appsec.fyi

Recon Resources

Post Share

A curated AppSec resource library covering XSS, SQLi, SSRF, IDOR, RCE, XXE, OSINT, and more.

Recon

Reconnaissance is the first and arguably most important phase of any security assessment. It involves systematically discovering and mapping a target's attack surface — subdomains, IP ranges, open ports, running services, technology stacks, and exposed endpoints — before any active testing begins.

Effective recon separates productive security testing from wasted effort. A thorough recon phase reveals forgotten assets, shadow IT, staging environments, and legacy systems that are often less hardened than primary applications. Many of the highest-impact bug bounty findings come from assets discovered during recon that other hunters overlook.

Modern recon combines passive and active techniques. Passive recon leverages certificate transparency logs, DNS records, web archives, search engine indexes, and public datasets to map infrastructure without touching the target. Active recon involves subdomain brute-forcing, port scanning, directory fuzzing, and technology fingerprinting. Tools like subfinder, httpx, nuclei, katana, and ffuf form the backbone of most researchers' recon pipelines.

Automation is essential at scale. Many hunters build continuous recon pipelines that monitor targets for new subdomains, changed DNS records, and newly exposed services — enabling them to test fresh attack surface before anyone else.

This page collects recon methodologies, tool guides, automation workflows, and techniques for comprehensive attack surface discovery.

