Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/JoshuaMart/AutoRecon
Simple shell script for automated domain recognition with some tools
https://github.com/JoshuaMart/AutoRecon
automated bugbounty domain-discovery recon reconnaissance
Last synced: 3 months ago
JSON representation
Simple shell script for automated domain recognition with some tools
- Host: GitHub
- URL: https://github.com/JoshuaMart/AutoRecon
- Owner: JoshuaMart
- Archived: true
- Created: 2019-02-18T17:12:21.000Z (almost 6 years ago)
- Default Branch: master
- Last Pushed: 2020-11-11T10:53:55.000Z (about 4 years ago)
- Last Synced: 2024-04-19T19:08:13.493Z (10 months ago)
- Topics: automated, bugbounty, domain-discovery, recon, reconnaissance
- Language: Shell
- Size: 50.8 KB
- Stars: 294
- Watchers: 15
- Forks: 68
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
# AutoRecon
![Banner](https://zupimages.net/up/19/01/uikg.png)![Maintenance](https://img.shields.io/badge/Maintained%3F-no-red.svg) ![made-with-bash](https://img.shields.io/badge/Made%20with-Bash-1f425f.svg) ![MIT license](https://img.shields.io/badge/License-MIT-blue.svg)
## CHECK [RENGINE](https://github.com/yogeshojha/rengine/) FOR A MORE INTERESTING AND ACTIVELY MAINTENED PROJECT
## Features
- Enum subdomains, create permutation & wildcard removing with [Amass](https://github.com/OWASP/Amass/)
- Search subdomains on github with [Github-Subdomains](https://github.com/gwen001/github-search/blob/master/github-subdomains.py)
- Find web services and screenshots with [Aquatone](https://github.com/michenriksen/aquatone)
- [Nuclei](https://github.com/projectdiscovery/nuclei) : Configurable targeted scanning based on templates
- [Gau](https://github.com/lc/gau) : Fetch known URLs from AlienVault's Open Threat Exchange, the Wayback Machine, and Common Crawl for any given domain.
- [Hakrawler](https://github.com/hakluke/hakrawler) : Simple, fast web crawler
- [ParamSpider](https://github.com/devanshbatham/ParamSpider) : Mining parameters from dark corners of Web Archives
- [Gf](https://github.com/tomnomnom/gf) : A wrapper around grep, to help you grep for things
- With somes GF profiles from [Gf-Patterns](https://github.com/1ndianl33t/Gf-Patterns) and [ParamSpider](https://github.com/devanshbatham/ParamSpider/tree/master/gf_profiles)
- [SubDomainizer](https://github.com/nsonaniya2010/SubDomainizer) : Designed to find hidden subdomains and secrets present is either webpage, Github, and external javascripts present in the given URL.![Workflow](https://zupimages.net/up/20/28/mclg.png)
## Installation
- Installation & Recon tested on Ubuntu 20.04Run installer :
```bash
./install.sh
```If wanted (recommended), configure [Amass](https://github.com/OWASP/Amass/) with the desired API keys by creating a [config.ini](https://github.com/OWASP/Amass/blob/master/examples/config.ini) file.
Create the file `.tokens` in `/root/Tools/Github-Subdomains/` with one or more github token.
## Usage
```bash
./recon.sh -d domain.tld -r -s -c /root/Tools/Amass/config.ini
```Options :
```bash
-d | --domain (required) : Domain in domain.tld format
-r | --recon (optional) : Search subdomains for the specified domain
-s | --scan (optional) : Scan the specified domain
-c | --amassconfig (optional) : Provide Amass configuration files for better results
-rp | --resultspath (optional) : Defines the output folder
```![RunningScript](https://zupimages.net/up/20/28/j650.png)
## Domain monitoring
The advantage of using amass with the "-dir" option is that it also allows monitoring with a bash script.
For example, you can create a cron task that executes the following content at regular intervals:```bash
#!/bin/bash
DOMAIN=your-domain.tld/root/AutoRecon.sh -d $DOMAIN -c /root/Tools/Amass/config.ini
MSG=$(amass track -d $DOMAIN -dir /root/Recon/$DOMAIN/Amass/ | grep 'Found:')
PAYLOAD="payload={\"text\": \"$MSG\"}"
HOOK=https://hooks.slack.com/services/XXXX/XXXX/XXXXif [ ! -z "$var" ]
then
curl -X POST --data-urlencode "$PAYLOAD" "$HOOK"
fi
```![SlackAlert](https://zupimages.net/up/20/19/yozr.png)