ReconX is an advanced passive reconnaissance tool for web servers. It performs deep analysis across control panel detection, SSL/TLS, HTTP headers, DNS enumeration, WAF/CDN fingerprinting, port scanning, endpoint discovery, and more — all in a single run.
| Module | Description |
|---|---|
| Control Panel Detection | Detects cPanel, CWP, Plesk, DirectAdmin, CyberPanel, Webmin, HestiaCP, ISPmanager, Ajenti |
| Vulnerability Check | Known CVEs for each control panel |
| CMS Detection | Identifies WordPress, Joomla, Drupal, Magento, PrestaShop, OpenCart, WooCommerce |
| SSL/TLS Analysis | Protocol version, cipher strength, expiry, SAN, self-signed check, and A+ to F grading |
| HTTP Headers Audit | Security headers audit (HSTS, CSP, X-Frame-Options…), server fingerprinting |
| WAF / CDN Detection | Identifies Cloudflare, Sucuri, Akamai, Incapsula, Imunify360, and more |
| Cloudflare Real IP | Bypasses Cloudflare to discover origin server IP |
| DNS & Subdomain Enum | Resolves A, AAAA, MX, NS, TXT, CNAME records — enumerates common subdomains |
| DNS Zone Transfer Check | Detects if DNS zone transfer is vulnerable |
| Certificate Transparency | Discovers subdomains via crt.sh logs |
| Port Scanning | Scans 30+ ports including FTP, SSH, SMTP, MySQL, cPanel, and more |
| Endpoint Discovery | Probes sensitive paths like /.env, /.git/HEAD, /phpinfo.php |
| Risk Scoring | Weighted 0–100 risk score with CRITICAL / HIGH / MEDIUM / LOW levels |
git clone https://github.com/mogbil/reconx.git
cd client
pip install -r requirements.txtPython>=3.8
requests>=2.28.0
# Interactive mode (prompts for target)
python reconx.py
# With target as argument
python reconx.py example.com
# JSON output (for scripting)
python reconx.py example.com -j
# Save to file
python reconx.py example.com -o results.json
# Quiet mode (for scripts/CI)
python reconx.py example.com -q
# Custom API endpoint
python reconx.py example.com --url https://custom-domain.com
# Retry on failure
python reconx.py example.com -r 5| Option | Description |
|---|---|
-j, --json |
Output raw JSON response |
-q, --quiet |
Suppress banner and progress |
-o, --output FILE |
Save output to file |
--url URL |
Override base URL |
-r, --retry N |
Number of retry attempts (default: 3) |
____ __ __
| _ \ ___ ___ ___ _ __ \ \/ /
| |_) / _ \/ __/ _ \| '_ \ \ /
| _ < __/ (_| (_) | | | |/ \
|_| \_\___|\___\___/|_| |_/_/\_\
════════════════════════════════════════════════════════════════
[ Web Server Reconnaissance Tool ]
[ Version 1.0 | Client Edition ]
[ By Mogbil Sourketti | info@wondtech.com ]
════════════════════════════════════════════════════════════════
[ReconX] Sending request to server …
──────────────────────────────────────────────────────
TARGET
──────────────────────────────────────────────────────
URL https://example.com
Host example.com
Scan ID rx_65abc1234.5678
Duration 12.5s
──────────────────────────────────────────────────────
CONTROL PANEL
──────────────────────────────────────────────────────
Type cPanel
[header_cpsrvd] cpsrvd/11.122.2
Vulnerabilities:
⚠ CVE-2022-44823 [high]
⚠ CVE-2022-44824 [high]
──────────────────────────────────────────────────────
WAF / CDN
──────────────────────────────────────────────────────
Protection Cloudflare
Real IP 192.168.1.1 (via MX record)
──────────────────────────────────────────────────────
SSL / TLS
──────────────────────────────────────────────────────
Grade A+
Issuer Let's Encrypt
Days Until Exp. 87
──────────────────────────────────────────────────────
CMS
──────────────────────────────────────────────────────
Type WordPress
Vulnerabilities:
⚠ CVE-2024-3144 [critical]
──────────────────────────────────────────────────────
DNS ZONE TRANSFER
──────────────────────────────────────────────────────
Status Secure (blocked)
──────────────────────────────────────────────────────
RISK ASSESSMENT
──────────────────────────────────────────────────────
Score: 42/100 [MEDIUM]
[████████░░░░░░░░░░░░]
+20 cPanel detected
✔ WAF present
✔ TLS grade A+
| Panel | Ports | Vulnerabilities |
|---|---|---|
| cPanel | 2082, 2083, 2086, 2087, 2095, 2096 | CVE-2022-44823, CVE-2022-44824, CVE-2023-32487 |
| CWP | 2030, 2031, 2408 | CVE-2023-31327, CVE-2023-31328, CVE-2024-25817 |
| Plesk | 8443, 8447, 8880 | CVE-2022-42868, CVE-2023-28403, CVE-2024-23757 |
| DirectAdmin | 2222 | CVE-2023-2637, CVE-2023-2638 |
| CyberPanel | 8090, 8091 | CVE-2023-23498, CVE-2023-23499, CVE-2024-23169 |
| Webmin | 10000, 20000 | CVE-2022-43945, CVE-2023-25179, CVE-2024-36401 |
| ISPmanager | 1500, 1501 | CVE-2023-32788, CVE-2023-32789 |
| HestiaCP | 8083 | CVE-2024-25818 |
| Ajenti | 8000, 8002 | CVE-2022-26695, CVE-2023-26132 |
| CMS | Key Files | Vulnerabilities |
|---|---|---|
| WordPress | /wp-login.php, /wp-admin/ | CVE-2024-3144, CVE-2024-3145 |
| Joomla | /administrator/, /configuration.php | CVE-2024-21780, CVE-2023-23752 |
| Drupal | /user/login, /sites/default/ | CVE-2024-1596, CVE-2023-28252 |
| Magento | /admin/, /downloader/ | CVE-2024-34102, CVE-2023-22247 |
| PrestaShop | /admin/, /modules/ | CVE-2023-39517, CVE-2022-0190 |
| OpenCart | /admin/, /catalog/view/ | CVE-2023-36325 |
| WooCommerce | /checkout/, /cart/ | CVE-2023-28154 |
! WARNING: ReconX must only be used on systems you own, manage, or have explicit written authorization to test.
ReconX is designed for authorized security auditing and reconnaissance only. Do not use this tool against systems you do not own or have explicit written permission to test. The author is not responsible for any misuse or damage caused by this tool. Always comply with applicable laws and regulations.
Country-Specific Restrictions:
| Country | Key Law | Notes |
|---|---|---|
| USA | CFAA (Computer Fraud and Abuse Act) | Unauthorized scanning is a federal crime |
| EU | NIS2 Directive | Reconnaissance tools may be restricted |
| Saudi Arabia | Anti-Cybercrime Law | Requires official authorization |
| UAE | Federal Law No. 5/2012 | Similar restrictions apply |
| UK | Computer Misuse Act 1990 | Unauthorized access is prohibited |
- Scanning servers you own or manage
- Authorized penetration testing with written consent
- Academic research on networks you have legal access to
- Scanning servers without authorization
- Scanning government domains (.gov, gov.x, .mil, .edu.x, etc.) — strictly prohibited
- Attempting to bypass security measures (WAF/CDN bypass)
- Using scan results for malicious purposes
If deploying this tool publicly:
- Use HTTPS for all communications
- Monitor and log all scan activity
- Restrict access to authorized personnel only
MIT License
Mogbil Sourketti | info@wondtech.com
