<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
  <title>appsec.fyi — Recon</title>
  <link>https://appsec.fyi/recon.html</link>
  <description>Curated Recon resources from appsec.fyi</description>
  <language>en-us</language>
  <atom:link href="https://appsec.fyi/feeds/recon.xml" rel="self" type="application/rss+xml"/>
  <lastBuildDate>Tue, 14 Apr 2026 16:08:27 +0000</lastBuildDate>
  <managingEditor>carl@chs.us (Carl Sampson)</managingEditor>
  <item>
    <title>Recon Roundup: Ultimate Reconnaissance Guide</title>
    <link>https://www.yeswehack.com/learn-bug-bounty/recon-series-recap-reconnaissance-footprinting</link>
    <guid isPermaLink="true">https://www.yeswehack.com/learn-bug-bounty/recon-series-recap-reconnaissance-footprinting</guid>
    <description>Recon Roundup: Ultimate Reconnaissance Guide</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:46 +0000</pubDate>
  </item>
  <item>
    <title>From Recon to Report: Complete Workflow 2025</title>
    <link>https://cyberxsociety.com/from-recon-to-report-complete-bug-bounty-workflow-for-2025-with-tools-commands-and-tips/</link>
    <guid isPermaLink="true">https://cyberxsociety.com/from-recon-to-report-complete-bug-bounty-workflow-for-2025-with-tools-commands-and-tips/</guid>
    <description>From Recon to Report: Complete Workflow 2025</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:45 +0000</pubDate>
  </item>
  <item>
    <title>Mastering Recon in Bug Bounty: Advanced Techniques 2025</title>
    <link>https://medium.com/@hackerfromhills/mastering-recon-in-bug-bounty-advanced-techniques-for-2025-1c8b5f3c43b9</link>
    <guid isPermaLink="true">https://medium.com/@hackerfromhills/mastering-recon-in-bug-bounty-advanced-techniques-for-2025-1c8b5f3c43b9</guid>
    <description>Mastering Recon in Bug Bounty: Advanced Techniques 2025</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:45 +0000</pubDate>
  </item>
  <item>
    <title>0-Day Hunting Guide: Recon Techniques Nobody Talks About</title>
    <link>https://blog.intelligencex.org/zero-day-hunting-advanced-recon-techniques-2025</link>
    <guid isPermaLink="true">https://blog.intelligencex.org/zero-day-hunting-advanced-recon-techniques-2025</guid>
    <description>0-Day Hunting Guide: Recon Techniques Nobody Talks About</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:44 +0000</pubDate>
  </item>
  <item>
    <title>Recon to Master: Complete Bug Bounty Checklist</title>
    <link>https://www.scribd.com/document/913060978/Recon-to-Master-the-Complete-Bug-Bounty-Checklist-by-Coffinxp-Jul-2025-InfoSec-Write-ups</link>
    <guid isPermaLink="true">https://www.scribd.com/document/913060978/Recon-to-Master-the-Complete-Bug-Bounty-Checklist-by-Coffinxp-Jul-2025-InfoSec-Write-ups</guid>
    <description>Recon to Master: Complete Bug Bounty Checklist</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:43 +0000</pubDate>
  </item>
  <item>
    <title>Awesome Bug Bounty Tools - GitHub</title>
    <link>https://github.com/vavkamil/awesome-bugbounty-tools</link>
    <guid isPermaLink="true">https://github.com/vavkamil/awesome-bugbounty-tools</guid>
    <description>Awesome Bug Bounty Tools - GitHub</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:42 +0000</pubDate>
  </item>
  <item>
    <title>Automating Subdomain Enumeration: Tools and Techniques at Scale</title>
    <link>https://osintteam.blog/automating-subdomain-enumeration-tools-and-techniques-that-scale-caceadf70c03</link>
    <guid isPermaLink="true">https://osintteam.blog/automating-subdomain-enumeration-tools-and-techniques-that-scale-caceadf70c03</guid>
    <description>Automating Subdomain Enumeration: Tools and Techniques at Scale</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:42 +0000</pubDate>
  </item>
  <item>
    <title>Ultimate Guide to Subdomain Enumeration for Bug Bounty</title>
    <link>https://medium.com/@thexnumb/the-ultimate-guide-to-subdomain-enumeration-for-bug-bounty-hunters-73b60fca62bc</link>
    <guid isPermaLink="true">https://medium.com/@thexnumb/the-ultimate-guide-to-subdomain-enumeration-for-bug-bounty-hunters-73b60fca62bc</guid>
    <description>Ultimate Guide to Subdomain Enumeration for Bug Bounty</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:41 +0000</pubDate>
