All Projects → x1mdev → Reconpi

x1mdev / Reconpi

Licence: mit
ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.

Programming Languages

shell
77523 projects

Projects that are alternatives of or similar to Reconpi

Getjs
A tool to fastly get all javascript sources/files
Stars: ✭ 190 (-61.22%)
Mutual labels:  hacktoberfest, hacking, recon
Grecon
Your Google Recon is Now Automated
Stars: ✭ 119 (-75.71%)
Mutual labels:  hacking, hacking-tool, recon
Scilla
🏴‍☠️ Information Gathering tool 🏴‍☠️ DNS / Subdomains / Ports / Directories enumeration
Stars: ✭ 116 (-76.33%)
Mutual labels:  hacking, hacking-tool, recon
Awesome Bbht
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Stars: ✭ 190 (-61.22%)
Mutual labels:  hacking, hacking-tool, recon
Chaos
🔥 CHAOS is a Remote Administration Tool that allow generate binaries to control remote operating systems.
Stars: ✭ 1,168 (+138.37%)
Mutual labels:  hacktoberfest, hacking, hacking-tool
Phonia
Phonia Toolkit is one of the most advanced toolkits to scan phone numbers using only free resources. The goal is to first gather standard information such as country, area, carrier and line type on any international phone numbers with a very good accuracy.
Stars: ✭ 221 (-54.9%)
Mutual labels:  hacking, hacking-tool, recon
Wprecon
WPrecon (WordPress Recon), is a vulnerability recognition tool in CMS Wordpress, developed in Go and with scripts in Lua.
Stars: ✭ 135 (-72.45%)
Mutual labels:  hacking, hacking-tool, recon
Nosqlmap
Automated NoSQL database enumeration and web application exploitation tool.
Stars: ✭ 1,928 (+293.47%)
Mutual labels:  hacktoberfest, hacking, hacking-tool
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-12.86%)
Mutual labels:  hacking, hacking-tool, recon
Pig
A Linux packet crafting tool.
Stars: ✭ 384 (-21.63%)
Mutual labels:  hacking, hacking-tool
Xeexe Topantivirusevasion
Undetectable & Xor encrypting with custom KEY (FUD Metasploit Rat) bypass Top Antivirus like BitDefender,Malwarebytes,Avast,ESET-NOD32,AVG,... & Automatically Add ICON and MANIFEST to excitable
Stars: ✭ 387 (-21.02%)
Mutual labels:  hacking, hacking-tool
Archstrike
An Arch Linux repository for security professionals and enthusiasts. Done the Arch Way and optimized for i686, x86_64, ARMv6, ARMv7 and ARMv8.
Stars: ✭ 401 (-18.16%)
Mutual labels:  raspberry-pi, hacking
Ipapatch
Patch iOS Apps, The Easy Way, Without Jailbreak.
Stars: ✭ 3,837 (+683.06%)
Mutual labels:  hacking, hacking-tool
Rustscan
🤖 The Modern Port Scanner 🤖
Stars: ✭ 5,218 (+964.9%)
Mutual labels:  hacktoberfest, hacking
Paradoxiarat
ParadoxiaRat : Native Windows Remote access Tool.
Stars: ✭ 395 (-19.39%)
Mutual labels:  hacking, hacking-tool
Chromepass
Chromepass - Hacking Chrome Saved Passwords
Stars: ✭ 364 (-25.71%)
Mutual labels:  hacking, hacking-tool
Hacking
hacker, ready for more of our story ! 🚀
Stars: ✭ 413 (-15.71%)
Mutual labels:  hacking, hacking-tool
Appinfoscanner
一款适用于以HW行动/红队/渗透测试团队为场景的移动端(Android、iOS、WEB、H5、静态网站)信息收集扫描工具,可以帮助渗透测试工程师、攻击队成员、红队成员快速收集到移动端或者静态WEB站点中关键的资产信息并提供基本的信息输出,如:Title、Domain、CDN、指纹信息、状态信息等。
Stars: ✭ 424 (-13.47%)
Mutual labels:  hacking, hacking-tool
Anymethodlog
Log any method call of object in Objective-C
Stars: ✭ 361 (-26.33%)
Mutual labels:  hacking, hacking-tool
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (-15.71%)
Mutual labels:  hacking, hacking-tool

Recon Pi

__________                          __________.__ 
\______   \ ____   ____  ____   ____\______   \__|
 |       _// __ \_/ ___\/  _ \ /    \|     ___/  |
 |    |   \  ___/\  \__(  <_> )   |  \    |   |  |
 |____|_  /\___  >\___  >____/|___|  /____|   |__|
        \/     \/     \/           \/             
                            
			v2.2 - @x1m_martijn 

ReconPi - A lightweight recon tool that performs extensive reconnaissance with the latest tools using a Raspberry Pi.

