Browser
Before the first scan, an attacker spends 30 minutes mining public indexes for your employees' email addresses, forgotten subdomains, exposed admin panels, code-search hits. We do that 30 minutes for you — across 40+ free public sources in one click. The list you get is the spear-phishing dataset already in their hands.
name@yourcompany.com addresses + 200 subdomains. Send a phishing email to finance@ from finance.yourcompany.support@gmail.com. Now they own one valid Microsoft 365 session.
+ optional API-key sources: Shodan, SecurityTrails, Hunter, Fofa, BinaryEdge, PentestTools — bring your own keys.
example.com. We validate — no IPs, no loopback, no URLs. Subprocess uses shell=False, all flags fixed.Free passive recon. 40+ public sources. 90 seconds. One click.
Map my domain →Powered by laramies/theHarvester — released under GPL-2.0. Browser uses theHarvester as an external CLI tool only; no source modification.