{"id":29861185,"url":"https://github.com/atharvbyadav/reconx","last_synced_at":"2025-07-30T04:13:04.100Z","repository":{"id":285006352,"uuid":"956779053","full_name":"atharvbyadav/ReconX","owner":"atharvbyadav","description":"ReconX Scan is an advanced network security toolkit. This tool helps security analysts, penetration testers, and IT professionals perform essential network reconnaissance and security assessments.","archived":false,"fork":false,"pushed_at":"2025-06-25T07:48:31.000Z","size":1925,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-06-25T08:40:06.749Z","etag":null,"topics":["bannergrabbing","cybersecurity","dnsenumuration","network-security","recon","reconnaissance"],"latest_commit_sha":null,"homepage":"https://atharvbyadav.github.io/ReconX/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"bsd-3-clause","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/atharvbyadav.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-03-28T21:06:42.000Z","updated_at":"2025-06-12T06:53:50.000Z","dependencies_parsed_at":"2025-06-25T08:32:26.473Z","dependency_job_id":"fbc2fa19-ac1b-4fd8-a34a-77bff7353898","html_url":"https://github.com/atharvbyadav/ReconX","commit_stats":null,"previous_names":["atharvbyadav/netsec","atharvbyadav/reconx"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/atharvbyadav/ReconX","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/atharvbyadav%2FReconX","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/atharvbyadav%2FReconX/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/atharvbyadav%2FReconX/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/atharvbyadav%2FReconX/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/atharvbyadav","download_url":"https://codeload.github.com/atharvbyadav/ReconX/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/atharvbyadav%2FReconX/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":267808420,"owners_count":24147391,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-07-30T02:00:09.044Z","response_time":70,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["bannergrabbing","cybersecurity","dnsenumuration","network-security","recon","reconnaissance"],"created_at":"2025-07-30T04:13:03.483Z","updated_at":"2025-07-30T04:13:04.075Z","avatar_url":"https://github.com/atharvbyadav.png","language":"Python","readme":"# 🛡️ ReconX — Network Reconnaissance Toolkit\n\n![Python](https://img.shields.io/badge/Python-3.x-blue.svg)\n![Streamlit](https://img.shields.io/badge/Built%20With-Streamlit-orange.svg)\n![License](https://img.shields.io/badge/License-BSD%203--Clause-green.svg)\n![Platform](https://img.shields.io/badge/Platform-Cross--Platform-lightgrey.svg)\n![Status](https://img.shields.io/badge/Status-Active-success.svg)\n\n![Recon Type](https://img.shields.io/badge/Recon-Active%20%26%20Passive-informational.svg)\n![Security Tool](https://img.shields.io/badge/Category-Security_Tool-critical.svg)\n![UI](https://img.shields.io/badge/UI-Streamlit_UI-red.svg)\n![GhostPath](https://img.shields.io/badge/Module-GhostPath-blueviolet.svg)\n![Contributions Welcome](https://img.shields.io/badge/Contributions-Welcome-brightgreen.svg)\n![Maintenance](https://img.shields.io/badge/Maintained%3F-Yes-66c2a5.svg)\n\n---\n\n## 📌 Overview\n\n\u003ctable border=\"0\" cellspacing=\"0\" cellpadding=\"0\" style=\"border: none; width: 100%;\"\u003e\n  \u003ctr\u003e\n    \u003ctd style=\"width: 60%; vertical-align: top; padding-right: 20px;\"\u003e\n      \u003cp\u003e\u003cstrong\u003eReconX\u003c/strong\u003e is a powerful, all-in-one \u003cstrong\u003enetwork security reconnaissance toolkit\u003c/strong\u003e built with a modern \u003cstrong\u003eStreamlit web interface\u003c/strong\u003e. Designed for \u003cstrong\u003epenetration testers, ethical hackers, red teamers\u003c/strong\u003e and \u003cstrong\u003ecybersecurity enthusiasts\u003c/strong\u003e, ReconX brings together essential active and passive recon techniques in one lightweight, interactive dashboard.\u003c/p\u003e\n      \u003cp\u003eWhether you’re prepping for a CTF, conducting OSINT, scanning your own infrastructure or just learning the ropes, \u003cstrong\u003eReconX empowers you to explore and assess digital footprints — securely, silently and effectively\u003c/strong\u003e.