Skip to content

ReconRaptor is a comprehensive web application and network penetration testing tool that combines web scanning, network reconnaissance, and vulnerability assessment capabilities.

License

Notifications You must be signed in to change notification settings

hackpathinstitute/ReconRaptor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

2 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

ReconRaptor

ReconRaptor is a comprehensive web application and network penetration testing tool that combines web scanning, network reconnaissance, and vulnerability assessment capabilities.

Features

  • 🌐 Web Application Scanning

    • Website information gathering
    • Technology stack detection
    • Server fingerprinting
    • Headers analysis
    • Directory and file enumeration (coming soon)
    • Login form brute-forcing (coming soon)
  • πŸ” Advanced Network Scanning

    • Port scanning and service detection
    • Operating system fingerprinting
    • Service version detection
    • NSE (Nmap Scripting Engine) vulnerability scanning
    • Aggressive scanning mode for detailed enumeration
    • Customizable port ranges and scan types
  • 🎯 Host Discovery

    • Network range scanning (CIDR format)
    • Multiple discovery methods (ICMP, ARP, TCP SYN/ACK, UDP)
    • MAC address and vendor detection
    • Hostname resolution
    • Comprehensive host enumeration
  • πŸ“Š Reporting

    • Detailed HTML reports
    • JSON raw data export
    • Summary reports with key findings
    • Network scan results integration
    • Host discovery results


πŸ“¦ Installation

Prerequisites

  • Python 3.8 or higher
  • Linux-based operating system
  • pip package manager
  • python3-venv package
  • python3-full package

Installation Steps

  1. Install required system packages:
# Update package lists
sudo apt update

3. Install system dependencies:
```bash
# For Debian/Ubuntu
sudo apt-get install nmap

# For RHEL/CentOS
sudo yum install nmap

# For macOS
brew install nmap

# Install required packages
sudo apt install -y python3-venv python3-full python3-pip
  1. Clone the repository:
git clone https://github.com/yourusername/ReconRaptor.git
cd ReconRaptor
  1. Create and activate a virtual environment:
# Create virtual environment
python3 -m venv .venv

# Activate virtual environment
source .venv/bin/activate  # For Linux/macOS
# or
.\venv\Scripts\activate  # For Windows

# Verify you're using the virtual environment's Python
which python  # Should show path to .venv/bin/python
  1. Install dependencies in the virtual environment:
# Upgrade pip in the virtual environment
python -m pip install --upgrade pip

# Install dependencies
python -m pip install -r requirements.txt
  1. Verify installation:
python -m reconraptor.interface --version

## Usage

### Basic Usage

```bash
python3 reconraptor.py target.com

Network Scanning Options

  1. Basic Network Scan
# Scan with default options (common ports)
python3 reconraptor.py target.com

# Scan specific ports
python3 reconraptor.py target.com --ports "80,443,8080"

# Scan port range
python3 reconraptor.py target.com --ports "1-1000"
  1. Advanced Network Scanning
# Enable aggressive scanning (includes OS detection and NSE scripts)
python3 reconraptor.py target.com --aggressive

# Network-only scan (skip web application scanning)
python3 reconraptor.py target.com --skip-web

# Custom port range with aggressive scanning
python3 reconraptor.py target.com --aggressive --ports "1-65535"
  1. Host Discovery
# Scan network range with all discovery methods
python3 reconraptor.py 192.168.1.0/24 --network-scan

# Use specific discovery method
python3 reconraptor.py 192.168.1.0/24 --network-scan --discovery ping

# Scan IP range with ARP
python3 reconraptor.py 192.168.1.1-254 --network-scan --discovery arp

# Combine host discovery with aggressive scanning
python3 reconraptor.py 192.168.1.0/24 --network-scan --discovery all --aggressive
  1. Selective Scanning
# Web-only scan (skip network scanning)
python3 reconraptor.py target.com --skip-network

# Skip banner and disclaimer
python3 reconraptor.py target.com --no-banner

Additional Options

# Set custom output directory
python3 reconraptor.py target.com --output /path/to/reports

# Set custom timeout
python3 reconraptor.py target.com --timeout 30

# Set number of threads
python3 reconraptor.py target.com --threads 20

Network Scanning Features

The network scanning module includes:

  1. Host Discovery Methods

    • ICMP Echo (ping)
    • ARP Scanning
    • TCP SYN/ACK Ping
    • UDP Ping
    • Comprehensive (all methods)
  2. Network Range Support

    • CIDR notation (e.g., 192.168.1.0/24)
    • IP ranges (e.g., 192.168.1.1-254)
    • Single IP addresses
  3. Host Information

    • IP address
    • Hostname resolution
    • MAC address detection
    • Vendor identification
    • Status (up/down)
  4. Service Detection

    • Accurate service version detection
    • Product and version information
    • CPE (Common Platform Enumeration) data
  5. OS Detection

    • Operating system fingerprinting
    • OS version detection
    • Accuracy ratings
  6. NSE Script Scanning

    • Default scripts
    • Vulnerability detection
    • Authentication testing
    • SSL/TLS analysis
    • Banner grabbing
  7. Aggressive Scanning

    • Comprehensive host enumeration
    • Advanced service probing
    • More detailed OS detection
    • Additional NSE scripts

Report Types

  1. Summary Report

    • Overview of all scans
    • Key findings and statistics
    • Module execution status
  2. Network Scan Report

    • Open ports and services
    • OS detection results
    • Service versions
    • Vulnerability findings
  3. Raw Data Export

    • JSON format
    • Complete scan results
    • Detailed technical information

Legal Disclaimer

This tool is for educational and authorized penetration testing purposes ONLY. Unauthorized use against systems you don't own or have explicit permission to test is illegal and unethical.