  </item>
  <item>
    <title>Amass Cheat Sheet: 70+ Commands for Recon &amp; Bug Bounty</title>
    <link>https://securityelites.com/amass-cheat-sheet/</link>
    <guid isPermaLink="true">https://securityelites.com/amass-cheat-sheet/</guid>
    <description>Amass Cheat Sheet: 70+ Commands for Recon &amp; Bug Bounty</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:56:40 +0000</pubDate>
  </item>
  <item>
    <title>The Complete Bug Bounty Recon Playbook: 2025 Edition</title>
    <link>https://techmasterguides.gumroad.com/l/bugbountyrecon2025</link>
    <guid isPermaLink="true">https://techmasterguides.gumroad.com/l/bugbountyrecon2025</guid>
    <description>The Complete Bug Bounty Recon Playbook: 2025 Edition</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:44:16 +0000</pubDate>
  </item>
  <item>
    <title>Master Bug Bounty Hunting with Top Recon Tools</title>
    <link>https://codetechlab.com/blog/bug-bounty/</link>
    <guid isPermaLink="true">https://codetechlab.com/blog/bug-bounty/</guid>
    <description>Master Bug Bounty Hunting with Top Recon Tools</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:44:14 +0000</pubDate>
  </item>
  <item>
    <title>Recon for Bug Bounty: 8 Essential Tools</title>
    <link>https://www.intigriti.com/researchers/blog/hacking-tools/recon-for-bug-bounty-8-essential-tools-for-performing-effective-reconnaissance</link>
    <guid isPermaLink="true">https://www.intigriti.com/researchers/blog/hacking-tools/recon-for-bug-bounty-8-essential-tools-for-performing-effective-reconnaissance</guid>
    <description>Recon for Bug Bounty: 8 Essential Tools</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:44:13 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty 101: Top 10 Reconnaissance Tools</title>
    <link>https://netlas.io/blog/best_recon_tools_for_bug_bounty/</link>
    <guid isPermaLink="true">https://netlas.io/blog/best_recon_tools_for_bug_bounty/</guid>
    <description>Bug Bounty 101: Top 10 Reconnaissance Tools</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:44:11 +0000</pubDate>
  </item>
  <item>
    <title>2025 Bug Bounty Methodology and Persistent Recon</title>
    <link>https://ravi73079.medium.com/2025-bug-bounty-methodology-toolsets-and-persistent-recon-d991e39e52ce</link>
    <guid isPermaLink="true">https://ravi73079.medium.com/2025-bug-bounty-methodology-toolsets-and-persistent-recon-d991e39e52ce</guid>
    <description>2025 Bug Bounty Methodology and Persistent Recon</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:44:10 +0000</pubDate>
  </item>
  <item>
    <title>Bug Bounty Recon Methodology 2025 - GitHub</title>
    <link>https://github.com/amrelsagaei/Bug-Bounty-Hunting-Methodology-2025</link>
    <guid isPermaLink="true">https://github.com/amrelsagaei/Bug-Bounty-Hunting-Methodology-2025</guid>
    <description>Bug Bounty Recon Methodology 2025 - GitHub</description>
    <category>Recon</category>
    <pubDate>Fri, 10 Apr 2026 01:44:09 +0000</pubDate>
  </item>
  <item>
    <title>Masriyan/Aegis: Windows Attack Surface Discovery Tool</title>
    <link>https://github.com/Masriyan/Aegis</link>
    <guid isPermaLink="true">https://github.com/Masriyan/Aegis</guid>
    <description>Masriyan/Aegis: Windows Attack Surface Discovery Tool</description>
    <category>Recon</category>
    <pubDate>Mon, 06 Apr 2026 02:03:36 +0000</pubDate>
  </item>
  <item>
    <title>External Attack Surface Management (EASM)</title>
    <link>https://www.cycognito.com/learn/attack-surface-management/external-attack-surface-management/</link>
    <guid isPermaLink="true">https://www.cycognito.com/learn/attack-surface-management/external-attack-surface-management/</guid>
    <description>External Attack Surface Management (EASM)</description>
    <category>Recon</category>
    <pubDate>Mon, 06 Apr 2026 02:03:35 +0000</pubDate>
  </item>
  <item>
    <title>Using OWASP Amass with Netlas Module</title>
    <link>https://netlas.io/blog/netlas_and_amass/</link>
    <guid isPermaLink="true">https://netlas.io/blog/netlas_and_amass/</guid>
    <description>Using OWASP Amass with Netlas Module</description>
    <category>Recon</category>
    <pubDate>Mon, 06 Apr 2026 02:03:34 +0000</pubDate>
  </item>
  <item>
