An AI skill that teaches coding assistants how to use the FullHunt API. Install it in Cursor, Windsurf, or any IDE that supports skills, and the assistant can query domains, hosts, vulnerabilities, dark web data, and more through natural language.
The skill gives the assistant a full endpoint reference, usage patterns, and jq recipes so it can make API calls with curl on your behalf.
For MCP (Model Context Protocol) access, see fullhunt-mcp.
- Full coverage of the FullHunt API: domain intel, host details, subdomain enumeration, on-demand scanning.
- Vulnerability intelligence: CVE search, exploit search (ExploitDB, Metasploit, CISA KEV).
- Dark web monitoring: compromised credentials, discovered emails, phishing domains, typosquatting.
- Data intelligence: IP-to-hosts, ASN lookups, DNS record correlation, Tor exit node checks, passive DNS.
- Enterprise APIs: organizations, alerts, assets with risk scores, certificates.
- OEM APIs: white-label attack surface, dark web, and vulnerability queries with client tracking.
- Global search with filters (country, product, ASN, port, cloud provider, CDN, etc.).
You need a FullHunt API key. Set it as an environment variable:
export FULLHUNT_API_KEY="your-api-key"Verify it works:
curl -s "https://fullhunt.io/api/v1/auth/status" \
-H "X-API-KEY: $FULLHUNT_API_KEY" | jq .user.planImport fullhunt.skill into your IDE via its skill settings, or drop the fullhunt/ folder into your project directory.
Cursor: Settings > Skills > Import fullhunt.skill
Once the skill is installed, just ask questions in natural language:
"Find all subdomains of example.com"
"Look up host details for api.example.com"
"Search for CVE-2024-1234 and check if exploits exist"
"Check if 8.8.8.8 is a Tor exit node"
"Show compromised credentials for @acme.com from the dark web"
"Scan example.com for exposed services"
"What organizations are associated with uber.com?"
The assistant will pick the right API endpoints and return structured results.
fullhunt.skill # Skill package
fullhunt/
├── SKILL.md # Main skill definition (endpoint table, usage patterns, jq recipes)
└── references/
├── endpoints.md # Full API reference with request/response schemas
└── agentic-ai.md # MCP tool reference and multi-step query workflows
| Category | Endpoints |
|---|---|
| Domain intelligence | Domain details, subdomain enumeration |
| Host intelligence | Host lookup, IP metadata, port/service info |
| Vulnerability intelligence | CVE search, exploit search |
| Data intelligence | IP-to-hosts, ASN, DNS MX/NS correlation, tags, products, web tech |
| Nexus | Tor check, passive DNS, cloud cert search, IP lookup, domain collection |
| Attack surface | On-demand scanning (domain, IP, CIDR) |
| Organizations | Company search by name or domain |
| Global search | Multi-filter search across the entire database (Enterprise) |
| Enterprise | Orgs, alerts, vulns, entities, assets, certs, suggested domains |
| Dark web | Compromised credentials, emails, phishing, typosquatting |
| OEM | White-label versions of attack surface, dark web, vuln intel, scanning |
FullHunt is an attack surface management platform. It lets companies discover their internet-facing assets, monitor them for changes, and scan for vulnerabilities. The API provides programmatic access to all of that data.
More info: https://fullhunt.io
MIT License.
Mazin Ahmed
- Email: mazin at FullHunt.io
- FullHunt: https://fullhunt.io
- Website: https://mazinahmed.net
- Twitter: https://twitter.com/mazen160
- LinkedIn: https://linkedin.com/in/infosecmazinahmed
