<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" ><generator uri="https://jekyllrb.com/" version="4.2.0">Jekyll</generator><link href="https://fullhunt.io/blog/feed.xml" rel="self" type="application/atom+xml" /><link href="https://fullhunt.io/blog/" rel="alternate" type="text/html" /><updated>2025-10-17T01:18:52-05:00</updated><id>https://fullhunt.io/blog/feed.xml</id><title type="html">FullHunt Blog</title><subtitle>Expose Your Attack Surface</subtitle><entry><title type="html">FullHunt Releases Agentic AI for Attack Surface Intelligence</title><link href="https://fullhunt.io/blog/2025/10/16/fullhunt-releases-agentic-ai-for-attack-surface-intelligence.html" rel="alternate" type="text/html" title="FullHunt Releases Agentic AI for Attack Surface Intelligence" /><published>2025-10-16T00:00:00-05:00</published><updated>2025-10-16T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2025/10/16/fullhunt-releases-agentic-ai-for-attack-surface-intelligence</id><content type="html" xml:base="https://fullhunt.io/blog/2025/10/16/fullhunt-releases-agentic-ai-for-attack-surface-intelligence.html">&lt;p align=&quot;center&quot;&gt;FullHunt launches Agentic AI capabilities for Attack Surface Mapping, Internet-Wide Assets Discovery, and Vulnerability Management to enable security teams to build Agentic AI workflows for securing external attack surfaces.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/41db494e-b97d-4c68-a7cb-ca660910d7b5-FullHunt%20blog%20post%20design%20-%201%20(2).png&quot; alt=&quot;FullHunt Agentic AI Release&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;fullhunt-releases-agentic-ai-for-attack-surface-intelligence&quot;&gt;FullHunt Releases Agentic AI for Attack Surface Intelligence&lt;/h1&gt;

&lt;div style=&quot;display: flex; justify-content: center; margin: 2rem 0;&quot;&gt;
  &lt;div style=&quot;position: relative; width: 100%; max-width: 800px; aspect-ratio: 16/9; border-radius: 12px; overflow: hidden; box-shadow: 0 8px 32px rgba(0,0,0,0.3);&quot;&gt;
    &lt;iframe width=&quot;100%&quot; height=&quot;100%&quot; src=&quot;https://www.youtube.com/embed/BqX3wUnBMrY?rel=0&quot; title=&quot;FullHunt Agentic AI Release&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; style=&quot;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border-radius: 12px;&quot;&gt;
    &lt;/iframe&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;p&gt;We’re launching &lt;strong&gt;FullHunt Agentic AI&lt;/strong&gt;, powered by the Model Context Protocol (MCP). Instead of writing scripts, clicking through dashboard tabs, or building custom integrations, you can request for a full attack surface analysis to any organization on the Internet, instantly.&lt;/p&gt;

&lt;p&gt;This is a major upgrade to today’s security testing workflows. With simple prompts, you can enumerate all internet-facing assets for “acme.com,” flag exposed admin panels, find vulnerable assets via FullHunt Vulnerability Intelligence, and surface exposures.&lt;/p&gt;

&lt;p&gt;In recent months, we focused on improving the user experience and exposing all of FullHunt’s APIs and capabilities. We’re excited to share this release.&lt;/p&gt;

&lt;h2 id=&quot;ask-in-simple-words&quot;&gt;Ask in Simple Words&lt;/h2&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/107a6edf-a338-4f1b-b54c-154688fb2c52-mcp%20blog%20post%20-%201.png&quot; alt=&quot;FullHunt Agentic AI discovers attack surfaces of any org&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;“Investigate acme.com and flag exposed admin panels.”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;The agent discovers subdomains, inspects hosts, looks for admin indicators, correlates with vulnerability data, and returns an actionable report.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;“Find exploits for CVE-2025-1234 and check our exposure.”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It pulls exploits and PoCs, checks your assets, references EPSS/CISA KEV, and prioritizes remediation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;“Is IP 8.8.8.8 malicious? Which domains point to it?”&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;It runs IP reputation, Tor checks, reverse/passive DNS, and builds a concise threat profile.&lt;/p&gt;

&lt;p&gt;Behind the scenes, many actions run inside FullHunt to keep this simple. In fact, it takes &lt;strong&gt;10 seconds&lt;/strong&gt; to build a full analysis on your attack surface.&lt;/p&gt;

&lt;h2 id=&quot;40-ai-accessible-security-tools&quot;&gt;40+ AI-Accessible Security Tools&lt;/h2&gt;

&lt;p&gt;The FullHunt MCP Server exposes &lt;strong&gt;40+ production tools&lt;/strong&gt; the agent can call:&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Domain &amp;amp; Host Intelligence&lt;/strong&gt;: domain/subdomain discovery, host tech, ASN/IP ranges, DNS &amp;amp; passive DNS.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Vulnerability Intelligence&lt;/strong&gt;: CVE + EPSS, exploit/PoC lookups, CISA KEV, auto-correlation.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Attack Surface Management&lt;/strong&gt;: on-demand scans (domains/IPs/CIDRs), continuous discovery, tech stack ID, cert monitoring.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Threat Intelligence&lt;/strong&gt;: IP reputation/geo, Tor exit detection, passive DNS, domain collections.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Dark Web Monitoring&lt;/strong&gt;: credential/breach intel, phishing and typosquat detection.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Enterprise&lt;/strong&gt;: orgs &amp;amp; tenants, real-time alerts, asset inventory, custom entity monitoring.&lt;/p&gt;

&lt;h2 id=&quot;available-on-fullhunt-professional-accounts&quot;&gt;Available on FullHunt Professional Accounts!&lt;/h2&gt;

&lt;p&gt;FullHunt Agentic AI is available for both professional and enterprise accounts. You can sign up for a professional plan instantly at &lt;a href=&quot;https://fullhunt.io/signup&quot;&gt;fullhunt.io/signup&lt;/a&gt;.&lt;/p&gt;

&lt;h2 id=&quot;integration-is-simple&quot;&gt;Integration is Simple&lt;/h2&gt;

&lt;p&gt;FullHunt Agentic AI is built on the Model Context Protocol (MCP), an open standard pioneered by Anthropic for AI tool integration. The following Claude Desktop configuration can be used directly to integrate with FullHunt Agentic AI.&lt;/p&gt;

&lt;div class=&quot;language-json highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;p&quot;&gt;{&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
  &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;mcpServers&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;{&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
    &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;fullhunt&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;{&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
      &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;transport&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;http&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
      &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;url&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;https://fullhunt.io/api/v1/mcp&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
      &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;headers&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;{&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
        &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;X-API-KEY&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;${env:FULLHUNT_API_KEY}&quot;&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
      &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
    &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
  &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;Enterprise customers get dedicated Agentic AI tenants.&lt;/p&gt;

