<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Ruyynn</title>
    <description>The latest articles on DEV Community by Ruyynn (@ruyynn).</description>
    <link>https://dev.to/ruyynn</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F3822729%2Fe7712c1f-3993-43a4-b24c-7e6b12e4e89e.jpeg</url>
      <title>DEV Community: Ruyynn</title>
      <link>https://dev.to/ruyynn</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/ruyynn"/>
    <language>en</language>
    <item>
      <title>GhostIntel v2.5 — What Changed Since I First Posted About It</title>
      <dc:creator>Ruyynn</dc:creator>
      <pubDate>Mon, 30 Mar 2026 09:10:46 +0000</pubDate>
      <link>https://dev.to/ruyynn/ghostintel-v25-what-changed-since-i-first-posted-about-it-m3e</link>
      <guid>https://dev.to/ruyynn/ghostintel-v25-what-changed-since-i-first-posted-about-it-m3e</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F880sh04l2zkgndsqkuga.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F880sh04l2zkgndsqkuga.png" alt="GhostIntel v2.5 Web UI — Username OSINT result for " width="800" height="486"&gt;&lt;/a&gt;
Found on 67 out of 129 platforms including Instagram, LinkedIn, &lt;br&gt;
TikTok, GitHub, Discord, and more."/&amp;gt;&lt;/p&gt;



&lt;p&gt;A few weeks ago I posted about GhostIntel — an OSINT tool I built to automate recon across 100+ platforms.&lt;/p&gt;

&lt;p&gt;A lot has changed since then. Here's what's new in v2.5.&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/ruyynn/GhostIntel" rel="noopener noreferrer"&gt;https://github.com/ruyynn/GhostIntel&lt;/a&gt;&lt;/p&gt;


&lt;h2&gt;
  
  
  🌐 Web UI
&lt;/h2&gt;

&lt;p&gt;The biggest addition. Run &lt;code&gt;python ghostintel.py -web&lt;/code&gt; and open &lt;code&gt;http://localhost:7331&lt;/code&gt;.&lt;/p&gt;

&lt;p&gt;You get a full dashboard — dark/light theme, scan history, live entity detection as you type, and export to JSON/Markdown directly from the browser. No more staring at a terminal if you don't want to.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe1l4kzu9jqqjhf03o596.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fe1l4kzu9jqqjhf03o596.png" alt="GhostIntel v2.5 Web UI — localhost dashboard with Quick Scan mode, scan history, and real-time OSINT results including platform breakdown, email hints, and found categories." width="800" height="413"&gt;&lt;/a&gt;&lt;/p&gt;


&lt;h2&gt;
  
  
  🔥 Email Breach Detection
&lt;/h2&gt;

&lt;p&gt;GhostIntel now checks email domains against a built-in breach database and returns a risk score from 0–100. It tells you what was leaked, when, and what to do about it.&lt;/p&gt;

&lt;p&gt;Includes Indonesian breaches too — Tokopedia, Bhinneka, JD.ID.&lt;/p&gt;


&lt;h2&gt;
  
  
  📱 Phone OSINT — Now 8 Countries
&lt;/h2&gt;

&lt;p&gt;Was 5, now 8. Added Australia, Singapore, and Philippines on top of ID, US, UK, MY, IDN.&lt;/p&gt;


&lt;h2&gt;
  
  
  👤 Username Check — 129+ Platforms
&lt;/h2&gt;

&lt;p&gt;Up from 100+. Added gaming, music, video, and more Indonesian-specific platforms.&lt;/p&gt;

&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F26rquwsjogs473y54c0z.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2F26rquwsjogs473y54c0z.png" alt="GhostIntel v2.5 HTML Report — Username OSINT result showing found profiles across social, dev, and security platforms, alongside possible email variations, username variations, and categorized platform breakdown." width="800" height="677"&gt;&lt;/a&gt;&lt;/p&gt;


&lt;h2&gt;
  
  
  📦 Batch Processing
&lt;/h2&gt;

