This is absolutely insane.
The prompt: "Set up a lab for Log4Shell at localhost:8080 and find all nuclei templates for this vulnerability. Use OAST detection to demonstrate the JNDI injection exploit with live callback verification."
Sign up for Neo today π
https://projectdiscovery.io/request-demo
05.03.2026 08:03
π 1
π 0
π¬ 0
π 0
Neo Security Engineer is like having a pro hacker in your pocket.
Just ask it what you want, it will download and use the necessary tools to achieve it.
In this video, I just asked Neo to find all subdomains and check which are live.
And, it did.
01.03.2026 18:03
π 1
π 0
π¬ 0
π 0
Did you know Subfinder has a "Deep Mode"? π΅οΈββοΈ
By adding -recursive, you aren't just looking for subdomains; you're looking for subdomains of subdomains.
Give it a try today!π
23.02.2026 18:02
π 1
π 0
π¬ 0
π 0
Join the ProjectDiscovery Community Discord Server!
This server is all about sharing information about security automation with ProjectDiscovery and other tools. | 8930 members
Got questions about our tools or anything security-related? π
Join our Discord community and ask away!
Weβd love to have you. π
20.02.2026 19:02
π 0
π 0
π¬ 0
π 0
Don't just find subdomains, find out where they came from.
Use the -cs flag to identify the specific source behind every lead and prioritize your targets.π
16.02.2026 17:34
π 0
π 0
π¬ 0
π 0
PR Pentesting | ProjectDiscovery
Every PR gets pentested before it ships. Neo combines code analysis, AI reasoning, and runtime exploitation to post verified proof directly in your pull requests.
Your PRs are getting pentested by attackers anyway. Why not test them first?
Neo runs full exploit chains on every pull request:
β’ Real browser sessions
β’ Actual exploit attempts
β’ Proof in PR comments
β’ Verified remediations
See Neo in action β projectdiscovery.io/solutions/pr...
16.02.2026 13:04
π 0
π 0
π¬ 0
π 0
Continuous Threat Modeling | ProjectDiscovery
Build living threat models from design to deployment. Neo learns your architecture, keeps threat models current as your system evolves, and validates threats at runtime.
Threat models shouldnβt go stale the moment you ship.
Neo builds living threat models from your architecture + APIs, updates them as code changes, and even validates threats at runtime (with evidence).
projectdiscovery.io/solutions/th...
12.02.2026 20:12
π 0
π 0
π¬ 0
π 0
We just leveled up Neo.
Claude Opus 4.6 is officially here!
Ready to build? projectdiscovery.io/request-demo
06.02.2026 16:57
π 0
π 0
π¬ 0
π 0
πPro-Tip for httpx:
If you are using the screenshot feature, remember that it integrates seamlessly with the rest of the ProjectDiscovery ecosystem.
You can pipe your findings directly into other tools to filter by status code or technology before you even look at a single image.
05.02.2026 23:02
π 1
π 0
π¬ 0
π 0
Stop inspecting every active host manually. Let httpx automate visual checks and capture screenshots, enabling rapid review and deeper analysis at scale.
05.02.2026 23:02
π 1
π 0
π¬ 1
π 0
Ever feel like you're missing something when researching domains? π
You might be! Private TLDs are often overlooked and #tldfinder will help you discover them!
https://github.com/projectdiscovery/tldfinder
04.02.2026 19:35
π 0
π 0
π¬ 0
π 0
State of AppSec 2026: Security at Engineering Speed | Report
AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.
PR security reviews werenβt designed for AI-generated code and nonstop merges.
The State of AppSec Report shows why teams are moving beyond static findings and toward runtime proof of exploitability.
Less guessing. Fewer debates. Faster decisions.
projectdiscovery.io/whitepapers/...
03.02.2026 14:21
π 0
π 0
π¬ 0
π 0
Tired of manually managing your security tools?
Meet PDTM the tool that lets you install, update, and uninstall all your project discovery tools with a single command.
β
Get started here: https://github.com/projectdiscovery/pdtm
02.02.2026 17:44
π 0
π 0
π¬ 0
π 0
π We just launched the ProjectDiscovery OSS Bounty Program! Contribute to our open source security tools, get your PRs merged & earn rewards! π₯
Read more π
π projectdiscovery.io/blog/announc...
