This command-line tool allows cybersecurity analysts and OSINT researchers to quickly launch targeted searches across multiple cyber intelligence platforms. Just enter an IP, domain, hash, or keyword, and select the engines to query.
- Supports fast lookups across top OSINT platforms
- Opens threat intelligence URLs directly in your default browser
- Supports IPs, domains, hashes, and email addresses
- Easily extendable for new engines
| Engine | Description |
|---|---|
shodan |
Internet-connected devices |
virustotal |
File/hash/domain reputation |
abuseipdb |
Malicious IPs reporting |
greynoise |
Internet noise and background scan data |
intelx |
Deep web, breached content, leaks |
exploitdb |
Public exploits and vulnerabilities |
pulsedive |
Threat intelligence platform |
threatminer |
Passive DNS, malware, and indicators |
haveibeenpwned |
Compromised credentials database |
dnsdumpster |
DNS recon and mapping tool |
No installation needed. Just clone or download the script and run it with Python 3:
python news_search.py <term> -e <engine1> <engine2> ...python news_search.py 8.8.8.8 -e shodan abuseipdb greynoisepython news_search.py someone@example.com -e haveibeenpwned intelxpython news_search.py abcdef123456... -e virustotal threatminerpython news_search.py anything -lTo add new engines, simply edit the SEARCH_INDEX dictionary in the script:
"newengine": "https://new.engine/search?q={}",This project is open-source and free to use for education and research. Attribution appreciated.