{"id":3438,"date":"2023-10-03T09:51:28","date_gmt":"2023-10-03T09:51:28","guid":{"rendered":"https:\/\/secry.me\/explore\/?p=3438"},"modified":"2023-10-09T06:08:01","modified_gmt":"2023-10-09T06:08:01","slug":"pinkerton-tool-ultimate-javascript-file-recon-tool","status":"publish","type":"post","link":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/","title":{"rendered":"Pinkerton Tool, Ultimate JavaScript File Recon Tool"},"content":{"rendered":"<div class=\"c7f5092f831f91fb6af859cc3a8052cc\" data-index=\"4\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/securepubads.g.doubleclick.net\/tag\/js\/gpt.js\"><\/script>\r\n<script>\r\n  window.googletag = window.googletag || {cmd: []};\r\n  googletag.cmd.push(function() {\r\n    googletag.defineSlot('\/22608490431\/iklan1', [[320, 100], [300, 50]], 'div-gpt-ad-1696178236578-0').addService(googletag.pubads());\r\n    googletag.pubads().enableSingleRequest();\r\n    googletag.enableServices();\r\n  });\r\n<\/script>\r\n<!-- \/22608490431\/iklan1 -->\r\n<div id='div-gpt-ad-1696178236578-0' style='min-width: 300px; min-height: 50px;'>\r\n  <script>\r\n    googletag.cmd.push(function() { googletag.display('div-gpt-ad-1696178236578-0'); });\r\n  <\/script>\r\n<\/div>\n<\/div>\n<p><strong>Indonesia, SECRY &#8211; Pinkerton Recon Tool &#8211;<\/strong> Hello SECRY Readers If you&#8217;re a <a href=\"https:\/\/secry.me\/explore\/bug-bounty\/\">bug hunter<\/a> or cyber security analyst and diving into the world of web reconnaissance and hunting for hidden JavaScript treasures, you&#8217;ve come to the right place.<\/p>\n<p>In this article, we&#8217;ll introduce you to Pinkerton, a nifty recon tool designed to seek out and analyze JavaScript files on websites. Pinkerton is your trusty sidekick in the quest for uncovering those gems hidden within the code. So, let&#8217;s roll up our sleeves and explore this handy tool that&#8217;s been making waves in the world of cyber reconnaissance.<\/p>\n<p>&nbsp;<\/p>\n<h2>What is Pinkerton?<\/h2>\n<p><strong>Pinkerton<\/strong>, available on Github <a href=\"https:\/\/github.com\/oppsec\/Pinkerton\">https:\/\/github.com\/oppsec\/Pinkerton<\/a>, is a versatile reconnaissance tool with the mission of investigating JavaScript files. With 228 stars and 37 forks, it&#8217;s gained popularity among cyber enthusiasts looking to dig deeper into website code. Pinkerton is all about unearthing JavaScript treasures, and here&#8217;s how it does it:<\/p>\n<h3>Key Features<\/h3>\n<h4>1. JavaScript File Search<\/h4>\n<p>Pinkerton&#8217;s first superpower is its ability to scan websites or applications and unearth JavaScript files. It&#8217;s like having a digital treasure map, but for code.<\/p>\n<h4>2. JavaScript File Extraction<\/h4>\n<p>Once Pinkerton discovers a JavaScript file, it doesn&#8217;t just leave it lying around. It swiftly extracts it from the website or app, ready for further examination.<\/p>\n<h4>3. JavaScript File Analysis<\/h4>\n<p>Here&#8217;s where Pinkerton really shines. It can analyze JavaScript files to uncover sensitive information like basic authorization data, secret variables, and vulnerabilities. Think of it as your cyber detective, sniffing out the juicy details.<\/p>\n<p>&nbsp;<\/p>\n<h2>Pinkerton Installation : Quick and Easy<\/h2>\n<p>Now, let&#8217;s get you set up with Pinkerton so you can start your JavaScript reconnaissance journey. Follow these simple steps:<\/p>\n<ol>\n<li>Clone the Pinkerton repository with this command:\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/oppsec\/pinkerton.git<\/code><\/pre>\n<pre class=\"wp-block-code\"><code>cd pinkerton<\/code><\/pre>\n<p><figure id=\"attachment_3440\" aria-describedby=\"caption-attachment-3440\" style=\"width: 781px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" td-modal-image wp-image-3440 size-full\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Clone-Pinkerton.png\" alt=\"Clone Pinkerton\" width=\"781\" height=\"185\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Clone-Pinkerton.png 781w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Clone-Pinkerton-300x71.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Clone-Pinkerton-768x182.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Clone-Pinkerton-150x36.png 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Clone-Pinkerton-696x165.png 696w\" sizes=\"auto, (max-width: 781px) 100vw, 781px\" \/><figcaption id=\"caption-attachment-3440\" class=\"wp-caption-text\">Clone Pinkerton From Github<\/figcaption><\/figure><\/li>\n<li>Install the required libraries with pip3:\n<pre class=\"wp-block-code\"><code>pip3 install -r requirements.txt<\/code><\/pre>\n<p><figure id=\"attachment_3444\" aria-describedby=\"caption-attachment-3444\" style=\"width: 1600px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" td-modal-image wp-image-3444 size-full\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL.png\" alt=\"Try Installing Pinkerton on my WSL\" width=\"1600\" height=\"668\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL.png 1600w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-300x125.