&lt;p&gt;Get started and contact us for support and integrations.&lt;/p&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise looking to enhance your security posture with AI-powered attack surface management, vulnerability intelligence, and threat detection? Contact us at team@fullhunt.io&lt;/strong&gt;&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
Founder, FullHunt&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;#JoinTheHunt&lt;/p&gt;</content><author><name></name></author><category term="announcement" /><category term="research" /><summary type="html">FullHunt launches Agentic AI capabilities for Attack Surface Mapping, Internet-Wide Assets Discovery, and Vulnerability Management to enable security teams to build Agentic AI workflows for securing external attack surfaces.</summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://dkh9ehwkisc4.cloudfront.net/static/files/41db494e-b97d-4c68-a7cb-ca660910d7b5-FullHunt%20blog%20post%20design%20-%201%20(2).png" /><media:content medium="image" url="https://dkh9ehwkisc4.cloudfront.net/static/files/41db494e-b97d-4c68-a7cb-ca660910d7b5-FullHunt%20blog%20post%20design%20-%201%20(2).png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">FullHunt 💜 Open-Source: 39,408 Exploits from 0day.today is Back Online</title><link href="https://fullhunt.io/blog/2025/09/28/fullhunt-releases-0day-today-archive.html" rel="alternate" type="text/html" title="FullHunt 💜 Open-Source: 39,408 Exploits from 0day.today is Back Online" /><published>2025-09-28T00:00:00-05:00</published><updated>2025-09-28T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2025/09/28/fullhunt-releases-0day-today-archive</id><content type="html" xml:base="https://fullhunt.io/blog/2025/09/28/fullhunt-releases-0day-today-archive.html">&lt;p align=&quot;center&quot;&gt;FullHunt is rolling out the complete 0day.today archive, featuring 39,408 exploits and nearly three decades of vulnerability research.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/ae8fafd2-1f6b-4f19-bc80-b7b7000d2f41-fullhunt-blog-post-oday-today-release.png&quot; alt=&quot;FullHunt 0Day Archive Release&quot; /&gt;&lt;/p&gt;

&lt;div style=&quot;display: flex; justify-content: center; margin: 2rem 0;&quot;&gt;
  &lt;div style=&quot;position: relative; width: 100%; max-width: 800px; aspect-ratio: 16/9; border-radius: 12px; overflow: hidden; box-shadow: 0 8px 32px rgba(0,0,0,0.3);&quot;&gt;
    &lt;iframe width=&quot;100%&quot; height=&quot;100%&quot; src=&quot;https://www.youtube.com/embed/XslyEr6JtMM?rel=0&quot; title=&quot;Introducing 0Day Archive&quot; frameborder=&quot;0&quot; allow=&quot;accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share&quot; allowfullscreen=&quot;&quot; style=&quot;position: absolute; top: 0; left: 0; width: 100%; height: 100%; border-radius: 12px;&quot;&gt;
    &lt;/iframe&gt;
  &lt;/div&gt;
&lt;/div&gt;

&lt;h1 id=&quot;open-source-release-0daytoday-exploits-archive&quot;&gt;Open-Source Release: &lt;a href=&quot;https://0day-archive.fullhunt.io/&quot;&gt;0day.today&lt;/a&gt; Exploits Archive&lt;/h1&gt;

&lt;p&gt;FullHunt is rolling out the complete 0day.today archive, featuring 39,408 exploits and vulnerability research from almost 30 years of security work.&lt;/p&gt;

&lt;p&gt;FullHunt launched &lt;a href=&quot;https://0day-archive.fullhunt.io/&quot;&gt;0day-archive.fullhunt.io&lt;/a&gt; to preserve the legacy of the 0day.today, 1337day, and milw0rm exploits databases.&lt;/p&gt;

&lt;p&gt;The database contains &lt;strong&gt;39,408 exploits&lt;/strong&gt; from 1996–2025, preserving decades of discoveries by the security community.&lt;/p&gt;

&lt;hr /&gt;

&lt;h2 id=&quot;what-is-the-0daytoday-archive&quot;&gt;What is the 0day.today Archive?&lt;/h2&gt;

&lt;p&gt;The 0day.today Archive recreates and preserves the classic 0day.today database, part of the Milw0rm legacy.&lt;/p&gt;

&lt;p&gt;Since the 2000s, Milw0rm was a key resource for security researchers, penetration testers, and cybersecurity professionals worldwide, hosting a vast collection of exploits, proof-of-concepts, and vulnerability research.&lt;/p&gt;

&lt;hr /&gt;

&lt;h2 id=&quot;credits&quot;&gt;Credits&lt;/h2&gt;

&lt;p&gt;Thanks to &lt;a href=&quot;https://x.com/Junior_Baines/status/1948770840562061647&quot;&gt;Jacob Baines&lt;/a&gt; for cloning and open-sourcing the 0day.today content on GitHub. FullHunt analyzed the data against various open-source clones and restored the website thanks to this contribution.&lt;/p&gt;

&lt;h2 id=&quot;getting-started&quot;&gt;Getting Started&lt;/h2&gt;
&lt;p&gt;Visit &lt;a href=&quot;https://0day-archive.fullhunt.io&quot;&gt;0day-archive.fullhunt.io&lt;/a&gt; to explore the complete archive.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Visit the archive&lt;/strong&gt;: &lt;a href=&quot;https://0day-archive.fullhunt.io&quot;&gt;0day-archive.fullhunt.io&lt;/a&gt;&lt;br /&gt;
&lt;strong&gt;GitHub repository&lt;/strong&gt;: &lt;a href=&quot;https://github.com/fullhunt/0day-today-archive&quot;&gt;github.com/fullhunt/0day-today-archive&lt;/a&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise looking to enhance your security posture with advanced attack surface management, vulnerability intelligence, and threat detection? Contact us at team@fullhunt.io or visit our &lt;a href=&quot;https://fullhunt.io/contact-us/&quot;&gt;contact page&lt;/a&gt; to learn how FullHunt can help secure your organization.&lt;/strong&gt;&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best Regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
Founder, FullHunt&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;#JoinTheHunt&lt;/p&gt;</content><author><name></name></author><category term="announcement" /><category term="research" /><summary type="html">FullHunt is rolling out the complete 0day.today archive, featuring 39,408 exploits and nearly three decades of vulnerability research.</summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://dkh9ehwkisc4.cloudfront.net/static/files/0day-today-archive-release-announcement.png" /><media:content medium="image" url="https://dkh9ehwkisc4.cloudfront.net/static/files/0day-today-archive-release-announcement.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Introducing FullHunt Vulnerability Intelligence</title><link href="https://fullhunt.io/blog/2025/09/18/introducing-fullhunt-vulnerability-intelligence.html" rel="alternate" type="text/html" title="Introducing FullHunt Vulnerability Intelligence" /><published>2025-09-18T00:00:00-05:00</published><updated>2025-09-18T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2025/09/18/introducing-fullhunt-vulnerability-intelligence</id><content type="html" xml:base="https://fullhunt.io/blog/2025/09/18/introducing-fullhunt-vulnerability-intelligence.html">&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/008706fc-32c3-448e-a549-aea3ea842fe9-vulnerabiliy-intelligence-product-release-post.png&quot; alt=&quot;FullHunt Vulnerability Intelligence&quot; /&gt;&lt;/p&gt;

&lt;p align=&quot;center&quot;&gt;FullHunt launches Vulnerability Intelligence - a comprehensive solution to understand and contextualize vulnerabilities at scale with enriched data and public exploits.&lt;/p&gt;

&lt;h1 id=&quot;introducing-fullhunt-vulnerability-intelligence&quot;&gt;Introducing FullHunt Vulnerability Intelligence&lt;/h1&gt;

&lt;p&gt;When I started FullHunt, one of my goals has been to build a centralized ecosystem to understand and secure Internet-facing assets. The journey continues, and today I’m excited to launch an innovation from the FullHunt team: &lt;strong&gt;FullHunt Vulnerability Intelligence&lt;/strong&gt;, and it’s now available to all FullHunt customers and community members.&lt;/p&gt;

&lt;h2 id=&quot;what-is-fullhunt-vulnerability-intelligence&quot;&gt;What is FullHunt Vulnerability Intelligence?&lt;/h2&gt;

&lt;p&gt;FullHunt Vulnerability Intelligence is a comprehensive solution to understand and contextualize vulnerabilities at scale. FullHunt aggregates vulnerability data from various sources, and continuously looks for new exploits, proof of concepts, research papers, and enriches vulnerabilities with various FullHunt sources to build enriched vulnerability data.&lt;/p&gt;