    <title>The Complete Beginner&#x27;s Guide to Bug Bounty Reconnaissance</title>
    <link>https://infosecwriteups.com/%EF%B8%8F-%EF%B8%8F-the-complete-beginners-guide-to-bug-bounty-reconnaissance-live-hunting-on-paypal-ddb2b0abecd3</link>
    <guid isPermaLink="true">https://infosecwriteups.com/%EF%B8%8F-%EF%B8%8F-the-complete-beginners-guide-to-bug-bounty-reconnaissance-live-hunting-on-paypal-ddb2b0abecd3</guid>
    <description>The Complete Beginner&#x27;s Guide to Bug Bounty Reconnaissance</description>
    <category>Recon</category>
    <pubDate>Mon, 06 Apr 2026 02:03:33 +0000</pubDate>
  </item>
  <item>
    <title>How I Built an Automated Recon Pipeline for Bug Bounty Hunting</title>
    <link>https://medium.com/@atnoforcybersecurity/how-i-built-an-automated-recon-pipeline-for-bug-bounty-hunting-bed3cb545317</link>
    <guid isPermaLink="true">https://medium.com/@atnoforcybersecurity/how-i-built-an-automated-recon-pipeline-for-bug-bounty-hunting-bed3cb545317</guid>
    <description>How I Built an Automated Recon Pipeline for Bug Bounty Hunting</description>
    <category>Recon</category>
    <pubDate>Mon, 06 Apr 2026 02:03:32 +0000</pubDate>
  </item>
  <item>
    <title>A Comprehensive Guide to Android Penetration Testing | Redfox Security</title>
    <link>https://redfoxsec.com/blog/a-comprehensive-guide-to-android-penetration-testing/</link>
    <guid isPermaLink="true">https://redfoxsec.com/blog/a-comprehensive-guide-to-android-penetration-testing/</guid>
    <description>A Comprehensive Guide to Android Penetration Testing | Redfox Security</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:50 +0000</pubDate>
  </item>
  <item>
    <title>A Step-by-Step Android Penetration Testing Guide | Hack The Box</title>
    <link>https://www.hackthebox.com/blog/intro-to-mobile-pentesting</link>
    <guid isPermaLink="true">https://www.hackthebox.com/blog/intro-to-mobile-pentesting</guid>
    <description>A Step-by-Step Android Penetration Testing Guide | Hack The Box</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:47 +0000</pubDate>
  </item>
  <item>
    <title>Mobile App Pentest Cheatsheet</title>
    <link>https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet</link>
    <guid isPermaLink="true">https://github.com/tanprathan/MobileApp-Pentest-Cheatsheet</guid>
    <description>Mobile App Pentest Cheatsheet</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:45 +0000</pubDate>
  </item>
  <item>
    <title>GarudRecon - Automated Domain Recon with XSS, SQLi, LFI, RCE Detection</title>
    <link>https://github.com/rix4uni/GarudRecon</link>
    <guid isPermaLink="true">https://github.com/rix4uni/GarudRecon</guid>
    <description>GarudRecon - Automated Domain Recon with XSS, SQLi, LFI, RCE Detection</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:43 +0000</pubDate>
  </item>
  <item>
    <title>Automating Subdomain Enumeration to Discover Critical Vulnerabilities</title>
    <link>https://shubhamrooter.medium.com/automating-subdomain-enumeration-to-discover-critical-vulnerabilities-aa6158d35a8f</link>
    <guid isPermaLink="true">https://shubhamrooter.medium.com/automating-subdomain-enumeration-to-discover-critical-vulnerabilities-aa6158d35a8f</guid>
    <description>Automating Subdomain Enumeration to Discover Critical Vulnerabilities</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:42 +0000</pubDate>
  </item>
  <item>
    <title>SubdomainX: All-in-One Subdomain Enumeration and Reconnaissance Tool</title>
    <link>https://github.com/itszeeshan/subdomainx</link>
    <guid isPermaLink="true">https://github.com/itszeeshan/subdomainx</guid>
    <description>SubdomainX: All-in-One Subdomain Enumeration and Reconnaissance Tool</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:40 +0000</pubDate>
  </item>
  <item>
    <title>How to Use Amass for Subdomain Enumeration and Recon Like a Pro</title>
    <link>https://iha089.org/amass-for-subdomain-enumeration-and-recon/</link>
    <guid isPermaLink="true">https://iha089.org/amass-for-subdomain-enumeration-and-recon/</guid>
    <description>How to Use Amass for Subdomain Enumeration and Recon Like a Pro</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:38 +0000</pubDate>
  </item>
  <item>
