FinalRecon : OSINT Tool for All-In-One Web Reconnaissance

FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.

Features

It provides detailed information such as :

  • Header Information
  • Whois
  • SSL Certificate Information
  • Crawler
  • DNS Enumeration
    • A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records
    • DMARC Records
  • Subdomain Enumeration
    • Data Sources
      • BuffOver
      • crt.sh
      • ThreatCrowd
      • AnubisDB
      • ThreatMiner
  • Traceroute
    • Protocols
      • UDP
      • TCP
      • ICMP
  • Directory Searching
  • Port Scan
    • Fast
    • Top 1000 Ports
    • Open Ports with Standard Services
  • Export
    • Formats
      • txt
      • xml
      • csv

Also Read – Lazydocker : The Lazier Way To Manage Everything Docker

Screenshots

  • Header Information
  • WHOIS
  • SSL Certificate Details
  • Crawler
  • DNS Enumeration
  • Subdomain Enumeration
  • Traceroute
  • Directory Searching
  • Port Scan

Tested On

  • Kali Linux 2019.1
  • BlackArch Linux

Installation

git clone https://github.com/thewhiteh4t/FinalRecon.git
cd FinalRecon
pip3 install -r requirements.txt

Usage

python3 finalrecon.py -h

Usage: finalrecon.py [-h] [–headers] [–sslinfo] [–whois] [–crawl] [–dns] [–sub] [–trace] [–dir] [–ps] [–full] [-t T] [-T T] [-w W] [-r] [-s] [-d D] [-m M] [-p P] [-tt TT] [-o O] url

FinalRecon – OSINT Tool for All-In-One Web Recon | v1.0.2

Positional arguments:
url Target URL

Optional arguments:
-h, –help show this help message and exit
–headers Header Information
–sslinfo SSL Certificate Information
–whois Whois Lookup
–crawl Crawl Target
–dns DNS Enumeration
–sub Sub-Domain Enumeration
–trace Traceroute
–dir Directory Search
–ps Fast Port Scan
–full Full Recon

Extra Options:
-t T Number of Threads [ Default : 50 ]
-T T Request Timeout [ Default : 10.0 ]
-w W Path to Wordlist [ Default : wordlists/dirb_common.txt ]
-r Allow Redirect [ Default : False ]
-s Toggle SSL Verification [ Default : True ]
-d D Custom DNS Servers [ Default : 1.1.1.1 ]
-m M Traceroute Mode [ Default : UDP ] [ Available : TCP, ICMP ]
-p P Port for Traceroute [ Default : 80 / 33434 ]
-tt TT Traceroute Timeout [ Default : 1.0 ]
-o O Export Output [ Default : txt ] [ Available : xml, csv ]

  • Check headers

python3 finalrecon.py –headers

  • Check ssl Certificate

python3 finalrecon.py –sslinfo

  • Check whois Information

python3 finalrecon.py –whois

  • Crawl Target

python3 finalrecon.py –crawl

  • Full scan

python3 finalrecon.py –full

Demo

R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago