Enter a target in the top bar and click Run Pipeline to start
—
pending
Pipeline Steps
Select tools to run:
Select a tool tab to view results
New Scheduled Scan
Scan Type
Target
Interval (hours)
No scheduled scans yet. Click New Schedule to add one.
0
Total
0
ASN
0
Domain
0
Recon
No saved sessions yet. Run a scan to save results.
Settings
General
Subdomain Sources
AI & Chat
X / Twitter Feed
Integrations
Scan Options
Thread CountParallel workers for scanning
Max Subdomains0 = unlimited
Reverse DNSResolve PTR records
HTTP ProbingCheck live status codes
Intelligence APIs
Add API keys to enable additional subdomain sources. All keys are stored locally in your browser.
Passive DNS & OSINT
NetworksDB API Keynetworksdb.io
SecurityTrails Keysecuritytrails.com
C99 API Keysubdomainfinder.c99.nl
Attack Surface Platforms
Shodan API Keyshodan.io
Censys API IDcensys.io — ID field
Censys API Secretcensys.io — Secret field
ZoomEye Keyzoomeye.org — JWT token
FOFA (Requires both fields)
FOFA EmailYour FOFA account email
FOFA API Keyfofa.info
Threat Intelligence (IPScope)
Netlas Keynetlas.io — IP & host data
GreyNoise Keygreynoise.io — internet noise intelligence
Criminal IP Keycriminalip.io — threat intelligence
Code & Repository
GitHub TokenFor domain mapper GitHub search
GitLab TokenFor gitlab-subdomains enumeration
ProjectDiscovery
Chaos API Keydns.projectdiscovery.io subdomain dataset
PDCP API KeyRequired for cvemap — get at cloud.projectdiscovery.io
AI Provider Keys
Keys power AI Chat, AI Analyze, and Feed Analysis. Any one key is enough — ZeekGlare uses the first available provider. Stored locally only.
Anthropic
Anthropic API KeyClaude Opus / Sonnet / Haiku
NVIDIA NIM
NVIDIA API KeyDeepSeek, Llama, Mistral via NIM
OpenAI
OpenAI API KeyGPT-4o, o3, o4-mini
X / Twitter Credentials
Create an app at developer.x.com, enable OAuth 1.0a read permissions, and generate tokens. Bearer Token alone → search-mode feed (recent cyber tweets). All four OAuth keys → your personal home timeline.
Bearer Token (Search API — v2)
Bearer TokenEnables search-mode feed
OAuth 1.0a (Home Timeline — v1)
API KeyConsumer Key from X app
API SecretConsumer Secret from X app
Access TokenGenerated for your account
Access Token SecretGenerated for your account
Telegram Bot
not running
Connect ZeekGlare to Telegram to control scans and chat with the AI from anywhere.
1. Create a bot via @BotFather → /newbot
2. Paste the token below. Optionally restrict to your Chat ID (from @userinfobot).
3. Enable the bot and send /help to your bot.
Bot Configuration
Bot TokenFrom @BotFather
Allowed Chat IDYour Telegram user ID (optional, restricts access)
Enable BotStart polling Telegram for messages
Caido Web Proxy
Caido is a web proxy for manual security testing. ZeekGlare can route discovered hosts through it (populating its history/sitemap) and add them to your project scope.
Generate your API key in Caido → Settings → Developer. The same URL is used for both proxy traffic and the GraphQL API.
Connection
Caido Proxy URLDefault: http://127.0.0.1:8080
Caido API KeyRequired for scope management
Burp Suite
Burp Suite is an industry-standard web proxy for manual security testing. ZeekGlare can route discovered hosts through Burp (populating its HTTP history & sitemap) and add them to your Target Scope.
Enable the REST API in Burp → Settings → Suite → REST API. The proxy and REST API use separate ports (default 8080 and 1337).
Proxy
Burp Proxy URLDefault: http://127.0.0.1:8080
REST API (Scope Management)
Burp REST API URLDefault: http://127.0.0.1:1337
Burp REST API KeyOptional — set in Burp REST API settings
Targets
Run a domain scan first.
Wordlist
Use dirsearch built-in wordlist
Extensions (comma sep)
Status Filter
Threads
Rec. Depth
Recursive fuzzing
Tool
Live Log
0found
—req/s
0selapsed
Saved Sessions
No saved sessions yet.
Filter:
Select a target and click Launch to start fuzzing.
ffuf · directory & file discovery
Status
Path
Size
Words
Lines
Redirect
Screenshot
Targets
Run a domain scan first.
Scanner
Severity (Nuclei)
CriticalHighMediumLowInfo
Templates (optional, e.g. cves/)
Rate Limit
Tags (opt)
Timeout (s)
Live Log
0found
0critical
0high
0selapsed
Saved Sessions
No saved sessions yet.
Severity:
Select targets and click Launch to start scanning.
Nuclei · CVE scanning & vulnerability detection
Severity
Tool
Finding
CVE / Ref
WordPress Targets
No WordPress targets detected. Run Domain Mapper with WhatWeb.
Scan Mode
Enumerate
Vuln Plugins All Plugins Vuln Themes All Themes Users Timthumbs Config Backups DB Exports
Usernames (comma-sep or file path)
Password List
Attack Method
WPScan API Token (optional — wpscan.com)
Threads
Live Log
0vulns
0users
0creds
0selapsed
Saved Sessions
No saved sessions yet.
Launch a scan to see WordPress details.
No vulnerabilities found yet.
No plugins detected yet.
No users enumerated yet.
No credentials found yet. Brute force mode will populate this tab.
Targets
Run a domain scan first.
Tools
Arjun
ParamSpider
x8
HTTP Method
GET
POST
Both
Threads 10
0Parameters
0URLs
0GET
0POST
No parameters found yet
Select targets from Domain Mapper and click Hunt Parameters
Enter a target domain and click Generate Dorks to build your dork library.
Custom Dork
GoogleBingDDGShodanGitHub
Dork Cheatsheet
site:target.com
inurl:admin
intitle:"index of"
intext:"api_key"
filetype:env
ext:sql
cache:site.com
link:site.com
related:site.com
before:2023-01-01
after:2020-01-01
-site:exclude.com
Shodan: hostname:, ssl:, http.title:, port:
Censys: parsed.names:, ip:, services.port:
GitHub: filename:.env, extension:pem, user:org
Quick Fire Dorks
☰ Tools
💾 Saved
Click any tool in the left panel to add it to the canvas. Drag tools directly onto the canvas. Connect nodes via their ports (● right → ● left).
Execution Log0
Node Config
Click a node to configure it
Ready
ASNs: 0Critical: 0Domains: 0
Network Map
DomainIPASNPortDrag nodes • Scroll to zoom
ASN Details
✨AI Analysis
Thinking...
🏹Send to Burp Suite
Collecting hosts…
Mode
Proxy Traffic — route a HEAD request through Burp for each live URL (populates HTTP history & sitemap, no REST API key needed)Scope Only — add all hosts to Burp Target Scope via REST API (requires REST API enabled in Burp settings)Both — proxy traffic + add to Target Scope (recommended)
Proxy URL and REST API URL are set in Settings → Integrations.
Enable the REST API in Burp → Settings → Suite → REST API. Burp proxy default is 127.0.0.1:8080, REST API default is 127.0.0.1:1337.
🔗Send to Caido
Collecting hosts…
Mode
Proxy Traffic — route a HEAD request through Caido for each live URL (populates history & sitemap, no API key needed)Scope Only — add all hosts to the Caido project scope via GraphQL API (requires API key)Both — proxy traffic + update scope (recommended)
Caido URL and API key are set in Settings → Integrations.
Caido must be running at the configured proxy URL. Generate your API key in Caido → Settings → Developer.