https://github.com/kunshdeep2812/reco
Recon tool for pen-tester's
https://github.com/kunshdeep2812/reco
bugbounty cidr-range hacking pentester recon reconnaissance scanner screenshots subdomain vhost vhost-finder web-security websocket
Last synced: 7 months ago
JSON representation
Recon tool for pen-tester's
- Host: GitHub
- URL: https://github.com/kunshdeep2812/reco
- Owner: kunshdeep2812
- License: gpl-3.0
- Created: 2020-04-06T06:29:09.000Z (over 5 years ago)
- Default Branch: master
- Last Pushed: 2021-09-09T04:16:31.000Z (about 4 years ago)
- Last Synced: 2024-04-18T08:00:16.576Z (over 1 year ago)
- Topics: bugbounty, cidr-range, hacking, pentester, recon, reconnaissance, scanner, screenshots, subdomain, vhost, vhost-finder, web-security, websocket
- Language: Ruby
- Homepage:
- Size: 160 KB
- Stars: 19
- Watchers: 4
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Reco... (version 0.0.1)
[](https://travis-ci.org/kunshdeep2812/reco) [](https://github.com/kunshdeep2812/reco/pulse) [](https://github.com/kunshdeep2812/reco/graphs/contributors) [](https://github.com/kunshdeep2812/reco/blob/master/LICENSE)
[](https://www.ruby-lang.org/en/)
###
A recon tool for pentester's with a simple command line. [](https://github.com/kunshdeep2812?tab=followers) [](https://github.com/kunshdeep2812/reco/stargazers) [](https://github.com/kunshdeep2812/reco/watchers) [](https://twitter.com/KandpalDeepk)
### Features:-
> - Range scan of ip's (CIDR range, custom provided range)
> - Validate working subdomain/Ip's for provided raw list
> - Web portal port scan on IP-range/Domain's(port based vhost)
> - Vhost finder(on domain name and IP based)
> - Echo test of websocket to check cross site websocket hijacking
> - Deep Redirection url check
> - Working domain Screenshot's
### Upcoming features:-
> - Subdomain finder, deep recon interface, some common exploits.
### Installation & Usage
```sh
git clone https://github.com/kunshdeep2812/reco.git
cd reco
sudo bash ./install.sh
ruby reco.rb --help/-h
```
##### Note:-
If you are using the "rbenv" then run the ```install.sh``` file without ```sudo``` or perform the installation task manually of each command in ```install.sh```.### Options
```ruby
Usage: ruby reco.rb --script [OPTIONS] ..[OPTIONS]How to use: reco.rb --script rangescan -s 192.0.0.1 -e 192.0.0.255 --thread 10
How to use: reco.rb --script portscan --ip 192.168.0.6 --scantype custom -p 80,443,23 --thread 40
How to use: reco.rb --script rangescan -r 192.168.0.1/24 -o test.csv --thread 10
How to use: reco.rb --script portscan --iL /home/test/example.txt --randomagent true --thread 50 -o example.txt
How to use: reco.rb --script echotest --socketurl wss://example.com
How to use: reco.rb --helpFor more please check the commands.txt file
Options:
-s, --startIPAddress Provide Starting IPaddress
-e, --endIPAddress Provide ending IPaddress
-o, --output Provide filename with extension(.txt)
-w, --wordlist Provide filename which contains wordlist
-d, --domain Provide domain name for bruteforce subdomain
-r, --ipRange Provide IpAddress Range (e.g.: 192.0.168.1/24)
--randomagent For random user-agent, set --randomagent true
--socketurl Provide socket initiation url
--iL provide the list of ipaddress/domain-name file
--ip provide single Ip
--thread provide number of threads
--script provide specific script name
--scantype provide port scan type (full, top, custom)
-p, --port Provide single or multiple port to scan
-h, --help Help Menu
--scriptlist List of scripts or modules```
### Operating Systems supported
> - Linux
###### Note:-
This tool work in kali(2020.1) perfectly! no lengthy process for installation, just run ```sudo bash ./install.sh ```.
If you are useing ```Non-GUI``` version of linux install web ```chromedriver``` manually to run ```selenium```--> https://chromedriver.chromium.org/.### Screenshots:-

# License
See the LICENSE file. [](https://github.com/kunshdeep2812/reco/)