&lt;p&gt;FullHunt provides its Vulnerability Intelligence through the FullHunt console and APIs. You can also integrate it into your own tools, and test it with your free community account.&lt;/p&gt;

&lt;h2 id=&quot;key-features&quot;&gt;Key Features&lt;/h2&gt;

&lt;p&gt;With FullHunt Vulnerability Intelligence, you can:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;Find exploits automatically&lt;/strong&gt; for any given CVE&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Get enriched details&lt;/strong&gt; about exploitability updated with EPSS scoring&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Access enrichments&lt;/strong&gt; whenever vulnerabilities are commonly exploited through CISA KEV feeds&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/1964f583-b559-42f7-ac3d-df2ee1b1a508-exploit-search-2.png&quot; alt=&quot;FullHunt Exploit Search&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;available-through-console-and-apis&quot;&gt;Available Through Console and APIs&lt;/h2&gt;

&lt;p&gt;FullHunt provides its Vulnerability Intelligence through multiple channels:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;strong&gt;FullHunt Console&lt;/strong&gt;: Access vulnerability intelligence directly through our web interface&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;APIs&lt;/strong&gt;: Integrate vulnerability data into your existing security tools and workflows&lt;/li&gt;
  &lt;li&gt;&lt;strong&gt;Free Community Access&lt;/strong&gt;: Test and explore the capabilities with your free community account&lt;/li&gt;
&lt;/ul&gt;

&lt;h2 id=&quot;continuous-security-innovation&quot;&gt;Continuous Security Innovation&lt;/h2&gt;

&lt;p&gt;We’re continuously building security software, and we’re making it available through our APIs. If you’re a security researcher, consultant, engineer, or anyone interested in security automation, you should check out the &lt;a href=&quot;https://docs.fullhunt.io/&quot;&gt;FullHunt API&lt;/a&gt;!&lt;/p&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise looking to solve Attack Surface Discovery, continuous monitoring, security scanning, and custom-developed tools and APIs? Please reach out to us at team@fullhunt.io or fill the out form on our &lt;a href=&quot;https://fullhunt.io/contact-us/&quot;&gt;contact page&lt;/a&gt;, and we will be happy to solve your challenges.&lt;/strong&gt;&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best Regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
Founder, FullHunt&lt;br /&gt;&lt;/p&gt;

&lt;p&gt;#JoinTheHunt&lt;/p&gt;</content><author><name></name></author><summary type="html"></summary><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://dkh9ehwkisc4.cloudfront.net/static/files/008706fc-32c3-448e-a549-aea3ea842fe9-vulnerabiliy-intelligence-product-release-post.png" /><media:content medium="image" url="https://dkh9ehwkisc4.cloudfront.net/static/files/008706fc-32c3-448e-a549-aea3ea842fe9-vulnerabiliy-intelligence-product-release-post.png" xmlns:media="http://search.yahoo.com/mrss/" /></entry><entry><title type="html">Introducing FullHunt’s OEM Intelligence API for Security Platforms</title><link href="https://fullhunt.io/blog/2025/05/06/fullhunt-oem-api-release.html" rel="alternate" type="text/html" title="Introducing FullHunt’s OEM Intelligence API for Security Platforms" /><published>2025-05-06T00:00:00-05:00</published><updated>2025-05-06T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2025/05/06/fullhunt-oem-api-release</id><content type="html" xml:base="https://fullhunt.io/blog/2025/05/06/fullhunt-oem-api-release.html">&lt;p align=&quot;center&quot;&gt;FullHunt released the OEM Intelligence API to enable seamless integration of attack surface intelligence into security platforms.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/c4319b64-b4d0-4517-947a-4c2cdfeb3053-poster%20-%20Introducing%20FullHunt%E2%80%99s%20OEM%20Intelligence%20API%20for%20Security%20Platforms-min.png&quot; alt=&quot;FullHunt OEM Intelligence API&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;introducing-fullhunts-oem-intelligence-api-for-security-platforms&quot;&gt;&lt;strong&gt;Introducing FullHunt’s OEM Intelligence API for Security Platforms&lt;/strong&gt;&lt;/h1&gt;

&lt;p&gt;Today, we’re excited to announce the launch of FullHunt’s &lt;strong&gt;OEM Intelligence API&lt;/strong&gt;, a new offering that allows security platforms and service providers to integrate FullHunt’s dark web monitoring and attack surface intelligence directly into their own products. This initiative is a game-changer for MSSPs, XDR and SIEM vendors, GRC platforms, and any enterprise security solution provider looking to augment their platform with rich security insights. With the OEM API, FullHunt essentially becomes your “intel engine” in the backend – powering your features with our data, FullHunt is rolling out OEM APIs to let you &lt;em&gt;“integrate FullHunt’s discovery and vulnerability scanning into your own security platform,”&lt;/em&gt; offering your users a seamless extension of FullHunt’s attack surface management (ASM) datasets within your product.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/80eaeb68-67ab-4e5e-b612-9888f2eb603f-org-db-request-api-min.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;what-does-the-oem-intelligence-api-include&quot;&gt;What Does the OEM Intelligence API Include?&lt;/h2&gt;

&lt;p&gt;The OEM Intelligence API encompasses three primary endpoints, each corresponding to a core FullHunt intelligence service:&lt;/p&gt;

&lt;h3 id=&quot;attack-surface-search-api&quot;&gt;&lt;strong&gt;Attack Surface Search API&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This endpoint allows you to query FullHunt’s external asset database for information on a given target domain. Essentially, it performs an &lt;strong&gt;attack surface enumeration&lt;/strong&gt; – returning data on all subdomains and hosts related to the domain, along with metadata about each host (open ports, running services, technologies, SSL certificates, and more). Think of it as instantly running an internet-wide scan for your target, but with one API call. For example, if integrated into a security platform, a user who enters their company domain on your interface could receive within seconds a full list of discovered assets: &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;vpn.acme.com&lt;/code&gt;, &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;mail.acme.com&lt;/code&gt;, &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;dev.acme.com&lt;/code&gt;, etc., each with IP addresses and details like “this host is running nginx on port 443 with a certificate for *.acme.com, and has an HTTP title ‘Acme Corp – Login’”. FullHunt’s scanning engine constantly discovers and refreshes this data, so your platform leverages a living, up-to-date inventory. Use cases include continuous attack surface monitoring (alert when a new subdomain appears or an open port is found), asset inventory for IT/security teams, or even feeding this info into a vulnerability scanner or SOC automation. The key value is that &lt;strong&gt;your users gain immediate visibility into their external footprint&lt;/strong&gt; without running separate scans – it’s all integrated into your product workflow. You can also automate actions like creating tickets for newly exposed services or unsafe configurations detected via the data.&lt;/p&gt;

&lt;h3 id=&quot;organizations-search-api&quot;&gt;&lt;strong&gt;Organizations Search API&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This endpoint provides &lt;strong&gt;organization intelligence&lt;/strong&gt;, essentially a knowledge base of company information and security-relevant facts. When integrated, it enables your platform to retrieve a profile of any organization by name or domain. The response includes company details (official name, industry, size, headquarters) and importantly, known security incidents (breaches) and related entities (subsidiaries, parent company, etc.). For a practical example, imagine a third-party risk management module in your GRC software: when onboarding a new vendor, you could call this API to automatically fill in the vendor’s profile and flag if that company has a history of breaches or cybersecurity incidents. Similarly, a threat intelligence platform might use it to enrich context around targets or adversaries (e.g. pulling up info on a company that a threat actor claims to have breached). All of this with one query. It adds a layer of situational awareness that can greatly aid decision-making in security operations and risk assessment. From a technical standpoint, this API is straightforward to use and the returned JSON is well-structured, so parsing out fields like &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;estimated_employee_count&lt;/code&gt; or &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;notable_breaches&lt;/code&gt; is trivial.&lt;/p&gt;

