Skip to content

Bash-based reconnaissance automation script for pentesting

License

Notifications You must be signed in to change notification settings

falcon0x1/FalconRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

FalconRecon Banner

π“…ƒ FalconRecon

Reconnaissance Framework
π“…ƒ Flying low, scanning high π“…ƒ

Version License Platform Author

Quick Start β€’ Features β€’ Modules β€’ Installation β€’ Usage β€’ Contributing


Overview

FalconRecon is a powerful, lightweight Bash-based reconnaissance automation framework designed for penetration testers and security researchers. It chains together industry-standard tools into an elegant workflow with a distinctive Egyptian falcon theme.

╔══════════════════════════════════════════════════════════════════╗
β•‘     π“…ƒ  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ•—      β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•— β–ˆβ–ˆβ–ˆβ•—   β–ˆβ–ˆβ•—      β•‘
β•‘        β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•”β•β•β•β•β•β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•—β–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ•‘       β•‘
β•‘        β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—  β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•”β–ˆβ–ˆβ•— β–ˆβ–ˆβ•‘       β•‘
β•‘        β–ˆβ–ˆβ•”β•β•β•  β–ˆβ–ˆβ•”β•β•β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ•‘β•šβ–ˆβ–ˆβ•—β–ˆβ–ˆβ•‘       β•‘
β•‘        β–ˆβ–ˆβ•‘     β–ˆβ–ˆβ•‘  β–ˆβ–ˆβ•‘β–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•—β•šβ–ˆβ–ˆβ–ˆβ–ˆβ–ˆβ•”β•β–ˆβ–ˆβ•‘ β•šβ–ˆβ–ˆβ–ˆβ–ˆβ•‘  π“…ƒ   β•‘
β•‘        β•šβ•β•     β•šβ•β•  β•šβ•β•β•šβ•β•β•β•β•β•β• β•šβ•β•β•β•β•β• β•šβ•β•β•β•β• β•šβ•β•  β•šβ•β•β•β•       β•‘
β•‘       𓆲  R E C O N N A I S S A N C E   F R A M E W O R K  𓆲    β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Features

Feature Description
π“…ˆ Subdomain Discovery Enumerate subdomains using subfinder
πŸͺ½ Live Host Detection Probe HTTP/HTTPS with httpx + tech detection
π“…‡ Screenshot Capture Visual recon with gowitness
πŸ‘οΈ Port Scanning Top 1000 ports with nmap + service detection
π“…‚ Directory Bruteforce Find hidden paths with gobuster
π“…† Technology Detection Identify tech stacks automatically
οΏ½ URL Crawling Deep crawl with katana
πŸ“‘ DNS Reconnaissance Full DNS record enumeration + WHOIS
πŸ” Vulnerability Scanning Automated vuln detection with nuclei
π“…ƒ HTML Reports Beautiful, shareable reports
𓆲 Config File Support Customizable settings

Quick Start

# Clone the repository
git clone https://github.com/falcon0x1/FalconRecon.git
cd FalconRecon

# Make scripts executable
chmod +x FalconRecon.sh setup_tools.sh

# Install dependencies
./setup_tools.sh

# Run FalconRecon
./FalconRecon.sh

Installation

Prerequisites

  • OS: Linux (Debian/Ubuntu/Kali/Arch) or macOS
  • Bash: Version 4.0+
  • Go: 1.19+ (for go-based tools)

Option 1: Git Clone (Recommended)

git clone https://github.com/falcon0x1/FalconRecon.git
cd FalconRecon
chmod +x *.sh
./setup_tools.sh

Option 2: One-Liner

curl -sL https://raw.githubusercontent.com/falcon0x1/FalconRecon/main/FalconRecon.sh -o FalconRecon.sh && \
curl -sL https://raw.githubusercontent.com/falcon0x1/FalconRecon/main/setup_tools.sh -o setup_tools.sh && \
chmod +x *.sh && ./setup_tools.sh

Required Tools

The setup_tools.sh script automatically installs:

Tool Purpose
subfinder Subdomain enumeration
httpx HTTP probing & tech detection
gowitness Screenshot capture
nmap Port scanning
gobuster Directory bruteforce
katana Web crawling
nuclei Vulnerability scanning
jq JSON processing
dig DNS queries
whois WHOIS lookups

Usage

Interactive Mode

./FalconRecon.sh

You'll be prompted for a target domain, then presented with an interactive menu:

╔══════════════════════════════════════════════════════════════════╗
β•‘  π“…ƒ  F A L C O N   R E C O N                                      β•‘
╠══════════════════════════════════════════════════════════════════╣
β•‘  𓆲 RECONNAISSANCE MODULES                                       β•‘
β•‘   [1] π“…ƒ Full Auto Scan      [6] π“…‚ Directory Brute            β•‘
β•‘   [2] π“…ˆ Subdomain Hunter     [7] π“…† Tech Detection             β•‘
β•‘   [3] πŸͺ½ Live Host Probe      [8] οΏ½ URL Crawler                β•‘
β•‘   [4] π“…‡ Screenshot Capture   [9] πŸ” Vuln Scan                  β•‘
β•‘   [5] πŸ‘οΈ Port Scanner         [10] πŸ“‘ DNS Recon                 β•‘
β•‘  𓆲 UTILITIES                                                    β•‘
β•‘  [11] π“…ƒ Generate Report     [12] 𖀍 View Summary               β•‘
β•‘  [13] 𓆲 Settings            [0] Exit                       β•‘
β•šβ•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•β•

Output Structure

results/
└── target.com/
    β”œβ”€β”€ subdomains.txt      # Discovered subdomains
    β”œβ”€β”€ live.txt            # Live hosts
    β”œβ”€β”€ live_details.json   # Detailed host info
    β”œβ”€β”€ ports.txt           # Port scan results
    β”œβ”€β”€ ports.xml           # Nmap XML output
    β”œβ”€β”€ dns_recon.txt       # DNS records
    β”œβ”€β”€ tech_summary.txt    # Technology stack
    β”œβ”€β”€ vulnerabilities.txt # Found vulnerabilities
    β”œβ”€β”€ dirs_*.txt          # Directory listings
    β”œβ”€β”€ urls_*.txt          # Crawled URLs
    β”œβ”€β”€ report.html         # HTML report
    β”œβ”€β”€ falconrecon.log     # Session log
    └── screens/            # Screenshots

Configuration

Create a config file at ~/.falconrecon.conf:

# π“…ƒ FalconRecon Configuration

# Thread count for parallel operations
THREADS=50

# Enable verbose logging
VERBOSE=false

# Log file path (empty = default)
LOG_FILE=""

# Custom wordlist path
CUSTOM_WORDLIST="/path/to/wordlist.txt"

Or use the in-app settings menu (option [13]).


Screenshots

Click to expand

Main Menu

Main Menu

Full Scan Progress

Scan Progress

HTML Report

Report


Contributing

Contributions are welcome! See CONTRIBUTING.md for guidelines.

  1. Fork the repository
  2. Create a feature branch (git checkout -b feature/amazing-feature)
  3. Commit your changes (git commit -m 'Add amazing feature')
  4. Push to the branch (git push origin feature/amazing-feature)
  5. Open a Pull Request

License

This project is licensed under the MIT License - see the LICENSE file for details.


Acknowledgments


Contact

Mahmoud Elshorbagy


π“…ƒ FalconRecon v2.0
π“…ƒ Flying low, scanning high π“…ƒ

About

Bash-based reconnaissance automation script for pentesting

Resources

License

Contributing

Stars

Watchers

Forks

Packages

No packages published

Languages