appsec.fyi

Recon Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Recon

Reconnaissance is the first and arguably most important phase of any security assessment. It involves systematically discovering and mapping a target's attack surface — subdomains, IP ranges, open ports, running services, technology stacks, and exposed endpoints — before any active testing begins.

Effective recon separates productive security testing from wasted effort. A thorough recon phase reveals forgotten assets, shadow IT, staging environments, and legacy systems that are often less hardened than primary applications. Many of the highest-impact bug bounty findings come from assets discovered during recon that other hunters overlook.

Modern recon combines passive and active techniques. Passive recon leverages certificate transparency logs, DNS records, web archives, search engine indexes, and public datasets to map infrastructure without touching the target. Active recon involves subdomain brute-forcing, port scanning, directory fuzzing, and technology fingerprinting. Tools like subfinder, httpx, nuclei, katana, and ffuf form the backbone of most researchers' recon pipelines.

Automation is essential at scale. Many hunters build continuous recon pipelines that monitor targets for new subdomains, changed DNS records, and newly exposed services — enabling them to test fresh attack surface before anyone else.

This page collects recon methodologies, tool guides, automation workflows, and techniques for comprehensive attack surface discovery.

Date Added Link Excerpt
2026-04-19 NEW 2026The 2026 State of Attack Surface Management — ProjectDiscoveryThe 2026 State of Attack Surface Management — ProjectDiscovery
2026-04-19 NEW 2026The Ultimate Guide to Attack Surface Management Tools in 2025The Ultimate Guide to Attack Surface Management Tools in 2025
2026-04-19 NEW 2026Top 10 Attack Surface Management Tools for 2026 — IntruderTop 10 Attack Surface Management Tools for 2026 — Intruder
2026-04-19 NEW 202612 Attack Surface Management Tools to Know in 202612 Attack Surface Management Tools to Know in 2026
2026-04-19 NEW 2026SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
2026-04-17 NEW 2026Bug Bounty Recon: Perform Faster Port Scan (Rootsploit)Bug Bounty Recon: Perform Faster Port Scan (Rootsploit)
2026-04-17 NEW 2026Naabu Zero to Hero Guide (Cyber Aryan)Naabu Zero to Hero Guide (Cyber Aryan)
2026-04-17 NEW 2026Mastering Network Scanning: Nmap and Masscan GuideMastering Network Scanning: Nmap and Masscan Guide
2026-04-17 NEW 2026Naabu Cheat Sheet: Commands & Examples (HighOn.Coffee)Naabu Cheat Sheet: Commands & Examples (HighOn.Coffee)
2026-04-17 NEW 2026naabu: Fast Go port scanner (ProjectDiscovery)naabu: Fast Go port scanner (ProjectDiscovery)
2026-04-17 NEW 2026Recon series #4: Port scanning methods (YesWeHack)Recon series #4: Port scanning methods (YesWeHack)
2026-04-17 NEW 2026bountyRecon: Bash automation for bug bounty reconbountyRecon: Bash automation for bug bounty recon
2026-04-17 NEW 2026JSFScan.sh: JavaScript recon automation (KathanP19)JSFScan.sh: JavaScript recon automation (KathanP19)
2026-04-17 NEW 2026Reconky: Content discovery bash scriptReconky: Content discovery bash script
2026-04-17 NEW 2026Bug-Bounty-Automation: Bash recon (Retr0-45809)Bug-Bounty-Automation: Bash recon (Retr0-45809)
2026-04-17 NEW 2026Recon-Script: automation with Nuclei (s1d6point7bugcrowd)Recon-Script: automation with Nuclei (s1d6point7bugcrowd)
2026-04-17 NEW 2026Bug-Bounty-Recon-Automation shell script (Amangupta1234)Bug-Bounty-Recon-Automation shell script (Amangupta1234)
2026-04-17 NEW 2026The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery)The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery)
2026-04-17 NEW 2026The Ultimate Recon Arsenal: 25+ Commands for Bug Bounty WorkflowThe Ultimate Recon Arsenal: 25+ Commands for Bug Bounty Workflow
2026-04-17 NEW 2026xpfarm: Automated bug bounty & recon framework (GitHub)xpfarm: Automated bug bounty & recon framework (GitHub)