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-1024x428.png 1024w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-768x321.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-1536x641.png 1536w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-150x63.png 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-696x291.png 696w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-Installing-Pinkerton-on-my-WSL-1068x446.png 1068w\" sizes=\"auto, (max-width: 1600px) 100vw, 1600px\" \/><figcaption id=\"caption-attachment-3444\" class=\"wp-caption-text\">Try Installing PIP requirements for Pinkerton on my WSL<\/figcaption><\/figure><\/li>\n<li>Run Pinkerton by executing this command:\n<pre class=\"wp-block-code\"><code>python3 main.py -u https:\/\/example.com<\/code><\/pre>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" td-modal-image alignnone wp-image-3445 size-full\" src=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton.png\" alt=\"Try analyze this website using &lt;yoastmark class=\" width=\"1701\" height=\"680\" srcset=\"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton.png 1701w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-300x120.png 300w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-1024x409.png 1024w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-768x307.png 768w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-1536x614.png 1536w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-150x60.png 150w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-696x278.png 696w, https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Try-analyze-this-website-using-Pinkerton-1068x427.png 1068w\" sizes=\"auto, (max-width: 1701px) 100vw, 1701px\" \/><\/li>\n<\/ol>\n<h2><\/h2>\n<h2>Dockerize Your Recon<\/h2>\n<p>Are you a fan of Docker containers? Pinkerton has you covered:<\/p>\n<ol>\n<li>Clone the repository:\n<pre class=\"wp-block-code\"><code>git clone https:\/\/github.com\/oppsec\/pinkerton.git<\/code><\/pre>\n<\/li>\n<li>Build the Docker image:\n<pre class=\"wp-block-code\"><code>sudo docker build -t pinkerton:latest<\/code><\/pre>\n<\/li>\n<li>Run the container:\n<pre class=\"wp-block-code\"><code>sudo docker run pinkerton:latest<\/code><\/pre>\n<p>&nbsp;<\/li>\n<\/ol>\n<h2>Prerequisites<\/h2>\n<p>Before you embark on your Pinkerton adventure, make sure you have Python 3 installed on your machine. You&#8217;ll also need to install the required libraries using this command:<\/p>\n<pre class=\"wp-block-code\"><code>pip3 install -r requirements.txt\r\n<\/code><\/pre>\n<p>&nbsp;<\/p>\n<h2>Credits and Acknowledgments<\/h2>\n<p>Pinkerton&#8217;s capabilities have been enhanced by the contributions of talented individuals in the cyber community, including:<\/p>\n<ul>\n<li><strong>m4ll0k<\/strong> (Creator of SecretFinder) for providing regex patterns.<\/li>\n<li><strong>h33lit (Jubaer Alnazi)<\/strong> for contributing regex patterns.<\/li>\n<li><strong>zricethezav (Creator of GitLeaks)<\/strong> for sharing regex patterns.<\/li>\n<\/ul>\n<p>With Pinkerton in your toolkit, you&#8217;re well-equipped to embark on your JavaScript reconnaissance missions. So, start scanning, extracting, and analyzing with confidence, and uncover those hidden treasures in the code. Happy recon hunting! \ud83d\udd75\ufe0f\u200d\u2642\ufe0f\ud83d\udcbb\ud83d\udd0d<\/p>\n<p>Just it, thanks for read !<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\" style=\"left: -10px; top: -10px; width: 0px; height: 0px;\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n<div id=\"urban-overlay\"><\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Indonesia, SECRY &#8211; Pinkerton Recon Tool &#8211; Hello SECRY Readers If you&#8217;re a bug hunter or cyber security analyst and diving into the world of web reconnaissance and hunting for hidden JavaScript treasures, you&#8217;ve come to the right place. In this article, we&#8217;ll introduce you to Pinkerton, a nifty recon tool designed to seek out [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":3448,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[136,201],"tags":[13,192,307,309,310,308],"class_list":{"0":"post-3438","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-bug-bounty","8":"category-tools","9":"tag-bug-bounty","10":"tag-cyber-security","11":"tag-cybersecurity","12":"tag-recon","13":"tag-reconnaissance","14":"tag-tools"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v21.4 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Pinkerton Tool, Ultimate JavaScript File Recon Tool | SECRY<\/title>\n<meta name=\"description\" content=\"Pinkerton is a versatile reconnaissance tool with the mission of investigating JavaScript files. With 228 stars and 37 forks, it&#039;s gained popularity among cyber enthusiasts\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Pinkerton Tool, Ultimate JavaScript File Recon Tool | SECRY\" \/>\n<meta property=\"og:description\" content=\"Indonesia, SECRY - Pinkerton Recon Tool - Hello SECRY Readers If you&#039;re a bug hunter or cyber security analyst and diving into the world of web\" \/>\n<meta property=\"og:url\" content=\"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/\" \/>\n<meta property=\"og:site_name\" content=\"SECRY\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/secry.me\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-03T09:51:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-09T06:08:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/10\/Pinkerton-Tools.