ProjectDiscovery's Avatar

ProjectDiscovery

@projectdiscovery

Detect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.

31
Followers
20
Following
112
Posts
03.09.2025
Joined
Posts Following

Latest posts by ProjectDiscovery @projectdiscovery

Video thumbnail

This is absolutely insane.

The prompt: "Set up a lab for Log4Shell at localhost:8080 and find all nuclei templates for this vulnerability. Use OAST detection to demonstrate the JNDI injection exploit with live callback verification."

Sign up for Neo today πŸ‘‡
https://projectdiscovery.io/request-demo

05.03.2026 08:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
How Neo found an SSRF vulnerability in Faraday, and why it matters for every team that ships code β€” ProjectDiscovery Blog Executive Summary Neo found a Server-Side Request Forgery (SSRF) vulnerability in Faraday, a widely used HTTP client library in the Ruby ecosystem. This is Neo’s first credited CVE discovery. Neo is...

An AI just found a CVE in a library with 1.1 billion downloads.

No human guidance. No custom rules. Neo reviewed Faraday's code, traced the URL logic, and found an SSRF that Snyk and Semgrep both missed.

Read the full breakdown: projectdiscovery.io/blog/how-neo...

03.03.2026 17:32 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Neo Security Engineer is like having a pro hacker in your pocket.

Just ask it what you want, it will download and use the necessary tools to achieve it.

In this video, I just asked Neo to find all subdomains and check which are live.

And, it did.

01.03.2026 18:03 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Did you know Subfinder has a "Deep Mode"? πŸ•΅οΈβ€β™‚οΈ

By adding -recursive, you aren't just looking for subdomains; you're looking for subdomains of subdomains.

Give it a try today!πŸ‘‡

23.02.2026 18:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Join the ProjectDiscovery Community Discord Server! This server is all about sharing information about security automation with ProjectDiscovery and other tools. | 8930 members

Got questions about our tools or anything security-related? πŸŒ€

Join our Discord community and ask away!

We’d love to have you. πŸ‘‡

20.02.2026 19:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Don't just find subdomains, find out where they came from.

Use the -cs flag to identify the specific source behind every lead and prioritize your targets.πŸ‘‡

16.02.2026 17:34 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
PR Pentesting | ProjectDiscovery Every PR gets pentested before it ships. Neo combines code analysis, AI reasoning, and runtime exploitation to post verified proof directly in your pull requests.

Your PRs are getting pentested by attackers anyway. Why not test them first?

Neo runs full exploit chains on every pull request:
β€’ Real browser sessions
β€’ Actual exploit attempts
β€’ Proof in PR comments
β€’ Verified remediations

See Neo in action β†’ projectdiscovery.io/solutions/pr...

16.02.2026 13:04 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Continuous Threat Modeling | ProjectDiscovery Build living threat models from design to deployment. Neo learns your architecture, keeps threat models current as your system evolves, and validates threats at runtime.

Threat models shouldn’t go stale the moment you ship.

Neo builds living threat models from your architecture + APIs, updates them as code changes, and even validates threats at runtime (with evidence).

projectdiscovery.io/solutions/th...

12.02.2026 20:12 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

We just leveled up Neo.

Claude Opus 4.6 is officially here!

Ready to build? projectdiscovery.io/request-demo

06.02.2026 16:57 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸŒ€Pro-Tip for httpx:

If you are using the screenshot feature, remember that it integrates seamlessly with the rest of the ProjectDiscovery ecosystem.

You can pipe your findings directly into other tools to filter by status code or technology before you even look at a single image.

05.02.2026 23:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Stop inspecting every active host manually. Let httpx automate visual checks and capture screenshots, enabling rapid review and deeper analysis at scale.

05.02.2026 23:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Ever feel like you're missing something when researching domains? πŸŒ€

You might be! Private TLDs are often overlooked and #tldfinder will help you discover them!

https://github.com/projectdiscovery/tldfinder

04.02.2026 19:35 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
State of AppSec 2026: Security at Engineering Speed | Report AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.

PR security reviews weren’t designed for AI-generated code and nonstop merges.

The State of AppSec Report shows why teams are moving beyond static findings and toward runtime proof of exploitability.

Less guessing. Fewer debates. Faster decisions.

projectdiscovery.io/whitepapers/...

03.02.2026 14:21 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Tired of manually managing your security tools?

Meet PDTM the tool that lets you install, update, and uninstall all your project discovery tools with a single command.

βœ… Get started here: https://github.com/projectdiscovery/pdtm

02.02.2026 17:44 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸš€ We just launched the ProjectDiscovery OSS Bounty Program! Contribute to our open source security tools, get your PRs merged & earn rewards! πŸ’₯

Read more πŸ‘‡
πŸ”— projectdiscovery.io/blog/announc...

#OpenSource #BugBounty #Infosec #ProjectDiscovery

02.02.2026 14:24 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
State of AppSec 2026: Security at Engineering Speed | Report AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.

