An open API service indexing awesome lists of open source software.

https://github.com/ivan-sincek/auto-recon

Not another auto-reconnaissance framework.
https://github.com/ivan-sincek/auto-recon

bug-bounty ethical-hacking offensive-security open-source-intelligence osint penetration-testing python reconnaissance red-team-engagement security threat-intelligence web-penetration-testing

Last synced: about 1 month ago
JSON representation

Not another auto-reconnaissance framework.

Awesome Lists containing this project

README

          

# Auto Recon

A custom-built OSINT framework, which is designed to streamline and automate various reconnaissance tasks.

This tool requires significant setup and configuration and will likely not work out of the box unless it is built and installed from the Dockerfile.

The following information is collected:

* [TXT files](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L32)
* [JSON files](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L93)

The list of tools used can be found [here](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L159).

## Table of Contents

* [How to Install](#how-to-install)
* [Build and Install From Dockerfile](#build-and-install-from-the-dockerfile)
* [How to Run](#how-to-run)
* [Usage](#usage)
* [Images](#images)

## How to Install

### Build and Install From the Dockerfile

```bash
git clone https://github.com/ivan-sincek/auto-recon && cd auto-recon

docker build --no-cache -t auto-recon:1.1.0 .
```

## How to Run

```bash
mkdir workdir # place all your wordlists here

docker run --rm -it -v "./workdir:/home/auto-recon" auto-recon:1.1.0 -d example.com -o results

docker run --rm -it -v "./workdir:/home/auto-recon" auto-recon:1.1.0 -d example.com -o results -s subdomains.txt -r resolvers.txt -w wordlist.txt
```

## Usage

```fundamental
Auto Recon v1.1.0 ( github.com/ivan-sincek/auto-recon )

Usage: auto-recon -d domain -o out [-s subdomains ] [-r resolvers ] [-w wordlist ]
Example: auto-recon -d example.com -o results [-s subdomains.txt] [-r resolvers.txt] [-w wordlist.txt]

DESCRIPTION
Not another auto-reconnaissance framework
DOMAIN
Fully qualified domain name to search
-d, --domain = example.com | etc.
EXCLUSIONS
File containing [wildcard] domains, subdomains, and IPs to exclude from the scope
If restoring a session, the exclusions file from the output directory has priority over the specified file
-e, --exclusions = exclusions.txt | etc.
NO FILTERING
Do not limit the scope to the FQDN
Exclusions are still being respected
-nf, --no-filtering
SUBDOMAINS
File containing subdomains to brute force DNS records
-s, --subdomains = subdomains.txt | etc.
RESOLVERS
File containing trusted DNS resolvers to resolve DNS records
-r, --resolvers = resolvers.txt | etc.
WORDLIST
Wordlist to brute force URL paths
-w, --wordlist = wordlist.txt | etc.
COLLABORATOR
Collaborator URL
-c, --collaborator = https://xyz.interact.sh | https://xyz.burpcollaborator.net | etc.
THREADS
Number of parallel tools to run per stage
Default: 5
-th, --threads = 10 | etc.
OUT
Output directory
-o, --out = results | etc.
RESTORE SESSION
Restore the session from the last breakpoint
-rs, --restore-session
```

## Images

Runtime

Figure 1 - Runtime

Collected Results

Figure 2 - Collected Results

Specific Results Example

Figure 3 - Specific Results Example