https://github.com/ivan-sincek/auto-recon
Not another auto-reconnaissance framework.
https://github.com/ivan-sincek/auto-recon
bug-bounty ethical-hacking offensive-security open-source-intelligence osint penetration-testing python reconnaissance red-team-engagement security threat-intelligence web-penetration-testing
Last synced: 3 days ago
JSON representation
Not another auto-reconnaissance framework.
- Host: GitHub
- URL: https://github.com/ivan-sincek/auto-recon
- Owner: ivan-sincek
- License: mit
- Created: 2021-07-05T10:26:47.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2025-06-09T20:30:53.000Z (4 months ago)
- Last Synced: 2025-10-01T11:41:13.723Z (6 days ago)
- Topics: bug-bounty, ethical-hacking, offensive-security, open-source-intelligence, osint, penetration-testing, python, reconnaissance, red-team-engagement, security, threat-intelligence, web-penetration-testing
- Language: Python
- Homepage:
- Size: 503 KB
- Stars: 2
- Watchers: 0
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Auto Recon
This is my personal, custom-built OSINT framework, designed to streamline and automate various reconnaissance tasks.
This tool requires significant setup and configuration, so it likely won't work out of the box for you.
I plan to containerize the framework and provide a Docker image in the future.
The following information is being collected: [TXT files](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L32) and [JSON files](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L90).
The list of tools used can be found [here](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L156).
## Table of Contents
* [How to Install](#how-to-install)
* [Build and Install From the Source](#build-and-install-from-the-source)
* [Usage](#usage)
* [Images](#images)## How to Install
### Build and Install From the Source
```bash
git clone https://github.com/ivan-sincek/auto-recon && cd auto-reconpython3 -m pip install --upgrade build
python3 -m build
python3 -m pip install dist/auto_recon-1.0-py3-none-any.whl
```## Usage
```fundamental
Auto Recon v1.0 ( github.com/ivan-sincek/auto-recon )Usage: auto-recon -d domain -o out [-s subdomains ] [-r resolvers ] [-w wordlist ]
Example: auto-recon -d example.com -o results [-s subdomains.txt] [-r resolvers.txt] [-w wordlist.txt]DESCRIPTION
Not another auto-reconnaissance framework
DOMAIN
Fully qualified domain name to search
-d, --domain = example.com | etc.
EXCLUSIONS
File containing [wildcard] domains, subdomains, and IPs to exclude from the scope
If restoring a session, the exclusions file from the output directory has priority over the specified file
-e, --exclusions = exclusions.txt | etc.
NO FILTERING
Do not limit the scope to the FQDN
Exclusions are still being respected
-nf, --no-filtering
SUBDOMAINS
File containing subdomains to brute force DNS records
-s, --subdomains = subdomains.txt | etc.
RESOLVERS
File containing trusted DNS resolvers to resolve DNS records
-r, --resolvers = resolvers.txt | etc.
WORDLIST
Wordlist to brute force URL paths
-w, --wordlist = wordlist.txt | etc.
COLLABORATOR
Collaborator URL
-c, --collaborator = https://xyz.interact.sh | https://xyz.burpcollaborator.net | etc.
THREADS
Number of parallel tools to run per stage
Default: 5
-th, --threads = 10 | etc.
OUT
Output directory
-o, --out = results | etc.
RESTORE SESSION
Restore the session from the last breakpoint
-rs, --restore-session
```## Images
Figure 1 - Runtime
Figure 2 - Results
Figure 3 - Results Specific