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2012\" \/>\n\t<meta property=\"og:image:height\" content=\"1116\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"NewsArticle\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/\"},\"author\":{\"name\":\"Christin\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\"},\"headline\":\"Pinkerton Tool, Ultimate JavaScript File Recon Tool\",\"datePublished\":\"2023-10-03T09:51:28+00:00\",\"dateModified\":\"2023-10-09T06:08:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/\"},\"wordCount\":467,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Pinkerton-Tools.png\",\"keywords\":[\"Bug Bounty\",\"Cyber Security\",\"CyberSecurity\",\"Recon\",\"Reconnaissance\",\"Tools\"],\"articleSection\":[\"Bug Bounty\",\"Tools\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/\",\"name\":\"Pinkerton Tool, Ultimate JavaScript File Recon Tool | SECRY\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Pinkerton-Tools.png\",\"datePublished\":\"2023-10-03T09:51:28+00:00\",\"dateModified\":\"2023-10-09T06:08:01+00:00\",\"description\":\"Pinkerton is a versatile reconnaissance tool with the mission of investigating JavaScript files. With 228 stars and 37 forks, it's gained popularity among cyber enthusiasts\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#primaryimage\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Pinkerton-Tools.png\",\"contentUrl\":\"https:\\\/\\\/secry.me\\\/explore\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/Pinkerton-Tools.png\",\"width\":2012,\"height\":1116,\"caption\":\"Pinkerton Javascript Recon Tool\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/pinkerton-tool-ultimate-javascript-file-recon-tool\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/secry.me\\\/explore\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Pinkerton Tool, Ultimate JavaScript File Recon Tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#website\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"name\":\"SECRY\",\"description\":\"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections\",\"publisher\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\"},\"alternateName\":\"Security Story\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/secry.me\\\/explore\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#organization\",\"name\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\",\"alternateName\":\"SECRY\",\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"contentUrl\":\"https:\\\/\\\/secryweb.sirv.com\\\/WP_secry.me\\\/2022\\\/06\\\/cropped-SECRY.webp\",\"width\":512,\"height\":512,\"caption\":\"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections\"},\"image\":{\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/secry.me\",\"https:\\\/\\\/pinterest.com\\\/secry_me\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/secry.me\\\/explore\\\/#\\\/schema\\\/person\\\/bf08de9f590b8968a1d054728257190f\",\"name\":\"Christin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g\",\"caption\":\"Christin\"},\"description\":\"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.\",\"sameAs\":[\"https:\\\/\\\/secry.me\\\/explore\"],\"url\":\"https:\\\/\\\/secry.me\\\/explore\\\/author\\\/secry\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Pinkerton Tool, Ultimate JavaScript File Recon Tool | SECRY","description":"Pinkerton is a versatile reconnaissance tool with the mission of investigating JavaScript files. With 228 stars and 37 forks, it's gained popularity among cyber enthusiasts","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/","og_locale":"en_US","og_type":"article","og_title":"Pinkerton Tool, Ultimate JavaScript File Recon Tool | SECRY","og_description":"Indonesia, SECRY - Pinkerton Recon Tool - Hello SECRY Readers If you're a bug hunter or cyber security analyst and diving into the world of web","og_url":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/","og_site_name":"SECRY","article_publisher":"https:\/\/www.facebook.com\/secry.me","article_published_time":"2023-10-03T09:51:28+00:00","article_modified_time":"2023-10-09T06:08:01+00:00","og_image":[{"width":2012,"height":1116,"url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2023\/10\/Pinkerton-Tools.png","type":"image\/png"}],"author":"Christin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Christin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"NewsArticle","@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#article","isPartOf":{"@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/"},"author":{"name":"Christin","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f"},"headline":"Pinkerton