In today’s security landscape, Attack Surface Management (ASM) is a cornerstone of proactive defense. Monitoring internet-facing assets, uncovering shadow IT, and identifying vulnerable endpoints before attackers do can mean the difference between a resilient organization and a breach-in-the-making. Yet, many ASM tools remain proprietary, expensive, or too complex for smaller security teams, researchers, or hobbyists to adopt effectively.
This is why I created Frogy—an open-source, Bash-based ASM tool you can run with minimal configuration. Before diving into how it works, let’s explore the motivations and driving forces behind its creation.
Most organizations today have:
Identifying all these assets, monitoring them for changes or exposures, and sorting out which ones are actually “live” can be a daunting process. Traditional ASM platforms exist but often come with:
For penetration testers, bug bounty hunters, or lean security teams, these obstacles may discourage systematic attack surface analysis—leading to missed vulnerabilities.
With Frogy, the goal is to simplify and democratize ASM:
Open Source & Transparent
Easy to Run
Cost-Effective
End-to-End Workflow
In short, Frogy aims to provide a complete ASM snapshot without the usual friction and expense.
It’s no secret that the security community already has a variety of excellent recon tools—like ProjectDiscovery’s suite (Subfinder, DNSX, Naabu, Httpx) and Tomnomnom’s Assetfinder. But each tool often requires separate commands and outputs. Newcomers can quickly get lost in the pipeline:
Frogy bridges these gaps by orchestrating each tool in a logical sequence, then outputting an HTML-based dashboard that’s easy to parse and navigate. It doesn’t just show raw data; it presents intuitive bar charts, priority buckets (P0–P4), and a searchable table so you can quickly find high-risk assets.
Because Frogy is open source and lightweight, it’s ideal for:
https://github.com/iamthefrogy/frogy2.0
Below is the working process of this tool.
Below is how you provide user input and run it. Post completion, it will generate all report files into output/company name folder. There will be report.html file.
The content of report.html file will not be visible until you create a web server and then load report.html