Start using that Raspberry Pi -- I know you all have one laying around somewhere ;)

Since version 2.1 ReconPi is usable on your VPS, thanks to Sachin Grover for putting in a lot of work.

The latest HypriotOS image works perfect for Raspberry Pi's!

Easy installation

Connect to your ReconPi or VPS with SSH:

ssh [email protected] [Edit IP address if needed]

Curl the install.sh script and run it: curl -L https://raw.githubusercontent.com/x1mdev/ReconPi/master/install.sh | bash

Manual installation

Connect to your system with SSH:

$ ssh [email protected] [Edit IP address if needed]

Now we can set up everything, it's quite simple:

  • git clone https://github.com/x1mdev/ReconPi.git
  • cd ReconPi
  • ./install.sh

Grab a cup of coffee since this will take a while.

Usage

After installing all of the dependencies for the ReconPi you can finally start doing some recon!

$ recon <domain.tld>

recon.sh will first gather resolvers for the given target, followed by subdomain enumeration and checking those assets for potential subdomain takeover. When this is done the IP addresses of the target are enumerated. Open ports will be discovered accompanied by a service scan provided by Nmap.

Nuclei and its templates have been implemented in the routine!

Finally the live targets will be screenshotted and evaluated to discover endpoints.

Results will be stored on the Recon Pi and can be viewed by running `python -m SimpleHTTPServer 1337" in your results directory. Your results will be accessible from any system with a browser that exists in the same network.

Make sure to add your SLACK token to the tokens.txt file if you want to get slack notification after the completion of recon process.

Sample Token.txt ($HOME/ReconPi/configs/tokens.txt)

github_subdomains_token=""
SLACK_WEBHOOK_URL="https://hooks.slack.com/services/xxx/xxx/xxx"
findomain_spyse_token=""
findomain_virustotal_token=""
findomain_securitytrails_token=""
CHAOS_KEY=""
hackerhandle="reconpi"

Config Files (Note: config file for amass, subfinder and naabu are stored inside ReconPi/configs/ folder, provide your api keys in these files)

Input your API keys in these files to get better results

Subfinder Config file path : $HOME/ReconPi/configs/config.yaml

Amass Config file path : $HOME/ReconPi/configs/config.ini

We have added a $hackerhandle which is used in the nuclei scans. An additional x-bug-bounty: reconpi header will be added, please update this with your own handle :)

Scripts

  • Script folder contains a script named daily which can be used as a cronjob to run subdomain enumeration automatically.

  • Methodology is to take already enumerated subdomains as input and use amass on top of them, then track their last 2 result, and alert new subdomains on slack.

Tools

Tools that will be installed:

Methodology

  • gatherResolvers
  • gatherSubdomains
  • checkTakeovers
  • getCNAME
  • gatherIPs
  • gatherScreenshots
  • startMeg
  • fetchArchive
  • fetchEndpoints
  • runNuclei
  • portScan
  • notifySlack

Subdomain Enumeration:

  • Sublert

  • Subfinder

  • assetfinder

  • amass

  • findomain (Add findomain sources token to get better result)

  • chaos dataset

  • github-subdomains

  • dns.bufferover.run

  • Mutate above Subdomains using commonspeak subdomain list

  • Combine and Sort above result -> Use shuffledns to resolve -> dnsgen(to mutate) -> httprobe (to get alive hosts)

  • Check takeover using subjack and nuclei

  • Get CNAME to check manually for takeovers

  • Use dnsprobe to gather IP, ignore if they fall in cloudflare ip range

  • Do masscan and then nmap scan on them, also use http-title and vulners script.

  • Take Screenshot for visual recon

  • Use gau to to get archive urls, get paramlist, jsurls, phpurls, aspxurls, and jspurls in there own files.

  • Get Endpoints using Linkfinder

  • Run Nuclei Scripts on alive hosts

  • Notify on Slack channel if token is specified.

  • Directory Buteforcing (Not enabled, as it takes long time, it is better to do manually)

More tools will be added in the future, feel free to make a pull request!

Contributors

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].