Skip to content

AutoRecon automates server and domain reconnaissance, making it easier for penetration testers to gather information quickly. With real-time HTML report updates and cross-platform support, it simplifies the reconnaissance process. 🛠️💻

Notifications You must be signed in to change notification settings

Codesignseo/AutoRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AutoRecon: Automated Server and Domain Reconnaissance Utility 🕵️‍♂️

GitHub release

Welcome to AutoRecon! This utility simplifies the process of server and domain reconnaissance for penetration testers and security specialists. It combines popular reconnaissance tools into one script, collects results, and presents them in a user-friendly HTML report that updates dynamically in your browser.

Table of Contents

Features

  • Automated Reconnaissance: Run multiple tools with a single command.
  • Dynamic HTML Report: View results in real-time within your browser.
  • User-Friendly Interface: Easy navigation and clear presentation of data.
  • Comprehensive Toolset: Integrates widely-used reconnaissance tools.
  • Customizable: Adjust settings to fit your specific needs.

Getting Started

To get started with AutoRecon, you can download the latest release from our Releases page. Download the appropriate file, execute it, and follow the instructions below to set it up on your system.

Installation

Prerequisites

Before installing AutoRecon, ensure you have the following tools installed:

  • Python 3.x
  • pip (Python package installer)

Step-by-Step Installation

  1. Clone the Repository:

    git clone https://github.com/Codesignseo/AutoRecon.git
    cd AutoRecon
  2. Install Required Packages:

    pip install -r requirements.txt
  3. Download the Latest Release: Visit our Releases page to download the latest version. Execute the downloaded file to complete the installation.

Usage

To run AutoRecon, use the following command in your terminal:

python autorecon.py <target_domain_or_ip>

Replace <target_domain_or_ip> with the domain or IP address you want to analyze. AutoRecon will initiate the reconnaissance process, launching the integrated tools and generating the report.

Example Command

python autorecon.py example.com

Supported Tools

AutoRecon integrates the following tools for comprehensive reconnaissance:

  • Nmap: Network scanning tool to discover hosts and services.
  • Nikto: Web server scanner that tests for vulnerabilities.
  • Gobuster: Directory and file brute-forcing tool.
  • Subfinder: Subdomain discovery tool.
  • WhatWeb: Web technology detection tool.
  • Nuclei: Fast and flexible vulnerability scanner.

These tools work together to provide a thorough analysis of the target.

Report Generation

Once the reconnaissance is complete, AutoRecon generates an HTML report. This report displays the results from all tools used, making it easy to review findings.

Accessing the Report

After the script finishes running, open the generated HTML file in your browser. The report will automatically update as the tools finish their tasks.

Contributing

We welcome contributions to AutoRecon! If you have suggestions, bug fixes, or new features, please follow these steps:

  1. Fork the repository.
  2. Create a new branch for your feature or fix.
  3. Make your changes and commit them.
  4. Push your branch to your forked repository.
  5. Open a pull request.

Your contributions help improve AutoRecon for everyone.

License

This project is licensed under the MIT License. See the LICENSE file for details.

Contact

For any inquiries or feedback, feel free to reach out:

Thank you for using AutoRecon! Visit our Releases page for the latest updates and tools.

About

AutoRecon automates server and domain reconnaissance, making it easier for penetration testers to gather information quickly. With real-time HTML report updates and cross-platform support, it simplifies the reconnaissance process. 🛠️💻

Topics

Resources

Stars

Watchers

Forks

Packages

No packages published

Contributors 2

  •  
  •  

Languages