PR Pentesting | ProjectDiscovery
Every PR gets pentested before it ships. Neo combines code analysis, AI reasoning, and runtime exploitation to post verified proof directly in your pull requests.
Your PRs are getting pentested by attackers anyway. Why not test them first?
Neo runs full exploit chains on every pull request:
• Real browser sessions
• Actual exploit attempts
• Proof in PR comments
• Verified remediations
See Neo in action → projectdiscovery.io/solutions/pr...
16.02.2026 13:04 — 👍 0 🔁 0 💬 0 📌 0
We just leveled up Neo.
Claude Opus 4.6 is officially here!
Ready to build? projectdiscovery.io/request-demo
06.02.2026 16:57 — 👍 0 🔁 0 💬 0 📌 0
🌀Pro-Tip for httpx:
If you are using the screenshot feature, remember that it integrates seamlessly with the rest of the ProjectDiscovery ecosystem.
You can pipe your findings directly into other tools to filter by status code or technology before you even look at a single image.
05.02.2026 23:02 — 👍 1 🔁 0 💬 0 📌 0
Stop inspecting every active host manually. Let httpx automate visual checks and capture screenshots, enabling rapid review and deeper analysis at scale.
05.02.2026 23:02 — 👍 1 🔁 0 💬 1 📌 0
Ever feel like you're missing something when researching domains? 🌀
You might be! Private TLDs are often overlooked and #tldfinder will help you discover them!
https://github.com/projectdiscovery/tldfinder
04.02.2026 19:35 — 👍 0 🔁 0 💬 0 📌 0
State of AppSec 2026: Security at Engineering Speed | Report
AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.
PR security reviews weren’t designed for AI-generated code and nonstop merges.
The State of AppSec Report shows why teams are moving beyond static findings and toward runtime proof of exploitability.
Less guessing. Fewer debates. Faster decisions.
projectdiscovery.io/whitepapers/...
03.02.2026 14:21 — 👍 0 🔁 0 💬 0 📌 0
Tired of manually managing your security tools?
Meet PDTM the tool that lets you install, update, and uninstall all your project discovery tools with a single command.
✅ Get started here: https://github.com/projectdiscovery/pdtm
02.02.2026 17:44 — 👍 0 🔁 0 💬 0 📌 0
🚀 We just launched the ProjectDiscovery OSS Bounty Program! Contribute to our open source security tools, get your PRs merged & earn rewards! 💥
Read more 👇
🔗 projectdiscovery.io/blog/announc...
#OpenSource #BugBounty #Infosec #ProjectDiscovery
02.02.2026 14:24 — 👍 3 🔁 1 💬 0 📌 0
State of AppSec 2026: Security at Engineering Speed | Report
AI accelerated delivery. AppSec architecture didn't. Download the State of AppSec 2026 report to learn why scan-and-report hit a ceiling; and what comes next.
What’s your biggest AppSec bottleneck right now?
A) too many findings
B) low dev adoption
C) slow remediation / unclear ownership
D) tool sprawl
We cover what teams are doing to fix these in the Neo State of AppSec Report.
📥 projectdiscovery.io/whitepapers/...
#AppSec #SecurityEngineering
29.01.2026 16:13 — 👍 0 🔁 0 💬 0 📌 0
🚀 The State of AppSec Report | Security at Engineering Speed is live: projectdiscovery.io/whitepapers/...
Trying to improve AppSec without slowing dev teams down? This is for you:
• trends shaping modern AppSec
• what’s driving noise + delays
• practical moves to improve adoption + remediation
28.01.2026 00:48 — 👍 0 🔁 0 💬 0 📌 0
Maximize your endpoint discovery by digging into JavaScript files. Using the -jc flag allows you to parse and crawl JS files to find hidden paths and APIs that standard crawls might miss
Use this command👇
katana -jc -u https://target(.)com
27.01.2026 22:31 — 👍 1 🔁 0 💬 0 📌 0
Move beyond simple discovery. Pair Subfinder with httpx to instantly profile your attack surface by extracting tech stacks, status codes, and page titles at scale.
Command👉 subfinder -d target(.)com | httpx -sc -td -title
26.01.2026 15:30 — 👍 1 🔁 1 💬 0 📌 0
Reply with your answer! 👇
23.01.2026 09:16 — 👍 0 🔁 0 💬 0 📌 0
ShuffleDNS is a fast Go tool for finding subdomains. It uses brute-force to identify valid targets and automatically filters out messy wildcard results
Command👉 shuffledns -d example(.)com -list wordlist(.)txt -r resolvers(.)txt
-r: Your list of DNS resolvers.
-list: Your subdomain wordlist.
22.01.2026 02:02 — 👍 0 🔁 0 💬 0 📌 0
ProjectDiscovery - Vulnerability management reimagined
Stop chasing false positives. ProjectDiscovery delivers real, exploitable vulnerability findings across your entire attack surface—validated at runtime and prioritized by impact.
Vuln backlog triage is mostly mechanical. Neo pulls findings, clusters + prioritizes with your context, reproduces in an isolated sandbox, captures evidence, drafts remediation, and updates tickets until closure. See it: projectdiscovery.io
21.01.2026 19:26 — 👍 0 🔁 0 💬 1 📌 0
Stop just finding subdomains. Start finding endpoints. 🕸️
Recon doesn't end with a list of domains. By piping subfinder and httpx into katana, you can automatically crawl and map out the entire attack surface of a target in seconds.👇
#Recon #Katana #Subfinder
20.01.2026 01:14 — 👍 0 🔁 0 💬 0 📌 0
Security work doesn’t fit in a 15‑minute coding loop. Neo is an AI security copilot that plans + executes long‑running security tasks (recon, threat modeling, testing, triage) with real tools (browser, terminal, APIs.) See Neo in action: projectdiscovery.io
19.01.2026 14:02 — 👍 0 🔁 0 💬 0 📌 0
🌀Naabu + Nmap = Port scan faster and inspect deeper.
