#recon — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #recon, aggregated by home.social.
-
Advanced Subdomain Discovery with Amass and Cheat Sheet
In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
https://denizhalil.com/2026/05/02/owasp-amass-subdomain-enumeration-cheat-sheet/#CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty
-
Advanced Subdomain Discovery with Amass and Cheat Sheet
In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
https://denizhalil.com/2026/05/02/owasp-amass-subdomain-enumeration-cheat-sheet/#CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty
-
Advanced Subdomain Discovery with Amass and Cheat Sheet
In this cheat sheet, I cover essential Amass commands, enumeration techniques, and practical workflows for effective recon.
https://denizhalil.com/2026/05/02/owasp-amass-subdomain-enumeration-cheat-sheet/#CyberSecurity #OWASP #Amass #SubdomainEnumeration #Recon #OSINT #AttackSurface #BugBounty
-
Plum, for Proactive Land Uncovering & Monitoring, is an orchestration tool to learn, monitor, and document an exposure surface. It coordinates work between scanning agents, keeps historical results, and makes observations searchable over time.
This project, part of D4 which was initially co-funded by the European Union, is still young, but it already addresses a concrete need: helping CIRCL to keep a global view of Luxembourg’s IP space, especially in the context of NIS2-related activities. The goal is not only to scan, but to maintain actionable knowledge of the national perimeter, its visible exposures and allows vulnerability discovery in the context of incident response.
#plum #scanning #networkscanning #cybersecurity #recon #csirt
https://www.d4-project.org/2026/04/29/Plum-knowing-and-monitoring-your-perimeter.html
-
https://www.europesays.com/nl/190109/ Crimson Glory – Chasing The Hydra #2026 #Amusement #BraveworldsRecords #ChasingTheHydra #CrimsonGlory #Dutch #Entertainment #FatesWarning #HeirApparent #lethal #Music #Muziek #Nederland #Nederlanden #Nederlands #Netherlands #NL #ProgressieveMetal #ProgressievePowerMetal #queensrÿche #recensie #recon #SacredWarrior #Sanctuary #savatage #VerenigdeStaten #watchtower #ZwareMetalen
-
https://www.europesays.com/be-nl/48063/ Crimson Glory – Chasing The Hydra #2026 #Amusement #BE #België #Belgium #BraveworldsRecords #ChasingTheHydra #CrimsonGlory #Entertainment #FatesWarning #HeirApparent #lethal #Music #Muziek #ProgressieveMetal #ProgressievePowerMetal #queensrÿche #recensie #recon #SacredWarrior #sanctuary #savatage #VerenigdeStaten #watchtower #ZwareMetalen
-
This Is What a Personal Surveillance System Actually Looks Like
You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run. -
This Is What a Personal Surveillance System Actually Looks Like
You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run. -
This Is What a Personal Surveillance System Actually Looks Like
You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run. -
This Is What a Personal Surveillance System Actually Looks Like
You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run. -
This Is What a Personal Surveillance System Actually Looks Like
You stop thinking of it as surveillance. It becomes “the system.” Just part of how things run. -
NiamonX Internet Surface (Beta) is now live — a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.
Instead of noisy scans or shallow datasets, the platform merges:
• internet-wide scanning (≈3,000 ports)
• multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
• deep tech fingerprinting
• graph-based topology mapping
• AI-driven risk reportsThe topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services — not just “open ports”.
Patterns and systemic weaknesses become visible instantly.The built-in AI Auditor produces contextual security reports:
• attack-path analysis
• CVE clustering & prioritization
• business impact breakdown
• actionable remediation roadmap
A process that normally takes days can now be done in hours.The entire system is designed with security & privacy in mind:
• hardened infrastructure
• zero request logging
• no user tracking
• only quota counters for rate enforcementAvailable across all plans — including the free tier.
If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.
🔗 dash.niamonx.io/internet_surface
🔗 is.niamonx.io#OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX
-
NiamonX Internet Surface (Beta) is now live — a passive, privacy-respecting OSINT & attack-surface intelligence platform built to map real-world exposure at global scale.