    <title>Subfinder Complete Guide 2025: Subdomain Enumeration Mastery</title>
    <link>https://blackworld.vip/subfinder-tool/</link>
    <guid isPermaLink="true">https://blackworld.vip/subfinder-tool/</guid>
    <description>Subfinder Complete Guide 2025: Subdomain Enumeration Mastery</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:37 +0000</pubDate>
  </item>
  <item>
    <title>Automate Recon and Detect Subdomain Takeovers with Amass, Subfinder, Nuclei</title>
    <link>https://www.webasha.com/blog/how-can-i-automate-recon-and-detect-subdomain-takeovers-using-tools-like-amass-subfinder-and-nuclei</link>
    <guid isPermaLink="true">https://www.webasha.com/blog/how-can-i-automate-recon-and-detect-subdomain-takeovers-using-tools-like-amass-subfinder-and-nuclei</guid>
    <description>Automate Recon and Detect Subdomain Takeovers with Amass, Subfinder, Nuclei</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:36 +0000</pubDate>
  </item>
  <item>
    <title>Reconnaissance 102: Subdomain Enumeration | ProjectDiscovery</title>
    <link>https://projectdiscovery.io/blog/recon-series-2</link>
    <guid isPermaLink="true">https://projectdiscovery.io/blog/recon-series-2</guid>
    <description>Reconnaissance 102: Subdomain Enumeration | ProjectDiscovery</description>
    <category>Recon</category>
    <pubDate>Fri, 03 Apr 2026 15:58:34 +0000</pubDate>
  </item>
  <item>
    <title>ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ on Twitter: &quot;RT @SecurityTrybe: Top 25 Recon Tools and thei</title>
    <link>https://twitter.com/DanielMiessler/status/1680728727007928321?utm_source=danielmiessler.com&amp;utm_medium=newsletter&amp;utm_campaign=unsupervised-learning-no-390</link>
    <guid isPermaLink="true">https://twitter.com/DanielMiessler/status/1680728727007928321?utm_source=danielmiessler.com&amp;utm_medium=newsletter&amp;utm_campaign=unsupervised-learning-no-390</guid>
    <description>Daniel Miessler shared a tweet about the top 25 Recon Tools, but the content seems to be cut off. It likely refers to a list of tools used for reconnaissance in cybersecurity. Recon tools are essential for gathering information about potential targets to assess vulnerabilities and plan security measures. Daniel Miessler&#x27;s tweet may have been promoting or sharing valuable resources related to cybersecurity tools and practices.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:58 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/SimplySecurity/SimplyEmail</title>
    <link>https://github.com/SimplySecurity/SimplyEmail</link>
    <guid isPermaLink="true">https://github.com/SimplySecurity/SimplyEmail</guid>
    <description>The link provided leads to a GitHub repository named SimplyEmail under the SimplySecurity organization. The repository likely contains code, documentation, or resources related to email security. For further details, exploring the repository on GitHub is recommended.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:56 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/Ekultek/Zeus-Scanner</title>
    <link>https://github.com/Ekultek/Zeus-Scanner</link>
    <guid isPermaLink="true">https://github.com/Ekultek/Zeus-Scanner</guid>
    <description>The content provided is a link to the GitHub repository for the Zeus-Scanner created by Ekultek. The Zeus-Scanner is likely a security tool or software designed for scanning and analyzing systems for vulnerabilities or threats. By visiting the GitHub link, users can access the source code, documentation, and potentially contribute to the project. It&#x27;s a tool that may be useful for security professionals, developers, or individuals interested in cybersecurity.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:54 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/m0rtem/CloudFail</title>
    <link>https://github.com/m0rtem/CloudFail</link>
    <guid isPermaLink="true">https://github.com/m0rtem/CloudFail</guid>
    <description>The link provided leads to a GitHub repository named CloudFail created by the user m0rtem. The content of the repository likely contains information, code, or tools related to cloud security or penetration testing. It is a resource that users can access to potentially learn more about cloud security vulnerabilities and how to address them.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:52 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/leebaird/discover</title>
