Transcribed from https://twitter.com/voldimmoral/status/1698774525284884529
| # | url/link | type |
|---|---|---|
| 1. | shodan.io | (Server) |
| 2. | google.com | (Dorks) |
| 3. | wigle.net | (WiFi Networks) |
| 4. | grep.app | (Codes Search) |
| 6. | onyphe.io | (Server) |
| 7. | viz.greynoise.io | (Threat Intelligence) |
| 8. | censys.io | (Server) |
| 9. | hunter.io | (Email Addresses) |
| 10. | fofa.info | (Threat Intelligence) |
| 11. | zoomeye.org | (Threat Intelligence) |
| 12. | leakix.net | (Threat Intelligence) |
| 13. | intelx.io | (OSINT) |
| 14. | app.netlas.io | (Attack Surface) |
| 15. | searchcode.com | (Codes Search) |
| 16. | urlscan.io | (Threat Intelligence) |
| 17. | publicwww.com | (Codes Search) |
| 18. | fullhunt.io | (Attack Surface) |
| 19. | socradar.io | (Threat Intelligence) |
| 20. | ivre.rocks | (Server) |
| 21. | crt.sh | (Certificate Search) |
| 22. | vulners.com | (Vulnerabilities) |
| 23. | pulsdive.com | (Threat Intelligence) |
| 24. | app.binaryedge.io* | (Threat Intelligence) // (Attack Surface) |
(*) This app was listed twice in the original post, once as 'app.binaryedge' and once as 'app.binaryedge.io'. Since it requires a login and seems a bit dated (c) is from 2020, I took the liberty to move it at the end of the list.