<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Bhawesh Chaudhary</title>
    <description>The latest articles on DEV Community by Bhawesh Chaudhary (@xybersec).</description>
    <link>https://dev.to/xybersec</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F457000%2F9896ac0e-e67b-4119-a3e7-82424bf13b2a.jpg</url>
      <title>DEV Community: Bhawesh Chaudhary</title>
      <link>https://dev.to/xybersec</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/xybersec"/>
    <language>en</language>
    <item>
      <title>🚀 Introducing Astra v1.1 – Local, Powerful, and Now Even More Flexible</title>
      <dc:creator>Bhawesh Chaudhary</dc:creator>
      <pubDate>Sun, 18 May 2025 07:25:52 +0000</pubDate>
      <link>https://dev.to/xybersec/introducing-astra-v11-local-powerful-and-now-even-more-flexible-3gi5</link>
      <guid>https://dev.to/xybersec/introducing-astra-v11-local-powerful-and-now-even-more-flexible-3gi5</guid>
      <description>&lt;p&gt;I'm excited to announce the release of Astra v1.1, the latest version of my open-source network scanning tool built for security researchers, sysadmins, and curious tinkerers. Astra combines speed, flexibility, and privacy — all without relying on third-party APIs.&lt;/p&gt;

&lt;p&gt;If you’re tired of bloated, cloud-reliant scanners, Astra is for you.&lt;/p&gt;

&lt;h2&gt;
  
  
  🌐 What is Astra?
&lt;/h2&gt;

&lt;p&gt;Astra is a Python-based CLI tool that lets you:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Scan domains and CIDR ranges&lt;/li&gt;
&lt;li&gt;Identify open TCP ports&lt;/li&gt;
&lt;li&gt;Resolve DNS locally&lt;/li&gt;
&lt;li&gt;Run scans without relying on external APIs (although ipinfo.io integration is optionally supported)&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;Whether you're probing a bug bounty target, analyzing your own infrastructure, or conducting research in an isolated lab, Astra gives you full control with no data leakage.&lt;/p&gt;

&lt;h2&gt;
  
  
  🔍 What’s New in Astra v1.1?
&lt;/h2&gt;

&lt;p&gt;Version 1.1 builds on the foundation of Astra with new scanning modes, improved usability, and better performance tuning. Here’s what’s new:&lt;/p&gt;

&lt;h2&gt;
  
  
  ✅ New Features:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;
&lt;strong&gt;CIDR Scan Enhancements:&lt;/strong&gt; Now supports selective scanning like &lt;code&gt;--first-1-per-cidr&lt;/code&gt;, &lt;code&gt;--first-2-per-cidr&lt;/code&gt;, and &lt;code&gt;--first-10-per-cidr&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Output Flexibility:&lt;/strong&gt; Save results in either JSON or CSV using &lt;code&gt;--output-format&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Expanded Port Options:&lt;/strong&gt; Quickly scan the first 300 or 1000 ports with &lt;code&gt;--first-300&lt;/code&gt; or &lt;code&gt;--first-1000&lt;/code&gt;.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Improved Verbose Logging:&lt;/strong&gt; Enhanced logs help you trace what Astra is doing under the hood.&lt;/li&gt;
&lt;li&gt;
&lt;strong&gt;Performance Tuning:&lt;/strong&gt; Fine-tune with &lt;code&gt;--timeout&lt;/code&gt;, &lt;code&gt;--max-ips&lt;/code&gt;, and per-CIDR controls.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🛠️ Quality of Life Improvements:
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;Simplified config setup via ~/.astra/config.json.&lt;/li&gt;
&lt;li&gt;Better help output (-h now clearly documents all flags).&lt;/li&gt;
&lt;li&gt;Graceful handling of invalid domains and empty scan results.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🚦 Use Cases
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;1. Scan a Domain:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 astra.py apple.com &lt;span class="nt"&gt;--verbose&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;2. Scan a CIDR Range:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 astra.py &lt;span class="nt"&gt;--cidr&lt;/span&gt; 192.168.1.0/24 &lt;span class="nt"&gt;--first-300&lt;/span&gt; &lt;span class="nt"&gt;--first-2-per-cidr&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;3. Limit Resources on Large Scans:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 astra.py facebook.com &lt;span class="nt"&gt;--first-1000&lt;/span&gt; &lt;span class="nt"&gt;--max-ips&lt;/span&gt; 100 &lt;span class="nt"&gt;--timeout&lt;/span&gt; 2.0
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;p&gt;&lt;strong&gt;4. Export to File:&lt;/strong&gt;&lt;br&gt;
&lt;/p&gt;

