Advanced Search

100+ Hacking Search Engines and Tools.

Fixxx

Moderator
Judge
Elite
Ultimate
Legend
Joined
31.10.19
Messages
1,541
Reaction score
5,194
Points
113
OSINT.jpg

All targeted hacking attacks begin with reconnaissance. Social engineers, red teams and individual pentesters also gather information about their targets before moving on to active actions. They are aided by dozens of tools, so below are links to some of them. Since this is only about searching, numerous scanners and other tools for active network exploration have been excluded, except for those capable of passive searches through open sources. The post consists of 8 sections, divided into categories for convenience:
  1. metasearch engines and search aggregators;
  2. tools for working with dorks;
  3. email and login searches;
  4. phone number searches;
  5. searches in the TOR network;
  6. searches for Internet of Things data, IPs, domains and subdomains;
  7. searches for vulnerability data and indicators of compromise;
  8. source code searches.
 

foster9111

Carding Novice
Joined
29.10.24
Messages
11
Reaction score
1
Points
3
View attachment 58279

All targeted hacking attacks begin with reconnaissance. Social engineers, red teams and individual pentesters also gather information about their targets before moving on to active actions. They are aided by dozens of tools, so below are links to some of them. Since this is only about searching, numerous scanners and other tools for active network exploration have been excluded, except for those capable of passive searches through open sources. The post consists of 8 sections, divided into categories for convenience:
  1. metasearch engines and search aggregators;
  2. tools for working with dorks;
  3. email and login searches;
  4. phone number searches;
  5. searches in the TOR network;
  6. searches for Internet of Things data, IPs, domains and subdomains;
  7. searches for vulnerability data and indicators of compromise;
  8. source code searches.
*** Hidden text: cannot be quoted. ***
Thank you for this
 

alicubon

Carding Novice
Joined
17.01.26
Messages
16
Reaction score
1
Points
3
View attachment 58279

All targeted hacking attacks begin with reconnaissance. Social engineers, red teams and individual pentesters also gather information about their targets before moving on to active actions. They are aided by dozens of tools, so below are links to some of them. Since this is only about searching, numerous scanners and other tools for active network exploration have been excluded, except for those capable of passive searches through open sources. The post consists of 8 sections, divided into categories for convenience:
  1. metasearch engines and search aggregators;
  2. tools for working with dorks;
  3. email and login searches;
  4. phone number searches;
  5. searches in the TOR network;
  6. searches for Internet of Things data, IPs, domains and subdomains;
  7. searches for vulnerability data and indicators of compromise;
  8. source code searches.
*** Hidden text: cannot be quoted. ***
Tks
 

aladin69

Active Carder
Joined
30.03.25
Messages
55
Reaction score
2
Points
8
View attachment 58279

All targeted hacking attacks begin with reconnaissance. Social engineers, red teams and individual pentesters also gather information about their targets before moving on to active actions. They are aided by dozens of tools, so below are links to some of them. Since this is only about searching, numerous scanners and other tools for active network exploration have been excluded, except for those capable of passive searches through open sources. The post consists of 8 sections, divided into categories for convenience:
  1. metasearch engines and search aggregators;
  2. tools for working with dorks;
  3. email and login searches;
  4. phone number searches;
  5. searches in the TOR network;
  6. searches for Internet of Things data, IPs, domains and subdomains;
  7. searches for vulnerability data and indicators of compromise;
  8. source code searches.
*** Hidden text: cannot be quoted. ***
good
 
Top Bottom