Built a self-hosted subdomain monitoring tool for bug bounty
好的,用户让我帮忙总结一篇英文文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读这篇文章,理解作者的主要观点。 文章的开头提到作者一直想做漏洞赏金,但学习了不同类型的攻击后,发现竞争很激烈,必须第一个发现漏洞。接着他想到做一个监控应用,在新目标出现时通知他,这样可以在AI机器人之前找到低垂果实。然后他介绍了自己开发的SubMon,这是一个简单的Web应用,功能包括跟踪目标、使用工具查找活跃子域、定期扫描、发送新子域出现的警报,并且有用户界面。最后他说还在早期阶段,希望得到漏洞赏金猎人或自动化侦察开发者的反馈。 总结的时候需要抓住关键点:作者想做漏洞赏金,发现竞争激烈,于是开发了SubMon来监控新目标和子域,并希望得到反馈。同时要控制在100字以内。 可能的结构是:作者想做漏洞赏金,发现竞争激烈后开发SubMon监控新目标和子域,并希望得到反馈。这样简洁明了。 检查一下是否符合要求:100字以内,直接描述内容,没有特定开头。看起来没问题。 </think> 作者想尝试漏洞赏金但发现竞争激烈后开发了SubMon应用,用于监控新目标和子域变化,并通过工具自动扫描和警报提醒。该应用有UI界面且仍处于早期阶段,寻求相关人士反馈。 2026-3-8 05:50:48 Author: www.reddit.com(查看原文) 阅读量:21 收藏

I always wanted to do bug bounty, but after learning different types of attacks from the tutorial, I realized it's much more competitive than I thought-one has to be the first to get the bounty.

Then I think it would be nice to have a monitor app that tells me whenever a new target shows up, perhaps I could find some low-hanging fruit before AI bots ;)

So I built SubMon. A simple web app that:

  • Keeps track of targets

  • Uses tools (subfinder, dnsx, httpx) to find active subdomains

  • Runs scheduled scans

  • Sends an alert when new subdomains appear

It has a UI, because I really don't want just another command-line tool.

Still early stage, but I’d love feedback from people who do bug bounty or build recon automation!


文章来源: https://www.reddit.com/r/netsecstudents/comments/1rnwrm0/built_a_selfhosted_subdomain_monitoring_tool_for/
如有侵权请联系:admin#unsafe.sh