&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;python3 astra.py apple.com &lt;span class="nt"&gt;--output&lt;/span&gt; results.json &lt;span class="nt"&gt;--output-format&lt;/span&gt; json
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;



&lt;h2&gt;
  
  
  🧰 Why Choose Astra?
&lt;/h2&gt;

&lt;ul&gt;
&lt;li&gt;🔒 &lt;strong&gt;Privacy First:&lt;/strong&gt; Runs locally. No third-party API calls required.&lt;/li&gt;
&lt;li&gt;⚙️ &lt;strong&gt;Highly Customizable:&lt;/strong&gt; Scan any range of ports, control IP selection, and tune timeouts.&lt;/li&gt;
&lt;li&gt;💡 &lt;strong&gt;Transparent Output:&lt;/strong&gt; Know exactly what's happening with verbose logs and structured results.&lt;/li&gt;
&lt;li&gt;🧩 &lt;strong&gt;Open Source:&lt;/strong&gt; Modify, contribute, or build on top of Astra — your tool, your rules.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  🔧 Installation is Simple
&lt;/h2&gt;



&lt;div class="highlight js-code-highlight"&gt;
&lt;pre class="highlight shell"&gt;&lt;code&gt;git clone https://github.com/bhaweshchaudhary/Astra.git
&lt;span class="nb"&gt;cd &lt;/span&gt;astra
python3 &lt;span class="nt"&gt;-m&lt;/span&gt; venv venv
&lt;span class="nb"&gt;source &lt;/span&gt;venv/bin/activate  &lt;span class="c"&gt;# Or venv\Scripts\activate on Windows&lt;/span&gt;
pip &lt;span class="nb"&gt;install&lt;/span&gt; &lt;span class="nt"&gt;-r&lt;/span&gt; requirements.txt
python3 astra.py &lt;span class="nt"&gt;-h&lt;/span&gt;
&lt;/code&gt;&lt;/pre&gt;

&lt;/div&gt;






&lt;h2&gt;
  
  
  🙋‍♂️ FAQs
&lt;/h2&gt;

&lt;p&gt;&lt;strong&gt;Is Astra legal to use?&lt;/strong&gt;&lt;br&gt;
Yes, &lt;em&gt;only with permission&lt;/em&gt;. Unauthorized scanning is illegal.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Does it support UDP or IPv6?&lt;/strong&gt;&lt;br&gt;
Not yet — but it’s on the roadmap.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Can I contribute?&lt;/strong&gt;&lt;br&gt;
Absolutely! Fork the repo, check out &lt;code&gt;DEVELOPER.md&lt;/code&gt;, and submit a pull request.&lt;/p&gt;




&lt;h2&gt;
  
  
  🎯 Final Thoughts
&lt;/h2&gt;

&lt;p&gt;Astra v1.1 represents a step forward in ethical, private, and powerful network scanning. Whether you're in offensive security, blue team defense, or just exploring your own network, Astra gives you a lightweight yet robust tool to get the job done — no cloud dependencies, no bloat.&lt;/p&gt;

&lt;blockquote&gt;
&lt;p&gt;Ready to scan like a pro?&lt;/p&gt;
&lt;/blockquote&gt;

&lt;p&gt;🔗 &lt;a href="https://github.com/bhaweshchaudhary/Astra" rel="noopener noreferrer"&gt;Get Astra on GitHub&lt;/a&gt;&lt;/p&gt;

