Reconnaissance Framework
π
Flying low, scanning high π
Quick Start β’ Features β’ Modules β’ Installation β’ Usage β’ Contributing
FalconRecon is a powerful, lightweight Bash-based reconnaissance automation framework designed for penetration testers and security researchers. It chains together industry-standard tools into an elegant workflow with a distinctive Egyptian falcon theme.
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β π
ββββββββ ββββββ βββ βββββββ ββββββ ββββ βββ β
β βββββββββββββββββββ βββββββββββββββββββββ βββ β
β ββββββ βββββββββββ βββ βββ βββββββββ βββ β
β ββββββ βββββββββββ βββ βββ βββββββββββββ β
β βββ βββ ββββββββββββββββββββββββββββββ ββββββ π
β
β βββ βββ βββββββββββ βββββββ ββββββ βββ βββββ β
β π² R E C O N N A I S S A N C E F R A M E W O R K π² β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
| Feature | Description |
|---|---|
| π Subdomain Discovery | Enumerate subdomains using subfinder |
| πͺ½ Live Host Detection | Probe HTTP/HTTPS with httpx + tech detection |
| π Screenshot Capture | Visual recon with gowitness |
| ποΈ Port Scanning | Top 1000 ports with nmap + service detection |
| π Directory Bruteforce | Find hidden paths with gobuster |
| π Technology Detection | Identify tech stacks automatically |
| οΏ½ URL Crawling | Deep crawl with katana |
| π‘ DNS Reconnaissance | Full DNS record enumeration + WHOIS |
| π Vulnerability Scanning | Automated vuln detection with nuclei |
| π HTML Reports | Beautiful, shareable reports |
| π² Config File Support | Customizable settings |
# Clone the repository
git clone https://github.com/falcon0x1/FalconRecon.git
cd FalconRecon
# Make scripts executable
chmod +x FalconRecon.sh setup_tools.sh
# Install dependencies
./setup_tools.sh
# Run FalconRecon
./FalconRecon.sh- OS: Linux (Debian/Ubuntu/Kali/Arch) or macOS
- Bash: Version 4.0+
- Go: 1.19+ (for go-based tools)
git clone https://github.com/falcon0x1/FalconRecon.git
cd FalconRecon
chmod +x *.sh
./setup_tools.shcurl -sL https://raw.githubusercontent.com/falcon0x1/FalconRecon/main/FalconRecon.sh -o FalconRecon.sh && \
curl -sL https://raw.githubusercontent.com/falcon0x1/FalconRecon/main/setup_tools.sh -o setup_tools.sh && \
chmod +x *.sh && ./setup_tools.shThe setup_tools.sh script automatically installs:
| Tool | Purpose |
|---|---|
subfinder |
Subdomain enumeration |
httpx |
HTTP probing & tech detection |
gowitness |
Screenshot capture |
nmap |
Port scanning |
gobuster |
Directory bruteforce |
katana |
Web crawling |
nuclei |
Vulnerability scanning |
jq |
JSON processing |
dig |
DNS queries |
whois |
WHOIS lookups |
./FalconRecon.shYou'll be prompted for a target domain, then presented with an interactive menu:
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β π
F A L C O N R E C O N β
β βββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ£
β π² RECONNAISSANCE MODULES β
β [1] π
Full Auto Scan [6] π
Directory Brute β
β [2] π
Subdomain Hunter [7] π
Tech Detection β
β [3] πͺ½ Live Host Probe [8] οΏ½ URL Crawler β
β [4] π
Screenshot Capture [9] π Vuln Scan β
β [5] ποΈ Port Scanner [10] π‘ DNS Recon β
β π² UTILITIES β
β [11] π
Generate Report [12] π€ View Summary β
β [13] π² Settings [0] Exit β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
results/
βββ target.com/
βββ subdomains.txt # Discovered subdomains
βββ live.txt # Live hosts
βββ live_details.json # Detailed host info
βββ ports.txt # Port scan results
βββ ports.xml # Nmap XML output
βββ dns_recon.txt # DNS records
βββ tech_summary.txt # Technology stack
βββ vulnerabilities.txt # Found vulnerabilities
βββ dirs_*.txt # Directory listings
βββ urls_*.txt # Crawled URLs
βββ report.html # HTML report
βββ falconrecon.log # Session log
βββ screens/ # Screenshots
Create a config file at ~/.falconrecon.conf:
# π
FalconRecon Configuration
# Thread count for parallel operations
THREADS=50
# Enable verbose logging
VERBOSE=false
# Log file path (empty = default)
LOG_FILE=""
# Custom wordlist path
CUSTOM_WORDLIST="/path/to/wordlist.txt"Or use the in-app settings menu (option [13]).
Contributions are welcome! See CONTRIBUTING.md for guidelines.
- Fork the repository
- Create a feature branch (
git checkout -b feature/amazing-feature) - Commit your changes (
git commit -m 'Add amazing feature') - Push to the branch (
git push origin feature/amazing-feature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file for details.
- ProjectDiscovery for subfinder, httpx, katana, nuclei
- Sensepost for gowitness
- OJ Reeves for gobuster
- The security community for inspiration
Mahmoud Elshorbagy
- GitHub: @falcon0x1
π
FalconRecon v2.0
π
Flying low, scanning high π



