Security Vendors & ISVs

Build on FullHunt's Attack Surface Intelligence

Embed discovery, enrichment, vulnerability intelligence, and agentic AI in your product. No scanners to build, no infrastructure to maintain. Ship security features in weeks.

FullHunt OEM APIs
01 / Enrichment & Discovery APIs

Add host and domain intelligence to your product with a single API call.

No scanning infrastructure required. Enrichment, attack path analysis, and IP lookup via clean REST APIs.

01
Host & Domain Enrichment
Technologies, certs, ports, DNS, and organization attribution for any target. Single API call.
02
External Attack Path Analysis
Map lateral exposure for red team features and remediation prioritization in your product.
03
IP Search
Query by IP, range, or ASN with full enrichment. Build IP intelligence features fast.
04
Suggested Domains
Discover affiliated domains for any organization. Expand scope automatically.
02 / MCP Server & Agentic AI

Native AI integration for your security platform.

Connect FullHunt to any AI agent framework via our native MCP server. Let your AI security workflows query attack surface data, enrichment, and threat intelligence natively.

  • MCP & Agentic AI: native MCP server compatible with Claude, GPT, and other agent frameworks
  • Structured API responses: clean JSON optimized for LLM consumption
  • Real-time queries: always-fresh data for agentic workflows
MCP Server & Agentic AI
03 / Intelligence Data APIs

The full intelligence data catalog, via REST API.

Vulnerability and exploit databases, passive DNS history, TOR data, and historical records. All accessible programmatically.

01
Vulnerability Intel
CVE database enriched with EPSS and KEV. Embed vulnerability intelligence in your product.
02
Exploit Intel
Real-time exploit tracking and PoC correlation. 100K+ exploits indexed and updated daily.
03
Internet Research Data
TOR exit nodes, OSINT enrichment, and research artifacts for threat analysis features.
04
Passive DNS
Historical DNS resolution records for any domain or IP. Build DNS intelligence features.
05
Historical Data
How assets and configurations changed over time. Add timeline and trending capabilities.

Why security vendors choose FullHunt

White-Label Ready

Embed APIs under your brand. No attribution required. Your product, your data layer.

Fast Time-to-Market

Ship attack surface features in weeks, not months. No scanning infrastructure to build or maintain.

No Infrastructure

Zero scanners, zero crawlers, zero maintenance. FullHunt handles the data pipeline end-to-end.

Full Data Catalog

Enrichment, vulnerabilities, exploits, DNS, historical data, all from one vendor with one API key.

Build on FullHunt's attack surface intelligence

ISVs and security platforms embed FullHunt APIs to ship discovery, enrichment, and intelligence features, without building scanning infrastructure.