&lt;p&gt;Create a &lt;code&gt;.txt&lt;/code&gt; with mixed targets — usernames, emails, phone numbers, domains, IPs — and run them all at once.&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python ghostintel.py &lt;span class="nt"&gt;--batch&lt;/span&gt; targets.txt &lt;span class="nt"&gt;--format&lt;/span&gt; all
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  ⚡ Performance
&lt;/h2&gt;

&lt;p&gt;Async parallel scanning now makes it roughly 10x faster than before. Also added rotating User-Agent (14+ UAs) to reduce rate-limiting.&lt;/p&gt;




&lt;h2&gt;
  
  
  📊 Reports — 4 Formats
&lt;/h2&gt;

&lt;p&gt;JSON, HTML, TXT, and Markdown. Generate all at once with &lt;code&gt;--format all&lt;/code&gt;.&lt;/p&gt;




&lt;h2&gt;
  
  
  Still zero API keys
&lt;/h2&gt;

&lt;p&gt;Everything still runs on public data only. No signups, no paid APIs, no hidden costs.&lt;/p&gt;




&lt;p&gt;If you tried v2.0 before, this version is a significant step up. Feedback and PRs are always welcome 🙌&lt;/p&gt;

&lt;p&gt;⭐ &lt;a href="https://github.com/ruyynn/GhostIntel" rel="noopener noreferrer"&gt;https://github.com/ruyynn/GhostIntel&lt;/a&gt;&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>python</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>I Built an OSINT Tool to Automate Recon Across 100+ Platforms</title>
      <dc:creator>Ruyynn</dc:creator>
      <pubDate>Fri, 27 Mar 2026 16:11:04 +0000</pubDate>
      <link>https://dev.to/ruyynn/i-built-an-osint-tool-to-automate-recon-across-100-platforms-4em3</link>
      <guid>https://dev.to/ruyynn/i-built-an-osint-tool-to-automate-recon-across-100-platforms-4em3</guid>
      <description>&lt;p&gt;&lt;a href="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fracvuywo7qucvkx79fd7.png" class="article-body-image-wrapper"&gt;&lt;img src="https://media2.dev.to/dynamic/image/width=800%2Cheight=%2Cfit=scale-down%2Cgravity=auto%2Cformat=auto/https%3A%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Farticles%2Fracvuywo7qucvkx79fd7.png" alt="GhostIntel CLI output showing username search results" width="800" height="484"&gt;&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Manual reconnaissance is slow, repetitive, and honestly… pretty inefficient.&lt;/p&gt;

&lt;p&gt;So I built &lt;strong&gt;GhostIntel&lt;/strong&gt; — a lightweight OSINT tool that automates recon across multiple platforms in one place.&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/ruyynn/GhostIntel" rel="noopener noreferrer"&gt;https://github.com/ruyynn/GhostIntel&lt;/a&gt;&lt;/p&gt;




&lt;h2&gt;
  
  
  🧠 What is GhostIntel?
&lt;/h2&gt;

&lt;p&gt;GhostIntel is an open-source tool designed to simplify how you gather publicly available information.&lt;/p&gt;

&lt;p&gt;Instead of jumping between different tools or manually searching, GhostIntel helps automate the process and return structured results.&lt;/p&gt;




&lt;h2&gt;
  
  
  ⚙️ Features
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;🔍 Username enumeration across 100+ platforms&lt;/li&gt;
&lt;li&gt;📧 Email footprint analysis&lt;/li&gt;
&lt;li&gt;🌐 Domain reconnaissance&lt;/li&gt;
&lt;li&gt;📱 Basic phone lookup&lt;/li&gt;
&lt;li&gt;🧩 Modular and easy to extend&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  💡 Why I built this
&lt;/h2&gt;

&lt;p&gt;While learning about OSINT and reconnaissance, I noticed that most tools are either too complex or too fragmented.&lt;/p&gt;

&lt;p&gt;I wanted something that is:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Simple&lt;/li&gt;
&lt;li&gt;Fast&lt;/li&gt;
&lt;li&gt;Actually useful&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;So I built GhostIntel as a personal project to learn while solving a real problem.&lt;/p&gt;