&lt;h3 id=&quot;dark-web-search-api&quot;&gt;&lt;strong&gt;Dark Web Search API&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;This endpoint gives your platform direct access to FullHunt’s dark web and breach intelligence database. You can search for compromised credentials and sensitive data exposures using a variety of identifiers. For example, you can query by an email address to find if that email (or accounts associated with it) have appeared in any data breaches, or search by a company domain to retrieve all credential leaks related to that organization. FullHunt’s dataset covers credentials and personal info leaked on underground forums, paste sites, dark web marketplaces, and public breach dumps. The API returns detailed records including exposed usernames, passwords (hashed or plaintext), names, contact info, and the source of the breach. By integrating this, an MSSP or XDR platform could automatically enrich an alert (e.g. “user account suspicious login”) with a check against dark web data – &lt;strong&gt;“has this user’s password been leaked online?”&lt;/strong&gt; – and immediately inform the analyst or end-customer if a compromise is found. It’s a powerful addition to threat intelligence feeds for incident response and identity protection. And because the search can be parameterized by different fields (username, IP, password, etc.), creative use cases abound – you might even integrate it into your vulnerability management workflow to see if any known exploits (by CVE) or specific indicators have associated leaked data. The possibilities for proactive threat hunting are huge.&lt;/p&gt;

&lt;p&gt;All three APIs support an optional &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;query_tags&lt;/code&gt; in the request, letting you attach metadata (like a customer ID or use-case tag) to each query for your own tracking. The responses also include metadata such as timestamps and result counts. Crucially, &lt;strong&gt;every request is authenticated with your API key and logged on FullHunt’s side&lt;/strong&gt;, providing traceability (FullHunt maintains audit logs for the OEM API usage). This means you can monitor how your integration is being used and ensure it’s in line with any usage quotas or compliance needs.&lt;/p&gt;

&lt;h2 id=&quot;integration-examples--workflows&quot;&gt;&lt;strong&gt;Integration Examples &amp;amp; Workflows&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;To illustrate how the OEM Intelligence API can be leveraged in real-world scenarios, let’s walk through a few example workflows that a security vendor might implement:&lt;/p&gt;

&lt;h3 id=&quot;continuous-attack-surface-monitoring-mssp-platform&quot;&gt;&lt;strong&gt;Continuous Attack Surface Monitoring (MSSP platform)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;If you’re an MSSP managing dozens of clients, you can integrate the Attack Surface API to run on a schedule (say nightly or weekly) for each client’s domain. Each run fetches the latest external asset list. You can then automatically compare it to the last known list and detect changes. New host discovered? Your platform can raise an alert or open a ticket in the client’s queue: &lt;em&gt;“A new subdomain ‘staging.acme.com’ was detected this week, pointing to an IP in AWS – please verify if this is expected.”&lt;/em&gt; Likewise, if a previously seen host now has an open port 22 exposed where it didn’t before, that could indicate a security change worth investigating. Essentially, FullHunt’s data becomes the eyes on the outside of each client’s network, and your platform acts as the brain to decide what to do with that data. Multi-tenant tagging ensures each domain’s results are tracked to the right client. The outcome is a value-add service: &lt;strong&gt;Attack Surface Monitoring as a Service&lt;/strong&gt;, powered by FullHunt in the backend but delivered through your operations.&lt;/p&gt;

&lt;h3 id=&quot;third-party-risk-assessment-grc-workflow&quot;&gt;&lt;strong&gt;Third-Party Risk Assessment (GRC workflow)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;In a GRC or vendor risk management application, assessing a new partner or vendor often requires gathering information about that organization’s size, industry, and any past breaches. By integrating the Organizations Search API, your platform can auto-populate these details. For example, when a user enters a vendor name, your system calls the API and fills out: Company X, ~1,200 employees, HQ in London, sector = Healthcare. It might also display a highlight: &lt;em&gt;“Security incidents: 1 – Data breach in 2019 exposing 200k patient records.”&lt;/em&gt; This equips the risk assessor with instant context, prompting deeper questions or controls if needed. It saves hours of manual research per vendor. Additionally, if you maintain a dashboard of all critical suppliers, you could periodically re-check each via the API to catch any newly reported breaches (e.g. if one of your suppliers gets hacked and it’s noted in the data, you’d want to know ASAP). This integration turns FullHunt’s intel into a proactive risk monitoring tool within your product.&lt;/p&gt;

&lt;h3 id=&quot;product-contextualization-security-analytics-platform&quot;&gt;&lt;strong&gt;Product Contextualization (Security Analytics platform)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Imagine a security analytics platform that investigates threats across multiple companies. When an analyst is looking at a particular threat actor or campaign, they might have a list of target organizations. Using FullHunt’s APIs, the platform can provide one-click context: For each organization, fetch their profile (Org API) to see what that company does, and fetch their attack surface summary (Attack Surface API) to see what infrastructure they have exposed. This can help the analyst understand why that threat actor might be interested (e.g. targeting all fintech companies with open Jenkins servers). It’s an enrichment step that adds narrative and depth to threat intelligence reporting.&lt;/p&gt;

&lt;p&gt;These examples scratch the surface of what’s possible. The flexibility of FullHunt’s OEM API means if you can think of a security use-case involving external intelligence, you can likely implement it with a bit of API glue. From augmenting vulnerability scanners with external context, to feeding SOC runbooks, to enhancing security ratings, the integration potential is vast.&lt;/p&gt;

&lt;h3 id=&quot;breach-alert-enrichment-xdrsiem&quot;&gt;&lt;strong&gt;Breach Alert Enrichment (XDR/SIEM)&lt;/strong&gt;&lt;/h3&gt;

&lt;p&gt;Suppose your XDR platform generates an alert for unusual activity on an admin user account. Through the FullHunt OEM integration, your platform can automatically query the Dark Web API for that user’s email as soon as the alert triggers. If the API returns that this email appears in a recent credential dump with a known password, your platform could attach a note to the alert: &lt;em&gt;“Credentials for this user were found in a 2024 breach (password: Password123).”&lt;/em&gt; This gives the analyst immediate insight that the account may be compromised due to password reuse. Your platform could even automate a higher severity rating or prompt an on-demand password reset workflow. All of this happens seamlessly — the analyst doesn’t have to pivot to an external breach-check service; the intelligence is injected right into the alert timeline. Over time, such enrichment dramatically improves incident response by adding context. It also adds value for your customers, as they get proactive breach notification embedded in your service.&lt;/p&gt;

&lt;p&gt;&lt;em&gt;Example of FullHunt’s data in action: Through the OEM Attack Surface API, you can retrieve this attack surface data (thousands of subdomains and hosts for a given domain, complete with IPs and metadata) in JSON format and integrate it into your own tools. In practice, this means within your platform, a client could enter a domain like “acme.com” and get an instant inventory of results just like the list shown above – enabling proactive management of external assets and exposures.&lt;/em&gt;&lt;/p&gt;