Instead of noisy scans or shallow datasets, the platform merges:
• internet-wide scanning (≈3,000 ports)
• multi-source enrichment (WHOIS/RDAP, public registries, partner crawlers)
• deep tech fingerprinting
• graph-based topology mapping
• AI-driven risk reportsThe topology graph reveals relationships between IP ranges, domains, ASNs, software stacks, libraries, misconfigurations, and exposed services — not just “open ports”.
Patterns and systemic weaknesses become visible instantly.The built-in AI Auditor produces contextual security reports:
• attack-path analysis
• CVE clustering & prioritization
• business impact breakdown
• actionable remediation roadmap
A process that normally takes days can now be done in hours.The entire system is designed with security & privacy in mind:
• hardened infrastructure
• zero request logging
• no user tracking
• only quota counters for rate enforcementAvailable across all plans — including the free tier.
If you’re doing OSINT, threat hunting, red/blue team work, or asset discovery, this is a tool worth exploring.
🔗 dash.niamonx.io/internet_surface
🔗 is.niamonx.io#OSINT #ThreatIntel #Infosec #AttackSurface #SecurityTools #CyberSecurity #Recon #AI #PassiveRecon #NiamonX
-
@thenarwhal
I pull this #meme out often, regarding the government's partnership with ecocidal corporations to exploit more unceded Indigenous lands. It's how #Canada really puts the #RECON in #reconciliation.#BCpol #CDNpoli #CSIS #Colonialism #Capitalism #WhitewashingThieves #GreenwashingThugs #BanCorporateLobbyists #StopCorporateWelfare #Ecocide #EcoJustice #IndigenousRights #UNDRIP #Landback #NativeLand #Unceded #CorporateGreed #GreedKills #Corruption #Bribery #DirtyDeals #BackroomBribes #PublicTransparency #PublicAccountability #PublicScrutiny #CrimesAgainstHumanity #RCMP #CIRG #FederalDomesticTerrorists #Inhumane #RemoveQualifiedImmunity #neoliberals #ColonizersLieCheatSteal #ColonialCriminals #StopTheWhitewash #KKKanada
-
Everyone's making final updates for the initial release of @owasp Amass v5!
Register and join our workshop at @defcon for additional details: https://lu.ma/hf83v61c
#security #infosec #redteam #recon #osint #attacksurface @defconowasp
-
Everyone's making final updates for the initial release of @owasp Amass v5!
Register and join our workshop at @defcon for additional details: https://lu.ma/hf83v61c
#security #infosec #redteam #recon #osint #attacksurface @defconowasp
-
Everyone's making final updates for the initial release of @owasp Amass v5!
Register and join our workshop at @defcon for additional details: https://lu.ma/hf83v61c
#security #infosec #redteam #recon #osint #attacksurface @defconowasp
-
Everyone's making final updates for the initial release of @owasp Amass v5!
Register and join our workshop at @defcon for additional details: https://lu.ma/hf83v61c
#security #infosec #redteam #recon #osint #attacksurface @defconowasp
-
Everyone's making final updates for the initial release of @owasp Amass v5!
Register and join our workshop at @defcon for additional details: https://lu.ma/hf83v61c
#security #infosec #redteam #recon #osint #attacksurface @defconowasp
-
Today I found a TUI for discovering subdomains! 🕵️
🌊 v**oyage:** A subdomain enumeration tool for your terminal
🚀 Supports multiple discovery methods, real-time monitoring & more!
🦀 Written in Rust & built with @ratatui_rs
⭐ GitHub: https://github.com/clickswave/voyage
#rustlang #ratatui #tui #subdomain #recon #security #terminal #commandline
-
Ronin 2.1.0 has finally been released! Lots of new stuff in this release, like new database tables, new payloads, ronin-recon, ronin-app, and more.
https://ronin-rb.dev/blog/2024/07/22/ronin-2-1-0-finally-released.html
#ronin #roninrb #ruby #infosec #securitytools #recon #payloads #opensource -
Going to be in #nyc this upcoming Wednesday? Come learn with the @owasp Global Board!
