Web OSINT Toolbox

Recon is the unsexy part of bug bounty hunting and it's where most of the easy wins live. Before you start poking at endpoints, you want a clear picture of what the target looks like from the outside: who owns the IPs, what tech stack is running, what's exposed, and whether anyone has already flagged something worth a closer look.

Every tool below does some of that work for free, using data that's already public. If you got here from a target's lookup page, every card pre-fills with that target's domain, so each one is a single click away from a real result.

The toolbox

A note on scope

Everything here is passive recon. You aren't poking the target's servers, you're asking other companies what they've already collected about it. That makes these tools safe to run against almost anything without prior permission.

It does not give you a free pass to wander outside scope. If a program tells you to focus on api.example.com, don't paste example.com into Shodan and start chasing leads from the parent org. Use these to confirm what you're looking at, surface forgotten infrastructure that's actually in scope, and build a clean mental model before you touch a real request.

What each category is good for