</description>
      <category>cybersecurity</category>
      <category>astra</category>
      <category>bugbounty</category>
      <category>recon</category>
    </item>
    <item>
      <title>A Comprehensive Guide to Bug Hunting</title>
      <dc:creator>Bhawesh Chaudhary</dc:creator>
      <pubDate>Sun, 18 May 2025 06:46:12 +0000</pubDate>
      <link>https://dev.to/xybersec/a-comprehensive-guide-to-bug-hunting-2l01</link>
      <guid>https://dev.to/xybersec/a-comprehensive-guide-to-bug-hunting-2l01</guid>
      <description>&lt;p&gt;This guide provides a structured, step-by-step approach to bug hunting, focusing on reconnaissance, subdomain enumeration, live domain filtering, vulnerability scanning, and JavaScript analysis. &lt;/p&gt;

&lt;p&gt;It incorporates essential tools like SecretFinder, Katana, GetJS, Nuclei, Mantra, Subjs, Grep, and Anew to enhance efficiency and coverage.&lt;/p&gt;

&lt;h2&gt;
  
  
  1. Initial Reconnaissance
&lt;/h2&gt;

&lt;p&gt;Gather information about the target to identify IP blocks, ASNs, DNS records, and associated domains.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools and Techniques:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;ARIN WHOIS: Lookup IP blocks and ownership details.&lt;/li&gt;
&lt;li&gt;BGP.HE: Retrieve IP blocks, ASNs, and routing information.&lt;/li&gt;
&lt;li&gt;ViewDNS.info: Check DNS history and reverse IP lookups.&lt;/li&gt;
&lt;li&gt;MXToolbox: Analyze MX records and DNS configurations.&lt;/li&gt;
&lt;li&gt;Whoxy: Perform WHOIS lookups for domain ownership.&lt;/li&gt;
&lt;li&gt;Who.is: Retrieve domain registration details.&lt;/li&gt;
&lt;li&gt;Whois.domaintools: Advanced WHOIS and historical data.&lt;/li&gt;
&lt;li&gt;IPAddressGuide: Convert CIDR to IP ranges.&lt;/li&gt;
&lt;li&gt;NSLookup: Identify nameservers.&lt;/li&gt;
&lt;li&gt;BuiltWith: Discover technologies used on the target website.&lt;/li&gt;
&lt;li&gt;Amass: Perform comprehensive information gathering (subdomains, IPs, etc.).&lt;/li&gt;
&lt;li&gt;Shodan: Search for exposed devices and services.&lt;/li&gt;
&lt;li&gt;Censys.io: Identify hosts and certificates.&lt;/li&gt;
&lt;li&gt;Hunter.how: Find email addresses and domain-related data.&lt;/li&gt;
&lt;li&gt;ZoomEye: Search for open ports and services.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Identify the target domain and associated IP ranges.&lt;/li&gt;
&lt;li&gt;Collect WHOIS data for ownership and registration details.&lt;/li&gt;
&lt;li&gt;Map out nameservers and DNS records.&lt;/li&gt;
&lt;li&gt;Use Amass to enumerate initial subdomains and IPs.&lt;/li&gt;
&lt;li&gt;Leverage Shodan, Censys, and ZoomEye to find exposed services.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  2. Subdomain Enumeration
&lt;/h2&gt;

&lt;p&gt;Subdomains often expose vulnerabilities. The goal is to discover as many subdomains as possible, including sub-subdomains, and filter live ones.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools and Techniques:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Subfinder: Fast subdomain enumeration.&lt;/li&gt;
&lt;li&gt;Amass: Advanced subdomain discovery.&lt;/li&gt;
&lt;li&gt;Crt.sh: Extract subdomains from certificate transparency logs.&lt;/li&gt;
&lt;li&gt;Sublist3r: Enumerate subdomains using multiple sources.&lt;/li&gt;
&lt;li&gt;FFUF: Brute-force subdomains.&lt;/li&gt;
&lt;li&gt;Chaos: Discover subdomains via ProjectDiscovery’s dataset.&lt;/li&gt;
&lt;li&gt;OneForAll: Comprehensive subdomain enumeration.&lt;/li&gt;
&lt;li&gt;ShuffleDNS: High-speed subdomain brute-forcing (VPS recommended).&lt;/li&gt;
&lt;li&gt;Katana: Crawl websites to extract subdomains and endpoints.&lt;/li&gt;
&lt;li&gt;VirusTotal: Find subdomains via passive DNS.&lt;/li&gt;
&lt;li&gt;Netcraft: Search DNS records for subdomains.&lt;/li&gt;
&lt;li&gt;Anew: Remove duplicate entries from subdomain lists.&lt;/li&gt;
&lt;li&gt;Httpx: Filter live subdomains.&lt;/li&gt;
&lt;li&gt;EyeWitness: Take screenshots of live subdomains for visual analysis.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run Subfinder, Amass, Sublist3r, and OneForAll to collect subdomains.&lt;/li&gt;
&lt;li&gt;Query Crt.sh and Chaos for additional subdomains.&lt;/li&gt;
&lt;li&gt;Use FFUF and ShuffleDNS for brute-forcing (on a VPS for speed).&lt;/li&gt;
&lt;li&gt;Crawl the target with Katana to extract subdomains from dynamic content.&lt;/li&gt;
&lt;li&gt;Combine results into a single file and use Anew to remove duplicates: cat subdomains.txt | anew &amp;gt; unique_subdomains.txt&lt;/li&gt;
&lt;li&gt;Filter live subdomains with Httpx: cat unique_subdomains.txt | httpx -silent &amp;gt; live_subdomains.txt&lt;/li&gt;
&lt;li&gt;Use EyeWitness to capture screenshots of live subdomains for manual review.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  3. Subdomain Takeover Checks
&lt;/h2&gt;

&lt;p&gt;Identify subdomains pointing to unclaimed services (e.g., AWS S3, Azure) that can be taken over.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Subzy: Check for subdomain takeover vulnerabilities.&lt;/li&gt;
&lt;li&gt;Subjack: Detect takeover opportunities (may be preinstalled in Kali).&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Run Subzy on the list of subdomains: subzy run --targets live_subdomains.txt&lt;/li&gt;
&lt;li&gt;Use Subjack for additional checks: subjack -w live_subdomains.txt -a&lt;/li&gt;
&lt;li&gt;Manually verify any flagged subdomains to confirm vulnerabilities.&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  4. Directory and File Bruteforcing
&lt;/h2&gt;

&lt;p&gt;Search for sensitive files and directories that may expose vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;FFUF: High-speed directory brute-forcing.&lt;/li&gt;
&lt;li&gt;Dirsearch: Discover hidden directories and files.&lt;/li&gt;
&lt;li&gt;Katana: Crawl for endpoints and files.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use FFUF to brute-force directories on live subdomains: ffuf -w wordlist.txt -u &lt;a href="https://subdomain.target.com/FUZZ" rel="noopener noreferrer"&gt;https://subdomain.target.com/FUZZ&lt;/a&gt;
&lt;/li&gt;
&lt;li&gt;Run Dirsearch for deeper enumeration: dirsearch -u &lt;a href="https://subdomain.target.com" rel="noopener noreferrer"&gt;https://subdomain.target.com&lt;/a&gt; -e *&lt;/li&gt;
&lt;li&gt;Crawl with Katana to identify additional endpoints: katana -u &lt;a href="https://subdomain.target.com" rel="noopener noreferrer"&gt;https://subdomain.target.com&lt;/a&gt; -o endpoints.txt&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  5. JavaScript Analysis
&lt;/h2&gt;

&lt;p&gt;Analyze JavaScript files for sensitive information like API keys, credentials, or hidden endpoints.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GetJS: Extract JavaScript file URLs from a target.&lt;/li&gt;
&lt;li&gt;Subjs: Identify JavaScript files across subdomains.&lt;/li&gt;
&lt;li&gt;Katana: Crawl for JavaScript files and endpoints.&lt;/li&gt;
&lt;li&gt;SecretFinder: Search JavaScript files for secrets (API keys, tokens, etc.).&lt;/li&gt;
&lt;li&gt;Mantra: Analyze JavaScript for vulnerabilities and misconfigurations.&lt;/li&gt;
&lt;li&gt;Grep: Filter specific patterns in JavaScript files.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Use Subjs and GetJS to collect JavaScript file URLs: cat live_subdomains.txt | subjs &amp;gt; js_files.txt getjs --url &lt;a href="https://subdomain.target.com" rel="noopener noreferrer"&gt;https://subdomain.target.com&lt;/a&gt; &amp;gt;&amp;gt; js_files.txt&lt;/li&gt;
&lt;li&gt;Crawl with Katana to find additional JavaScript files: katana -u &lt;a href="https://subdomain.target.com" rel="noopener noreferrer"&gt;https://subdomain.target.com&lt;/a&gt; -o js_endpoints.txt&lt;/li&gt;
&lt;li&gt;Download JavaScript files for analysis: wget -i js_files.txt -P js_files/&lt;/li&gt;
&lt;li&gt;Run SecretFinder to identify sensitive data: secretfinder -i js_files/ -o secrets.txt&lt;/li&gt;
&lt;li&gt;Use Mantra to detect vulnerabilities in JavaScript code: mantra -f js_files/ -o mantra_report.txt&lt;/li&gt;
&lt;li&gt;Search for specific patterns (e.g., API keys) with Grep: grep -r "api_key|token" js_files/&lt;/li&gt;
&lt;/ul&gt;

&lt;h2&gt;
  
  
  6. Vulnerability Scanning
&lt;/h2&gt;

&lt;p&gt;Perform automated scans to identify common vulnerabilities.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Nuclei: Fast vulnerability scanner with customizable templates.&lt;/li&gt;
&lt;li&gt;Mantra: Detect misconfigurations and vulnerabilities in web assets.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Run Nuclei with a comprehensive template set: nuclei -l live_subdomains.txt -t cves/ -t exposures/ -o nuclei_results.txt&lt;/p&gt;

&lt;p&gt;Use Mantra to scan for misconfigurations: mantra -u &lt;a href="https://subdomain.target.com" rel="noopener noreferrer"&gt;https://subdomain.target.com&lt;/a&gt; -o mantra_scan.txt&lt;/p&gt;

&lt;h2&gt;
  
  
  7. GitHub Reconnaissance
&lt;/h2&gt;

&lt;p&gt;Search for leaked sensitive information in public repositories.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tools:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;GitHub Search: Manually search for target-related repositories.&lt;/li&gt;
&lt;li&gt;Grep: Filter repository content for sensitive data.&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;&lt;strong&gt;Steps:&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Search GitHub for the target domain or subdomains (e.g., from:target.com).&lt;/p&gt;

&lt;p&gt;Clone relevant repositories and use Grep to find secrets: grep -r "api_key|password|secret" repo_folder/&lt;/p&gt;

&lt;p&gt;Analyze code for hardcoded credentials or misconfigurations.&lt;/p&gt;

&lt;h2&gt;
  
  
  8. Next Steps and Analysis
&lt;/h2&gt;

&lt;p&gt;Review EyeWitness screenshots for login pages, outdated software, or misconfigurations.&lt;/p&gt;

&lt;p&gt;Analyze Nuclei and Mantra reports for actionable vulnerabilities.&lt;br&gt;
Perform manual testing on promising subdomains (e.g., XSS, SQLi, SSRF).&lt;/p&gt;

&lt;p&gt;Document findings and prioritize vulnerabilities based on severity.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Additional Notes&lt;/strong&gt;&lt;/p&gt;

&lt;p&gt;Learning Resources: Complete TryHackMe’s pre-security learning path for foundational knowledge.&lt;/p&gt;

&lt;p&gt;&lt;strong&gt;Tool Installation:&lt;/strong&gt;&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Install Anew: go install github.com/tomnomnom/anew@latest&lt;/li&gt;
&lt;li&gt;Install Subzy: go install github.com/PentestPad/subzy@latest&lt;/li&gt;
&lt;li&gt;Install Nuclei: go install github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Install Katana: go install github.com/projectdiscovery/katana/cmd/katana@latest&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;Optimization: Use a VPS for resource-intensive tools like ShuffleDNS and FFUF.&lt;/p&gt;&lt;/li&gt;
&lt;li&gt;&lt;p&gt;File Management: Organize outputs into separate files (e.g., subdomains.txt, js_files.txt) for clarity.&lt;/p&gt;&lt;/li&gt;
&lt;/ul&gt;

</description>
      <category>cybersecurity</category>
    </item>
  </channel>
</rss>
