryEdge, Shodan
💻 Code Search
Grep.app, Searchcode, PublicWWW
🧠 Comprehensive OSINT Platform
IntelX, Google Dorks
📧 Email & Personnel Collection
Hunter.io
📡 WiFi Network Map
Wigle
🔐 Certificate History Query
crt.sh
🧱 Attack Surface Management
Netlas, FullHunt, BinaryEdge

01. Shodan.io[1]#

The world's leading device search engine that can search for servers, cameras, databases, etc., quickly locating public assets and vulnerabilities.

🔧 Example Search:

port:22 country:"CN"

02. Google.com[2] + Dorks#

Utilizes advanced syntax combinations to achieve "information mining," capable of digging up logs, configuration files, hidden pages, etc.

🔍 Example:

intitle:"index of" site:example.com

👉 Recommended Resource: Google Hacking Database[3]


03. Wigle.net[4]#

A global WiFi mapping platform that supports searching WiFi records by location or SSID.


04. Grep.app[5]#

A full-text search engine for open-source code on GitHub, suitable for finding sensitive functions, plaintext passwords, etc.


05. BinaryEdge.io[6]#

Provides global asset scanning results, vulnerabilities, port information, etc., and is a strong complement to Shodan.


06. Onyphe.io[7]#

A cyberspace threat intelligence platform that supports multi-dimensional searches for IPs, domain names, file hashes, etc.


07. GreyNoise[8]#

Determines whether an IP is "background noise" (scanners, honeypots, researchers) or a genuine malicious actor.


08. Censys.io[9]#

An internet asset search engine, particularly adept at SSL certificate analysis.


09. Hunter.io[10]#

Finds related public email addresses through corporate domain names, facilitating social engineering analysis.


10. FOFA.info[11]#

A powerful Chinese cyberspace search engine that supports subdomain, protocol, CMS identification, etc.


11. ZoomEye.org[12]#

Similar to Shodan, it searches for globally open service ports, identifying honeypots, industrial control systems, etc.


12. LeakIX.net[13]#

A platform focused on data leaks that can discover misconfigured databases / APIs, etc.


13. IntelX.io[14]#

Aggregates emails, IPs, documents, dark web, and data leak records, serving as a powerful comprehensive OSINT tool.


14. Netlas.io[15]#

Focuses on attack surface management and asset mapping, suitable for enterprise asset monitoring.


15. Searchcode.com[16]#

Can search source code across multiple code platforms, a secret weapon in security analysis.


16. URLScan.io[17]#

Visualizes the loading resources and script behaviors of URLs, a powerful tool for phishing website analysis.


17. PublicWWW.com[18]#

Searches web pages based on HTML snippets, capable of finding websites that have embedded specific code.


18. FullHunt.io[19]#

A real-time attack surface discovery tool that can be used for asset assessment from red team and blue team perspectives.


19. SOCRadar.io[20]#

Provides threat intelligence, data leak monitoring, attack attribution, and other functions.


20. BinaryEdge.io (Main Site)[21]#

In addition to sub-site data platforms, it also allows viewing product ecosystems, open APIs, and more.


21. IVRE.rocks[22]#

A self-built data visualization platform for asset scanning analysis.


22. crt.sh[23]#

Queries SSL certificate transparency logs to discover domain names, subdomains, historical certificates, etc.


23. Vulners.com[24]#

A vulnerability database aggregation search, suitable for security researchers looking for PoC, patches, and other information.


24. Pulsedive.com[25]#

A threat intelligence platform that aggregates URL/IP/domain reputation and IOC data.


🧠 Practical Usage Suggestions#

The suggested steps for intelligence gathering are as follows:

  1. Personnel Profiling Analysis: Use hunter.io to obtain corporate emails → Combine with intelx.io to check data leak records

  2. Asset Discovery: Search corporate public hosts using fofa.info, shodan.io, netlas.io, etc.

  3. Code Analysis: Use grep.app and searchcode.com to find sensitive information or hardcoded credentials

  4. Vulnerability Matching: Search for corresponding asset CVE numbers and exploitation methods on vulners.com

  5. Threat Validation: Use greynoise or pulsedive to identify whether there are any attack behaviors or IOC tags

  6. Website Analysis: Conduct visual analysis of target site behavior through urlscan.io

Alternatives to the open-source intelligence framework "osintframework"

When I first ventured into the OSINT field, the first learning website recommended to me by my seniors was osintframework.com. This site not only guided me into

osintframework is a web-based tool designed to help collect and process open-source intelligence (OSINT) across various fields and topics. It organizes resources in a hierarchical manner, providing researchers, investigators, and security professionals with a structured directory of OSINT tools and resources. The framework categorizes resources and tools into different themes, such as social media, domain names, IP addresses, personnel searches, etc., to assist in collecting publicly available information.

The framework does not directly host tools but serves as a directory linking to various online resources, tools, and websites that can be used for OSINT purposes. It is a valuable resource for those conducting investigations, cybersecurity analysis, background checks, and anyone interested in collecting information from public sources.

The OSINT framework is widely used in cybersecurity, journalism, law enforcement, and research to collect data from publicly accessible resources, supporting investigations or gathering intelligence about specific topics, companies, or individuals. The user interface is typically intuitive and user-friendly, allowing users to browse different categories and find tools relevant to their needs.

Website: osintframework.com

Although the reasons are unclear, the project has not seen updates for a long time. In the rapidly evolving OSINT field, continuous updates of tools and methods are crucial to keep pace with the times. This stagnation in updates may suggest a need for more community support or resource investment to continue pushing the project forward to meet the ever-changing demands of the industry.

Therefore, the author @malfratsind created his version of the open-source intelligence framework.

https://map.malfrats.industries/

Website Screenshot

Unfortunately, the last code commit by @malfratsind on Github was 9 months ago, and the X account has not been updated since last July. Many links on this site are still valid, and OSINT enthusiasts can explore them.


📎 Conclusion#

Open-source intelligence is a comprehensive ability that integrates search techniques, associative reasoning, and information integration. The 24 tools recommended in this article cover almost all mainstream OSINT scenarios, suitable for both beginners and advanced users.

📌 It is recommended to bookmark this article for easy daily reference!

📣 If you have more private tools, feel free to leave a message to share, and let's build a knowledge map for the OSINT Chinese community together!


References

[1] Shodan.io: https://shodan.io

[2] Google.com: https://google.com

[3] Google Hacking Database: https://www.exploit-db.com/google-hacking-database

[4] Wigle.net: https://wigle.net

[5] Grep.app: https://grep.app

[6] BinaryEdge.io: https://app.binaryedge.io

[7] Onyphe.io: https://onyphe.io

[8] GreyNoise: https://viz.greynoise.io

[9] Censys.io: https://censys.io

[10] Hunter.io: https://hunter.io

[11] FOFA.info: https://fofa.info

[12] ZoomEye.org: https://zoomeye.org

[13] LeakIX.net: https://leakix.net

[14] IntelX.io: https://intelx.io

[15] Netlas.io: https://app.netlas.io

[16] Searchcode.com: https://searchcode.com

[17] URLScan.io: https://urlscan.io

[18] PublicWWW.com: https://publicwww.com

[19] FullHunt.io: https://fullhunt.io

[20] SOCRadar.io: https://socradar.io

[21] BinaryEdge.io (Main Site): https://binaryedge.io

[22] IVRE.rocks: https://ivre.rocks

[23] crt.sh: https://crt.sh

[24] Vulners.com: https://vulners.com

[25] Pulsedive.com: https://pulsedive.com

END

Loading...
Ownership of this post data is guaranteed by blockchain and smart contracts to the creator alone.