Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xdekster/ReconNote
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
https://github.com/0xdekster/ReconNote
pentesting recon security-tools whitehat
Last synced: 21 days ago
JSON representation
Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters
- Host: GitHub
- URL: https://github.com/0xdekster/ReconNote
- Owner: 0xdekster
- Created: 2020-09-16T07:13:49.000Z (about 4 years ago)
- Default Branch: master
- Last Pushed: 2020-11-24T12:23:06.000Z (about 4 years ago)
- Last Synced: 2024-08-05T17:43:33.615Z (4 months ago)
- Topics: pentesting, recon, security-tools, whitehat
- Language: Vue
- Homepage:
- Size: 709 KB
- Stars: 412
- Watchers: 19
- Forks: 93
- Open Issues: 6
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - 0xdekster/ReconNote - Web Application Security Automation Framework which recons the target for various assets to maximize the attack surface for security professionals & bug-hunters (Vue)
README
# ReconNote
## Web Application Security Recon Automation Framework
It takes user input as a domain name and maximize the attack surface area by listing the assets of the domain like -
- Subdomains from - Amass ,findomain, subfinder & resolvable subdomains using shuffledns
- Screenshots
- Port Scan
- JS files
- Httpx Status codes of subdomains
- Dirsearch file/dir paths by fuzzing# Installation
1 - Install Docker & docker-compose according to you OS from here - https://docs.docker.com/get-docker/ \
2 - git clone https://github.com/0xdekster/ReconNote.git \
3 - Open docker-compose.yml & change the volumes directory path to the output folderexample -
volumes:
- /root/reconnote/output/:/var/www/html
4 - Change the API_HOST parameter value to your server/host ip or domain name.\
5 - Run docker-compose build OR docker-compose build --no-cache\
6 - Run docker-compose up -d\
7 - Reconnote framework will be up at - {your-server}:3000# Set Amass Config File to set API Keys
1- cd /ReconNote\
2- docker exec -it reconnote_dekster_1 bash\
3- cd /deksterrecon\
4- nano amass-config.ini\
5- Set your API keys and save, exit.# Usage
1 - Just enter domain/target name in Add Target & choose scan type\
2 - Everything will be done by Reconnote and in few minutes you will get the Scan Results![Image of reconnote](https://github.com/0xdekster/ReconNote/blob/master/reconnote3.png)
# Scan Result
![Image of reconnote2](https://github.com/0xdekster/ReconNote/blob/master/reconnote4.png)
# Demo Video
[![IMAGE ALT TEXT HERE](https://img.youtube.com/vi/jGpgreUY4H8/0.jpg)](https://youtu.be/jGpgreUY4H8)
# Contributions
This is an open source project so contributins are welcome.
You can request a PR for any changes that can enhance the ReconNote framework be it UI enhancement , tools adjustment ,features , etc..# Acknowledgements
ReconNote Security framework have been created by using the open source security tools made by amazing security community -
1- [Eduard Tolosa](https://github.com/Edu4rdSHL/findomain)\
2- [Tomnomnom](https://github.com/tomnomnom)\
3- [Michen riksen](https://github.com/michenriksen/aquatone)\
4- [Project Discovery](https://github.com/projectdiscovery)\
5- [Corben Leo](https://github.com/lc)