Auto Recon is a Bash script for automating the reconnaissance phase of penetration testing. It performs various types of scans to gather information about the target domain, including IP details, domain reconnaissance, vulnerability scanning, network mapping, application fingerprinting, and Google dorks.
This script uses all the active scan methods, which may trigger the backend monitoring systems. Use this tool at your own risk!
To run this script, you need to have the following tools installed:
toilet
figlet
wig
nmap
jq
To use this script, simply run the auto-recon.sh
file and enter the target domain name when prompted. The script will create a directory called results-{domain-name}
in the current working directory and save the scan results in various subdirectories within it.
The results-{domain-name}
directory contains the following subdirectories:
Domain-reconnaissance
: Contains information about the target domain, including IP addresses, subdomains, and SSL certificate details.Vulnerability-scanning
: Contains vulnerability scan reports generated using various tools, such asnmap
andnikto
.Network-mapping
: Contains network maps generated using tools likenmap
.Application-fingerprinting
: Contains information about the web technologies used by the target website, obtained usingwig
.Google-dorks
: Contains Google dorks specific to the target domain.Screenshots
: Contains screenshots of the target website, generated using tools likeaquatone
.Reporting
: Contains various reports generated during the reconnaissance phase.
git clone https://github.com/sujayadkesar/auto-rec0n.git
cd auto-rec0n
chmod +x auto-rec0n.sh
./auto-rec0n.sh
Note : To access this tool from any directory
ln -sf <complete path to auto-rec0n.sh> /usr/local/bin/auto-recon
- nslookup
- host_discovery
- dig utilities
- dnsrecon
- whatweb
- wafw00f
- nmap
- nmap-script-engines
- theHarvester
- adding much more soon!!
Contributions to Auto-recon are welcome and encouraged! If you would like to contribute, please follow these steps:
- Fork the Auto-recon repository
- Create a new branch for your feature or bug fix
- Make your changes and test them thoroughly
- Submit a pull request to the main Auto-recon repository
Before submitting a pull request, please make sure to run the tests and update the documentation as necessary.
Warning!! : This auto recon uses all the active scan methods it may trigger the backend monitoring systems. Use this tool with authorized access!