\u003c/p\u003e\n      🔗 \u003cstrong\u003eLive Demo:\u003c/strong\u003e \u003ca href=\"https://reconx.streamlit.app/\"\u003eReconX Web App\u003c/a\u003e\u003cbr\u003e\n      📂 \u003cstrong\u003eRepository:\u003c/strong\u003e \u003ca href=\"https://github.com/atharvbyadav/ReconX\"\u003eReconX GitHub\u003c/a\u003e\n    \u003c/td\u003e\n    \u003ctd style=\"width: 60%; text-align: center; vertical-align: top;\"\u003e\n      \u003cimg src=\"https://github.com/atharvbyadav/ReconX/blob/main/assets/ReconX.png\" alt=\"ReconX Banner\" style=\"width: 100%; max-width: 420px; height: auto; border-radius: 10px;\" /\u003e\n    \u003c/td\u003e\n  \u003c/tr\u003e\n\u003c/table\u003e\n\n---\n\n## 🚀 Features\n\n### 1️⃣ Port Scanning\n- Multithreaded TCP port scanner (range: 1–500)\n- Detects open ports, grabs banners, highlights outdated services\n\n### 2️⃣ OS Fingerprinting\n- Basic TCP handshake analysis to infer Linux/Unix vs Windows OS\n\n### 3️⃣ WHOIS Lookup\n- Retrieves domain ownership and registrar information\n\n### 4️⃣ Reverse DNS Lookup\n- Resolves IPs back to domain names (if records exist)\n\n### 5️⃣ DNS Enumeration\n- Retrieves A, AAAA, MX, NS, CNAME, TXT records for a domain\n\n### 6️⃣ GhostPath (Passive Recon)\n- Extracts subdomains via `crt.sh`\n- Gathers archived URLs via the Wayback Machine\n- Fully passive — no requests to target servers\n\n---\n\n## 🧠 Under the Hood\n\n**ReconX** may look like a polished web app — and it is — but under the hood, it’s powered by a well-organized collection of recon logic packed efficiently into a single, maintainable Python script.\n\nInstead of scattering logic across multiple files or scripts, all core functionalities — **Port Scanning**, **OS Fingerprinting**, **WHOIS Lookup**, **DNS Enumeration**, **Reverse DNS** and **GhostPath** — are implemented as **individual Python classes within one main file**.\n\nThis approach provides:\n- A clean, modular structure without file sprawl\n- Easier debugging — you only focus on the relevant class\n- Smooth onboarding for contributors or learners\n\n---\n\n### 🌐 Streamlit-Powered UI\n\nThe app’s interface is built with **Streamlit**, enabling a fast, reactive and browser-based frontend. Each recon class is wrapped in Streamlit UI components:\n- Text inputs for target domains/IPs\n- Buttons to trigger scans\n- Sections with expanders, tables and logs to display results\n\n---\n\n### 👻 Integrated GhostPath Engine\n\nReconX also embeds **GhostPath**, a passive reconnaissance engine that runs directly in the app. It consists of two internal classes:\n- `GhostSubdomains`: Fetches subdomains using **crt.sh**\n- `GhostWayback`: Gathers archived URLs from the **Wayback Machine**\n\nThese components operate quietly in the background, leaving no footprint on the target. They're perfect for stealthy reconnaissance workflows and OSINT-based enumeration.\n\n---\n\n### 🚀 Why This Architecture Works\n\n- ✅ **All-in-one file** means simpler code navigation and faster debugging  \n- ✅ **Class-based design** provides modularity and clarity  \n- ✅ **Streamlit frontend** offers interactivity without extra complexity  \n- ✅ **GhostPath integration** brings passive recon into your active workflow  \n\n---\n\n## 🛠️ Installation \u0026 Usage\n\n### Prerequisites\nEnsure you have **Python 3.x** installed.\n\n### Clone the Repository\n```bash\ngit clone https://github.com/atharvbyadav/ReconX.git\ncd ReconX\n````\n\n### Install Dependencies\n\n```bash\npip install -r requirements.txt\n```\n\n### Launch the App\n\n```bash\nstreamlit run ReconX.py\n```\n\n---\n\n## 📖 Usage Guide\n\n### 🔸 Port Scanning\n\nEnter the **Target IP**, hit **Scan** and see open ports, banners and potential risks.\n\n### 🔸 OS Fingerprinting\n\nEnter an IP and run detection to infer the OS type.\n\n### 🔸 WHOIS Lookup\n\nEnter a domain or IP to view WHOIS data.\n\n### 🔸 Reverse DNS Lookup\n\nReverse resolve an IP to any registered domain.\n\n### 🔸 DNS Enumeration\n\nEnter a domain name to pull DNS records.\n\n### 🔸 GhostPath (Passive Recon)\n\nUse **crt.sh** and **Wayback Machine** to uncover historical data and subdomains.\n\n---\n\n## ⚠️ Disclaimer\n\nThis tool is for **educational and authorized security research purposes only**. Scanning networks you don't own or lack permission to test is **illegal**.\n\nUse responsibly. Stay ethical.\n\n---\n\n## 📜 License\n\nThis project is licensed under the **BSD 3-Clause License**.\nSee the [LICENSE](LICENSE) file for full details.\n\n---\n\n## 🤝 Contributing\n\nContributions are welcome!\nFeel free to **fork this repo**, improve or expand features and open a **pull request**.\n\nHave ideas? Open an issue or reach out via the contact links below.\n\n---\n\n## 📬 Contact\n\n- **👨‍💻 Author**: Atharv Yadav\n- **📧 Email**: [uuwr5t1s@duck.com](mailto:uuwr5t1s@duck.com)  \n  _Looks suspicious? Good. It’s mine. The ducks work for me. 🦆💻_\n- **🌐 Website**: [atharvbyadav.github.io](https://atharvbyadav.github.io)\n- **🐙 GitHub**: [@atharvbyadav](https://github.com/atharvbyadav)\n- **🧠 Connect**: [LinkedIn](https://www.linkedin.com/in/atharvbyadav/) · [X](https://x.com/AtharvYadavB)\n\n\u003e *\"Collaboration is the backbone of innovation. Let’s build better tools together.\"*\n\n---\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fatharvbyadav%2Freconx","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fatharvbyadav%2Freconx","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fatharvbyadav%2Freconx/lists"}