All Projects → 0xdekster → Deksterecon

0xdekster / Deksterecon

Web Application recon automation

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Deksterecon

Intrec Pack
Intelligence and Reconnaissance Package/Bundle installer.
Stars: ✭ 177 (+62.39%)
Mutual labels:  automation, security-tools, recon
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (+74.31%)
Mutual labels:  security-tools, recon, bugbounty
Arl
ARL(Asset Reconnaissance Lighthouse)资产侦察灯塔系统旨在快速侦察与目标关联的互联网资产,构建基础资产信息库。 协助甲方安全团队或者渗透测试人员有效侦察和检索资产,发现存在的薄弱点和攻击面。
Stars: ✭ 1,357 (+1144.95%)
Mutual labels:  security-tools, recon, bugbounty
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+3055.05%)
Mutual labels:  security-tools, recon, bugbounty
Recon My Way
This repository created for personal use and added tools from my latest blog post.
Stars: ✭ 271 (+148.62%)
Mutual labels:  security-tools, recon, bugbounty
Recon Pipeline
An automated target reconnaissance pipeline.
Stars: ✭ 278 (+155.05%)
Mutual labels:  security-tools, recon, bugbounty
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+291.74%)
Mutual labels:  security-tools, recon, bugbounty
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+603.67%)
Mutual labels:  security-tools, bugbounty
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+611.01%)
Mutual labels:  automation, security-tools
Urlhunter
a recon tool that allows searching on URLs that are exposed via shortener services
Stars: ✭ 934 (+756.88%)
Mutual labels:  recon, bugbounty
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+884.4%)
Mutual labels:  security-tools, bugbounty
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+597.25%)
Mutual labels:  security-tools, bugbounty
Bypass Firewalls By Dns History
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+577.98%)
Mutual labels:  security-tools, bugbounty
Subdomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+739.45%)
Mutual labels:  security-tools, bugbounty
Stacoan
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (+548.62%)
Mutual labels:  security-tools, bugbounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+793.58%)
Mutual labels:  recon, bugbounty
Jok3r
Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework
Stars: ✭ 645 (+491.74%)
Mutual labels:  automation, security-tools
Gitgot
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Stars: ✭ 964 (+784.4%)
Mutual labels:  security-tools, recon
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-43.12%)
Mutual labels:  security-tools, bugbounty
Cazador unr
Hacking tools
Stars: ✭ 95 (-12.84%)
Mutual labels:  automation, bugbounty

Screenshot

Web Application recon automation , it aggregates your target results at one place so that the struggle of manually running each tool on single target/url will get removed and it helps to get a broader view of your attack surface.

It takes a target domain as an input and performs reconnaissance on it and gives out - Screenshots, javscripts from wayback machine, endpoints, subdomains, Valid paths, xss parameters, check for live ports , check for Subdomain takeover , etc..

Installation -

1- Recommended to run on a VPS having minimum 2GB ram.
2- Make sure latest GO verison and python3 is installed on your vps.
3- Install Apache web server - sudo apt install apache2
4- git clone https://github.com/0xdekster/deksterecon.git
5- cd deksterecon
6- chmod +x install.sh
7- ./install.sh

DO SET TOKENS FOR THE API'S YOU ARE USING

findomain_virustotal_token="YourAccessToken" findomain -(options)

Usage -

./deksterecon.sh target.com

Result

They will show at - /var/www/html/targetfolder

Screenshot

Thanks to the builders to these open-source tools

1- Eduard Tolosa
2- Tomnomnom
3- Hahwul
4- Michen riksen
5- Project Discovery
6- Corben Leo

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].