____ _
/ __ \___ _________ ____ (_)____
/ /_/ / _ \/ ___/ __ \/ __ \/ / ___/
/ _, _/ __/ /__/ /_/ / / / / / /__
/_/ |_|\___/\___/\____/_/ /_/_/\___/
Automated Reconnaissance Framework
Created by Othman Kamal
Reconic is a powerful reconnaissance orchestrator designed for bug bounty hunters and security professionals. It intelligently combines the best-in-class ProjectDiscovery tools into a seamless, guided workflow without reinventing the wheel.
- Primary: Subfinder (fast, all sources)
- Optional: Amass (deep, thorough — slower)
- httpx with tech detection, titles, status codes, and redirect following
- Katana — best-in-class JS-aware crawling with headless support, form filling, and known file discovery
- Playwright fallback for extremely heavy JavaScript applications
- Nuclei with automatic template updates and 10,000+ community templates
- Built-in fingerprinting for 17+ popular services:
- GitHub Pages, Heroku, AWS S3, Azure
- Cloudfront, Fastly, Pantheon, ReadMe
- Bitbucket, Ghost, HelpJuice, HelpScout
- Cargo, StatusPage, Tumblr, WordPress, Unbounce
- Full proxy support (HTTP/SOCKS)
- TOR routing (
--tor) - Cookie & Authorization header authentication
- Automated Mode — One-command full reconnaissance
- Interactive Mode (
--interactive) — Step-by-step control for targeted testing
This tool orchestrates proven tools — it does not replace manual testing.
Real bounties come from Burp Suite, creative thinking, and manual verification.
Reconic gives you the best starting point possible.
pip install aiohttp aiofiles tldextract beautifulsoup4 dnspython colorama PyYAML requests playwright
playwright install chromium# Requires Go 1.21+
go install -v github.com/projectdiscovery/subfinder/v2/cmd/subfinder@latest
go install -v github.com/projectdiscovery/katana/cmd/katana@latest
go install -v github.com/projectdiscovery/nuclei/v2/cmd/nuclei@latest
go install -v github.com/projectdiscovery/httpx/cmd/httpx@latest
# Optional: Deep enumeration (slower but thorough)
go install -v github.com/owasp-amass/amass/v4/...@master
# Add to PATH
export PATH=$PATH:$HOME/go/binpython reconic.pyThe tool will automatically detect which external tools are installed and show their status.
python reconic.py https://example.compython reconic.py --interactiveThis launches a guided wizard that lets you:
- Choose enumeration methods (Subfinder, Amass, or both)
- Select specific subdomains to test
- Pick which tests to run (alive check, crawling, takeover, Nuclei)
- Configure proxy/authentication
- Review configuration before execution
--timeout N Request timeout (default: 20)
--concurrency N Concurrent requests (default: 100)
--depth N Crawl depth (default: 3)
--output-dir DIR Output directory (default: ./reconic_output)--no-subfinder Disable Subfinder
--use-amass Enable Amass (slower, more thorough)
--no-katana Disable Katana crawler
--use-playwright Enable Playwright fallback
--no-httpx Disable httpx probing
--no-nuclei Disable Nuclei scanning
--no-takeover Skip takeover detection--proxy URL HTTP/SOCKS proxy
--tor Use TOR (127.0.0.1:9050)
--auth-cookie COOKIE Authentication cookie
--auth-header HEADER Authorization header--nuclei-templates DIR Custom Nuclei templates directory
--interactive, -i Launch interactive modepython reconic.py https://example.compython reconic.py https://example.com --use-amasspython reconic.py https://app.example.com --auth-cookie 'session=abc123'python reconic.py https://example.com --torpython reconic.py https://example.com --nuclei-templates ./my-templatespython reconic.py https://example.com --no-katana --no-nucleipython reconic.py --interactive
# Then follow the guided promptsAll results are saved to ./reconic_output/:
reconic_output/
├── recon_20251215_143022.json # Full structured results
├── httpx_output.json # Alive hosts with metadata
├── katana_output.txt # Discovered endpoints
├── nuclei_results.json # Vulnerability findings
├── subfinder_example.com.txt # Subdomain enumeration results
└── interactive_scan_*.json # Interactive mode results
The main JSON output contains:
target- Target URLscan_date- Timestamptools_used- Which tools were available/usedsubdomains- All discovered subdomainsalive_hosts- Live hosts with HTTP metadataendpoints- Crawled endpointstakeovers- Potential takeover vulnerabilitiesnuclei_results- Path to Nuclei scan results
Reconic executes reconnaissance in five organized phases:
- Runs Subfinder (fast, passive sources)
- Optionally runs Amass (deep, active enumeration)
- Deduplicates and sorts results
- Uses httpx to probe all discovered subdomains
- Captures status codes, titles, technologies
- Follows redirects and filters CDN responses
- DNS CNAME resolution
- Service fingerprinting
- HTTP response analysis
- Critical findings flagged immediately
- Katana crawls alive hosts with JS rendering
- Extracts all links, forms, API endpoints
- Optionally uses Playwright for heavy JS sites
- Updates templates automatically
- Scans hosts + discovered endpoints
- Filters by severity (critical/high/medium)
- Organized output by vulnerability type
- Review takeover findings — Submit immediately if valid
- Import endpoints into Burp Suite for manual testing
- Review Nuclei findings — Verify high/critical vulnerabilities
- Run deeper fuzzing with ffuf or Feroxbuster on interesting paths
- Test parameters with SQLMap or custom injection scripts
- Screenshot alive hosts for visual reconnaissance
- Check historical URLs with gau/waybackurls
╔═══════════════════════════════════════════════════════════════════╗
║ AUTHORIZATION REQUIRED ║
╚═══════════════════════════════════════════════════════════════════╝
This tool performs active security testing.
Only use on targets where you have explicit written permission.
Unauthorized testing is illegal.
- Always get written authorization before testing
- Respect rate limits and target infrastructure
- Use
--toror proxies for sensitive testing - Start with
--no-nucleion production systems - Review findings before reporting
- Never test critical infrastructure without approval
Contributions welcome! Focus areas:
- Additional historical URL sources (gau, waybackurls integration)
- Screenshot integration (httpx -screenshot)
- Burp/BBRF export formats
- More takeover fingerprints
- Report generation (HTML/PDF)
- GitHub/GitLab recon integration
- Google dorking module
- Certificate transparency logs
- Port scanning integration
- Technology stack analysis
- Cloud bucket enumeration (S3, Azure, GCP)
- API endpoint fuzzing templates
- Automated credential checking
- Notification system (Slack/Discord)
- Multi-target support
To contribute:
- Fork the repository
- Create a feature branch
- Make your changes
- Test thoroughly
- Submit a pull request
- Initial release
- Subfinder & Amass integration
- Katana JS-aware crawling
- httpx alive host verification
- Nuclei vulnerability scanning
- Subdomain takeover detection
- Interactive mode
- Proxy & TOR support
- Authentication support
- ProjectDiscovery - Subfinder, Katana, Nuclei, httpx
- OWASP Amass
- Playwright
IMPORTANT: Only use this tool on targets you have explicit written permission to test. Unauthorized scanning is illegal and unethical. The author is not responsible for any misuse or damage caused by this tool.
This tool is provided "as is" without warranty of any kind. Always verify findings manually before reporting.
Made for hunters, by hunters. 🏆
Happy hunting!