All Projects → robotshell → magicRecon

robotshell / magicRecon

Licence: GPL-3.0 license
MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to magicRecon

Pinaak
A vulnerability fuzzing tool written in bash, it contains the most commonly used tools to perform vulnerability scan
Stars: ✭ 69 (-85.56%)
Mutual labels:  xss-vulnerability, nuclei, bugbounty, bash-script, vulnerability-scanners
Galaxy-Bugbounty-Checklist
Tips and Tutorials for Bug Bounty and also Penetration Tests.
Stars: ✭ 34 (-92.89%)
Mutual labels:  bug, bugbounty, bugbounty-tool, bugbountytricks
cf-check
CloudFlare Checker written in Go
Stars: ✭ 147 (-69.25%)
Mutual labels:  scanner, bugbounty, bugbounty-tool
Xunfeng
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Stars: ✭ 3,131 (+555.02%)
Mutual labels:  scanner, infosec, vulnerability-scanners
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+619.46%)
Mutual labels:  scanner, infosec, bugbounty
massurl
A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Stars: ✭ 14 (-97.07%)
Mutual labels:  bug, infosec, bugbounty-tool
sec-scannode
SEC分布式资产扫描系统
Stars: ✭ 8 (-98.33%)
Mutual labels:  scanner, infosec, vulnerability-scanners
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+6.49%)
Mutual labels:  scanner, infosec, bugbounty
sub404
A python tool to check subdomain takeover vulnerability
Stars: ✭ 205 (-57.11%)
Mutual labels:  subdomain, bugbounty, bugbounty-tool
tugarecon
Pentest: Subdomains enumeration tool for penetration testers.
Stars: ✭ 142 (-70.29%)
Mutual labels:  scanner, infosec, bugbounty
Reconftw
reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities
Stars: ✭ 974 (+103.77%)
Mutual labels:  scanner, subdomain, bugbounty
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+124.48%)
Mutual labels:  scanner, infosec, bugbounty
Can I Take Over Xyz
"Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
Stars: ✭ 2,808 (+487.45%)
Mutual labels:  subdomain, infosec, bugbounty
Resources
No description or website provided.
Stars: ✭ 38 (-92.05%)
Mutual labels:  scanner, sql-injection, bugbounty
Subjack
Subdomain Takeover tool written in Go
Stars: ✭ 1,194 (+149.79%)
Mutual labels:  subdomain, infosec, bugbounty
Securitymanageframwork
Security Manage Framwork is a security management platform for enterprise intranet, which includes asset management, vulnerability management, account management, knowledge base management, security scanning automation function modules, and can be used for internal security management. This platform is designed to help Party A with fewer security personnel, complicated business lines, difficult periodic inspection and low automation to better achieve internal safety management.
Stars: ✭ 378 (-20.92%)
Mutual labels:  scanner, infosec, vulnerability-scanners
Go Dork
The fastest dork scanner written in Go.
Stars: ✭ 274 (-42.68%)
Mutual labels:  infosec, bugbounty, vulnerability-scanners
Sec Admin
分布式资产安全扫描核心管理系统(弱口令扫描,漏洞扫描)
Stars: ✭ 222 (-53.56%)
Mutual labels:  scanner, infosec, vulnerability-scanners
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+1415.9%)
Mutual labels:  scanner, infosec, bugbounty
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+303.35%)
Mutual labels:  scanner, sql-injection, bugbounty


magicRecon
MagicRecon: Fast, simple and effective

Hi hacker 😉

Welcome to the MagicRecon tool repository!

MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

With Magic Recon you can perform passive and active reconnaissance, vulnerability analysis, subdomain scan and many more!


Disclaimer ⚠️

The author of this document take no responsibility for correctness. This project is merely here to help guide security researchers towards determining whether something is vulnerable or not, but does not guarantee accuracy. Warning: This code was originally created for personal use, it generates a substantial amount of traffic, please use with caution.


Main features 💥

  • Save the results in an organized way in different formats.
  • Subdomain enumeration.
  • Check if the domains are alive.
  • Get whois information about every subdomain.
  • Get dns information about every subdomain.
  • Extract the technologies used in the domain.
  • Get information about the certificate used in the domain .
  • Take a screenshot on the domain.
  • Searches for emails on the domain, users and more things.
  • Enumerate public resources in AWS, Azure, and Google Cloud.
  • Search juicy information via GitHub Dorks.
  • Check all entrys in robots.txt file.
  • Get all endpoints on the web.
  • Perform a parameter scan.
  • Perform a port scan to discover open ports.
  • Perform a dirsearch to find directories and files.
  • Check if is possible to bypass 403 HTTP status code.
  • Perform a massive recon and vulnerability scan via Nuclei every X seconds.
  • Search missing security headers.
  • Check if the domain is vulnerable to Email spoofing.
  • Check if the domain is vulnerable to Subdomain takeover.
  • Check if the domain is vulnerable to Cross-Origin Resource Sharing (CORS).
  • Check if different endpoints are vulnerable to CSRF.
  • Look for entry points in the URL and check if it is vulnerable to Open Redirect.
  • Look for entry points in the URL and check if it is vulnerable to Cross-site scripting (XSS).
  • Look for entry points in the URL and check if it is vulnerable to SQL Injection (SQLi).
  • Look for entry points in the URL and check if it is vulnerable to Server-side request forgery (SSRF).
  • Search all JS files in the domain and perform a scan for API Keys, access tokens, endpoints, etc.
  • Check if the domain use a CMS and scan it.
  • And many more...