Tool, Ultimate JavaScript File Recon Tool","datePublished":"2023-10-03T09:51:28+00:00","dateModified":"2023-10-09T06:08:01+00:00","mainEntityOfPage":{"@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/"},"wordCount":467,"commentCount":0,"publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"image":{"@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Pinkerton-Tools.png","keywords":["Bug Bounty","Cyber Security","CyberSecurity","Recon","Reconnaissance","Tools"],"articleSection":["Bug Bounty","Tools"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/","url":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/","name":"Pinkerton Tool, Ultimate JavaScript File Recon Tool | SECRY","isPartOf":{"@id":"https:\/\/secry.me\/explore\/#website"},"primaryImageOfPage":{"@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#primaryimage"},"image":{"@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#primaryimage"},"thumbnailUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Pinkerton-Tools.png","datePublished":"2023-10-03T09:51:28+00:00","dateModified":"2023-10-09T06:08:01+00:00","description":"Pinkerton is a versatile reconnaissance tool with the mission of investigating JavaScript files. With 228 stars and 37 forks, it's gained popularity among cyber enthusiasts","breadcrumb":{"@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#primaryimage","url":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Pinkerton-Tools.png","contentUrl":"https:\/\/secry.me\/explore\/wp-content\/uploads\/2023\/10\/Pinkerton-Tools.png","width":2012,"height":1116,"caption":"Pinkerton Javascript Recon Tool"},{"@type":"BreadcrumbList","@id":"https:\/\/secry.me\/explore\/pinkerton-tool-ultimate-javascript-file-recon-tool\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/secry.me\/explore\/"},{"@type":"ListItem","position":2,"name":"Pinkerton Tool, Ultimate JavaScript File Recon Tool"}]},{"@type":"WebSite","@id":"https:\/\/secry.me\/explore\/#website","url":"https:\/\/secry.me\/explore\/","name":"SECRY","description":"#1 Cyber [SEC]urity Sto[RY]  -  News &amp; Bug Bounty Story Collections","publisher":{"@id":"https:\/\/secry.me\/explore\/#organization"},"alternateName":"Security Story","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/secry.me\/explore\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/secry.me\/explore\/#organization","name":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections","alternateName":"SECRY","url":"https:\/\/secry.me\/explore\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/","url":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","contentUrl":"https:\/\/secryweb.sirv.com\/WP_secry.me\/2022\/06\/cropped-SECRY.webp","width":512,"height":512,"caption":"#1 Cyber [SEC]urity Sto[RY] - News & Bug Bounty Story Collections"},"image":{"@id":"https:\/\/secry.me\/explore\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/secry.me","https:\/\/pinterest.com\/secry_me"]},{"@type":"Person","@id":"https:\/\/secry.me\/explore\/#\/schema\/person\/bf08de9f590b8968a1d054728257190f","name":"Christin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b5497f25505814356d5235813688d08a9e63670586640e4bb29680889eabcc9b?s=96&d=robohash&r=g","caption":"Christin"},"description":"A cybersecurity practitioner with more than 5 years of experience in the cybersecurity world. Has an interest in creating simple blog websites, learning about SEO and graphic design, writing, AI, and understanding the concepts of journalism. Intentionally created this website to make the world of cybersecurity more engaging by combining it with journalistic principles and presenting cybersecurity stories that are easy to understand, which can help anyone who wants to develop in the cybersecurity world.","sameAs":["https:\/\/secry.me\/explore"],"url":"https:\/\/secry.me\/explore\/author\/secry\/"}]}},"_links":{"self":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3438","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/comments?post=3438"}],"version-history":[{"count":7,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3438\/revisions"}],"predecessor-version":[{"id":3495,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/posts\/3438\/revisions\/3495"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media\/3448"}],"wp:attachment":[{"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/media?parent=3438"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/categories?post=3438"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secry.me\/explore\/wp-json\/wp\/v2\/tags?post=3438"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}