Skip to content

imcoder44/Recon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 

Repository files navigation

🔍 Recon Automation Tool

license last‑commit issues

A Bash‑driven reconnaissance framework that automates common bug‑bounty and pentest recon tasks.
It wraps Nmap, Dirsearch, and crt.sh lookups (with room for more) into a single, modular workflow supporting:

  • multi‑domain scanning
  • interactive mode
  • selective scan modes (nmap-only, dirsearch-only, crt-only, all)
  • tidy per‑domain reports 🌐📄

📂 Directory Layout


Recon/
├── recon.sh             # Main launcher
├── scan.lib             # Function library (nmap / dirsearch / crt)
├── dirsearch/           # External clone of dirsearch (see setup below)
└── README.md


🚀 Quick Start

1. Clone

git clone https://github.com/imcoder44/Recon.git
cd Recon

2. Pull Dirsearch

git clone https://github.com/maurosoria/dirsearch.git

Leave the dirsearch/ folder inside the repo, or export its path (next step).

3. Install prerequisites

sudo apt update
sudo apt install nmap jq curl python3 -y

4. Make the script executable

chmod +x recon.sh

⚙️ Optional PATH tweak

To call dirsearch.py from anywhere:

export PATH="$PWD/dirsearch:$PATH"
# add the same line to ~/.bashrc for permanence

🏃‍♂️ Usage

Mode Command Description
Full scan ./recon.sh -m all example.com Runs Nmap + Dirsearch + crt.sh
Nmap only ./recon.sh -m nmap-only example.com Just ports
Dirsearch only ./recon.sh -m dirsearch-only example.com Directory brute‑force
crt.sh only ./recon.sh -m crt-only example.com Pull cert subdomains
Multi‑domain ./recon.sh -m all example.com test.com Batch scan
Interactive ./recon.sh -i -m all Type domains one‑by‑one, quit to exit

Tip: combine -i and specific modes for on‑the‑fly targeted scans.


📁 Output

Each target produces a folder:

example.com_recon/
├── nmap          # cleaned port list
├── dirsearch     # dirsearch simple report
├── crt           # raw JSON from crt.sh
└── report        # consolidated human‑readable report

🖼️ Screenshots

Replace these placeholder paths with your own images.

Screenshot 2025-07-10 233330 Screenshot 2025-07-10 233206

🧩 Extending

  • All scan logic lives in scan.lib – drop in new functions (e.g. subfinder_scan) and call them in recon.sh.
  • Use jq, grep, or custom parsers to normalise tool output before appending to the master report.

🔐 Legal

Use only on targets you own or have explicit permission to test. The author takes no responsibility for misuse.


🙌 Credits


📜 License

This project is released under the MIT License – see LICENSE for details.


### What changed vs. the previous draft?

1. **Clone URL:** now points to `https://github.com/imcoder44/Recon.git`.
2. **Badges:** added shields.io badges for license, last commit, and open issues.
3. **Username references:** switched to **imcoder44** everywhere.
4. **Minor polish:** tightened wording, clarified optional PATH step.


About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages