Supercharge Your Subdomain Enumeration: Subfinder now supports RedHunt’s Attack Surface Recon API!

Hey there, cybersecurity enthusiasts! Ever wondered how to up your game in subdomain enumeration? Well, we’ve got some exciting news. Subfinder, a tool you probably know and love, is now integrated with RedHunt’s Attack Surface Recon API. Yep, you heard that right, your favourite subdomain enumeration tool just got even better with more comprehensive results.

Introducing BucketLoot – An Automated Cloud Bucket Inspector

RedHunt Labs introduces BucketLoot – a cutting-edge, automated S3-compatible Cloud Object Storage bucket inspector designed to empower users in securing their data. BucketLoot offers an array of powerful features, allowing users to seamlessly extract valuable assets, detect secret exposures, and search for custom keywords and Regular Expressions within publicly-exposed storage buckets.

Millions of Secrets Exposed via Web Application Frontends – Wave 7

Web applications are the cornerstone of anything on the publicly accessible internet. Due to the complexities of the software development life cycle, developers tend to embed secrets within the source code of the applications. As the code-base enlarges, developers often fail to redact the sensitive data before deploying it to production.

Octopii – An open-source, PII (Personally Identifiable Information) Scanner for Images

Say Hi to Octopii, an AI-powered Personal Identifiable Information scanner that uses Tesseract’s Optical Character Recognition (OCR) and a MobileNet Convolutional Neural Network (CNN) model to detect various forms of Government IDs, passports, debit cards, driver’s licenses, photos, signatures, etc. Let’s take a closer look at how Octopii works and why it’s essential to look out for exposed PII throughout your assets.