Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/jreisinger/recon
Gather public info about network hosts
https://github.com/jreisinger/recon
osint osint-tool
Last synced: about 2 months ago
JSON representation
Gather public info about network hosts
- Host: GitHub
- URL: https://github.com/jreisinger/recon
- Owner: jreisinger
- Created: 2023-10-11T14:26:59.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-01-24T07:54:25.000Z (5 months ago)
- Last Synced: 2024-01-27T11:02:22.055Z (5 months ago)
- Topics: osint, osint-tool
- Language: Go
- Homepage:
- Size: 43.9 KB
- Stars: 13
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Lists
- cli-apps - recon - Gather public info about network hosts. (<a name="networking"></a>Networking)
- awesome-cli-apps - recon - Gather public info about network hosts. (<a name="networking"></a>Networking)
README
Recon is a small CLI tool (and a Go package) for gathering public information about network hosts. It's meant to be fast, easy to use, and easy to extend (by adding reconnoiterers).
Install
```
# optional; to install inside an ephemeral container
docker run --rm -it golang /bin/bashgo install github.com/jreisinger/recon/cmd/recon@latest
```Run all reconnoiterers against one host
```
$ recon example.com
example.com: txt records: v=spf1 -all, wgyf8z8cgvm2qmxpnbnldrcltvk4xqfn
example.com: geolocation: 93.184.216.34: London - GB, 2606:2800:220:1:248:1893:25c8:1946: New York - US
example.com: http version: HTTP/2.0
example.com: certificate issuer: DigiCert Inc
example.com: tls version: TLS 1.3
example.com: ip addresses: 93.184.216.34, 2606:2800:220:1:248:1893:25c8:1946
example.com: name servers: b.iana-servers.net, a.iana-servers.net
example.com: certificate authority: DigiCert Inc
```Run just one of the reconnoiterers (`-r`) against multiple hosts
```
$ recon -r ips example.com golang.org
example.com: ip addresses: 93.184.216.34, 2606:2800:220:1:248:1893:25c8:1946
golang.org: ip addresses: 142.251.36.81, 2a00:1450:4014:80a::2011
```Output JSON (`-j`)
```
$ recon -r ips -j example.com golang.org
{"target":"example.com","info":"ip addresses","results":["93.184.216.34","2606:2800:220:1:248:1893:25c8:1946"]}
{"target":"golang.org","info":"ip addresses","results":["142.251.36.81","2a00:1450:4014:80a::2011"]}
```Embed within a pipeline
```
$ subfinder --silent -d example.net | recon -r ips -j 2> /dev/null | jq '.info[]' -r | checkip 2> /dev/null
--- 2606:2800:220:1:248:1893:25c8:1946 ---
db-ip.com New York, United States
iptoasn.com EDGECAST
is on AWS false
malicious 0% (0/5) ✅
--- 93.184.216.34 ---
db-ip.com London, United Kingdom
iptoasn.com EDGECAST
is on AWS false
tls TLS 1.3, exp. 2024/02/13, www.example.org, example.net, example.edu, example.com, example.org, www.example.com, www.example.edu, www.example.net
malicious 14% (1/7) ✅
```- [subfinder](https://github.com/projectdiscovery/subfinder)
- [jq](https://jqlang.github.io/jq/)
- [checkip](https://github.com/jreisinger/checkip)