2026-04-17 NEW 2026Automate Your Nuclei Recon Pipeline with VPN + Discord AlertsAutomate Your Nuclei Recon Pipeline with VPN + Discord Alerts
2026-04-17 NEW 2026Advanced Recon: Taking Your Subdomain Discovery to the Next LevelAdvanced Recon: Taking Your Subdomain Discovery to the Next Level
2026-04-17 NEW 2026GitHub dorking for beginners: find more vulnerabilities (Intigriti)GitHub dorking for beginners: find more vulnerabilities (Intigriti)
2026-04-17 NEW 2026google-dorks-bug-bounty (TakSec, GitHub)google-dorks-bug-bounty (TakSec, GitHub)
2026-04-17 NEW 2026How I Found Sensitive Information using GitHub Dorks (Part 3)How I Found Sensitive Information using GitHub Dorks (Part 3)
2026-04-17 NEW 2026The Ultimate Subdomain Recon PlaybookThe Ultimate Subdomain Recon Playbook
2026-04-17 NEW 2026Complete Guide to Amass Tool (2025 Edition)Complete Guide to Amass Tool (2025 Edition)
2026-04-17 NEW 2026Mastering Passive Reconnaissance for Bug Bounty and PentestingMastering Passive Reconnaissance for Bug Bounty and Pentesting
2026-04-17 NEW 2026How to Use Recon-ng Tool for OSINT and Bug BountyHow to Use Recon-ng Tool for OSINT and Bug Bounty
2026-04-17 NEW 2026Mastering OSINT for Bug Bounty: Advanced Deep ReconMastering OSINT for Bug Bounty: Advanced Deep Recon
2026-04-17 NEW 2026Mastering Passive Information Gathering: Extensive OSINT GuideMastering Passive Information Gathering: Extensive OSINT Guide
2026-04-17 NEW 2026Google Dorking Mastery: From Passive OSINT to Bug BountyGoogle Dorking Mastery: From Passive OSINT to Bug Bounty
2026-04-17 NEW 20269 Attack Surface Monitoring Tools in 2026 (SentinelOne)9 Attack Surface Monitoring Tools in 2026 (SentinelOne)
2026-04-17 NEW 2026Recon Methodology: Subdomain EnumerationRecon Methodology: Subdomain Enumeration
2026-04-17 NEW 2026Recon Guide: Subdomain EnumerationRecon Guide: Subdomain Enumeration
2026-04-17 NEW 2026Bug-Bounty-recon: Automated recon framework (GitHub)Bug-Bounty-recon: Automated recon framework (GitHub)
2026-04-17 NEW 2026Subdomain enumeration: expand attack surface with active, passive methodsSubdomain enumeration: expand attack surface with active, passive methods
2026-04-16 NEW 2026Passive Reconnaissance Using OSINTPassive Reconnaissance Using OSINT
2026-04-16 NEW 2026From Recon to Sensitive Key Exposure Using NucleiFrom Recon to Sensitive Key Exposure Using Nuclei
2026-04-16 NEW 2026reconFTW: Automated Recon ToolreconFTW: Automated Recon Tool
2026-04-16 NEW 2026A Deep Dive on Katana Field ExtractionA Deep Dive on Katana Field Extraction
2026-04-16 NEW 2026Subdomain Takeover in 2025: New Methods and ToolsSubdomain Takeover in 2025: New Methods and Tools
2026-04-16 NEW 2026My Complete Recon Workflow for Bug Bounty Hunting (2025)My Complete Recon Workflow for Bug Bounty Hunting (2025)
2026-04-16 NEW 2026Internet-Wide Recon: Moving Past IP-Centric ApproachesInternet-Wide Recon: Moving Past IP-Centric Approaches
2026-04-16 NEW 2026The Art of Recon: Strategies for Modern Asset DiscoveryThe Art of Recon: Strategies for Modern Asset Discovery
2026-04-10 2026Recon Roundup: Ultimate Reconnaissance GuideRecon Roundup: Ultimate Reconnaissance Guide
2026-04-10 2026From Recon to Report: Complete Workflow 2025From Recon to Report: Complete Workflow 2025
2026-04-10 2026Mastering Recon in Bug Bounty: Advanced Techniques 2025Mastering Recon in Bug Bounty: Advanced Techniques 2025
2026-04-10 20260-Day Hunting Guide: Recon Techniques Nobody Talks About0-Day Hunting Guide: Recon Techniques Nobody Talks About
2026-04-10 2026Recon to Master: Complete Bug Bounty ChecklistRecon to Master: Complete Bug Bounty Checklist
2026-04-10 2026Awesome Bug Bounty Tools - GitHubAwesome Bug Bounty Tools - GitHub
2026-04-10 2026Automating Subdomain Enumeration: Tools and Techniques at ScaleAutomating Subdomain Enumeration: Tools and Techniques at Scale
2026-04-10 2026Ultimate Guide to Subdomain Enumeration for Bug BountyUltimate Guide to Subdomain Enumeration for Bug Bounty