Date Added Link Excerpt
2026-05-05 2026GhostTrack Explained: Track IPs Phones and Usernames Easily beginner OSINTTool for gathering publicly available data on phone numbers, IP addresses, and usernames. GhostTrack, a Python OSINT script currently at Version 2.2, consolidates IP tracking, phone lookup, and username search into a single menu-driven interface. While a useful learning aid and convenient for Termux users, it falls short compared to professional tools like PhoneInfoga and Sherlock, offering broader but shallower reconnaissance capabilities. The script primarily targets Debian-based Linux and Termux, and users should be aware that its phone tracking module identifies registration country and carrier, not live location.
2026-04-22 2026ars0n-framework-v2: Bug Bounty Hunting Framework intermediateFramework that automates bug bounty hunting workflows, acting as a wrapper around 20+ tools like Amass, Nuclei, and Ffuf. It guides users through a methodology, centralizes scan results, and offers educational components to understand the "why" behind each step. The framework utilizes Docker containers for deployment and includes features for data visualization and learning.
2026-04-22 2026Uncover Hidden Assets with Bug Bounty Recon: Fuzzing and JS Analysis intermediateLibrary for bug bounty reconnaissance that teaches parameter fuzzing, forced browsing, and JS analysis. It covers using tools like LinkFinder and bookmarklets for endpoint discovery, integrating Burp Suite extensions such as JSLinkFinder, GAP, and JSpector for automated JS analysis, and employing techniques like path and parameter fuzzing to uncover hidden assets and potential vulnerabilities. → yeswehack.com
2026-04-22 2026Subdomain Takeover: Proof Creation for Bug Bounties intermediateWriteup detailing manual subdomain takeover proof creation for bug bounty hunters, focusing on cloud providers like Amazon S3, GitHub Pages, Heroku, and Readme.io. It outlines specific verification steps using regex patterns and HTTP requests, along with actionable takeover procedures for each service, referencing can-i-takeover-xyz.
2026-04-22 2026Shodan and Censys for beginners: How to find more vulnerabilities beginnerGuide for beginners on utilizing Shodan and Censys for vulnerability discovery, focusing on reconnaissance techniques. It details how to use specific search operators like `org`, `asn`, `http.status`, `ssl.cert.subject.CN`, `http.favicon.hash`, and `http.html` to identify exposed hosts, forgotten assets via expired certificates, and authentication panels. The guide also explains filtering by technologies such as PHP and finding directory listings. → intigriti.com
2026-04-22 2026Hunting down subdomain takeover vulnerabilities intermediateLibrary for identifying and exploiting subdomain takeover vulnerabilities. It details how companies often use third-party services, leaving DNS records pointing to forgotten services that attackers can claim. The library covers identifying vulnerable cases like AWS S3 and distinguishing them from non-vulnerable ones like HubSpot and Atlassian StatusPage. It also discusses automating the discovery process with tools such as OWASP Amass, Subfinder, Subjack, and Subzy, and outlines exploitation methods including OAuth/SSO token leaks and cookie leaks via misconfigured cookie policies. → intigriti.com
2026-04-22 2026FFuF Fuzzer Guide: Fuzz Faster u Fool for Bug Bounty Hunters intermediateTool for web fuzzing: FFuF (Fuzz Faster u Fool) assists bug bounty hunters by rapidly discovering directories, files, and hidden parameters. It supports GET and POST requests, authenticated testing via cookies, recursive directory scanning, and allows customization of request delay, threading, and response code filtering. Installation involves obtaining the Go programming language and then using "go get" to install FFuF from its GitHub repository. → intigriti.com
2026-04-22 2026Open Source Intelligence Gathering: Techniques, Automation, and Visualization beginnerReference detailing techniques for gathering open-source intelligence, focusing on mapping networks, discovering domains via reverse WHOIS with tools like WhoXY, and enumerating subdomains using services such as crt.sh and Censys. It covers resolving domains to IP addresses, analyzing DNS records including MX and TXT for email spoofing potential via DMARC and SPF, and emphasizes automation for efficiency.
2026-04-22 2026OWASP Test for Subdomain Takeover beginnerLibrary for testing subdomain takeover vulnerabilities, which occurs when a subdomain record points to a non-existent or inactive external service and the service provider does not verify ownership. This allows attackers to claim subdomains, leading to attacks like phishing or credential theft. The library covers testing various DNS record types, including A, CNAME, and NS, and details methods for black-box and gray-box testing using tools like `dig` and `dnsrecon`. → owasp.org
