38 points by caffeinedoom 2 days ago | 6 comments
hexadec 53 minutes ago
I am not seeing the long term, what is the value of this over a Shodan API key? They both crawl public IPs and explore subdomains for exposed resources.

Short term, if you have limited the view to companies only with bug bounty programs, it seems useful if you want to complete a bug bounty but don't know where to start. But the mapping of public resources has already been done.

I think showing URLs with sensitive params exposed, services using default creds, or some extra value add over a commodity scanner would be valuable. But then you would just be running a bug bounty/ pentesting AI service for bigger enterprises.

caffeinedoom 37 minutes ago
Great feedback! I have some of these questions myself, which makes me think about where I'd like to take neobotnet. The URL data needs to be more refined and provide actionable insights to security teams and devs so they can take appropriate actions with the data. There's more to explore within this data, such as JS and API reconnaissance as also possible client side issues. I'm looking to gather user feedback to polish the tool. Thanks for the comment.
rmonvfer 34 minutes ago
I like the idea but the fake scarcity really puts me off. Most technical people are usually very wary of it, and that seems like your target audience.
caffeinedoom 32 minutes ago
had to pump up the available spots and do some hot fixes on the fronted. my apologies pal. i'm learning idea validation atm.
QubridAI 1 hour ago
This is either an insanely useful recon tool or a future headache for a lot of security teams probably both tbh.
freeplay 1 hour ago
By time I got signed in, I missed the early adopter spots. Any chance you could open up a couple more?
caffeinedoom 45 minutes ago
hey freeplay! I added 5 more spots. Thank you so much for using Neobotnet.
freeplay 42 minutes ago
Thanks! Just grabbed one.
Taipan_Enigma 2 hours ago
[dead]
dailoxxxx 1 day ago
[flagged]