https://github.com/atharvbyadav/reconx
ReconX Scan is an advanced network security toolkit. This tool helps security analysts, penetration testers, and IT professionals perform essential network reconnaissance and security assessments.
https://github.com/atharvbyadav/reconx
bannergrabbing cybersecurity dnsenumuration network-security recon reconnaissance
Last synced: 9 months ago
JSON representation
ReconX Scan is an advanced network security toolkit. This tool helps security analysts, penetration testers, and IT professionals perform essential network reconnaissance and security assessments.
- Host: GitHub
- URL: https://github.com/atharvbyadav/reconx
- Owner: atharvbyadav
- License: bsd-3-clause
- Created: 2025-03-28T21:06:42.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2025-06-25T07:48:31.000Z (10 months ago)
- Last Synced: 2025-06-25T08:40:06.749Z (10 months ago)
- Topics: bannergrabbing, cybersecurity, dnsenumuration, network-security, recon, reconnaissance
- Language: Python
- Homepage: https://atharvbyadav.github.io/ReconX/
- Size: 1.84 MB
- Stars: 1
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# π‘οΈ ReconX β Network Reconnaissance Toolkit











---
## π Overview
ReconX is a powerful, all-in-one network security reconnaissance toolkit built with a modern Streamlit web interface. Designed for penetration testers, ethical hackers, red teamers and cybersecurity enthusiasts, ReconX brings together essential active and passive recon techniques in one lightweight, interactive dashboard.
Whether youβre prepping for a CTF, conducting OSINT, scanning your own infrastructure or just learning the ropes, ReconX empowers you to explore and assess digital footprints β securely, silently and effectively.
π Live Demo: ReconX Web App
π Repository: ReconX GitHub
---
## π Features
### 1οΈβ£ Port Scanning
- Multithreaded TCP port scanner (range: 1β500)
- Detects open ports, grabs banners, highlights outdated services
### 2οΈβ£ OS Fingerprinting
- Basic TCP handshake analysis to infer Linux/Unix vs Windows OS
### 3οΈβ£ WHOIS Lookup
- Retrieves domain ownership and registrar information
### 4οΈβ£ Reverse DNS Lookup
- Resolves IPs back to domain names (if records exist)
### 5οΈβ£ DNS Enumeration
- Retrieves A, AAAA, MX, NS, CNAME, TXT records for a domain
### 6οΈβ£ GhostPath (Passive Recon)
- Extracts subdomains via `crt.sh`
- Gathers archived URLs via the Wayback Machine
- Fully passive β no requests to target servers
---
## π§ Under the Hood
**ReconX** may look like a polished web app β and it is β but under the hood, itβs powered by a well-organized collection of recon logic packed efficiently into a single, maintainable Python script.
Instead of scattering logic across multiple files or scripts, all core functionalities β **Port Scanning**, **OS Fingerprinting**, **WHOIS Lookup**, **DNS Enumeration**, **Reverse DNS** and **GhostPath** β are implemented as **individual Python classes within one main file**.
This approach provides:
- A clean, modular structure without file sprawl
- Easier debugging β you only focus on the relevant class
- Smooth onboarding for contributors or learners
---
### π Streamlit-Powered UI
The appβs interface is built with **Streamlit**, enabling a fast, reactive and browser-based frontend. Each recon class is wrapped in Streamlit UI components:
- Text inputs for target domains/IPs
- Buttons to trigger scans
- Sections with expanders, tables and logs to display results
---
### π» Integrated GhostPath Engine
ReconX also embeds **GhostPath**, a passive reconnaissance engine that runs directly in the app. It consists of two internal classes:
- `GhostSubdomains`: Fetches subdomains using **crt.sh**
- `GhostWayback`: Gathers archived URLs from the **Wayback Machine**
These components operate quietly in the background, leaving no footprint on the target. They're perfect for stealthy reconnaissance workflows and OSINT-based enumeration.
---
### π Why This Architecture Works
- β
**All-in-one file** means simpler code navigation and faster debugging
- β
**Class-based design** provides modularity and clarity
- β
**Streamlit frontend** offers interactivity without extra complexity
- β
**GhostPath integration** brings passive recon into your active workflow
---
## π οΈ Installation & Usage
### Prerequisites
Ensure you have **Python 3.x** installed.
### Clone the Repository
```bash
git clone https://github.com/atharvbyadav/ReconX.git
cd ReconX
````
### Install Dependencies
```bash
pip install -r requirements.txt
```
### Launch the App
```bash
streamlit run ReconX.py
```
---
## π Usage Guide
### πΈ Port Scanning
Enter the **Target IP**, hit **Scan** and see open ports, banners and potential risks.
### πΈ OS Fingerprinting
Enter an IP and run detection to infer the OS type.
### πΈ WHOIS Lookup
Enter a domain or IP to view WHOIS data.
### πΈ Reverse DNS Lookup
Reverse resolve an IP to any registered domain.
### πΈ DNS Enumeration
Enter a domain name to pull DNS records.
### πΈ GhostPath (Passive Recon)
Use **crt.sh** and **Wayback Machine** to uncover historical data and subdomains.
---
## β οΈ Disclaimer
This tool is for **educational and authorized security research purposes only**. Scanning networks you don't own or lack permission to test is **illegal**.
Use responsibly. Stay ethical.
---
## π License
This project is licensed under the **BSD 3-Clause License**.
See the [LICENSE](LICENSE) file for full details.
---
## π€ Contributing
Contributions are welcome!
Feel free to **fork this repo**, improve or expand features and open a **pull request**.
Have ideas? Open an issue or reach out via the contact links below.
---
## π¬ Contact
- **π¨βπ» Author**: Atharv Yadav
- **π§ Email**: [uuwr5t1s@duck.com](mailto:uuwr5t1s@duck.com)
_Looks suspicious? Good. Itβs mine. The ducks work for me. π¦π»_
- **π Website**: [atharvbyadav.github.io](https://atharvbyadav.github.io)
- **π GitHub**: [@atharvbyadav](https://github.com/atharvbyadav)
- **π§ Connect**: [LinkedIn](https://www.linkedin.com/in/atharvbyadav/) Β· [X](https://x.com/AtharvYadavB)
> *"Collaboration is the backbone of innovation. Letβs build better tools together."*
---