appsec.fyi

Recon Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Recon

Reconnaissance is the first and arguably most important phase of any security assessment. It involves systematically discovering and mapping a target's attack surface — subdomains, IP ranges, open ports, running services, technology stacks, and exposed endpoints — before any active testing begins.

Effective recon separates productive security testing from wasted effort. A thorough recon phase reveals forgotten assets, shadow IT, staging environments, and legacy systems that are often less hardened than primary applications. Many of the highest-impact bug bounty findings come from assets discovered during recon that other hunters overlook.

Modern recon combines passive and active techniques. Passive recon leverages certificate transparency logs, DNS records, web archives, search engine indexes, and public datasets to map infrastructure without touching the target. Active recon involves subdomain brute-forcing, port scanning, directory fuzzing, and technology fingerprinting. Tools like subfinder, httpx, nuclei, katana, and ffuf form the backbone of most researchers' recon pipelines.

Automation is essential at scale. Many hunters build continuous recon pipelines that monitor targets for new subdomains, changed DNS records, and newly exposed services — enabling them to test fresh attack surface before anyone else.

This page collects recon methodologies, tool guides, automation workflows, and techniques for comprehensive attack surface discovery.

Date Added Link Excerpt
2026-04-10 NEW 2026Recon Roundup: Ultimate Reconnaissance GuideRecon Roundup: Ultimate Reconnaissance Guide
2026-04-10 NEW 2026From Recon to Report: Complete Workflow 2025From Recon to Report: Complete Workflow 2025
2026-04-10 NEW 2026Mastering Recon in Bug Bounty: Advanced Techniques 2025Mastering Recon in Bug Bounty: Advanced Techniques 2025
2026-04-10 NEW 20260-Day Hunting Guide: Recon Techniques Nobody Talks About0-Day Hunting Guide: Recon Techniques Nobody Talks About
2026-04-10 NEW 2026Recon to Master: Complete Bug Bounty ChecklistRecon to Master: Complete Bug Bounty Checklist
2026-04-10 NEW 2026Awesome Bug Bounty Tools - GitHubAwesome Bug Bounty Tools - GitHub
2026-04-10 NEW 2026Automating Subdomain Enumeration: Tools and Techniques at ScaleAutomating Subdomain Enumeration: Tools and Techniques at Scale
2026-04-10 NEW 2026Ultimate Guide to Subdomain Enumeration for Bug BountyUltimate Guide to Subdomain Enumeration for Bug Bounty
2026-04-10 NEW 2026Amass Cheat Sheet: 70+ Commands for Recon & Bug BountyAmass Cheat Sheet: 70+ Commands for Recon & Bug Bounty
2026-04-10 NEW 2026The Complete Bug Bounty Recon Playbook: 2025 EditionThe Complete Bug Bounty Recon Playbook: 2025 Edition
2026-04-10 NEW 2026Master Bug Bounty Hunting with Top Recon ToolsMaster Bug Bounty Hunting with Top Recon Tools
2026-04-10 NEW 2026Recon for Bug Bounty: 8 Essential ToolsRecon for Bug Bounty: 8 Essential Tools
2026-04-10 NEW 2026Bug Bounty 101: Top 10 Reconnaissance ToolsBug Bounty 101: Top 10 Reconnaissance Tools
2026-04-10 NEW 20262025 Bug Bounty Methodology and Persistent Recon2025 Bug Bounty Methodology and Persistent Recon
2026-04-10 NEW 2026Bug Bounty Recon Methodology 2025 - GitHubBug Bounty Recon Methodology 2025 - GitHub
2026-04-06 2026Masriyan/Aegis: Windows Attack Surface Discovery ToolMasriyan/Aegis: Windows Attack Surface Discovery Tool
2026-04-06 2026External Attack Surface Management (EASM)External Attack Surface Management (EASM)
2026-04-06 2026Using OWASP Amass with Netlas ModuleUsing OWASP Amass with Netlas Module
2026-04-06 2026The Complete Beginner's Guide to Bug Bounty ReconnaissanceThe Complete Beginner's Guide to Bug Bounty Reconnaissance
2026-04-06 2026How I Built an Automated Recon Pipeline for Bug Bounty HuntingHow I Built an Automated Recon Pipeline for Bug Bounty Hunting
2026-04-03 2026A Comprehensive Guide to Android Penetration Testing | Redfox SecurityA Comprehensive Guide to Android Penetration Testing | Redfox Security
2026-04-03 2026A Step-by-Step Android Penetration Testing Guide | Hack The BoxA Step-by-Step Android Penetration Testing Guide | Hack The Box
2026-04-03 2026Mobile App Pentest CheatsheetMobile App Pentest Cheatsheet
2026-04-03 2026GarudRecon - Automated Domain Recon with XSS, SQLi, LFI, RCE DetectionGarudRecon - Automated Domain Recon with XSS, SQLi, LFI, RCE Detection
2026-04-03 2026Automating Subdomain Enumeration to Discover Critical VulnerabilitiesAutomating Subdomain Enumeration to Discover Critical Vulnerabilities
2026-04-03 2026SubdomainX: All-in-One Subdomain Enumeration and Reconnaissance ToolSubdomainX: All-in-One Subdomain Enumeration and Reconnaissance Tool
2026-04-03 2026How to Use Amass for Subdomain Enumeration and Recon Like a ProHow to Use Amass for Subdomain Enumeration and Recon Like a Pro
2026-04-03 2026Subfinder Complete Guide 2025: Subdomain Enumeration MasterySubfinder Complete Guide 2025: Subdomain Enumeration Mastery
2026-04-03 2026Automate Recon and Detect Subdomain Takeovers with Amass, Subfinder, NucleiAutomate Recon and Detect Subdomain Takeovers with Amass, Subfinder, Nuclei
2026-04-03 2026Reconnaissance 102: Subdomain Enumeration | ProjectDiscoveryReconnaissance 102: Subdomain Enumeration | ProjectDiscovery