&lt;h2 id=&quot;seamless-integration-and-support&quot;&gt;&lt;strong&gt;Seamless Integration and Support&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;Getting started with the FullHunt OEM Intelligence API is designed to be developer-friendly. If you’re familiar with RESTful APIs and JSON, you’ll find FullHunt’s API straightforward. You authenticate with an API key via a header, and then send &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;POST&lt;/code&gt; requests to specific endpoints under the &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/api/v1/oem/&lt;/code&gt; path for the features described. FullHunt’s documentation site provides copy-pastable &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;curl&lt;/code&gt; examples for each endpoint, making initial testing a breeze. For instance, to search the attack surface data for a domain, you’d use an HTTP POST to &lt;code class=&quot;language-plaintext highlighter-rouge&quot;&gt;/oem/atack-surface/search&lt;/code&gt; with a JSON body like:&lt;/p&gt;

&lt;div class=&quot;language-json highlighter-rouge&quot;&gt;&lt;div class=&quot;highlight&quot;&gt;&lt;pre class=&quot;highlight&quot;&gt;&lt;code&gt;&lt;span class=&quot;p&quot;&gt;{&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; 
 &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;type&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;domain&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
 &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;query&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;acme.com&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;,&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
 &lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;query_tags&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;p&quot;&gt;{&lt;/span&gt;&lt;span class=&quot;nl&quot;&gt;&quot;client&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;:&lt;/span&gt;&lt;span class=&quot;w&quot;&gt; &lt;/span&gt;&lt;span class=&quot;s2&quot;&gt;&quot;ACME Corp&quot;&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;  
&lt;/span&gt;&lt;span class=&quot;p&quot;&gt;}&lt;/span&gt;&lt;span class=&quot;w&quot;&gt;
&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;/div&gt;

&lt;p&gt;And you’d receive back a JSON response containing an array of all matching leaked records related to “acme.com”. The patterns are similar for the other endpoints (with slight differences in required fields), so once you integrate one, adding the others is intuitive.&lt;/p&gt;

&lt;p&gt;FullHunt also ensures that OEM partners have the support they need. When you come on board as an OEM partner, you will coordinate with FullHunt’s team to get your API key provisioned with the proper access. Typically, this involves contacting FullHunt sales or support – as noted in the documentation, OEM access is enabled for partners by request. After that, you’re free to integrate and test. During integration, if you have questions, FullHunt’s technical support is available. They can help with optimizing queries, understanding the data schema, or troubleshooting any issues. Additionally, because OEM integrations can be complex, FullHunt is open to feedback – if you need a certain feature or data point exposed via the API to support your use case, we can accommodate it or put it on the roadmap.&lt;/p&gt;

&lt;p&gt;On the operational side, FullHunt’s OEM API comes with built-in &lt;strong&gt;user credit management&lt;/strong&gt; and audit logs for queries.&lt;/p&gt;

&lt;h2 id=&quot;ready-to-unlock-fullhunt-intelligence-in-your-platform&quot;&gt;&lt;strong&gt;Ready to Unlock FullHunt Intelligence in Your Platform?&lt;/strong&gt;&lt;/h2&gt;

&lt;p&gt;The FullHunt OEM Intelligence API represents a bold step towards collaborative innovation in cybersecurity. By opening up our intelligence via OEM channels, we aim to empower other security providers to deliver better outcomes for end users. Whether you’re an MSSP looking to enhance your managed services or a security product company aiming to expand features, FullHunt’s data can become a force-multiplier for your offerings.&lt;/p&gt;

&lt;p&gt;We invite you to explore what FullHunt OEM Intelligence can do for your organization. &lt;strong&gt;Dive into our developer documentation (&lt;/strong&gt;&lt;a href=&quot;https://api-docs.fullhunt.io/&quot;&gt;api-docs.fullhunt.io&lt;/a&gt;) to see the technical details and example responses. If you’re interested in becoming an OEM partner, &lt;strong&gt;contact our team&lt;/strong&gt; (sales@fullhunt.io or via our website) to discuss access and partnership options – we’ll work with you to get the API enabled on your account and ensure a smooth onboarding.&lt;/p&gt;

&lt;p&gt;With FullHunt, you can deliver attack surface mapping, organization intelligence, dark web monitoring as an integrated part of your service – all backed by FullHunt’s proven technology and extensive data. We’re excited to see how you will innovate with these capabilities at your fingertips.&lt;/p&gt;

&lt;h3&gt;Download an in-depth documentation report about the OEM Intelligence API Product&lt;/h3&gt;

&lt;p&gt;&lt;a href=&quot;https://fullhunt.io/reports/oem&quot;&gt;OEM Intelligence API - in-depth Product Documentation&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Unlock the power of FullHunt OEM Intelligence API today, and give your platform the definitive edge in security intelligence.&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Best Regards,&lt;br /&gt;
Mazin Ahmed&lt;/p&gt;</content><author><name></name></author><category term="research" /><summary type="html">FullHunt released the OEM Intelligence API to enable seamless integration of attack surface intelligence into security platforms.</summary></entry><entry><title type="html">FullHunt Exciting New Features and Free APIs! 🚀</title><link href="https://fullhunt.io/blog/2024/07/08/fullhunt-release-announcement.html" rel="alternate" type="text/html" title="FullHunt Exciting New Features and Free APIs! 🚀" /><published>2024-07-08T00:00:00-05:00</published><updated>2024-07-08T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2024/07/08/fullhunt-release-announcement</id><content type="html" xml:base="https://fullhunt.io/blog/2024/07/08/fullhunt-release-announcement.html">&lt;p align=&quot;center&quot;&gt;Explore FullHunt's new features and free APIs. The FullHunt team has been working on exciting attack surface discovery and threat intelligence features - #JoinTheHunt.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/6cd2472b-6804-476d-9d27-b1809fe7ca90-fullhunt%20announcement%20Exciting%20New%20Features%20and%20Free%20APIs.jpg&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;exciting-updates-from-fullhunt--new-features-and-free-apis-&quot;&gt;Exciting Updates from FullHunt – New Features and Free APIs! 🚀&lt;/h1&gt;

&lt;p&gt;We’ve got some exciting news to share. Over the past few months, we’ve been busy building awesome new products and features at FullHunt, and we can’t wait to tell you all about them.&lt;/p&gt;

&lt;h2 id=&quot;whats-coming-up&quot;&gt;What’s Coming Up?&lt;/h2&gt;

&lt;p&gt;We’ve been working on some exciting new products, features, and tools that will be rolling out in the next few weeks. Keep an eye out for our announcements — these updates are going to make a big difference in your attack surface discovery!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/db08cab6-15e7-468f-93fd-867ee5132e4b-screenshot-7.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;free-community-apis--now-available&quot;&gt;Free Community APIs – Now Available!&lt;/h2&gt;

&lt;p&gt;We’ve also launched new free community APIs to help you discover your external attack surface more effectively.&lt;/p&gt;

&lt;h2 id=&quot;introducing-data-intelligence-apis&quot;&gt;Introducing Data Intelligence APIs&lt;/h2&gt;

&lt;p&gt;Data Intelligence APIs are designed to help you run threat intelligence and large-scale internet investigations by querying the FullHunt Database for a wide range of use cases and characteristics.&lt;/p&gt;

&lt;p&gt;FullHunt runs one of the largest databases for attack surfaces on the Internet, and we’re happy to make it available to the community.&lt;/p&gt;

&lt;p&gt;We have rolled out the Data Intelligence product and APIs to a closed number of enterprise customers, and they’re already finding it useful in their security automation and investigations. The APIs are available now, and we think they’ll be a great addition to your security toolkit.&lt;/p&gt;

&lt;p&gt;The results are limited for community accounts. Enterprise accounts gain full access to Data Intelligence API.&lt;/p&gt;

&lt;p&gt;Check out the new APIs here: &lt;a href=&quot;https://api-docs.fullhunt.io/#data-intelligence-apis&quot;&gt;Data Intelligence APIs&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;We will announce it more in-depth in upcoming weeks.&lt;/p&gt;