2026-04-10 2026Amass Cheat Sheet: 70+ Commands for Recon & Bug BountyAmass Cheat Sheet: 70+ Commands for Recon & Bug Bounty
2026-04-10 2026The Complete Bug Bounty Recon Playbook: 2025 EditionThe Complete Bug Bounty Recon Playbook: 2025 Edition
2026-04-10 2026Master Bug Bounty Hunting with Top Recon ToolsMaster Bug Bounty Hunting with Top Recon Tools
2026-04-10 2026Recon for Bug Bounty: 8 Essential ToolsRecon for Bug Bounty: 8 Essential Tools
2026-04-10 2026Bug Bounty 101: Top 10 Reconnaissance ToolsBug Bounty 101: Top 10 Reconnaissance Tools
2026-04-10 20262025 Bug Bounty Methodology and Persistent Recon2025 Bug Bounty Methodology and Persistent Recon
2026-04-10 2026Bug Bounty Recon Methodology 2025 - GitHubBug Bounty Recon Methodology 2025 - GitHub
2026-04-06 2026Masriyan/Aegis: Windows Attack Surface Discovery ToolMasriyan/Aegis: Windows Attack Surface Discovery Tool
2026-04-06 2026External Attack Surface Management (EASM)External Attack Surface Management (EASM)
2026-04-06 2026Using OWASP Amass with Netlas ModuleUsing OWASP Amass with Netlas Module
2026-04-06 2026The Complete Beginner's Guide to Bug Bounty ReconnaissanceThe Complete Beginner's Guide to Bug Bounty Reconnaissance
2026-04-06 2026How I Built an Automated Recon Pipeline for Bug Bounty HuntingHow I Built an Automated Recon Pipeline for Bug Bounty Hunting
2026-04-03 2026A Step-by-Step Android Penetration Testing Guide | Hack The BoxA Step-by-Step Android Penetration Testing Guide | Hack The Box
2026-04-03 2026Mobile App Pentest CheatsheetMobile App Pentest Cheatsheet
2026-04-03 2026GarudRecon - Automated Domain Recon with XSS, SQLi, LFI, RCE DetectionGarudRecon - Automated Domain Recon with XSS, SQLi, LFI, RCE Detection
2026-04-03 2026Automating Subdomain Enumeration to Discover Critical VulnerabilitiesAutomating Subdomain Enumeration to Discover Critical Vulnerabilities
2026-04-03 2026SubdomainX: All-in-One Subdomain Enumeration and Reconnaissance ToolSubdomainX: All-in-One Subdomain Enumeration and Reconnaissance Tool
2026-04-03 2026How to Use Amass for Subdomain Enumeration and Recon Like a ProHow to Use Amass for Subdomain Enumeration and Recon Like a Pro
2026-04-03 2026Subfinder Complete Guide 2025: Subdomain Enumeration MasterySubfinder Complete Guide 2025: Subdomain Enumeration Mastery
2026-04-03 2026Reconnaissance 102: Subdomain Enumeration | ProjectDiscoveryReconnaissance 102: Subdomain Enumeration | ProjectDiscovery
2025-08-14 2025ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ on Twitter: "RT @SecurityTrybe: Top 25 Recon Tools and theiDaniel Miessler shared a tweet about the top 25 Recon Tools, but the content seems to be cut off. It likely refers to a list of tools used for reconnaissance in cybersecurity. Recon tools are essential for gathering information about potential targets to assess vulnerabilities and plan security measures. Daniel Miessler's tweet may have been promoting or sharing valuable resources related to cybersecurity tools and practices.
2025-08-14 2025https://github.com/SimplySecurity/SimplyEmailThe link provided leads to a GitHub repository named SimplyEmail under the SimplySecurity organization. The repository likely contains code, documentation, or resources related to email security. For further details, exploring the repository on GitHub is recommended.
2025-08-14 2025https://github.com/Ekultek/Zeus-ScannerThe content provided is a link to the GitHub repository for the Zeus-Scanner created by Ekultek. The Zeus-Scanner is likely a security tool or software designed for scanning and analyzing systems for vulnerabilities or threats. By visiting the GitHub link, users can access the source code, documentation, and potentially contribute to the project. It's a tool that may be useful for security professionals, developers, or individuals interested in cybersecurity.
2025-08-14 2025https://github.com/m0rtem/CloudFailThe link provided leads to a GitHub repository named CloudFail created by the user m0rtem. The content of the repository likely contains information, code, or tools related to cloud security or penetration testing. It is a resource that users can access to potentially learn more about cloud security vulnerabilities and how to address them.