2025-08-14 2025ᴅᴀɴɪᴇʟ ᴍɪᴇssʟᴇʀ on Twitter: "RT @SecurityTrybe: Top 25 Recon Tools and theiDaniel Miessler shared a tweet about the top 25 Recon Tools, but the content seems to be cut off. It likely refers to a list of tools used for reconnaissance in cybersecurity. Recon tools are essential for gathering information about potential targets to assess vulnerabilities and plan security measures. Daniel Miessler's tweet may have been promoting or sharing valuable resources related to cybersecurity tools and practices.
2025-08-14 2025https://github.com/SimplySecurity/SimplyEmailThe link provided leads to a GitHub repository named SimplyEmail under the SimplySecurity organization. The repository likely contains code, documentation, or resources related to email security. For further details, exploring the repository on GitHub is recommended.
2025-08-14 2025https://github.com/Ekultek/Zeus-ScannerThe content provided is a link to the GitHub repository for the Zeus-Scanner created by Ekultek. The Zeus-Scanner is likely a security tool or software designed for scanning and analyzing systems for vulnerabilities or threats. By visiting the GitHub link, users can access the source code, documentation, and potentially contribute to the project. It's a tool that may be useful for security professionals, developers, or individuals interested in cybersecurity.
2025-08-14 2025https://github.com/m0rtem/CloudFailThe link provided leads to a GitHub repository named CloudFail created by the user m0rtem. The content of the repository likely contains information, code, or tools related to cloud security or penetration testing. It is a resource that users can access to potentially learn more about cloud security vulnerabilities and how to address them.
2025-08-14 2025https://github.com/leebaird/discoverThe provided link directs to a GitHub repository belonging to a user named leebaird. The repository is named "discover." Unfortunately, without further information or access to the repository, it is not possible to provide a detailed summary of its contents or purpose. It is recommended to visit the GitHub link to explore the repository and its contents further.
2025-08-14 2025https://github.com/BishopFox/GitGotThe link provided leads to a GitHub repository named GitGot, created by BishopFox. The content of the repository likely includes information, code, or tools related to GitGot. Users can visit the link to explore the repository and access its contents, which may involve tools or resources related to Git or other relevant topics. BishopFox is the organization or individual behind the GitGot project, and the repository may contain valuable resources for those interested in Git-related tools or projects.
2025-08-14 2025https://github.com/s0md3v/StrikerThe provided link leads to a GitHub repository for a tool called Striker created by the user s0md3v. Striker is likely a software tool or program, but without further details from the content, its specific functionality or purpose is unclear. The repository on GitHub may contain information about the tool's features, how to use it, and any contributions or issues related to the project. It is recommended to visit the link for more detailed information on Striker and its capabilities.
2025-08-14 2025https://github.com/s0md3v/ReconDogThe content provided is a link to a GitHub repository for a tool called ReconDog created by a user named s0md3v. ReconDog is likely a reconnaissance tool used for information gathering and security testing purposes. The GitHub repository contains the source code and documentation for the tool. Users can access the tool, contribute to its development, or use it for their own reconnaissance activities.
2025-08-14 2025ArjunThe content provided is simply the name "Arjun."
2020-03-08 2020GitHub - redhuntlabs/Awesome-Asset-Discovery: List of Awesome Asset Discovery ResourcesThe content is a list of valuable resources for asset discovery available on GitHub under the project named "redhuntlabs/Awesome-Asset-Discovery." Users are encouraged to contribute to the development of these resources by creating an account on GitHub. This repository likely contains tools, techniques, or information related to asset discovery, which can be useful for cybersecurity professionals, researchers, or anyone interested in identifying and managing digital assets effectively.

Frequently Asked Questions

What is reconnaissance in security testing?
Reconnaissance is the process of discovering and mapping a target's attack surface before active testing. It includes finding subdomains, IP ranges, open ports, running services, technology stacks, and exposed endpoints. Thorough recon is often the difference between finding critical vulnerabilities and finding nothing.
What are the essential recon tools?
Core tools include subfinder and amass for subdomain enumeration, httpx for live host discovery, nmap for port scanning, nuclei for automated vulnerability scanning, katana and gospider for web crawling, ffuf for directory fuzzing, and waybackurls for historical URL discovery. Most hunters combine these into automated pipelines.
What is continuous recon and why does it matter?
Continuous recon monitors targets for changes over time — new subdomains, changed DNS records, newly exposed services, or updated technologies. Many high-impact findings come from assets that just appeared. Hunters automate this with cron jobs or services like Chaos by ProjectDiscovery, alerting them to fresh attack surface before competitors.

Weekly AppSec Digest

Get new resources delivered every Monday.