ReconRaptor is a comprehensive reconnaissance tool designed to perform extensive scanning and enumeration of domains and subdomains. It integrates various open-source tools and APIs to provide detailed information about the target.
- Subdomain enumeration using multiple APIs and SubFinder
- URL fetching using Waymore
- Subdomain takeover detection
- JavaScript exposure scanning
- Live host filtering
- Port scanning using Naabu
- Exposed panel detection
- Reflection scanning
- GF pattern-based scanning
- XSS scanning using Dalfox
- Fuzzing with ffuf
- SQL injection scanning with sqlmap
- Send Results file and logs to your discord server using discord webhook url you can yours to web webhook at
DISCORD_WEBHOOK="" # Here Add your webhook
Make sure you have the following tools installed:
- subfinder
- httpx
- waymore
- subov88r
- nuclei
- naabu
- kxss
- qsreplace
- gf
- dalfox
- ffuf
- interlace
- urldedupe
bash setup.sh
git clone https://github.com/h0tak88r/ReconRaptor.git
cd ReconRaptor
git clone https://github.com/1ndianl33t/Gf-Patterns
mkdir -p ~/.gf
cp Gf-Patterns/*.json ~/.gf
echo 'source $GOPATH/src/github.com/tomnomnom/gf/gf-completion.bash' >> ~/.bashrc
source ~/.bashrc
./reconraptor.sh <target_domain> [-s single_subdomain]
<target_domain>
: The main domain to be scanned.-s single_subdomain
: (Optional) Specify a single subdomain to scan.
-
Scan a domain:
./reconraptor.sh example.com
-
Scan a single subdomain:
./reconraptor.sh example.com -s sub.example.com
Results are saved in the results
directory, which is recreated for each run.
All log messages are saved to reconraptor.log
.
This project is licensed under the MIT License.
Contributions are welcome! Please fork the repository and create a pull request.