2025-08-14 2025https://github.com/leebaird/discoverThe provided link directs to a GitHub repository belonging to a user named leebaird. The repository is named "discover." Unfortunately, without further information or access to the repository, it is not possible to provide a detailed summary of its contents or purpose. It is recommended to visit the GitHub link to explore the repository and its contents further.
2025-08-14 2025https://github.com/BishopFox/GitGotThe link provided leads to a GitHub repository named GitGot, created by BishopFox. The content of the repository likely includes information, code, or tools related to GitGot. Users can visit the link to explore the repository and access its contents, which may involve tools or resources related to Git or other relevant topics. BishopFox is the organization or individual behind the GitGot project, and the repository may contain valuable resources for those interested in Git-related tools or projects.
2025-08-14 2025https://github.com/s0md3v/StrikerThe provided link leads to a GitHub repository for a tool called Striker created by the user s0md3v. Striker is likely a software tool or program, but without further details from the content, its specific functionality or purpose is unclear. The repository on GitHub may contain information about the tool's features, how to use it, and any contributions or issues related to the project. It is recommended to visit the link for more detailed information on Striker and its capabilities.
2025-08-14 2025https://github.com/s0md3v/ReconDogThe content provided is a link to a GitHub repository for a tool called ReconDog created by a user named s0md3v. ReconDog is likely a reconnaissance tool used for information gathering and security testing purposes. The GitHub repository contains the source code and documentation for the tool. Users can access the tool, contribute to its development, or use it for their own reconnaissance activities.
2025-08-14 2025ArjunThe content provided is simply the name "Arjun."
2020-03-08 2020GitHub - redhuntlabs/Awesome-Asset-Discovery: List of Awesome Asset Discovery ResourcesThe content is a list of valuable resources for asset discovery available on GitHub under the project named "redhuntlabs/Awesome-Asset-Discovery." Users are encouraged to contribute to the development of these resources by creating an account on GitHub. This repository likely contains tools, techniques, or information related to asset discovery, which can be useful for cybersecurity professionals, researchers, or anyone interested in identifying and managing digital assets effectively.

Frequently Asked Questions

What is reconnaissance in security testing?
Reconnaissance is the process of discovering and mapping a target's attack surface before active testing. It includes finding subdomains, IP ranges, open ports, running services, technology stacks, and exposed endpoints. Thorough recon is often the difference between finding critical vulnerabilities and finding nothing.
What are the essential recon tools?
Core tools include subfinder and amass for subdomain enumeration, httpx for live host discovery, nmap for port scanning, nuclei for automated vulnerability scanning, katana and gospider for web crawling, ffuf for directory fuzzing, and waybackurls for historical URL discovery. Most hunters combine these into automated pipelines.
What is continuous recon and why does it matter?
Continuous recon monitors targets for changes over time — new subdomains, changed DNS records, newly exposed services, or updated technologies. Many high-impact findings come from assets that just appeared. Hunters automate this with cron jobs or services like Chaos by ProjectDiscovery, alerting them to fresh attack surface before competitors.

Weekly AppSec Digest

Get new resources delivered every Monday.