&lt;h2 id=&quot;we-want-to-hear-from-you&quot;&gt;We Want to Hear from You&lt;/h2&gt;

&lt;p&gt;Your feedback is super important to us. We’d love to hear what you think about the new features and how we can keep improving.&lt;/p&gt;

&lt;p&gt;&lt;a href=&quot;https://fullhunt.io/contact-us/&quot;&gt;Share your thoughts with us here&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Thanks for being a part of the FullHunt community. We’re really excited about these new updates and can’t wait to support you even more.&lt;/p&gt;

&lt;p&gt;#JoinTheHunt&lt;/p&gt;

&lt;p&gt;Best Regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
Founder &amp;amp; CTO, FullHunt&lt;br /&gt;&lt;/p&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise that is looking to solve Attack Surface Discovery, continuous monitoring, security scanning, and custom-developed tools and APIs? Please reach out to us at team@fullhunt.io, and we will be happy to solve your challenges.&lt;/strong&gt; Please request a FullHunt Enterprise trial and we will be happy to solve your challenges.&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;</content><author><name></name></author><category term="announcement" /><summary type="html">Explore FullHunt's new features and free APIs. The FullHunt team has been working on exciting attack surface discovery and threat intelligence features - #JoinTheHunt.</summary></entry><entry><title type="html">Log4J-scan update: Detection for Apache Commons Text RCE (CVE-2022-42889)</title><link href="https://fullhunt.io/blog/2022/10/20/apache-commons-text-rce.html" rel="alternate" type="text/html" title="Log4J-scan update: Detection for Apache Commons Text RCE (CVE-2022-42889)" /><published>2022-10-20T00:00:00-05:00</published><updated>2022-10-20T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2022/10/20/apache-commons-text-rce</id><content type="html" xml:base="https://fullhunt.io/blog/2022/10/20/apache-commons-text-rce.html">&lt;p align=&quot;center&quot;&gt;FullHunt released an update to Log4J-Scan to detect Apache Commons Text RCE (CVE-2022-42889).&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/86be47af-e11a-4d36-a17e-e6fc5f18aaf9-Detecting%20Apache%20Commons%20Text%20RCE%20blog%20post.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;detecting-apache-commons-text-rce-cve-2022-42889&quot;&gt;Detecting Apache Commons Text RCE (CVE-2022-42889)&lt;/h1&gt;

&lt;p&gt;The Apache Commons Text RCE (CVE-2022-42889) is a critical vulnerability that is highly similar to Log4J RCE. Successful exploitation of this vulnerability allows full remote code execution on affected services. The vulnerability has been ranked a CVSS score of 9.8/10.&lt;/p&gt;

&lt;p&gt;We have tested the vulnerability in our local lab and confirmed the potential severity of this vulnerability.&lt;/p&gt;

&lt;p&gt;FullHunt released an update to identify Apache Commons Text RCE (CVE-2022-42889). We recommend patching it as soon as possible. If help is needed in scanning and discovering this vulnerability on your infrastructure, please get in touch at (team@fullhunt.io).&lt;/p&gt;

&lt;h1 id=&quot;demo&quot;&gt;Demo&lt;/h1&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/545a0960-3dc4-4157-bf82-c79d0b73a3e7-CVE-2022-42889-demo.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;log4j-scan-project-githubcomfullhuntlog4j-scan&quot;&gt;&lt;a href=&quot;https://github.com/fullhunt/log4j-scan&quot;&gt;log4j-scan Project: github.com/fullhunt/log4j-scan&lt;/a&gt;&lt;/h2&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise that is looking for help with scanning for Apache Commons Text RCE (CVE-2022-42889), discovering all the external internet-facing assets, network services, applications, services, and endpoints?&lt;/strong&gt; Please request a FullHunt Enterprise trial and we will be happy to solve your challenges.&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup/&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
The FullHunt Team&lt;/p&gt;</content><author><name></name></author><category term="research" /><summary type="html">FullHunt released an update to Log4J-Scan to detect Apache Commons Text RCE (CVE-2022-42889).</summary></entry><entry><title type="html">Detecting Spring4Shell RCE CVE-2022-22965 at scale</title><link href="https://fullhunt.io/blog/2022/04/08/detecting-springshell-rce-at-scale.html" rel="alternate" type="text/html" title="Detecting Spring4Shell RCE CVE-2022-22965 at scale" /><published>2022-04-08T00:00:00-05:00</published><updated>2022-04-08T00:00:00-05:00</updated><id>https://fullhunt.io/blog/2022/04/08/detecting-springshell-rce-at-scale</id><content type="html" xml:base="https://fullhunt.io/blog/2022/04/08/detecting-springshell-rce-at-scale.html">&lt;p align=&quot;center&quot;&gt;FullHunt developed an open-source tool for discovering Spring4Shell RCE at scale.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/1f91695e-02f8-4652-aba4-f447e35145be-spring4shell-scan-blog-header.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;detecting-java-spring-rce-at-scale&quot;&gt;Detecting Java Spring RCE at scale&lt;/h1&gt;

&lt;p&gt;The Spring4Shell RCE is a CVE-2022-22965 critical vulnerability that has been exploited by threat actors this weekend. At FullHunt, we developed, spring4shell-scan: a fully automated, reliable, and accurate scanner for finding Java Spring RCE (Spring4Shell). It was mainly available for our customers during the past days. We’re glad to be open-sourcing it now!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/1e1ae28a-96f7-44b0-810b-977f78960dfe-github-repo.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;fullhunt-vs-spring4shell&quot;&gt;FullHunt vs. Spring4Shell&lt;/h1&gt;

&lt;p&gt;As soon as the Spring4Shell vulnerability was announced, we started investigating the exploitability of these vulnerabilities. The FullHunt platform already supports the discovery and automatic classification of Spring apps. This was a life-saver feature to be able to map all Spring apps within hundreds of thousands of assets while the vulnerability has been released.&lt;/p&gt;

&lt;p&gt;We focused on researching the detection of Spring4Shell CVE-2022-22965 vulnerability and the Spring Cloud RCE CVE-2022-22963.&lt;/p&gt;

&lt;h1 id=&quot;how-to-detect-spring4shell-and-spring-cloud-rce&quot;&gt;How to detect Spring4Shell and Spring Cloud RCE?&lt;/h1&gt;

&lt;p&gt;The Spring4Shell is essentially a Java Deserialization vulnerability that can be highly noisy and sensitive during its detection and exploitation. The current way that we observed to be used by threat actors makes use of the initially published Proof of Concept that was shared online. The initial Proof of Concept takes an unsafe approach where a JSP web-shell is uploaded when knowing the correct path (while being set to a default path). This is inaccurate, can be easily detected, can definitely be easy to evade.&lt;/p&gt;

&lt;p&gt;The approach that FullHunt has taken works by sending a corrupted raw object that triggers an exception when deserialized. Once an exception is detected, a check is sent to validate that the payload has effectively triggered an exception - so that if an API endpoint for instance is already returning 4XX or 5XX errors, it wouldn’t cause a False Positive. Additionally, within spring4shell-scan, payloads are tested in different HTTP methods, as we have higher accuracy in testing in different HTTP methods.&lt;/p&gt;

&lt;p&gt;This approach also applies to Spring Cloud CVE-2022-22963, where a malicious SpEL query can lead to remote code execution. We have found that sending corrupted SpEL queries can be a valid method for discovering the Spring Cloud CVE-2022-22963.&lt;/p&gt;

&lt;h1 id=&quot;waf-rules-we-bypassed-them-during-our-tests&quot;&gt;WAF rules? We bypassed them during our tests&lt;/h1&gt;

