SecurityTrails Blog

Top 25 OSINT Tools for Penetration Testing
When you start an IT security investigation, the first phase you will face is the data reconnaissance and intel gathering about your target. Once you finish gathering information about your objective you will have all the needed information like IP addresses, domain names, servers, technology and much more so you can finally conduct your security tests.

Exploring Microsoft Subdomains
Using SecurityTrails to explore subdomains inside popular companies is one of our favorite pastimes: you never know what you will find. And no matter if we are exploring giant agencies or companies, as covered in FBI subdomains and Google subdomains, or small IT companies: you can always find some gems.

Backpage.com Seizure and What Happens to Seized Domains
What really happens when the FBI seizes a domain?

Launch of SecurityTrails domain and IP intelligence platform
With the launch of SecurityTrails.com, we are providing the same excellent data in an even easier to use and more eye-appealing web interface.

Popular Domain Privacy Guard Email Address Schemes
Domain Privacy guard email services can be used to hide the real identity of the domain owner, along with the email address and other contact information. Here we take look into the different strategies for guarding your identity.

Intelligence collection about your competitors using SecurityTrails, featured by Syed Balkhi
SecurityTrails can be used to discover the future plans of your competitors. See how.

Wrong Bind Configuration Exposes the Complete List of Russian TLD's to the Internet
DNS is one of the most important services of the net — it’s the heart and soul of the Internet as we know it. And when DNS servers are not well configured, they can easily be exploited to gain important information about their DNS zones and records.

Exploring Google DNS zone, record by record
Days ago playing with DNSTrails we discovered some new gems to share with you, this time from Google.com. Let’s explore the list.

New SecurityTrails SpiderFoot plugin
Today, we are excited to announce the immediate availability of our new SecurityTrails SpiderFoot plugin.

Using the SecurityTrails API™ for Bug Bounty Programs
Bug bounty programs are quite popular in software developer communities around the world. The way they work is fairly simple: developers find and report bugs to the company who owns and runs the software, gain recognition, and in most cases, compensation for their valuable help.