Stop wasting time with slow, full-range scans!
Scan a host for open ports and use Nmap to detect the service versions.
Use this 👇
naabu -host projectdiscovery(.)io -nmap-cli ‘nmap -sV’
#naabu #hackwithautomation #portscan
03.01.2026 03:02 — 👍 1 🔁 0 💬 0 📌 0
Welcome, 2026!
We look forward to building more great things with you in the new year!
With AI-driven threats emerging as the major challenge, our focus is clear: to bring you the defense you'll need for cutting-edge Attack Surface Management.
#HappyNewYear #Infosec #2026
01.01.2026 04:02 — 👍 0 🔁 0 💬 0 📌 0
For 2026, the next generation of Attack Surface Management isn't just about seeing more; it's about knowing what's real.
Want to learn why your security strategy needs proof?
➡️ Get our latest report now: https://projectdiscovery.io/whitepapers/attack-surface-management-2025
30.12.2025 23:31 — 👍 0 🔁 0 💬 0 📌 0
🌀Happy Holidays to everyone in our community who is celebrating!
We hope you all have a wonderful time recharging and connecting with loved ones.
[+] Santa_v2025.zip 🎅
— The ProjectDiscovery Team
25.12.2025 12:44 — 👍 0 🔁 0 💬 0 📌 0
Need to isolate common ports on a single host?
Use Naabu to target specific, common ports and save the results for your next step.👇
21.12.2025 20:02 — 👍 0 🔁 0 💬 0 📌 0
2025 proved one thing: the gap between disclosure and exploitation is gone.
We broke down the 5 vulnerabilities that actually shaped attacker behavior this year.
Read the full analysis 👇
projectdiscovery.io/blog/year-in...
18.12.2025 21:40 — 👍 0 🔁 0 💬 0 📌 0
NahamCon - A Virtual Security Conference
🚨 We’re presenting at #NahamCon24!
Join us at 1:30 PM PT for a hands-on recon deep dive using free ProjectDiscovery tools: Subfinder → ShuffleDNS → AlterX → Katana + URLFinder
Learn smart patterns, QPS tuning, rate-limit strategies, and see real demos in action.
🎟️Free registration: www.nahamcon.com
17.12.2025 15:58 — 👍 1 🔁 1 💬 0 📌 0
As we get into 2025, we're back with another PD Tips and Tricks video to help improve your workflow. This time, we're focusing on a cool feature of httpx tha...
ProjectDiscovery Tips and Tricks - Filter Duplicates Tag!
Tired of dealing with duplicate results in your scans?
Httpx now has a cool feature for that: Filter Duplicates Tag!
It allows you to filter duplicates as you scan, saving you time and giving you cleaner results.
See how it works in 1 min 👇
16.12.2025 22:02 — 👍 0 🔁 0 💬 0 📌 0
Security leaders are aligned on this: the perimeter didn’t vanish… it became more dynamic, distributed, and influenced by AI-driven reconnaissance. As a result, visibility isn’t enough. Learn more: projectdiscovery.io/whitepapers/...
15.12.2025 21:07 — 👍 1 🔁 0 💬 0 📌 0
Love all aspects of Cyber Security, Professional Pentester and trying to make the world safer one network and website at a time.
Established security after Shamoon cyberwar attack against @Saudi_Aramco, legally hacked Boeing, post-quantum computer hacking, author, veteran @AFSpace @DarknetDiaries #30 former @MiddleEastInst
Security Consultant @TrustedSec | Military grade meme poster, researcher, cloud penetration tester, voider of warranties. My thoughts are my own.
eJPT, CC, PenTest+ | Security researcher, embedded systems engineer, gamer and Twitch affiliate.
https://danielchateau.com
Northwest Florida Hacker Community operating as a DEF CON group.
Curious security octopus | Adalanche Attack Graph Analyzer / 8.7B hashes http://ntlm.pw / NIFO Defender Removal | Sarcasm level 11 | All thoughts, no leadership | 🇩🇰 🇺🇦
musician turned infosec analyst. premium goofs as a service. my employer has no clue this account exists but my thoughts are my own.
Hacker & CEO @SocialProofSec security awareness/social engineering training, videos, talks | 3X @DEFCON🥈 | Ex Chair @WISPorg | Ex @CISAgov Technical Advisory Council under Director Jen Easterly
Managed endpoint protection, detection and response designed to help the 99% fight back against today’s cybercriminals.
CEO and founder of runZero.com, previously the founder and lead developer of Metasploit, a CSO, a consultant, and the head of various security research teams. Contact info, presentations, and more at https://hdm.io/
CSO of TPO.group ♦️ EFF Board of Directors♦️she/her ♦️ bestselling author but only that one time
Aka @c_c_krebs over there
OSCP, CRTO, GCPN, GWAPT, MS in InfoSec. Fortunate pen tester... just learning all the things! And the obligatory: my views don’t equal my employer’s...
🏳️🌈🇳🇱🇺🇸 Founder Open Security // Former BHIS // Former SANS // Former USAF / #RedTeamFit /http://youtube.com/user/MToussain
The world’s premier hacker conference. Serving the global hacker community since 1993.
Defcon.org
Forum.defcon.org
Defcon.social
official Bluesky account (check username👆)
Bugs, feature requests, feedback: support@bsky.app