&lt;p&gt;The main approach that several companies have used to protect against the new Spring4Shell (CVE-2022-22965) and CVE-2022-22963 are through WAF rules provided by vendors. We have developed payloads that have been tested against several WAF vendors, and it was confirmed to be bypassing the majority of WAF rules during our tests. It’s advised to contact your WAF vendor to make sure that the new techniques developed by FullHunt are blocked.&lt;/p&gt;

&lt;p&gt;We mainly recommend that companies update their Spring setup and dependencies as the approach for remediating these sets of vulnerabilities. Virtual patching through WAF should be only taken as a temporary approach.&lt;/p&gt;

&lt;p&gt;As many companies are facing challenges discovering its Spring deployments. We have been helping companies map its Spring deployments, scan them for all of the released Spring vulnerabilities, and run continuous security scanning.&lt;/p&gt;

&lt;h1 id=&quot;demo&quot;&gt;Demo&lt;/h1&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/8b677a1b-7c53-40b1-933e-e10f571c8bb8-spring4shell-Demo.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;spring4shell-scan-project-githubcomfullhuntspring4shell-scan&quot;&gt;&lt;a href=&quot;https://github.com/fullhunt/spring4shell-scan&quot;&gt;spring4shell-scan Project: github.com/fullhunt/spring4shell-scan&lt;/a&gt;&lt;/h2&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise that is looking for help with scanning for Spring4Shell, discovering all the externally public assets, network services, applications, services, and endpoints?&lt;/strong&gt; Please request a FullHunt Enterprise trial and we will be happy to solve your challenges.&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup/&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
The FullHunt Team&lt;/p&gt;</content><author><name></name></author><category term="research" /><summary type="html">FullHunt developed an open-source tool for discovering Spring4Shell RCE at scale.</summary></entry><entry><title type="html">Detecting Log4j RCE CVE-2021-44228 at scale</title><link href="https://fullhunt.io/blog/2021/12/13/detecting-log4j-rce-at-scale.html" rel="alternate" type="text/html" title="Detecting Log4j RCE CVE-2021-44228 at scale" /><published>2021-12-13T00:00:00-06:00</published><updated>2021-12-13T00:00:00-06:00</updated><id>https://fullhunt.io/blog/2021/12/13/detecting-log4j-rce-at-scale</id><content type="html" xml:base="https://fullhunt.io/blog/2021/12/13/detecting-log4j-rce-at-scale.html">&lt;p&gt;FullHunt developed an open-source tool for discovering Apache Log4j RCE CVE-2021-4428 at scale.&lt;/p&gt;

&lt;h2 id=&quot;detecting-apache-log4j-rce-at-scale&quot;&gt;Detecting Apache Log4J RCE at scale&lt;/h2&gt;

&lt;p&gt;The Apache Log4J RCE CVE-2021-4428 is a critical vulnerability that has been heavily exploited by threat actors this weekend. At FullHunt, we developed, log4j-scan: a fully automated, accurate, and extensive scanner for finding Apache Log4j RCE. It was mainly available for our customers during the past days. We’re glad to be open-sourcing it now!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/f06756ae-b184-443f-a958-68162f4e62a0-FGde2icX0AEqWqf.jpeg&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;how-log4j-scan-works&quot;&gt;How log4j-scan works?&lt;/h1&gt;

&lt;p&gt;Log4j-scan fuzzes HTTP request headers, POST data, JSON body, and all possible points where a Log4j entry can be generated from an HTTP request. It also has WAF bypass payloads that can be tested to evaluate the security of WAFs and make sure that WAFs are blocking Log4J variants.&lt;/p&gt;

&lt;p&gt;It uses DNS OOB callback to validate whether an host is affected, and it does not attempt to exploit the RCE vulnerability.&lt;/p&gt;

&lt;p&gt;FullHunt Enterprise customers have already been tested once the vulnerability was released, and all FullHunt Enterprise customers have this RCE resolved.&lt;/p&gt;

&lt;h2 id=&quot;demo&quot;&gt;Demo&lt;/h2&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/80e52a5b-7d72-44c2-8187-76a2a58f5657-demo.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;log4j-scan-project-githubcomfullhuntlog4j-scan&quot;&gt;&lt;a href=&quot;https://github.com/fullhunt/log4j-scan&quot;&gt;log4j-scan Project: github.com/fullhunt/log4j-scan&lt;/a&gt;&lt;/h2&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise that is looking for assets discovery, continuous monitoring, security scanning, better support, more features, and custom-developed tools?&lt;/strong&gt; Please reach out to us at team@fullhunt.io, and we will be happy to solve your challenges.&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup/&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
The FullHunt Team&lt;/p&gt;</content><author><name></name></author><category term="research" /><summary type="html">FullHunt developed an open-source tool for discovering Apache Log4j RCE CVE-2021-4428 at scale.</summary></entry><entry><title type="html">FullHunt 💜 Open-Source: Integration with Amass + SpiderFoot</title><link href="https://fullhunt.io/blog/2021/12/07/fullhunt-integration-with-amass-spiderfoot.html" rel="alternate" type="text/html" title="FullHunt 💜 Open-Source: Integration with Amass + SpiderFoot" /><published>2021-12-07T00:00:00-06:00</published><updated>2021-12-07T00:00:00-06:00</updated><id>https://fullhunt.io/blog/2021/12/07/fullhunt-integration-with-amass-spiderfoot</id><content type="html" xml:base="https://fullhunt.io/blog/2021/12/07/fullhunt-integration-with-amass-spiderfoot.html">&lt;p&gt;FullHunt Public API is now a data provider for Amass + SpiderFoot!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/268878e6-d236-4e1d-acc5-5dd1f421e83f-fullhunt-integration-with-amass-spiderfoot.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h2 id=&quot;fullhunt--open-source&quot;&gt;FullHunt 💜 Open-Source&lt;/h2&gt;

&lt;p&gt;If there is one thing we’re excited about, it’s the Open-Source community. Today, we’re glad to announce the integration of FullHunt with two major security tools within the OSINT industry: Amass + SpiderFoot. FullHunt is now a data provider that powers the OSINT and passive scanning for Amass and SpiderFoot to discover attack surfaces. This comes in addition to TheHarvester too, which came last month.&lt;/p&gt;

&lt;h2 id=&quot;fullhunt-integration-with-amass-&quot;&gt;FullHunt integration with Amass 🚀&lt;/h2&gt;

&lt;p&gt;The new release of Amass includes the FullHunt API as a data source of the subdomain enumeration phase of Amass.&lt;/p&gt;

&lt;p&gt;I have been a big fan of Amass since its release a few years ago, I’m glad to see this happening!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/1c890d05-0a54-42de-9262-5009251caf8d-screenshot-nov16-2-1.jpeg&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/dc5fd48a-afd8-4eaf-8214-09f68bfb1004-Screenshot-nov16-1-1.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;Tweet: &lt;a href=&quot;https://twitter.com/owaspamass/status/1459019750437236759&quot;&gt;https://twitter.com/owaspamass/status/1459019750437236759&lt;/a&gt;&lt;/p&gt;

&lt;h1 id=&quot;fullhunt-integration-with-spiderfoot-framework️&quot;&gt;FullHunt integration with SpiderFoot Framework🕷️&lt;/h1&gt;