By using ReconRaptor, you agree to:

  1. Use it only for legal and authorized testing
  2. Not use it for malicious purposes
  3. Take full responsibility for your actions

License

[Insert your chosen license here]

Contributing

Contributions are welcome! Please feel free to submit a Pull Request.

🚨 Legal Disclaimer

IMPORTANT: This tool is intended for educational purposes and authorized penetration testing only. Unauthorized use against systems you do not own or have explicit permission to test is illegal and unethical. By using this tool, you agree to:

  • Use it only for legal and authorized testing
  • Not use it for malicious purposes
  • Take full responsibility for your actions

πŸ› οΈ Core Features

1. Website Information Scanner

  • Server headers analysis
  • HTTP status checking
  • IP address resolution
  • Technology stack detection
  • Content-Type analysis
  • Server software identification

2. Directory & File Bruteforcing

  • Custom wordlist support
  • Threaded scanning for performance
  • Status code analysis (200, 301, 302, 403, 404)
  • Response size analysis
  • Title extraction
  • Common directory detection

3. Login Brute-Force (Safe Mode)

  • Form-based login testing
  • Lockout detection
  • Rate limiting
  • Custom username/password lists
  • Session handling
  • CSRF token support

4. Basic Vulnerability Scanner

  • SQL injection detection
  • XSS vulnerability checking
  • Common misconfigurations
  • Security headers analysis
  • SSL/TLS configuration checks

5. Report Generator

  • Structured .txt reports
  • Detailed findings documentation
  • Timestamp and metadata
  • Vulnerability classification
  • Recommendations

### Troubleshooting

If you encounter the "externally-managed-environment" error:
1. Make sure you've activated the virtual environment (you should see `(.venv)` in your prompt)
2. Verify you're using the correct pip:
```bash
which pip  # Should show path to .venv/bin/pip
  1. If the error persists, try:
python -m pip install --user -r requirements.txt

Deactivating the Virtual Environment

When you're done using ReconRaptor, you can deactivate the virtual environment:

deactivate

Note for Future Use

Always activate the virtual environment before using ReconRaptor:

cd /path/to/ReconRaptor
source .venv/bin/activate  # For Linux/macOS
# or
.\venv\Scripts\activate  # For Windows

πŸš€ Usage Guide

Basic Usage

# Method 1: Using the Python module
python -m reconraptor.interface https://example.com

# Method 2: Using the reconraptor.py script
python reconraptor.py https://example.com

# Method 3: Making the script executable
chmod +x reconraptor.py
./reconraptor.py https://example.com

Advanced Usage

# Full scan with all options
python reconraptor.py https://example.com \
    --wordlist /path/to/wordlist.txt \
    --threads 20 \
    --login-url https://example.com/login \
    --timeout 15 \
    --output ./scan_results

# Skip banner display
python reconraptor.py https://example.com --no-banner

# Show version
python reconraptor.py --version

Command Line Arguments

Argument Description Default
target Target URL to scan Required
--wordlist Path to wordlist file None
--login-url Login URL for brute-force testing None
--threads Number of concurrent threads 10
--timeout Request timeout in seconds 10
--output Output directory for reports ./reports
--no-banner Skip banner display False
--version Show version and exit N/A

Example Scenarios

  1. Basic website scan:
python -m reconraptor.interface https://example.com
  1. Directory brute-forcing:
python -m reconraptor.interface https://example.com --wordlist /usr/share/wordlists/dirb/common.txt
  1. Login form testing:
python -m reconraptor.interface https://example.com --login-url https://example.com/login

πŸ”§ Configuration

The tool can be configured through:

  • Command line arguments
  • Environment variables
  • Configuration file (coming soon)

πŸ“ Report Format

Reports are generated in the following structure:

reports/
β”œβ”€β”€ scan_20240101_120000/
β”‚   β”œβ”€β”€ website_info.txt
β”‚   β”œβ”€β”€ directories.txt
β”‚   β”œβ”€β”€ vulnerabilities.txt
β”‚   └── summary.txt

🀝 Contributing

Contributions are welcome! Please read our contributing guidelines before submitting pull requests.

πŸ“ License

This project is licensed under the MIT License - see the LICENSE file for details.

⚠️ Security Notice

  • This tool is for educational purposes only
  • Always obtain proper authorization before testing
  • Respect rate limits and system resources
  • Do not use against production systems without permission

πŸ“ž Support

For support, please:

  1. Check the documentation
  2. Open an issue on GitHub
  3. Join our community discussions

Made with ❀️ by the ReconRaptor Team

About

ReconRaptor is a comprehensive web application and network penetration testing tool that combines web scanning, network reconnaissance, and vulnerability assessment capabilities.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages