Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/markgacoka/r3c0n
A tool for performing reconnaissance on web targets in Python
https://github.com/markgacoka/r3c0n
bugbounty cybersecurity library python recon reconnaissance reconnaissance-framework
Last synced: 22 days ago
JSON representation
A tool for performing reconnaissance on web targets in Python
- Host: GitHub
- URL: https://github.com/markgacoka/r3c0n
- Owner: markgacoka
- License: mit
- Created: 2022-02-07T10:22:08.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2022-03-06T16:25:19.000Z (almost 3 years ago)
- Last Synced: 2024-10-29T01:30:21.143Z (about 2 months ago)
- Topics: bugbounty, cybersecurity, library, python, recon, reconnaissance, reconnaissance-framework
- Language: Python
- Homepage: https://pypi.org/project/r3c0n/
- Size: 31.3 KB
- Stars: 3
- Watchers: 2
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-hacking-lists - markgacoka/r3c0n - A tool for performing reconnaissance on web targets in Python (Python)
README
# r3c0n
A tool for performing reconnaissance on web targets in Python.### Description
The tool is designed to integrate into your automation workflow for the reconnaissance stage. Given an engine and an in-scope domain, `r3c0n` returns the subdomains and directories associated with the domain.#### Supported Engines
| Engine | Importation | API Key |
| ----------- | ----------- | ------- |
| All engines | `from r3c0n.engines.all import All` | Free (default) |
| Anubis | `from r3c0n.engine.anubis import Anubis` | Free |
| HackerTarget| `from r3c0n.engine.hacker_target import HackerTarget` | Free |
| OpenThreat | `from r3c0n.engine.open_threat import OpenThreat` | Free |
| ProjectSonar| `from r3c0n.engine.project_sonar import ProjectSonar` | Free |
| Riddler | `from r3c0n.engine.riddler import Riddler` | Paid |
| Shodan | `from r3c0n.engine.shodan import Shodan` | Free Trial/Paid |
| ThreatCrowd | `from r3c0n.engine.threatcrowd import ThreatCrowd` | Free |
| VirusTotal | `from r3c0n.engine.virustotal import VirusTotal` | Free/Paid |More examples below at Usage.
### Installation
```
pip install r3c0n
```### Run tests
```
python tests/test_cleanup.py
```### Usage
#### Single import
```python
from r3c0n.engines.anubis import Anubisdomain = 'coda.io'
subdomains = Anubis(domain).subdomains()
print(subdomains)> ['www.coda.io', 'dev.coda.io', 'blog.coda.io', 'cdn.coda.io', 'staging.coda.io', 'help.coda.io', 'data.coda.io', 'go.coda.io', 'community.coda.io', 'status.coda.io', 'auth.coda.io', 'bounce.coda.io']
```#### Multiple imports
```python
from r3c0n.engines.anubis import Anubis
from r3c0n.engines.hacker_target import HackerTargetdomain = 'coda.io'
subdomains = set()
subdomains = set.union(subdomains, set(Anubis(domain).subdomains()))
subdomains = set.union(subdomains, set(HackerTarget(domain).subdomains()))
print(list(subdomains))> ['bounce.coda.io', 'staging.coda.io', 'data.coda.io', 'cdn.coda.io', 'auth.coda.io', 'dev.coda.io', 'adhoc.coda.io', 'go.coda.io', 'coda.io', 'head.coda.io', 'community.coda.io', 'status.coda.io', 'blog.coda.io', 'www.coda.io', 'help.coda.io', 'maze.coda.io']
```#### Running from the Terminal
```bash
# Prints the subdomains from all the engines on the terminal
r3c0n -d coda.io --engines=all# Outputs the subdomains found from specific engines to a file
r3c0n -d coda.io --engines=anubis,hackertarget --output subdomains.txt
```