    <link>https://github.com/leebaird/discover</link>
    <guid isPermaLink="true">https://github.com/leebaird/discover</guid>
    <description>The provided link directs to a GitHub repository belonging to a user named leebaird. The repository is named &quot;discover.&quot; Unfortunately, without further information or access to the repository, it is not possible to provide a detailed summary of its contents or purpose. It is recommended to visit the GitHub link to explore the repository and its contents further.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:50 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/BishopFox/GitGot</title>
    <link>https://github.com/BishopFox/GitGot</link>
    <guid isPermaLink="true">https://github.com/BishopFox/GitGot</guid>
    <description>The link provided leads to a GitHub repository named GitGot, created by BishopFox. The content of the repository likely includes information, code, or tools related to GitGot. Users can visit the link to explore the repository and access its contents, which may involve tools or resources related to Git or other relevant topics. BishopFox is the organization or individual behind the GitGot project, and the repository may contain valuable resources for those interested in Git-related tools or projects.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:45 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/s0md3v/Striker</title>
    <link>https://github.com/s0md3v/Striker</link>
    <guid isPermaLink="true">https://github.com/s0md3v/Striker</guid>
    <description>The provided link leads to a GitHub repository for a tool called Striker created by the user s0md3v. Striker is likely a software tool or program, but without further details from the content, its specific functionality or purpose is unclear. The repository on GitHub may contain information about the tool&#x27;s features, how to use it, and any contributions or issues related to the project. It is recommended to visit the link for more detailed information on Striker and its capabilities.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:41 +0000</pubDate>
  </item>
  <item>
    <title>https://github.com/s0md3v/ReconDog</title>
    <link>https://github.com/s0md3v/ReconDog</link>
    <guid isPermaLink="true">https://github.com/s0md3v/ReconDog</guid>
    <description>The content provided is a link to a GitHub repository for a tool called ReconDog created by a user named s0md3v. ReconDog is likely a reconnaissance tool used for information gathering and security testing purposes. The GitHub repository contains the source code and documentation for the tool. Users can access the tool, contribute to its development, or use it for their own reconnaissance activities.</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:39 +0000</pubDate>
  </item>
  <item>
    <title>Arjun</title>
    <link>https://github.com/s0md3v/Arjun</link>
    <guid isPermaLink="true">https://github.com/s0md3v/Arjun</guid>
    <description>The content provided is simply the name &quot;Arjun.&quot;</description>
    <category>Recon</category>
    <pubDate>Thu, 14 Aug 2025 04:31:37 +0000</pubDate>
  </item>
  <item>
    <title>GitHub - redhuntlabs/Awesome-Asset-Discovery: List of Awesome Asset Discovery Resources</title>
    <link>https://github.com/redhuntlabs/Awesome-Asset-Discovery</link>
    <guid isPermaLink="true">https://github.com/redhuntlabs/Awesome-Asset-Discovery</guid>
    <description>The content is a list of valuable resources for asset discovery available on GitHub under the project named &quot;redhuntlabs/Awesome-Asset-Discovery.&quot; Users are encouraged to contribute to the development of these resources by creating an account on GitHub. This repository likely contains tools, techniques, or information related to asset discovery, which can be useful for cybersecurity professionals, researchers, or anyone interested in identifying and managing digital assets effectively.</description>
    <category>Recon</category>
    <pubDate>Sun, 08 Mar 2020 07:17:53 +0000</pubDate>
  </item>
</channel>
</rss>