2026-04-22 2026Maximizing Security Outcomes: The Role of ASM in Bug Bounty Programs beginnerLibrary for optimizing bug bounty programs, focusing on attacker mentality and high-impact findings. It emphasizes continuous, wide-breadth attack surface analysis and deep mapping, reflecting principles born from the bug bounty space. The library helps companies attract top talent by aligning with hunter motivations, who prioritize high payouts and focus on a limited number of programs that offer significant returns for their manual hacking efforts. → assetnote.io
2026-04-22 2026Building a Fast One-Shot Recon Script for Bug Bounty intermediateLibrary for building a one-shot reconnaissance script for bug bounty hunting, automating asset discovery, subdomain enumeration using tools like puredns and shuffledns, HTTP server enumeration with nmap and tew, and vhosting resolution. It also incorporates HTTP crawling with gospider and response capture inspired by Tomnomnom's techniques, aiming to efficiently gather essential information for initial bug bounty assessments.
2026-04-19 2026The 2026 State of Attack Surface Management — ProjectDiscovery newsWhitepaper on Attack Surface Management in 2026, detailing how AI adversaries operate at machine speed and render legacy ASM tools insufficient. It explains why traditional visibility-focused approaches fail against autonomous, adaptive attackers, and introduces the concept of "Proof-Based Intelligence" as the future of ASM. The document highlights the need for deterministic validation, application exposure logic, and adaptive learning, supported by real-world case studies demonstrating significant reductions in alerts and operational savings. → projectdiscovery.io
2026-04-19 2026The Ultimate Guide to Attack Surface Management Tools in 2025 newsGuide to 20 Attack Surface Management (ASM) tools for 2025, featuring FireCompass, Intruder, Detectify, CrowdStrike Falcon, Trend Vision One, Darktrace, Qualys CSAM, CyCognito, Tenable ASM, SentinelOne Singularity, Wiz, Mandiant Advantage, UpGuard, Palo Alto Networks, WithSecure ASM, CTM360 HackerView, IBM Security Randori, Scrut Automation, Risk-based Vulnerability Management, and Cyber Asset Management. This resource details automated asset discovery, vulnerability scanning, threat detection, and risk prioritization capabilities offered by these solutions.
2026-04-19 2026Top 10 Attack Surface Management Tools for 2026 — Intruder newsLibrary of attack surface management tools for 2026, including Intruder, Detectify, Rapid 7, Qualys, Tenable, Microsoft Defender, CyCognito, CrowdStrike Falcon Surface, Mandiant Advantage, and Cymulate. These solutions help uncover exposed assets, identify vulnerabilities, and reduce business risk by providing continuous monitoring and automated security testing for dynamic cloud environments and web applications.
2026-04-19 202612 Attack Surface Management Tools to Know in 2026 newsTools for Attack Surface Management (ASM) continuously discover and map externally accessible assets, validate their security posture, and prioritize vulnerabilities for remediation. These solutions identify domains, sub-domains, APIs, and cloud services, creating comprehensive inventories. By assessing exploitability and business context, ASM tools help organizations reduce their digital footprint, detect hidden threats like shadow IT, and proactively manage risks arising from expanding cloud environments and third-party services.
2026-04-19 2026SubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025 intermediateSubFinder: Automating Subdomain Enumeration for Bug Bounty in 2025
2026-04-17 2026Naabu Zero to Hero Guide (Cyber Aryan) beginnerLibrary for high-speed SYN-based port scanning, Naabu enables rapid identification of open ports. Designed for reconnaissance pipelines, it accepts domains or hosts as input and outputs open ports. Usable for stealth scans, firewall bypass with TCP connect, or integration with Nmap for further analysis, Naabu is frequently chained with tools like Subfinder and Httpx to create efficient attack surface enumeration pipelines.
2026-04-17 2026Mastering Network Scanning: Nmap and Masscan Guide beginnerMastering Network Scanning: Nmap and Masscan Guide
2026-04-17 2026Naabu Cheat Sheet: Commands & Examples (HighOn.Coffee) intermediateCheatsheet on Naabu, a fast Go-based port scanner from Project Discovery, detailing its features like automatic IP deduplication, SYN/CONNECT/UDP scanning, and passive Shodan integration. It provides installation instructions for Linux and Kali, along with practical command examples for scanning all ports, verifying specific ports, and integrating with Nmap for service enumeration.
