Skip to content

mogbil/reconx

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 
 
 
 
 

Repository files navigation

ReconX — Web Server Reconnaissance Tool

ReconX

ReconX is an advanced passive reconnaissance tool for web servers. It performs deep analysis across control panel detection, SSL/TLS, HTTP headers, DNS enumeration, WAF/CDN fingerprinting, port scanning, endpoint discovery, and more — all in a single run.


Features

Module Description
Control Panel Detection Detects cPanel, CWP, Plesk, DirectAdmin, CyberPanel, Webmin, HestiaCP, ISPmanager, Ajenti
Vulnerability Check Known CVEs for each control panel
CMS Detection Identifies WordPress, Joomla, Drupal, Magento, PrestaShop, OpenCart, WooCommerce
SSL/TLS Analysis Protocol version, cipher strength, expiry, SAN, self-signed check, and A+ to F grading
HTTP Headers Audit Security headers audit (HSTS, CSP, X-Frame-Options…), server fingerprinting
WAF / CDN Detection Identifies Cloudflare, Sucuri, Akamai, Incapsula, Imunify360, and more
Cloudflare Real IP Bypasses Cloudflare to discover origin server IP
DNS & Subdomain Enum Resolves A, AAAA, MX, NS, TXT, CNAME records — enumerates common subdomains
DNS Zone Transfer Check Detects if DNS zone transfer is vulnerable
Certificate Transparency Discovers subdomains via crt.sh logs
Port Scanning Scans 30+ ports including FTP, SSH, SMTP, MySQL, cPanel, and more
Endpoint Discovery Probes sensitive paths like /.env, /.git/HEAD, /phpinfo.php
Risk Scoring Weighted 0–100 risk score with CRITICAL / HIGH / MEDIUM / LOW levels

Installation

git clone https://github.com/mogbil/reconx.git
cd client
pip install -r requirements.txt

Requirements

Python>=3.8
requests>=2.28.0

Usage

# Interactive mode (prompts for target)
python reconx.py

# With target as argument
python reconx.py example.com

# JSON output (for scripting)
python reconx.py example.com -j

# Save to file
python reconx.py example.com -o results.json

# Quiet mode (for scripts/CI)
python reconx.py example.com -q

# Custom API endpoint
python reconx.py example.com --url https://custom-domain.com

# Retry on failure
python reconx.py example.com -r 5

Options

Option Description
-j, --json Output raw JSON response
-q, --quiet Suppress banner and progress
-o, --output FILE Save output to file
--url URL Override base URL
-r, --retry N Number of retry attempts (default: 3)

Sample Output

  ____                     __  __
 |  _ \ ___  ___ ___  _ __ \ \/ /
 | |_) / _ \/ __/ _ \| '_ \ \  /
 |  _ <  __/ (_| (_) | | | |/  \
 |_| \_\___|\___\___/|_| |_/_/\_\

        ════════════════════════════════════════════════════════════════

                  [ Web Server Reconnaissance Tool ]
                  [ Version 1.0  |  Client Edition ]
                  [ By Mogbil Sourketti  |  info@wondtech.com ]

        ════════════════════════════════════════════════════════════════


  [ReconX] Sending request to server …

──────────────────────────────────────────────────────
  TARGET
──────────────────────────────────────────────────────
  URL                   https://example.com
  Host                  example.com
  Scan ID               rx_65abc1234.5678
  Duration              12.5s

──────────────────────────────────────────────────────
  CONTROL PANEL
──────────────────────────────────────────────────────
  Type                  cPanel
  [header_cpsrvd]       cpsrvd/11.122.2

  Vulnerabilities:
  ⚠ CVE-2022-44823 [high]
  ⚠ CVE-2022-44824 [high]

──────────────────────────────────────────────────────
  WAF / CDN
──────────────────────────────────────────────────────
  Protection            Cloudflare
  Real IP               192.168.1.1 (via MX record)

──────────────────────────────────────────────────────
  SSL / TLS
──────────────────────────────────────────────────────
  Grade                 A+
  Issuer                Let's Encrypt
  Days Until Exp.       87

