{"id":13586592,"url":"https://github.com/west-wind/LAR","last_synced_at":"2025-04-07T18:34:08.030Z","repository":{"id":199525903,"uuid":"116676961","full_name":"west-wind/LAR","owner":"west-wind","description":"Light Armoured Recon is a python script designed to automate passive recon. It automates execution of TheHarvester, whois, Robtex.com, Builtwith.com, DNSrecon, metagoofil, \u0026 knockpy.","archived":false,"fork":false,"pushed_at":"2018-02-28T12:16:19.000Z","size":258,"stargazers_count":35,"open_issues_count":0,"forks_count":7,"subscribers_count":4,"default_branch":"master","last_synced_at":"2024-02-14T21:38:16.297Z","etag":null,"topics":["automation","builtwith","dnsrecon","metagoofil","passive-check","passive-vulnerability-scanner","penetration-testing","pentest-scripts","python","python-script","recon","shell-script","theharvester"],"latest_commit_sha":null,"homepage":"https://twitter.com/Praetorian_GRD","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/west-wind.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null}},"created_at":"2018-01-08T12:59:17.000Z","updated_at":"2023-12-25T05:59:35.000Z","dependencies_parsed_at":null,"dependency_job_id":"7e16318f-e253-403a-bb9e-2ee89f1e6e67","html_url":"https://github.com/west-wind/LAR","commit_stats":null,"previous_names":["west-wind/lar"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/west-wind%2FLAR","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/west-wind%2FLAR/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/west-wind%2FLAR/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/west-wind%2FLAR/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/west-wind","download_url":"https://codeload.github.com/west-wind/LAR/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":247707709,"owners_count":20982830,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["automation","builtwith","dnsrecon","metagoofil","passive-check","passive-vulnerability-scanner","penetration-testing","pentest-scripts","python","python-script","recon","shell-script","theharvester"],"created_at":"2024-08-01T15:05:40.078Z","updated_at":"2025-04-07T18:34:07.740Z","avatar_url":"https://github.com/west-wind.png","language":"Python","readme":"\n# Light Armoured Recon\n**Light Armoured Recon** is a python script designed to automate passive reconnaissance. It automates execution of *TheHarvester*, *whois*, *Robtex.com*, *Builtwith.com*, *DNSrecon*, *metagoofil*, \u0026 *knockpy*.\n# Installing\n## Prerequisites\n - Python 2.7\n - [TheHarvester](https://code.google.com/p/theharvester/)\n - [whois](https://github.com/rfc1036/whois)\n - [DNSrecon](https://github.com/darkoperator/dnsrecon)\n - [metagoofil](www.edge-security.com/metagoofil.php)\n - [knockpy](https://github.com/guelfoweb/knock)\n## Dependencies\n - subprocess\n - threading\n## Installation \n\n    $ git clone https://github.com/west-wind/LAR.git\n    $ cd LAR\n    $ ./dependency_installer.sh\n    $ python LAR.py\n# Intended Use\nUsage of **Light Armoured Recon** for sending any traffic to a target without prior mutual consent is illegal. It is the end user's responsibility to obey all applicable local, state and federal laws. Developer assume no liability and are not responsible for any misuse or damage caused by this program. \n# Getting Started\nThis script requires the user to input the target URL *(excluding www)* by selecting option 1 \u0026 the output filename by selecting option 2. Make sure the filename is unique, so as not to overwrite any existing files in the directory.\n\nTo begin\n\n    $ cd LAR\n    $ python LAR.py\n\nEnter target URL by selecting option 1.\n\n![Running the script](https://raw.githubusercontent.com/west-wind/LAR/master/Screenshots/SCR%201.png)\n\nEnter output filename by selecting option 2. Make sure that no other file with the same name exists in the same directory, so as to avoid overwriting any existing files.\n\n![Entering target information](https://raw.githubusercontent.com/west-wind/LAR/master/Screenshots/SCR%202.png)\n\nSelect option 3 to proceed with recon.\n\n![Entering output filename](https://raw.githubusercontent.com/west-wind/LAR/master/Screenshots/SCR%203.png)\n\nEnter 'EXECUTE' to commence execution of packages.\n\n![Commence recon](https://raw.githubusercontent.com/west-wind/LAR/master/Screenshots/SCR%204.png)\n\n## Customisation\nYou can customise the execution of each package by editing command specific parameters in **LAR. py**\n\nFor example, if you're only interested in downloading **pdf** files with metagoofil, you can do so by editing the filetype parameter.\n\nfrom\n\n    cmd = 'metagoofil -d ' + target + ' -t pdf,doc,xls,ppt,odp,ods,docx,xlsx,pptx -l 10 -n 1 -o metagoofil_downloads -f metagoofil_output.html'\n to\n \n    cmd = 'metagoofil -d ' + target + ' -t pdf -l 10 -n 1 -o metagoofil_downloads -f metagoofil_output.html' \n\n# Built With\nPython\n# Authors\nAlex John, B. ([@Praetorian_GRD](https://twitter.com/Praetorian_GRD))\n# License\nCopyright (C) 2018 Alex John, B. This project is licensed under the GNU License - see the [LICENSE.md](https://raw.githubusercontent.com/west-wind/LAR/master/LICENSE) file for details.\n# Acknowledgements\n[Joe Perry](https://www.cybrary.it/members/perry/) \u0026 [Cybrary](https://www.cybrary.it) for the awesome ‘[Python for Security Professionals](https://www.cybrary.it/course/python/)’ course.\n","funding_links":[],"categories":["Python"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwest-wind%2FLAR","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fwest-wind%2FLAR","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fwest-wind%2FLAR/lists"}