Neobotnet collects intel data from companies on HackerOne and Bugcrowd — subdomains, DNS records, web servers with status codes, indexed/crawled URLs, JS files, and exposed secrets/paths (still building this last part). The data is already there when you need it. No scans to run.
Currently tracking 41 companies, 63,878 web servers, and 1.8M+ URLs.
Long term I want to expand this to startups that depend on cloud infrastructure so they can see what's publicly accessible.
Made a free sample with Capital One's data (and other companies) so you can see what it looks like without signing up: https://freerecon.com
Original Page: https://neobotnet.com
Feedback very welcome.
Short term, if you have limited the view to companies only with bug bounty programs, it seems useful if you want to complete a bug bounty but don't know where to start. But the mapping of public resources has already been done.
I think showing URLs with sensitive params exposed, services using default creds, or some extra value add over a commodity scanner would be valuable. But then you would just be running a bug bounty/ pentesting AI service for bigger enterprises.