&lt;h2&gt;
  
  
  🛠️ Tech Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Python&lt;/li&gt;
&lt;li&gt;CLI-based interface&lt;/li&gt;
&lt;li&gt;JSON-based configs&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🚀 Getting Started
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/ruyynn/GhostIntel
&lt;span class="nb"&gt;cd &lt;/span&gt;GhostIntel
pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
python ghostintel.py &lt;span class="nt"&gt;-h&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  📌 What’s next?
&lt;/h2&gt;

&lt;p&gt;I’m currently working on:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Report generation (HTML / PDF)&lt;/li&gt;
&lt;li&gt;Better data correlation&lt;/li&gt;
&lt;li&gt;Graph visualization&lt;/li&gt;
&lt;li&gt;More platform integrations&lt;/li&gt;
&lt;/ul&gt;




&lt;h2&gt;
  
  
  🤝 Feedback
&lt;/h2&gt;

&lt;p&gt;This project is still evolving, and I’d really appreciate feedback from the community 🙌&lt;/p&gt;

&lt;p&gt;If you find it useful, consider giving it a ⭐ on GitHub&lt;/p&gt;

&lt;p&gt;Thanks for reading 👀&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>python</category>
      <category>cybersecurity</category>
      <category>infosec</category>
    </item>
    <item>
      <title>VulnDraft: Open-Source Bug Report Generator for Bug Bounty &amp; Pentesting</title>
      <dc:creator>Ruyynn</dc:creator>
      <pubDate>Wed, 25 Mar 2026 09:26:24 +0000</pubDate>
      <link>https://dev.to/ruyynn/vulndraft-open-source-bug-report-generator-for-bug-bounty-pentesting-1eh3</link>
      <guid>https://dev.to/ruyynn/vulndraft-open-source-bug-report-generator-for-bug-bounty-pentesting-1eh3</guid>
      <description>&lt;p&gt;&lt;strong&gt;TL;DR&lt;/strong&gt;: Stop wasting 30-45 minutes formatting bug reports. VulnDraft helps bug bounty hunters and pentesters generate professional security reports in minutes.&lt;/p&gt;




&lt;h2&gt;
  
  
  Why VulnDraft?
&lt;/h2&gt;

&lt;p&gt;You find a bug. You have the PoC. But then comes the report:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Which platform? HackerOne, Bugcrowd, Intigriti?&lt;/li&gt;
&lt;li&gt;What sections do they require?&lt;/li&gt;
&lt;li&gt;Where's that CVSS calculator?&lt;/li&gt;
&lt;li&gt;Did I include all the steps?&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;The result:&lt;/strong&gt; Time lost formatting, when you could have found more bugs.&lt;/p&gt;




&lt;h2&gt;
  
  
  What VulnDraft Does
&lt;/h2&gt;

&lt;p&gt;✅ HackerOne / Bugcrowd / Intigriti templates — no more format guessing&lt;br&gt;
✅ Built-in CVSS v3.1 calculator&lt;br&gt;
✅ CLI + Web interface — use it your way&lt;br&gt;
✅ Export to Markdown, HTML, JSON&lt;br&gt;
✅ Multi-vulnerability support — one report, multiple findings&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Spend less time formatting, more time finding real security issues.&lt;/p&gt;
&lt;/blockquote&gt;


&lt;h2&gt;
  
  
  Tech Stack
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Python 3.8+&lt;/li&gt;
&lt;li&gt;FastAPI (web interface)&lt;/li&gt;
&lt;li&gt;Pydantic (validation)&lt;/li&gt;
&lt;li&gt;Questionary (CLI prompts)&lt;/li&gt;
&lt;li&gt;TailwindCSS (styling)&lt;/li&gt;
&lt;/ul&gt;


&lt;h2&gt;
  
  
  Try It Yourself
&lt;/h2&gt;


