<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/">
	<channel>
		<title><![CDATA[Dark C0d3rs - Network Pentesting]]></title>
		<link>https://darkcoders.wiki/</link>
		<description><![CDATA[Dark C0d3rs - https://darkcoders.wiki]]></description>
		<pubDate>Sat, 09 May 2026 11:54:30 +0000</pubDate>
		<generator>MyBB</generator>
		<item>
			<title><![CDATA[LazyHunter - Automated Bug Hunting Recon Tool]]></title>
			<link>https://darkcoders.wiki/Thread-LazyHunter-Automated-Bug-Hunting-Recon-Tool</link>
			<pubDate>Sun, 23 Feb 2025 07:01:49 +0000</pubDate>
			<dc:creator><![CDATA[<a href="https://darkcoders.wiki/member.php?action=profile&uid=2">hashXploiter</a>]]></dc:creator>
			<guid isPermaLink="false">https://darkcoders.wiki/Thread-LazyHunter-Automated-Bug-Hunting-Recon-Tool</guid>
			<description><![CDATA[LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs. It retrieves open ports, hostnames, tags, and vulnerabilities for a given IP and fetches CVE details, including affected products and CVSS scores. Results are color-coded by severity for easy analysis.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">Features</span></span><ul class="mycode_list"><li>Fetch open ports, hostnames, and associated vulnerabilities for an IP address.<br />
</li>
<li>Retrieve CVE details including severity levels.<br />
</li>
<li>Color-coded output for easy identification of risk levels.<br />
</li>
<li>Support for file input (-f) and output saving (-o).<br />
</li>
<li>Option to display combined CVEs and open ports.<br />
</li>
</ul>
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<img src="https://raw.githubusercontent.com/iamunixtz/Lazy-Hunter/main/images/singleipcves.png" loading="lazy"  alt="[Image: singleipcves.png]" class="mycode_img" />]]></description>
			<content:encoded><![CDATA[LazyHunter is an automated reconnaissance tool designed for bug hunters, leveraging Shodan's InternetDB and CVEDB APIs. It retrieves open ports, hostnames, tags, and vulnerabilities for a given IP and fetches CVE details, including affected products and CVSS scores. Results are color-coded by severity for easy analysis.<br />
<br />
<span style="font-weight: bold;" class="mycode_b"><span style="font-size: x-large;" class="mycode_size">Features</span></span><ul class="mycode_list"><li>Fetch open ports, hostnames, and associated vulnerabilities for an IP address.<br />
</li>
<li>Retrieve CVE details including severity levels.<br />
</li>
<li>Color-coded output for easy identification of risk levels.<br />
</li>
<li>Support for file input (-f) and output saving (-o).<br />
</li>
<li>Option to display combined CVEs and open ports.<br />
</li>
</ul>
<br />
Link : You are not allowed to view links. <a href="https://darkcoders.wiki/member.php?action=register">Register</a> or <a href="https://darkcoders.wiki/member.php?action=login">Login</a> to view.<br />
<img src="https://raw.githubusercontent.com/iamunixtz/Lazy-Hunter/main/images/singleipcves.png" loading="lazy"  alt="[Image: singleipcves.png]" class="mycode_img" />]]></content:encoded>
		</item>
	</channel>
</rss>