ReconMate is a professional-grade, automated OSINT & Reconnaissance tool designed for cybersecurity analysts and penetration testers. It streamlines the initial phase of security assessments by automating DNS enumeration, subdomain discovery, port scanning, and threat intelligence gathering.
- 🔍 target Validation: Smartly distinguishes between Domains and IPs.
- 🌐 DNS Reconnaissance:
- Retrieves
A,AAAA,MX,NS,TXTrecords. - Performs automatic WHOIS lookups.
- Retrieves
- 🔎 Subdomain Enumeration:
- Integrates with crt.sh for passive certificate transparency log analysis.
- 📡 Advanced Port Scanning:
- Powered by Nmap for reliable service and version detection.
- Multi-threaded scanning for efficiency.
- 🌍 Shodan Intelligence:
- Queries Shodan API for organization details, OS fingerprinting, and known vulnerabilities (CVEs).
- 🕸️ Network Visualization:
- Generates interactive interactive graphs to map attack surfaces.
- 📊 Professional Reporting:
- Produces comprehensive HTML reports with risk summaries and data tables.
- Python 3.8+
- Nmap (Must be installed and in your system PATH)
-
Clone the Repository
git clone https://github.com/yourusername/ReconMate.git cd ReconMate -
Install Dependencies
pip install -r requirements.txt
-
Configure API Keys Open
config.pyand add your Shodan API Key:class Config: SHODAN_API_KEY = "YOUR_SHODAN_API_KEY_HERE"
Run ReconMate simply by pointing it to your target.
python main.py -t example.compython main.py -t 192.168.1.5 --ports "20-80,443,8080"| Flag | Description | Default |
|---|---|---|
-t, --target |
Target Domain or IP address (Required) | N/A |
--ports |
Specific ports to scan | 1-1000 |
--no-shodan |
Skip Shodan intelligence lookup | False |
--no-subdomains |
Skip subdomain enumeration | False |
____ __ __ _
| _ \ ___ ___ ___ _ __ | \/ | __ _| |_ ___
| |_) / _ \/ __/ _ \| '_ \| |\/| |/ _` | __/ _ \
| _ < __/ (_| (_) | | | | | | | (_| | || __/
|_| \_\___|\___\___/|_| |_|_| |_|\__,_|\__\___|
ReconMate - Automated OSINT & Recon Tool | v1.0
[+] Starting scan against: example.com (93.184.216.34)
[+] DNS Records found: A, MX, TXT...
[+] Found 15 unique subdomains from crt.sh
[+] Port scan completed. Open ports: 80, 443
[+] Shodan scan completed. Org: EDGECAST
[-] Report generated successfully: reports/example.com_report.html
Contributions are welcome! Please fork the repository and submit a pull request for any enhancements or bug fixes.
This project is licensed under the MIT License - see the LICENSE file for details.
Disclaimer: ReconMate is intended for educational and authorized testing purposes only. The developers assume no liability for misuse.