2026-04-17 2026naabu: Fast Go port scanner (ProjectDiscovery) beginnerLibrary for fast SYN, CONNECT, and UDP port scanning. naabu supports numerous input and output formats, including JSON, and offers features like CDN/WAF exclusion, NMAP integration for service discovery, and custom UDP payloads. It can scan hosts from lists, CIDRs, or ASNs, and provides options for rate limiting, IPv4/IPv6 scanning, and proxy support.
2026-04-17 2026Recon series #4: Port scanning methods (YesWeHack) beginnerLibrary for reconnaissance techniques, detailing passive and active port scanning methods to uncover open ports and hidden services. It explores tools like Nmap, Masscan, and Naabu, and techniques such as TCP SYN, CONNECT, and UDP scanning, alongside banner grabbing for service identification. The resource also covers evasion strategies for firewalls and IDS, referencing methods like decoys and scan delays to improve stealth. → yeswehack.com
2026-04-17 2026bountyRecon: Bash automation for bug bounty recon intermediatebountyRecon: Bash automation for bug bounty recon
2026-04-17 2026JSFScan.sh: JavaScript recon automation (KathanP19) intermediateTool for automating JavaScript reconnaissance in bug bounty programs. JSFScan.sh gathers JavaScript file links from various sources, extracts endpoints and secrets, fetches JS files for manual analysis, generates wordlists, identifies variables, scans for DOM XSS, and produces HTML reports. It can be run locally or within a Docker container, offering options for targeted scans or comprehensive analysis using tools like hakrawler.
2026-04-17 2026Reconky: Content discovery bash script intermediateLibrary for automated reconnaissance and information gathering. This Bash script, Reconky, uses tools like assetfinder, Sublist3r, amass, knockpy, httprobe, nmap, waybackurls, and eyewitness to gather subdomains, check for duplex, perform dictionary attacks, identify alive domains, investigate subdomain takeovers, scan open ports, extract parameters, collect files, and capture screenshots. It also assists in assembling possible parameters from wayback_url data and pulling json/js/php/aspx/ files.
2026-04-17 2026Bug-Bounty-Automation: Bash recon (Retr0-45809) intermediateLibrary automating bug bounty reconnaissance using Bash scripting. It orchestrates tools like Sublister, Eyewitness, Assetfinder, Amass, Httprobe, Nmap, and Sqlmap, requiring Kali Linux, Python, and Golang. The script executes multiple recon tools sequentially, storing their outputs for a comprehensive view of web application, mobile app, and other platform vulnerabilities.
2026-04-17 2026Recon-Script: automation with Nuclei (s1d6point7bugcrowd) intermediateLibrary for automating Nuclei vulnerability scans, integrating features like voice notifications via espeak, proxychains support, and optional cloud uploads to ProjectDiscovery Cloud Platform (PDCP). It allows for out-of-scope filtering, custom bug bounty headers, and detailed scan logging with timestamps, supporting tools such as subfinder, dnsx, and httpx.
2026-04-17 2026Bug-Bounty-Recon-Automation shell script (Amangupta1234) intermediateLibrary for automating bug bounty reconnaissance tasks. This Bash script streamlines project documentation, subdomain enumeration using Sublist3r and assetfinder, subdomain resolution with httprobe, and directory bruteforcing/fuzzing with dirsearch. It also includes subdomain takeover detection via Subjack and JavaScript file discovery with subjs, simplifying repetitive processes for hunters.
2026-04-17 2026The Ultimate Guide to Finding Bugs With Nuclei (ProjectDiscovery) beginnerLibrary for efficient, extensible vulnerability scanning using YAML-based templates. Nuclei supports HTTP, DNS, SSL, and raw TCP protocols, allowing detection of CVEs, misconfigurations, and sensitive file exposures. It integrates into workflows with other tools and offers features like custom template creation, fuzzing, advanced DSL for matchers, and various scan modes including headless and network. Advanced options include rate limiting, template filtering by technology, severity, or name, and resuming interrupted scans. → projectdiscovery.io
2026-04-17 2026The Ultimate Recon Arsenal: 25+ Commands for Bug Bounty Workflow intermediateLibrary of 25+ reconnaissance commands streamlines bug bounty workflows, covering advanced subdomain enumeration with tools like Amass and MassDNS, asset discovery and service fingerprinting using HTTPX, directory brute-forcing with Feroxbuster, and JavaScript analysis with LinkFinder. It also details automating these processes with a Bash workflow script and validating critical vulnerabilities using Nuclei. The library emphasizes the necessity of automation for efficient, large-scale target mapping and attack surface assessment, highlighting techniques that move beyond basic automation to masterful enumeration. → undercodetesting.com