What’s your biggest AppSec bottleneck right now?

A) too many findings

B) low dev adoption

C) slow remediation / unclear ownership

D) tool sprawl

We cover what teams are doing to fix these in the Neo State of AppSec Report.

πŸ“₯ projectdiscovery.io/whitepapers/...

#AppSec #SecurityEngineering

29.01.2026 16:13 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸš€ The State of AppSec Report | Security at Engineering Speed is live: projectdiscovery.io/whitepapers/...

Trying to improve AppSec without slowing dev teams down? This is for you:

β€’ trends shaping modern AppSec

β€’ what’s driving noise + delays

β€’ practical moves to improve adoption + remediation

28.01.2026 00:48 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Maximize your endpoint discovery by digging into JavaScript files. Using the -jc flag allows you to parse and crawl JS files to find hidden paths and APIs that standard crawls might miss

Use this commandπŸ‘‡

katana -jc -u https://target(.)com

27.01.2026 22:31 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Move beyond simple discovery. Pair Subfinder with httpx to instantly profile your attack surface by extracting tech stacks, status codes, and page titles at scale.

CommandπŸ‘‰ subfinder -d target(.)com | httpx -sc -td -title

26.01.2026 15:30 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Post image

Reply with your answer! πŸ‘‡

23.01.2026 09:16 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

ShuffleDNS is a fast Go tool for finding subdomains. It uses brute-force to identify valid targets and automatically filters out messy wildcard results

CommandπŸ‘‰ shuffledns -d example(.)com -list wordlist(.)txt -r resolvers(.)txt

-r: Your list of DNS resolvers.
-list: Your subdomain wordlist.

22.01.2026 02:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
ProjectDiscovery - Vulnerability management Monitor your infrastructure. Real vulnerabilities. Zero noise. Trusted by 100k+ security professionals to streamline vulnerabilities that can actually be exploited.

To see Neo in your environment, request a demo: projectdiscovery.io/request-demo

21.01.2026 19:28 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Neo - AI Security Engineer AI security engineer that fits into your day-to-day security workflows, from vulnerability analysis and code reviews to threat modeling and security reporting.

See Neo in action for yourself: neo.projectdiscovery.io/share/79a2dc...

21.01.2026 19:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
ProjectDiscovery - Vulnerability management reimagined Stop chasing false positives. ProjectDiscovery delivers real, exploitable vulnerability findings across your entire attack surfaceβ€”validated at runtime and prioritized by impact.

Vuln backlog triage is mostly mechanical. Neo pulls findings, clusters + prioritizes with your context, reproduces in an isolated sandbox, captures evidence, drafts remediation, and updates tickets until closure. See it: projectdiscovery.io

21.01.2026 19:26 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Post image

Stop just finding subdomains. Start finding endpoints. πŸ•ΈοΈ

Recon doesn't end with a list of domains. By piping subfinder and httpx into katana, you can automatically crawl and map out the entire attack surface of a target in seconds.πŸ‘‡

#Recon #Katana #Subfinder

20.01.2026 01:14 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Security work doesn’t fit in a 15‑minute coding loop. Neo is an AI security copilot that plans + executes long‑running security tasks (recon, threat modeling, testing, triage) with real tools (browser, terminal, APIs.) See Neo in action: projectdiscovery.io

19.01.2026 14:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Surfacing the real attack surface: Advances in asset discovery β€” ProjectDiscovery Blog Introduction Accurate external asset discovery remains a moving target for security teams at scale. What’s actually exposed is hard to pin down, regardless of how many inventories or spreadsheets an ...

Here’s a technical look at discovery methods that adapt over time, including cert-based discovery and recursive subdomain expansion. If you’re doing recon or external asset discovery, this is a solid overview of techniques beyond basic DNS bruteforce.
πŸ“– projectdiscovery.io/blog/surfaci...

15.01.2026 14:13 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸŒ€Naabu + Nmap = Port scan faster and inspect deeper.

Stop wasting time with slow, full-range scans!

Scan a host for open ports and use Nmap to detect the service versions.

Use this πŸ‘‡

naabu -host projectdiscovery(.)io -nmap-cli β€˜nmap -sV’

#naabu #hackwithautomation #portscan

03.01.2026 03:02 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

Welcome, 2026!

We look forward to building more great things with you in the new year!

With AI-driven threats emerging as the major challenge, our focus is clear: to bring you the defense you'll need for cutting-edge Attack Surface Management.

#HappyNewYear #Infosec #2026

01.01.2026 04:02 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Video thumbnail

For 2026, the next generation of Attack Surface Management isn't just about seeing more; it's about knowing what's real.

Want to learn why your security strategy needs proof?

➑️ Get our latest report now: https://projectdiscovery.io/whitepapers/attack-surface-management-2025

30.12.2025 23:31 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0