I'll be co-hosting with @redteamblueteam and doing a talk to introduce the new @amass project that builds your attack surface mapping infrastructure!
#infosec #cyber #cybersecurity #security #recon #reconnaissance #attacksurface #attacksurfacemanagement
https://www.meetup.com/owasp-new-york-city-chapter/events/299764785/
-
25 Recon Tools for Hacking & BugBounty 🔎
#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #CTF #pwn #cybersecuritytips #redteam #coding #100DaysOfHacking #vulnerabilities #BugBounty #recon #enumeration #100DaysOfCyberSecurity #CyberSecurityAwareness
-
CW: Poll: Autism Awareness in App Profiles
As I continue to #unmask during #Autism Awareness Month, I’ve been adjusting my various online profiles to raise awareness that I’m #Autistic. I’m curious whether others see this as useful. Or if you have done it, have you observed any effect on your interactions or success with folks online?
#AutismAwarenessMonth #ActuallyAutistic #Sctuff #GROWLr #Grindr #BiggerCity #Recon #FetLife @actuallyautistic
-
I recently made a highly efficient subdomain discovery wordlist by scanning the entire IPv4 space for SSL certs.
I've written a full article on the project, which is, in fact, my first public InfoSec article ever!
I would love to hear what you think!
You can read it here:
https://n0kovo.github.io/posts/subdomain-enumeration-creating-a-highly-efficient-wordlist-by-scanning-the-entire-internet/(boosts and shares highly appreciated ❤️)
#infosec #writeup #redteam #pentesting #recon #reconnaissance #enumeration #subdomain #subdomains #wordlist #masscan #osint #bugbounty #bughunter #hacking
-
I recently made a highly efficient subdomain discovery wordlist by scanning the entire IPv4 space for SSL certs.
I've written a full article on the project, which is, in fact, my first public InfoSec article ever!
I would love to hear what you think!
You can read it here:
https://n0kovo.github.io/posts/subdomain-enumeration-creating-a-highly-efficient-wordlist-by-scanning-the-entire-internet/(boosts and shares highly appreciated ❤️)
#infosec #writeup #redteam #pentesting #recon #reconnaissance #enumeration #subdomain #subdomains #wordlist #masscan #osint #bugbounty #bughunter #hacking
-
- #Ukraine developing their own #recon & #combat #drones
- #Pentagon grounds some #F35s after #Texas ejection
- #Kosovo shuts #border with #Serbia amid worst crisis in years
- Reconnecting the #energy #grid in #freezing #Kharkiv
- #Russian forces about to lose #Kreminna in #Luhansk
- #Battle of #Bakhmut: #Putin running out of men, #battalions split up
- #Russia's #war on drinkable #water
These & more war articles at:
https://flipboard.com/@curiouscurator/war-engines-rumble-6p4g58moz?from=share&utm_source=flipboard&utm_medium=curator_share -
United States Air Force RQ-4 Global Hawk 10-2045 as FORTE10 at FL580 #AE5420 over Greece and about to go feet wet in the Aegean as it RTB. The Global Hawk is an uncrewed reconnaissance drone and is part of the NATOP responce to the russian invasion #NAFO #milair #RQ4 ##planespotting #haveglass #aviation #AvGeek #spotter #aviationdaily #photography #aircraft #Nikon #Z9 #AvgeeksofMastodon #Recon
-
#ffuf - Fuzz Faster U Fool on multiple hosts
for i in
cat urls.txt; do ffuf -u $i/FUZZ -w wordlist.txt -mc 200,302,401 -se ;donePro Tip: If you are not finding any valid endpoints, try within a discovered path adding ..;/ to the url.
ie http://site.tld/somedir/..;/FUZZ
#bypass #payloads https://github.com/aufzayed/bugbounty/blob/main/403-bypass/403_url_payloads.txt