2026-04-17 2026xpfarm: Automated bug bounty & recon framework (GitHub) intermediateLibrary wrapping offensive security tools like Subfinder, Naabu, Httpx, Nuclei, Nmap, and Gowitness into a unified web UI. It offers distributed scanning, AI-generated reports via Overlord, a smart scan planner, and an interactive attack graph, supporting multiple AI providers and specialized agents for analysis.
2026-04-17 2026Automate Your Nuclei Recon Pipeline with VPN + Discord Alerts intermediateScript automates bug bounty reconnaissance by enumerating subdomains with subfinder, probing live hosts via httpx, rotating NordVPN IPs, and running Nuclei scans with specific templates and filters. It sends Discord alerts for any found vulnerabilities, detailing the count, severity, template ID, matched target, and current IP. The process is designed for repeatable, single-command execution on a list of target domains.
2026-04-17 2026Advanced Recon: Taking Your Subdomain Discovery to the Next Level intermediateAdvanced Recon: Taking Your Subdomain Discovery to the Next Level
2026-04-17 2026GitHub dorking for beginners: find more vulnerabilities (Intigriti) beginnerGuide detailing how to leverage GitHub's advanced search operators for bug bounty hunting. It covers essential techniques like using `org:`, `user:`, `extension:`, and boolean operators, alongside advanced filters such as `filename:`, `language:`, and `path:`. Specific examples demonstrate finding hard-coded secrets like Stripe API keys, AWS access keys, and OpenAI API keys, as well as sensitive configuration files, hard-coded URLs, database connection strings, and JWT secrets. → intigriti.com
2026-04-17 2026google-dorks-bug-bounty (TakSec, GitHub) intermediateLibrary of Google Dorks for bug bounty hunting, web application security, and penetration testing. This collection includes dorks for discovering configuration files, error messages, API endpoints, potential vulnerabilities, sensitive documents, administrative interfaces, and various subdomain structures. It also provides example queries for identifying specific technologies like Apache and Drupal, and for searching on platforms like Pastebin, GitHub, and cloud storage services.
2026-04-17 2026How I Found Sensitive Information using GitHub Dorks (Part 3) intermediateHow I Found Sensitive Information using GitHub Dorks (Part 3)
2026-04-17 2026The Ultimate Subdomain Recon Playbook beginnerLibrary for systematic subdomain enumeration, progressing from passive OSINT tools like crt.sh, DNSDumpster, SecurityTrails, Shodan, and Censys, to offline command-line tools including Subfinder, Amass, Assetfinder, puredns, and dnsx. It further incorporates web archive crawling with gau and waybackurls, JS file analysis using linkfinder and hakrawler, and advanced DNS permutation attacks via dnsgen and altdns. The library also facilitates automation through tools like Chaos, httpx, OneForAll, and ReconFTW, and includes post-recon workflows for subdomain takeover checks with subjack and nuclei, port scanning with naabu, and vulnerability scanning with nuclei.
2026-04-17 2026Complete Guide to Amass Tool (2025 Edition) beginnerLibrary for comprehensive Amass recon and subdomain enumeration, covering installation on Kali Linux, Termux, and Windows WSL. It details Amass modules like Enum, Intel, Viz, Track, and DB, and provides basic usage examples for discovering subdomains, mapping DNS, and performing passive and active recon. The guide also includes pro tips for bug bounty hunters and installation via GitHub binary.
2026-04-17 2026Mastering Passive Reconnaissance for Bug Bounty and Pentesting beginnerMastering Passive Reconnaissance for Bug Bounty and Pentesting
2026-04-17 2026Mastering OSINT for Bug Bounty: Advanced Deep Recon intermediateLibrary for performing deep reconnaissance in bug bounty hunting, this resource details advanced Open-Source Intelligence (OSINT) tools and techniques. It covers subdomain enumeration with Amass and Subfinder, exposed service discovery using Shodan and Censys, and secret finding via GitHub Dorks and Gitleaks. The guide also explores identifying technologies and employees through LinkedIn and Twitter, and extracting metadata with ExifTool and FOCA, outlining a comprehensive workflow for mapping targets and identifying vulnerabilities.
2026-04-17 2026Mastering Passive Information Gathering: Extensive OSINT Guide beginnerMastering Passive Information Gathering: Extensive OSINT Guide
2026-04-17 20269 Attack Surface Monitoring Tools in 2026 (SentinelOne) newsLibrary for discovering and managing attack surface exposures, including open ports, subdomains, misconfigurations, and public-facing APIs. It integrates with SIEMs and incident response teams, providing real-time risk assessment and addressing multi-cloud and hybrid complexities. SentinelOne Singularity™ Cloud Security, a CNAPP solution, offers features like CSPM, CIEM, EASM, AI-SPM, CWPP, and CDR, with autonomous AI-based protection and secret detection. → sentinelone.com