──────────────────────────────────────────────────────
  CMS
──────────────────────────────────────────────────────
  Type                  WordPress
  Vulnerabilities:
  ⚠ CVE-2024-3144 [critical]

──────────────────────────────────────────────────────
  DNS ZONE TRANSFER
──────────────────────────────────────────────────────
  Status                Secure (blocked)

──────────────────────────────────────────────────────
  RISK ASSESSMENT
──────────────────────────────────────────────────────
  Score: 42/100  [MEDIUM]
  [████████░░░░░░░░░░░░]

     +20  cPanel detected
       ✔  WAF present
       ✔  TLS grade A+

Supported Control Panels

Panel Ports Vulnerabilities
cPanel 2082, 2083, 2086, 2087, 2095, 2096 CVE-2022-44823, CVE-2022-44824, CVE-2023-32487
CWP 2030, 2031, 2408 CVE-2023-31327, CVE-2023-31328, CVE-2024-25817
Plesk 8443, 8447, 8880 CVE-2022-42868, CVE-2023-28403, CVE-2024-23757
DirectAdmin 2222 CVE-2023-2637, CVE-2023-2638
CyberPanel 8090, 8091 CVE-2023-23498, CVE-2023-23499, CVE-2024-23169
Webmin 10000, 20000 CVE-2022-43945, CVE-2023-25179, CVE-2024-36401
ISPmanager 1500, 1501 CVE-2023-32788, CVE-2023-32789
HestiaCP 8083 CVE-2024-25818
Ajenti 8000, 8002 CVE-2022-26695, CVE-2023-26132

Supported CMS

CMS Key Files Vulnerabilities
WordPress /wp-login.php, /wp-admin/ CVE-2024-3144, CVE-2024-3145
Joomla /administrator/, /configuration.php CVE-2024-21780, CVE-2023-23752
Drupal /user/login, /sites/default/ CVE-2024-1596, CVE-2023-28252
Magento /admin/, /downloader/ CVE-2024-34102, CVE-2023-22247
PrestaShop /admin/, /modules/ CVE-2023-39517, CVE-2022-0190
OpenCart /admin/, /catalog/view/ CVE-2023-36325
WooCommerce /checkout/, /cart/ CVE-2023-28154

Legal Disclaimer

! WARNING: ReconX must only be used on systems you own, manage, or have explicit written authorization to test.

ReconX is designed for authorized security auditing and reconnaissance only. Do not use this tool against systems you do not own or have explicit written permission to test. The author is not responsible for any misuse or damage caused by this tool. Always comply with applicable laws and regulations.

! International Legal Considerations

Country-Specific Restrictions:

Country Key Law Notes
USA CFAA (Computer Fraud and Abuse Act) Unauthorized scanning is a federal crime
EU NIS2 Directive Reconnaissance tools may be restricted
Saudi Arabia Anti-Cybercrime Law Requires official authorization
UAE Federal Law No. 5/2012 Similar restrictions apply
UK Computer Misuse Act 1990 Unauthorized access is prohibited

What is Allowed

  • Scanning servers you own or manage
  • Authorized penetration testing with written consent
  • Academic research on networks you have legal access to

What is Prohibited

  • Scanning servers without authorization
  • Scanning government domains (.gov, gov.x, .mil, .edu.x, etc.) — strictly prohibited
  • Attempting to bypass security measures (WAF/CDN bypass)
  • Using scan results for malicious purposes

Secure Deployment

If deploying this tool publicly:

  • Use HTTPS for all communications
  • Monitor and log all scan activity
  • Restrict access to authorized personnel only

License

MIT License


Author

Mogbil Sourketti | info@wondtech.com

About

ReconX is an advanced passive reconnaissance tool for web servers. It performs deep analysis across control panel detection, SSL/TLS, HTTP headers, DNS enumeration, WAF/CDN fingerprinting, port scanning, endpoint discovery, and more — all in a single run.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages