Hey, cool project!
We run a bug bounty at Mitigata. If you're looking to add more targets, I'd be happy to connect you with the right person if that's useful.
caffeinedoom 5 hours ago [-]
thank you :) happy to connect and add more targets. please, reach out to me through X at @caffeinedoom or email at sam@neobotnet.com
hexadec 23 hours ago [-]
I am not seeing the long term, what is the value of this over a Shodan API key? They both crawl public IPs and explore subdomains for exposed resources.
Short term, if you have limited the view to companies only with bug bounty programs, it seems useful if you want to complete a bug bounty but don't know where to start. But the mapping of public resources has already been done.
I think showing URLs with sensitive params exposed, services using default creds, or some extra value add over a commodity scanner would be valuable. But then you would just be running a bug bounty/ pentesting AI service for bigger enterprises.
caffeinedoom 23 hours ago [-]
Great feedback! I have some of these questions myself, which makes me think about where I'd like to take neobotnet. The URL data needs to be more refined and provide actionable insights to security teams and devs so they can take appropriate actions with the data. There's more to explore within this data, such as JS and API reconnaissance as also possible client side issues. I'm looking to gather user feedback to polish the tool. Thanks for the comment.
rmonvfer 23 hours ago [-]
I like the idea but the fake scarcity really puts me off. Most technical people are usually very wary of it, and that seems like your target audience.
caffeinedoom 23 hours ago [-]
had to pump up the available spots and do some hot fixes on the fronted. my apologies pal. i'm learning idea validation atm.
freeplay 24 hours ago [-]
By time I got signed in, I missed the early adopter spots. Any chance you could open up a couple more?
caffeinedoom 23 hours ago [-]
hey freeplay! I added 5 more spots. Thank you so much for using Neobotnet.
freeplay 23 hours ago [-]
Thanks! Just grabbed one.
Taipan_Enigma 1 days ago [-]
[dead]
AmelieQiao 10 hours ago [-]
[dead]
dailoxxxx 2 days ago [-]
[flagged]
QubridAI 23 hours ago [-]
[flagged]
Rendered at 19:42:09 GMT+0000 (Coordinated Universal Time) with Vercel.
Short term, if you have limited the view to companies only with bug bounty programs, it seems useful if you want to complete a bug bounty but don't know where to start. But the mapping of public resources has already been done.
I think showing URLs with sensitive params exposed, services using default creds, or some extra value add over a commodity scanner would be valuable. But then you would just be running a bug bounty/ pentesting AI service for bigger enterprises.