Hello infosec community

I'm a developer interested in cybersecurity, OSINT, and reconnaissance tooling. Lately I've been spending time building small open-source tools in Python and learning more about how different recon techniques work in practice.

Most of my projects focus on things like subdomain discovery, endpoint extraction, and attack surface mapping. I'm still learning a lot and experimenting with different approaches.

Looking forward to connecting with other researchers and developers here and learning from the discussions in the community.

#CyberSecurity #OSINT #InfoSec

python osint recon code - YaCy 'agent-mogomut-ufe-25': Search Page

Software HTTP Freeware Home Page

@gary_alderson

Thanks for the suggestion! I haven’t tried running my own YaCy instance yet but that sounds really interesting for OSINT data gathering.

I'll definitely look into it and keep sharing some of the recon/OSINT tools I'm building.

Appreciate the advice!

@Ruyynn interesting. How do you do subdomain discovery? Is it just checking against a possible list of subdomain string possibilities? Like checking for “staging” and “dev” and such ?

@vicash

Good question. Not just wordlist brute forcing.

Usually it's a mix of passive discovery and some active techniques. Passive sources like certificate transparency logs and public datasets can reveal quite a few subdomains. After that, wordlist-based brute forcing helps catch common patterns like dev, staging, api, etc.

Another useful approach is analyzing JavaScript files and crawling public assets to extract additional endpoints or subdomain references.

Still exploring and refining different recon techniques.