All Projects β†’ sharathunni β†’ auto-recon-ng

sharathunni / auto-recon-ng

Licence: other
Automated script to run all modules for a specified list of domains, netblocks or company name

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to auto-recon-ng

Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+882.35%)
Mutual labels:  enumeration, penetration-testing, reconnaissance
Rapidscan
πŸ†• The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+4458.82%)
Mutual labels:  enumeration, penetration-testing, reconnaissance
Scilla
πŸ΄β€β˜ οΈ Information Gathering tool πŸ΄β€β˜ οΈ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (+582.35%)
Mutual labels:  enumeration, penetration-testing, reconnaissance
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+1070.59%)
Mutual labels:  enumeration, penetration-testing
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+13500%)
Mutual labels:  enumeration, reconnaissance
Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (+941.18%)
Mutual labels:  enumeration, reconnaissance
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+11241.18%)
Mutual labels:  enumeration, penetration-testing
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 1,572 (+9147.06%)
Mutual labels:  enumeration, reconnaissance
Ntlmrecon
Enumerate information from NTLM authentication enabled web endpoints πŸ”Ž
Stars: ✭ 252 (+1382.35%)
Mutual labels:  enumeration, reconnaissance
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (+735.29%)
Mutual labels:  penetration-testing, reconnaissance
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (+164.71%)
Mutual labels:  penetration-testing, reconnaissance
warf
WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (+211.76%)
Mutual labels:  penetration-testing, reconnaissance
Asnlookup
Leverage ASN to look up IP addresses (IPv4 & IPv6) owned by a specific organization for reconnaissance purposes, then run port scanning on it.
Stars: ✭ 163 (+858.82%)
Mutual labels:  enumeration, reconnaissance
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+970.59%)
Mutual labels:  enumeration, penetration-testing
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+10629.41%)
Mutual labels:  enumeration, penetration-testing
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (+1505.88%)
Mutual labels:  penetration-testing, reconnaissance
CEH
Exam Prep for the Ec-council Certified Ethical Hacker 312-50
Stars: ✭ 71 (+317.65%)
Mutual labels:  enumeration, reconnaissance
webrecon
Automated Web Recon Shell Scripts
Stars: ✭ 48 (+182.35%)
Mutual labels:  penetration-testing, reconnaissance
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (+70.59%)
Mutual labels:  penetration-testing, recon-ng
Horn3t
Powerful Visual Subdomain Enumeration at the Click of a Mouse
Stars: ✭ 120 (+605.88%)
Mutual labels:  enumeration, penetration-testing

auto-recon-ng


AUTO RECON-NG - Automated script to run all modules for a specified list of domains, netblocks or company name

Source: https://bitbucket.org/LaNMaSteR53/recon-ng

Usage: auto_recon-ng.py [-h] -w WORKSPACE [-i FILENAME] [-m MODULENAME] [-company DBNAME1] [-domain DBNAME2] [-netblock DBNAME3]

Optional arguments:

-h, --help show this help message and exit

-w, --workspace WORKSPACE Workspace name

-i FILENAME Set the recon-ng source using this list

-m MODULENAME Specify the modules list

-company DBNAME1 Specify the file containing company names

-domain DBNAME2 Specify the file containing domain names

-netblock DBNAME3 Specify the file containing netblocks

Example: python auto-recon-ng -w recon_2018 -m modules.txt -domain domains.txt


Setting up Auto-recon-ng for sub-domain enumeration:

  1. Add API keys to Recon-ng:

i. Launch recon-ng

ii. Run the command keys list to view all the existing keys

iii. Add new API key using the command: keys add shodan_api <paste_key_here>

iv. Run keys list again and confirm that the keys were added

  1. List of API keys to be added for sub-domain enumeration:

Recon-ng will require API keys for using the below 3rd party services, register a new account and generate a new API key each time. Most of these services have rate limiting and will only allow certain number of requests per day.

Domain list: Create a text file containing the list of top domains in the working directory of auto-recon-ng. For example: bing.com microsoft.com

Modules list:

a. Subdomain Enumeration:

Create a text file containing the list of modules, for subdomain enumeration use the below list. When using the below list the β€œdomain” option must be used with auto-recon-ng.

  • recon/domains-domains/brute_suffix
  • recon/domains-hosts/bing_domain_api
  • recon/domains-hosts/bing_domain_web
  • recon/domains-hosts/brute_hosts
  • recon/domains-hosts/builtwith
  • recon/domains-hosts/certificate_transparency
  • recon/domains-hosts/google_site_api
  • recon/domains-hosts/google_site_web
  • recon/domains-hosts/hackertarget
  • recon/domains-hosts/mx_spf_ip
  • recon/domains-hosts/netcraft
  • recon/domains-hosts/shodan_hostname
  • recon/domains-hosts/ssl_san
  • recon/domains-hosts/theharvester_xml
  • recon/domains-hosts/threatcrowd
  • recon/hosts-hosts/bing_ip
  • recon/hosts-hosts/ssltools
  • recon/hosts-ports/shodan_ip

b. Netblock to host discovery:

Create a text file containing the list of modules, for host enumeration use the below list. When using the below list the β€œnetblock” option must be used with auto-recon-ng.

  • recon/netblocks-hosts/reverse_resolve
  • recon/netblocks-hosts/shodan_net
  • recon/netblocks-ports/census_2012
  • recon/netblocks-ports/censysio
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].