InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

A great tool that will be helpful in your bug bounty&pentesting journey.

Find endpoints, subdomains and, IP information, .js files using this tool.

loyalonlytoday
InfoSec Write-ups
Published in
3 min readMar 19, 2025

--

FREE LINK ACCESS

Image created by author with the help of ai

⚠️DISCLAIMER: INFORMATION IN THIS ARTICLE IS ONLY FOR EDUCATIONAL PURPOSES. ANY MISUSE OF THIS INFORMATION BY THE AUTHOR OF THIS ARTICLE IS NOT RESPONSIBLE.

In this article, you learn about a tool that will be helpful in your bug bounty and pen testing journey.

So let’s start this article.

THIS GREAT TOOL CREDITS → karol_paciorek

Click on the below link

Enter your target URL and select Deep Scan and click on enter.

Security Analysis details for my target URL.

No content Security policy and No Csrf protection, unsecured cookies, etc.

URL Scan Results

Network information details included the IPv4 addresses

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Responses (4)

Write a response