2026-04-17 2026Recon Methodology: Subdomain Enumeration beginnerRecon Methodology: Subdomain Enumeration
2026-04-17 2026Recon Guide: Subdomain Enumeration beginnerRecon Guide: Subdomain Enumeration
2026-04-17 2026Bug-Bounty-recon: Automated recon framework (GitHub) intermediateLibrary for automated reconnaissance in authorized security testing and bug bounty programs. It chains tools like subfinder, assetfinder, httpx, and nuclei to discover subdomains, identify login pages, admin panels, APIs, and perform Nmap scans. The framework detects changes between runs, reporting only new subdomains, open ports, and findings, ideal for scheduled or continuous monitoring on VPS.
2026-04-17 2026Subdomain enumeration: expand attack surface with active, passive methods intermediateLibrary for advanced subdomain enumeration, this resource details passive techniques using tools like Censys, Shodan, Subfinder, and Amass, alongside active methods such as DNS brute-forcing with Gobuster. It emphasizes expanding the attack surface by discovering hidden subdomains through analyzing public databases, SSL logs, and web archives, and through direct interaction with the target, offering practical examples for bug bounty hunting and penetration testing. → yeswehack.com
2026-04-16 2026Passive Reconnaissance Using OSINT beginnerLibrary for performing passive reconnaissance using OSINT, detailing methodologies for mapping public-facing infrastructure without direct interaction. It emphasizes techniques like Google Advanced Search, analyzing client-side scripts with tools like LinkFinder, and leveraging external services such as crt.sh, Findsubdomains.com, and Censys.io to discover subdomains, exposed services, and potential vulnerabilities like token leaks or privilege escalation. The library highlights real-world examples, including bounties from Snapchat and Shopify, and the discovery of misconfigured Jenkins instances.
2026-04-16 2026From Recon to Sensitive Key Exposure Using Nuclei intermediateFrom Recon to Sensitive Key Exposure Using Nuclei
2026-04-16 2026reconFTW: Automated Recon Tool intermediateLibrary for automated reconnaissance, reconFTW automates subdomain enumeration, vulnerability scanning for XSS, SSRF, SQLi, and more, and OSINT gathering. It supports distributed scanning via AX Framework, integrates with Faraday for reporting, and leverages tools like subfinder, nuclei, ffuf, and SQLMap for comprehensive intelligence.
2026-04-16 2026A Deep Dive on Katana Field Extraction intermediateTool for headless web crawling and field extraction. Katana, a Golang-based CLI tool from ProjectDiscovery, efficiently spiders web applications and supports customizable field extraction using regex. It reduces unstructured data by allowing users to filter and utilize output for reconnaissance pipelines or to identify specific data like unique parameters for fuzzing XSS vulnerabilities. Katana supports predefined fields and custom regex-based extraction for enhanced data processing. → projectdiscovery.io
2026-04-16 2026Subdomain Takeover in 2025: New Methods and Tools intermediateLibrary detailing subdomain takeover techniques, focusing on their continued effectiveness in 2025 due to widespread cloud adoption. It covers the fundamental mechanism of takeovers, their inherent dangers such as brand reputation damage and facilitating phishing, and outlines a step-by-step workflow involving subdomain enumeration with tools like `subfinder` and `dnsx`, followed by exploitation checks. The resource also highlights essential tools such as `httpx` and `subzy`, and demonstrates an automated exploitation example on Heroku.

Frequently Asked Questions

What is reconnaissance in security testing?
Reconnaissance is the process of discovering and mapping a target's attack surface before active testing. It includes finding subdomains, IP ranges, open ports, running services, technology stacks, and exposed endpoints. Thorough recon is often the difference between finding critical vulnerabilities and finding nothing.
What are the essential recon tools?
Core tools include subfinder and amass for subdomain enumeration, httpx for live host discovery, nmap for port scanning, nuclei for automated vulnerability scanning, katana and gospider for web crawling, ffuf for directory fuzzing, and waybackurls for historical URL discovery. Most hunters combine these into automated pipelines.
What is continuous recon and why does it matter?
Continuous recon monitors targets for changes over time — new subdomains, changed DNS records, newly exposed services, or updated technologies. Many high-impact findings come from assets that just appeared. Hunters automate this with cron jobs or services like Chaos by ProjectDiscovery, alerting them to fresh attack surface before competitors.

Weekly AppSec Digest

Get new resources delivered every Monday.