Rendered at 13:28:53 GMT+0000 (Coordinated Universal Time) with Cloudflare Workers.
hexadec 2 days ago [-]
I am not seeing the long term, what is the value of this over a Shodan API key? They both crawl public IPs and explore subdomains for exposed resources.
Short term, if you have limited the view to companies only with bug bounty programs, it seems useful if you want to complete a bug bounty but don't know where to start. But the mapping of public resources has already been done.
I think showing URLs with sensitive params exposed, services using default creds, or some extra value add over a commodity scanner would be valuable. But then you would just be running a bug bounty/ pentesting AI service for bigger enterprises.
caffeinedoom 2 days ago [-]
Great feedback! I have some of these questions myself, which makes me think about where I'd like to take neobotnet. The URL data needs to be more refined and provide actionable insights to security teams and devs so they can take appropriate actions with the data. There's more to explore within this data, such as JS and API reconnaissance as also possible client side issues. I'm looking to gather user feedback to polish the tool. Thanks for the comment.
Areena_28 1 days ago [-]
Hey, cool project!
We run a bug bounty at Mitigata. If you're looking to add more targets, I'd be happy to connect you with the right person if that's useful.
caffeinedoom 23 hours ago [-]
thank you :) happy to connect and add more targets. please, reach out to me through X at @caffeinedoom or email at sam@neobotnet.com
rmonvfer 2 days ago [-]
I like the idea but the fake scarcity really puts me off. Most technical people are usually very wary of it, and that seems like your target audience.
caffeinedoom 2 days ago [-]
had to pump up the available spots and do some hot fixes on the fronted. my apologies pal. i'm learning idea validation atm.
freeplay 2 days ago [-]
By time I got signed in, I missed the early adopter spots. Any chance you could open up a couple more?
caffeinedoom 2 days ago [-]
hey freeplay! I added 5 more spots. Thank you so much for using Neobotnet.
Short term, if you have limited the view to companies only with bug bounty programs, it seems useful if you want to complete a bug bounty but don't know where to start. But the mapping of public resources has already been done.
I think showing URLs with sensitive params exposed, services using default creds, or some extra value add over a commodity scanner would be valuable. But then you would just be running a bug bounty/ pentesting AI service for bigger enterprises.