Installation 🔨

$ git clone https://github.com/robotshell/magicRecon
$ cd magicRecon
$ chmod +x install.sh
$ ./install.sh

Configuration 🔧

To configure MagicRecon tool you must open the configuration.cfg file and change variables defined by user data.

It is also important to correctly configure tools such as Subfinder and Notify to guarantee the correct functioning of magicRecon.


Usage 👀

TARGET OPTIONS

Parameter Description
-d Target domain
-w Wildcard domain
-l Target list

MODE OPTIONS

Parameter Description
-a, --all All mode - Full scan with full target recognition and vulnerability scanning
-p, --passive Passive reconnaissance (Footprinting) - Performs only passive recon with multiple tools
-x, --active Active reconnaissance (Fingerprinting) - Performs only active recon with multiple tools
-r, --recon Reconnaissance - Perform active and passive reconnaissance
-v, --vulnerabilities Vulnerabilities - Check multiple vulnerabilities in the domain/list domains
-m, --massive Massive recon - Massive vulnerability analysis with repetitions every X seconds

EXTRA OPTIONS

Parameter Description
-n, --notify Notify - This option is used to receive notifications via Discord, Telegram or Slack
-h, --help Help - Show help
./magicrecon.sh -h                 
 __  __             _      ____                      
|  \/  | __ _  __ _(_) ___|  _ \ ___  ___ ___  _ __  
| |\/| |/ _` |/ _` | |/ __| |_) / _ \/ __/ _ \| '_ \ 
| |  | | (_| | (_| | | (__|  _ <  __/ (_| (_) | | | |
|_|  |_|\__,_|\__, |_|\___|_| \_\___|\___\___/|_| |_|
              |___/                                  
MagicRecon v.3.0 - Open Source Project | Author: Robotshell | Twitter: @robotshelld


USAGE
./magicrecon.sh [-d domain.com] [-w domain.com] [-l listdomains.txt]
                      [-a] [-p] [-x] [-r] [-v] [-m] [-n] [-h] 

TARGET OPTIONS
   -d domain.com     Target domain
   -w domain.com     Wildcard domain
   -l list.txt       Target list
 
MODE OPTIONS
   -a, --all         All mode - Full scan with full target recognition and vulnerability scanning
   -p, --passive     Passive reconnaissance (Footprinting) - Performs only passive recon with multiple tools
   -x, --active      Active reconnaissance (Fingerprinting) - Performs only active recon with multiple tools
   -r, --recon       Reconnaissance - Perform active and passive reconnaissance
   -v, --vulnerabilities         Vulnerabilities - Check multiple vulnerabilities in the domain/list domains
   -m, --massive     Massive recon - Massive vulnerability analysis with repetitions every X seconds
 
EXTRA OPTIONS
   -n, --notify      Notify - This option is used to receive notifications via Discord, Telegram or Slack
   -h, --help                Help - Show this help


Example Usage 🙊

All:

./magicrecon.sh -d domain.com -a

Passive reconnaissance to a list of domains:

./magicrecon.sh -l domainlist.txt -p

Active reconnaissance to a domain:

./magicrecon.sh -d domain.com -x

Full reconnaissance:

./magicrecon.sh -d domain.com -r

Full reconnaissance and vulnerabilities scanning:

./magicrecon.sh -d domain.com -r -v

Full reconnaissance and vulnerabilities scanning to a wildcard:

./magicrecon.sh -w domain.com 

Massive reconnaissance and vulnerabilities scanning:

./magicrecon.sh -w domain.com -m 

Sample video: passive reconnaissance 🎥

Example image


To do 🧙‍♂️

  • Change tool operation to parameters.
  • Improve the use of Notify.
  • Add new interesting tools to find more vulnerabilities.
  • Save results in other formats.
  • Save the results in a document as a report.
  • Check if the emails found by the tool are leaked.
  • Integrate RobotScraper.

Contribution & License 👪

You can contribute in following ways:

  • Report bugs & add issues.
  • Fix something and open a pull request.
  • Give suggestions (Ideas) to make it better.
  • Spread the word.

Do you want to have a conversation in private? email me : [email protected]

MagicRecon is licensed under GPL-3.0 License


Special thanks


About me

Twitter


Useful? 🤔

  • If you've earned a bug bounty using this tool, please consider donating to support it's development. You can help me to develop more useful scripts and tools. Thanks! 😍

Buy Me A Coffee PayPal

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].