#OpenSource #BugBounty #Infosec #ProjectDiscovery
02.02.2026 14:24
π 3
π 1
π¬ 0
π 0
State of AppSec 2026: Security at Engineering Speed | Report
AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.
Whatβs your biggest AppSec bottleneck right now?
A) too many findings
B) low dev adoption
C) slow remediation / unclear ownership
D) tool sprawl
We cover what teams are doing to fix these in the Neo State of AppSec Report.
π₯ projectdiscovery.io/whitepapers/...
#AppSec #SecurityEngineering
29.01.2026 16:13
π 0
π 0
π¬ 0
π 0
π The State of AppSec Report | Security at Engineering Speed is live: projectdiscovery.io/whitepapers/...
Trying to improve AppSec without slowing dev teams down? This is for you:
β’ trends shaping modern AppSec
β’ whatβs driving noise + delays
β’ practical moves to improve adoption + remediation
28.01.2026 00:48
π 0
π 0
π¬ 0
π 0
Maximize your endpoint discovery by digging into JavaScript files. Using the -jc flag allows you to parse and crawl JS files to find hidden paths and APIs that standard crawls might miss
Use this commandπ
katana -jc -u https://target(.)com
27.01.2026 22:31
π 1
π 0
π¬ 0
π 0
Move beyond simple discovery. Pair Subfinder with httpx to instantly profile your attack surface by extracting tech stacks, status codes, and page titles at scale.
Commandπ subfinder -d target(.)com | httpx -sc -td -title
26.01.2026 15:30
π 1
π 1
π¬ 0
π 0
Reply with your answer! π
23.01.2026 09:16
π 0
π 0
π¬ 0
π 0
ShuffleDNS is a fast Go tool for finding subdomains. It uses brute-force to identify valid targets and automatically filters out messy wildcard results
Commandπ shuffledns -d example(.)com -list wordlist(.)txt -r resolvers(.)txt
-r: Your list of DNS resolvers.
-list: Your subdomain wordlist.
22.01.2026 02:02
π 0
π 0
π¬ 0
π 0
ProjectDiscovery - Vulnerability management reimagined
Stop chasing false positives. ProjectDiscovery delivers real, exploitable vulnerability findings across your entire attack surfaceβvalidated at runtime and prioritized by impact.
Vuln backlog triage is mostly mechanical. Neo pulls findings, clusters + prioritizes with your context, reproduces in an isolated sandbox, captures evidence, drafts remediation, and updates tickets until closure. See it: projectdiscovery.io
21.01.2026 19:26
π 0
π 0
π¬ 1
π 0
Stop just finding subdomains. Start finding endpoints. πΈοΈ
Recon doesn't end with a list of domains. By piping subfinder and httpx into katana, you can automatically crawl and map out the entire attack surface of a target in seconds.π
#Recon #Katana #Subfinder
20.01.2026 01:14
π 0
π 0
π¬ 0
π 0
Security work doesnβt fit in a 15βminute coding loop. Neo is an AI security copilot that plans + executes longβrunning security tasks (recon, threat modeling, testing, triage) with real tools (browser, terminal, APIs.) See Neo in action: projectdiscovery.io
19.01.2026 14:02
π 0
π 0
π¬ 0
π 0
πNaabu + Nmap = Port scan faster and inspect deeper.
Stop wasting time with slow, full-range scans!
Scan a host for open ports and use Nmap to detect the service versions.
Use this π
naabu -host projectdiscovery(.)io -nmap-cli βnmap -sVβ
#naabu #hackwithautomation #portscan
03.01.2026 03:02
π 1
π 0
π¬ 0
π 0
Welcome, 2026!
We look forward to building more great things with you in the new year!
With AI-driven threats emerging as the major challenge, our focus is clear: to bring you the defense you'll need for cutting-edge Attack Surface Management.
#HappyNewYear #Infosec #2026
01.01.2026 04:02
π 0
π 0
π¬ 0
π 0
For 2026, the next generation of Attack Surface Management isn't just about seeing more; it's about knowing what's real.
Want to learn why your security strategy needs proof?
β‘οΈ Get our latest report now: https://projectdiscovery.io/whitepapers/attack-surface-management-2025
30.12.2025 23:31
π 0
π 0
π¬ 0
π 0