&lt;p&gt;SpiderFoot was one of the first adopters to FullHunt. as soon as the FullHunt API reached beta, SpiderFoot has developed a module for FullHunt and a Pull Request was ready by &lt;a href=&quot;https://twitter.com/_bcoles&quot;&gt;@_bcoles&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;It’s really exciting to see SpiderFoot integrating FullHunt for OSINT. I especially liked the use of several data points FullHunt is probing to build an OSINT interface.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/9e01e74c-5671-4b51-a006-f36708ac246a-screenshot-nov16-3.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h3 id=&quot;fullhunt-api-documentation&quot;&gt;&lt;a href=&quot;https://api-docs.fullhunt.io&quot;&gt;FullHunt API Documentation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;You can find the API documentation for the public API at: &lt;a href=&quot;https://api-docs.fullhunt.io/&quot;&gt;api-docs.fullhunt.io&lt;/a&gt;.&lt;/p&gt;

&lt;h3 id=&quot;api-keys&quot;&gt;API Keys&lt;/h3&gt;

&lt;p&gt;You can obtain an API key by signing up for a free account at FullHunt. If you’re an enterprise customer, your account receives unlimited access to the FullHunt public API.&lt;/p&gt;

&lt;h1 id=&quot;this-is-just-the-beginning&quot;&gt;This is just the beginning…&lt;/h1&gt;

&lt;p&gt;We’re in the process of integrating FullHunt with the Metasploit framework to allow Attack Surface Discovery within seconds right from the Metasploit console.&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/f705e037-4085-4b5c-80e1-1eff6c3b4737-screenshot-nov16-4-1.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;PR: &lt;a href=&quot;https://github.com/rapid7/metasploit-framework/issues/15857&quot;&gt;https://github.com/rapid7/metasploit-framework/issues/15857&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Would you like to contribute to the Metasploit and build an Auxiliary Module for discovering attack surfaces using FullHunt.io? This will be a great addition :)&lt;/p&gt;

&lt;h1 id=&quot;huge-thanks-to-the-amazing-open-source-contributors&quot;&gt;Huge Thanks to the amazing Open-Source contributors&lt;/h1&gt;

&lt;p&gt;This would not have been possible without the amazing Open-Source contributors:&lt;/p&gt;

&lt;ul&gt;
  &lt;li&gt;&lt;a href=&quot;https://twitter.com/jeff_foley&quot;&gt;Jeff Foley&lt;/a&gt;: for building Amass, and developing the excellent integration of FullHunt on ADS language.&lt;/li&gt;
  &lt;li&gt;&lt;a href=&quot;https://twitter.com/_bcoles&quot;&gt;@_bcoles&lt;/a&gt;: for building the extensive SpiderFoot integration that utilizes several FullHunt datapoints on its OSINT gathering.&lt;/li&gt;
  &lt;li&gt;Everyone at SpiderFoot, theHarvester, and Amass for being awesome.&lt;/li&gt;
&lt;/ul&gt;

&lt;hr /&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise that is looking for more features, continuous monitoring, security scanning, better support, more features, and custom-developed tools?&lt;/strong&gt; Please reach out to us at team@fullhunt.io, and we will be happy to solve your challenges.&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup/&quot;&gt;Discover unknown assets today and protect your organization&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
The FullHunt Team&lt;/p&gt;</content><author><name></name></author><category term="announcement" /><category term="platform" /><category term="release" /><category term="assets-discovery" /><category term="api" /><category term="automation" /><category term="owasp" /><category term="amass" /><category term="spiderfoot" /><category term="attack-surface-management" /><summary type="html">FullHunt Public API is now a data provider for Amass + SpiderFoot!</summary></entry><entry><title type="html">New Release: FullHunt Public API! 🚀🚀</title><link href="https://fullhunt.io/blog/2021/11/10/fullhunt-public-api-release.html" rel="alternate" type="text/html" title="New Release: FullHunt Public API! 🚀🚀" /><published>2021-11-10T00:00:00-06:00</published><updated>2021-11-10T00:00:00-06:00</updated><id>https://fullhunt.io/blog/2021/11/10/fullhunt-public-api-release</id><content type="html" xml:base="https://fullhunt.io/blog/2021/11/10/fullhunt-public-api-release.html">&lt;p&gt;FullHunt is releasing a public API to find all attack surfaces, exposed services, DNS records, subdomains, and public assets for FREE!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/c5c7e7e2-50f8-403c-b555-d5efccbdd107-api-release.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h1 id=&quot;fullhunt-api-release&quot;&gt;FullHunt API Release&lt;/h1&gt;

&lt;p&gt;After the huge success of the FullHunt platform release, we’re happy to announce the API release for the FullHunt public platform, where you can find all subdomains, domains, assets, and public attack surfaces of any company for free!&lt;/p&gt;

&lt;p&gt;Enterprises will receive Unlimited access to the API and the platform, along with the exclusive FullHunt Enterprise Platform that provides custom APIs to run large ranges of data analysis to the attack surface.&lt;/p&gt;

&lt;h2 id=&quot;fullhunt--open-source&quot;&gt;FullHunt 💜 Open-Source&lt;/h2&gt;

&lt;h2 id=&quot;integration-with-theharvester-open-source-tool&quot;&gt;Integration with TheHarvester Open-Source Tool!&lt;/h2&gt;

&lt;p&gt;The FullHunt API has been integrated with TheHarvester. TheHarvester is one of our favorite tools at FullHunt, where it runs at the early stages of penetration tests and red teaming engagements to collect OSINT (Open-Source Intelligence) about companies, their websites, and their attack surface. We’re happy to be a &lt;strong&gt;Data source&lt;/strong&gt; for theHarvester as a way of contributing to the security community.&lt;/p&gt;

&lt;p&gt;The integration was developed by &lt;a href=&quot;https://twitter.com/jay_townsend1&quot;&gt;Jay Townsend&lt;/a&gt;, the core developer of TheHarvester. Thank you Jay for the amazing addition!&lt;/p&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/435666c2-5942-4976-a0b7-346107a8dcf5-theharvester-fullhunt.gif&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h3 id=&quot;pull-request&quot;&gt;&lt;a href=&quot;https://github.com/laramies/theHarvester/pull/894&quot;&gt;Pull Request&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/67b18a12-9133-4a12-b07a-a7c2ca1da126-pr-1.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;h3 id=&quot;fullhunt-api-documentation&quot;&gt;&lt;a href=&quot;https://api-docs.fullhunt.io&quot;&gt;FullHunt API Documentation&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;&lt;img src=&quot;https://dkh9ehwkisc4.cloudfront.net/static/files/a7d07ae4-c85e-48a7-86b5-40a19bee7245-api-docs-1.png&quot; alt=&quot;&quot; /&gt;&lt;/p&gt;

&lt;p&gt;You can find the API documentation for the public API at: &lt;a href=&quot;https://api-docs.fullhunt.io/&quot;&gt;api-docs.fullhunt.io&lt;/a&gt;. Enterprises will receive a separate email for their Enterprise API key of the public API, in addition to their Enterprise API.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Are you an enterprise that is looking for more features, continuous monitoring, security scanning, better support, more features, and custom-developed tools?&lt;/strong&gt; Please reach out to us at team@fullhunt.io, and we will be happy to solve your challenges.&lt;/p&gt;

&lt;h3 id=&quot;discover-unknown-assets-today-and-protect-your-organization-for-free&quot;&gt;&lt;a href=&quot;https://fullhunt.io/signup/&quot;&gt;Discover unknown assets today and protect your organization for free!&lt;/a&gt;&lt;/h3&gt;

&lt;p&gt;Best regards,&lt;br /&gt;
Mazin Ahmed&lt;br /&gt;
The FullHunt Team&lt;/p&gt;</content><author><name></name></author><category term="announcement" /><category term="platform" /><category term="release" /><category term="assets-discovery" /><category term="api" /><category term="automation" /><category term="theHarvester" /><summary type="html">FullHunt is releasing a public API to find all attack surfaces, exposed services, DNS records, subdomains, and public assets for FREE!</summary></entry></feed>