Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/003random/003Recon
Some tools to automate recon - 003random
https://github.com/003random/003Recon
Last synced: 6 days ago
JSON representation
Some tools to automate recon - 003random
- Host: GitHub
- URL: https://github.com/003random/003Recon
- Owner: 003random
- Created: 2017-11-20T15:53:17.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2018-06-05T18:24:33.000Z (over 6 years ago)
- Last Synced: 2024-08-01T08:11:02.419Z (3 months ago)
- Language: Python
- Homepage: https://poc-server.com/
- Size: 65.4 KB
- Stars: 295
- Watchers: 10
- Forks: 74
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-bbht - 003Recon - Some tools to automate recon - 003random (Frameworks / XSS)
- awesome-bbht - 003Recon - Some tools to automate recon - 003random (Frameworks / XSS)
- awesome-hacking-lists - 003random/003Recon - Some tools to automate recon - 003random (Python)
README
## 📌 Description
This repository contains some of my scripts that i created to automate some recon processes.
It performs the following things;
1. Get subdomains of a domain
2. Filter out only online domains
3. Scan the domains for CRLF
4. Check for a CORS misconfigurations
5. Test for open redirects
6. Grab sensitive headers
7. Get sensitive info from error pages
8. Check for subdomain takeovers
9. Extract javascript files
10. Feed the javascript files into 'relative-url-extractor'
11. Screenshot all domains
12. Check if sites run wordpress
13. Start a wpscan on the wordpress sites
14. Do a nmap service scanMore tools in comming soon / in progress :wink:
All output will get saved in a folder named by the domain, in the output folder.
In this folder it will create files with the discovered content.## Install:
git clone https://github.com/003random/003Recon.git;
cd 003Recon;
./install.sh; #Or if you have some tools already installed, edit the paths in recon.sh and comment those tools out here.And then call it with:
./recon.sh example.com
### Also, you might need to install some python modules like 'requests'.👌 *Created by [003random](http://hackerone.com/003random) - [@003random](https://twitter.com/rub003) - [003random.com](https://poc-server.com/blog/)*