OSINT Toolkit

We're giving researchers an epic edge with powerful data resources at an amazing discount.

What's in the box?

Check CircleSecurity data API access Check Circle2500 queries/month Check CircleSubdomain mapping Check CircleAssociated domains Check CircleDSL v1 access Check CircleDNS and WHOIS history Check CircleCode samples for JS, Python, GO, and more Check CircleAPI Docs and& Technical Support

$99/month

Osint Toolkit image
Sign Up Now

* The OSINT Toolkit is exclusively available to Security Researchers. Any commercial use beyond security research is not permitted.

More for your research

Improved Recon

Accelerate your search with SurfaceBrowser™. Discover IP blocks, associated domains, subdomains, expired/valid SSL certificates, and more in the blink of an eye.

Full DNS Enumeration

The SecurityTrails API allows you to perform a full domain and subdomain enumeration in literal seconds. Unveil all hosts behind any organization.


Associated Domains

Instantly discover every associated domain of any organization. It’s never been easier to cross-relate domain data for security research.


Integrated on Open-Source Projects
Security Researchers Trust

Amass Axiom Subfinder

Don't miss this opportunity

Start using the Bug Bounty Hunter's Toolkit today!

Latest Security Research Posts

Industry expert interviews, technical guides, and tips for Security Researchers

How to Query Massive Port Scan Data with the SecurityTrails API™

How to Query Massive Port Scan Data with the SecurityTrails API™

The most important part of both bug bounty hunting and security research is the ability to find vulnerabilities quickly, before an attacker can take advantage of them. Read More

Mentoring the Upcoming Generation of Bug Bounty Hunters with Hakluke

Mentoring the Upcoming Generation of Bug Bounty Hunters with Hakluke

We are in a time where global economies are screeching to a halt while cybercrime is not resting. With cybercrime predicted to inflict damages totaling $6 trillion in 2021, its rise has outraced traditional security teams and methodologies, making it harder to detect, mitigate, and resolve an escalating number of threats. Read More

How to Find Associated Domains and IP Neighbors with the SecurityTrails API™

How to Find Associated Domains and IP Neighbors with the SecurityTrails API™

It has long been argued that a carefully-planned initial OSINT strategy favors the outcome of the remaining engagement. Read More

Giving Back to the Community with Ben Bidmead aka pry

Giving Back to the Community with Ben Bidmead aka pry

Collaboration and human connection are significant trends in cybersecurity. A vast and fluctuating cyber threat landscape means new challenges and vulnerabilities are always just around the corner. Sharing knowledge, techniques, and skills empowers cybersecurity professionals and practitioners to thwart cyber-attacks and minimize risks. Read More

IP Reconnaissance for Bug Bounty Hunters with SurfaceBrowser™

IP Reconnaissance for Bug Bounty Hunters with SurfaceBrowser™

IP reconnaissance is often the base and a starting point of any security research or bug hunt. This is simply because scanning any IP address can lead you to an individual host in question—and once you’ve found the host, the possibilities are limitless. From there you may find running services, open ports, databases, unsecured files and much more. Everything begins with finding and scanning the IP address. Read More

10 Popular Bug Bounty Programs

10 Popular Bug Bounty Programs

Surprisingly, crowdsourced security testing has been around for quite some time. As early as 1995, Netscape Communications Corporation introduced the first technology bug bounty program, “Netscape Bug Bounty”. Read More