zerodumb@ethics-journal:~/services$
OSINT Reports for Builders & Startups
Simple, ethical surface scans. No drama. No risk. No shady code.
📂 Overview
- Public metadata scan (emails, GitHub, Google dorks)
- Subdomain visibility check
- Credential leak review (HaveIBeenPwned etc.)
- Basic security recommendations
🔍 Common Question
Q: “am I allowed to scan my own stuff?”
A:Yes. You absolutely are. You own the domain, the content, and you’re acting on your own behalf.
It doesn't matter if it’s hosted on GitHub Pages, GoDaddy, or powered by a hamster on a wheel — if you control it, you're in the clear.
Here’s what counts as a green light:
- You’re the domain owner (e.g. zerodumb.dev)
- You control the GitHub repo
- You’re scanning only public endpoints/content (no admin panels, no authenticated sessions)
- You’re not hammering your host like a DDoS — we keep scans polite and staggered
In fact, it’s smart to recon your own site. You’ll find:
- Overshared metadata (Git leaks, repo history)
- Mistyped robots.txt that accidentally lists sensitive paths
- Indexable files you didn’t mean to make public
- Framework debug endpoints still open
You’re basically being your own bug bounty hunter — minus the swag hoodie and million-dollar payout.
How to Order
Request a ReportYour request MUST include:
- Your name (or alias, no judgment)
- Your main domain or project URL
- Your email address that matches the domain (I will check, and I don’t do work for gmail, hotmail, or your mom’s mail, etc.)
- A sentence saying "Yes, I give permission for surface-level recon"
📂 Expanded Services
These aren’t ‘buy now’ buttons. These are ‘email me if you’re serious’ services.
Most of this, I don't do for the money. I do it to learn. If you want to support my caffeine habit, buy me coffee .