&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/ruyynn/VulnDraft.git
&lt;span class="nb"&gt;cd &lt;/span&gt;VulnDraft
pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
python main.py
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;


&lt;p&gt;Start the web interface:&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python main.py &lt;span class="nt"&gt;--web&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;blockquote&gt;
&lt;p&gt;Open &lt;a href="http://localhost:8000" rel="noopener noreferrer"&gt;http://localhost:8000&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;




&lt;h2&gt;
  
  
  Feedback &amp;amp; Contributions
&lt;/h2&gt;

&lt;p&gt;Try it. Break it. Tell me what sucks — &lt;strong&gt;open to suggestions, improvements, and contributions!&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/ruyynn/VulnDraft" rel="noopener noreferrer"&gt;VulnDraft on GitHub&lt;/a&gt;&lt;br&gt;
⭐ Star it if you find it useful!&lt;/p&gt;

</description>
      <category>opensource</category>
      <category>productivity</category>
      <category>security</category>
      <category>showdev</category>
    </item>
    <item>
      <title>Building Open Source Cybersecurity Tools with Python</title>
      <dc:creator>Ruyynn</dc:creator>
      <pubDate>Fri, 13 Mar 2026 16:48:03 +0000</pubDate>
      <link>https://dev.to/ruyynn/building-open-source-cybersecurity-tools-with-python-bd4</link>
      <guid>https://dev.to/ruyynn/building-open-source-cybersecurity-tools-with-python-bd4</guid>
      <description>&lt;p&gt;Introduction&lt;/p&gt;

&lt;p&gt;Cybersecurity and open source have always gone hand in hand.&lt;br&gt;
Recently, I've been working on several small tools focused on reconnaissance, OSINT, and security research.&lt;/p&gt;

&lt;p&gt;Most of these tools are written in Python and designed to be simple, practical, and useful for researchers, developers, and bug bounty hunters.&lt;/p&gt;

&lt;p&gt;Why I Built These Tools&lt;/p&gt;

&lt;p&gt;While learning more about reconnaissance workflows, I noticed that many tools are either:&lt;/p&gt;

&lt;p&gt;too complex for beginners&lt;/p&gt;

&lt;p&gt;not flexible enough&lt;/p&gt;

&lt;p&gt;or difficult to integrate into simple workflows&lt;/p&gt;

&lt;p&gt;So I started building my own tools to experiment with automation and information gathering.&lt;/p&gt;

&lt;p&gt;Some of My Projects&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;hxr&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A security reconnaissance framework focused on gathering useful data during early stages of security research.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;RYN27&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A CLI tool for information gathering including:&lt;/p&gt;

&lt;p&gt;WHOIS lookup&lt;/p&gt;

&lt;p&gt;DNS records&lt;/p&gt;

&lt;p&gt;IP geolocation&lt;/p&gt;

&lt;p&gt;port scanning&lt;/p&gt;

&lt;p&gt;technology detection&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;IP-Hunter&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;A defensive security tool designed to help website owners identify potential risks and misconfigurations.&lt;/p&gt;

&lt;p&gt;Open Source and Learning&lt;/p&gt;

&lt;p&gt;All of these projects are open source and part of my learning process in cybersecurity and Python development.&lt;/p&gt;

&lt;p&gt;I believe sharing tools openly helps others learn and improve their workflows.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Projects&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;You can explore all projects here:&lt;/p&gt;

&lt;p&gt;GitHub:&lt;br&gt;
&lt;a href="https://github.com/ruyynn" rel="noopener noreferrer"&gt;https://github.com/ruyynn&lt;/a&gt;&lt;/p&gt;

&lt;p&gt;Feedback&lt;/p&gt;

&lt;p&gt;If you work in cybersecurity, OSINT, or bug bounty, I’d love to hear your feedback.&lt;/p&gt;

&lt;p&gt;What tools do you rely on the most?&lt;/p&gt;

&lt;p&gt;What features are often missing from reconnaissance tools?&lt;/p&gt;

&lt;p&gt;Suggestions are always welcome.&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>opensource</category>
      <category>python</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
