Subdomain Enumeration
Subdomain Enumeration: Finding Forgotten Doors Unleash wordlists and brute-force to peel back layers of hidden subdomains. Turns one domain into a sprawling attack surface map.
Explore →DNS & IP Lookup
DNS & IP Lookup: Decoding the Digital DNA Translate names to IPs, reveal mail servers, and trace geographic footprints. The internet’s phonebook never lies.
Explore →WHOIS Lookup
WHOIS Lookup: Unmasking the Owner Pull registration dates, owner emails, and name servers from public records. Anonymity cracks open with a single query.
Explore →Port Scanning
Port Scanning: Knocking on Digital Doors Sweep thousands of ports to fingerprint services and versions in seconds. Open doors light up like runway signals.
Explore →HTTP Probing
HTTP Probing: Breathing Life Into Hosts Handshake with web servers to grab titles, headers, and status codes. Polite recon that speaks fluent HTTP.
Explore →Email Harvesting
Email Harvesting: Behind the Curtain of Access Scrape public pages, Google dorks, and PGP keys for employee addresses. Builds org charts before saying hello.
Explore →Metadata Extraction
Metadata Extraction: The Hidden Gold in Plain Sight Strip PDFs, images, and docs for usernames, software, and GPS tags. Files whisper secrets louder than content.
Explore →Archive Analysis
Archive Analysis: Time Traveling for Clues Dive into Wayback Machine snapshots to resurrect deleted pages and configs. The web never truly forgets.
Explore →Web Technology Detection
Web Technology Detection: Fingerprinting the Stack Fingerprint CMS, frameworks, JS libraries, and server stacks from headers and HTML. Know the target before touching it.
Explore →Certificate Transparency Monitoring

