FinalRecon is a fast and simple python script for web reconnaissance. It follows a modular structure so in future new modules can be added with ease.
Featured
Features
FinalRecon provides detailed information such as :
Also Read – Web Hacker’s Weapons : Collection Of Cool Tools Used By Web Hackers
Configuration
Some Modules Use API Keys to fetch data from different resources, these are optional, if you are not using an API key, they will be simply skipped. If you are interested in using these resources you can store your API key in keys.json file.
Path –> finalrecon/conf/keys.json
If you dont want to use a key for a certain data source just set its value to null
, by default values of all available data sources are null.
This data source is used to fetch Certificate Transparency data which is used in Subdomain Enumeration
Key Format : APP-ID|APP-SECRET
Read More : https://developers.facebook.com/docs/facebook-login/access-tokens
Tested On
FinalRecon is a tool for Pentesters and it’s designed for Linux based Operating Systems, other platforms like Windows and Termux are NOT supported.
Installation
pacman -S finalrecon
doas pkg_add finalrecon
git clone https://github.com/thewhiteh4t/FinalRecon.git
cd FinalRecon
pip3 install -r requirements.txt
docker pull thewhiteh4t/finalrecon
docker run -it –entrypoint /bin/sh thewhiteh4t/finalrecon
Usage
python3 finalrecon.py -h
Usage: finalrecon.py [-h] [–headers] [–sslinfo] [–whois] [–crawl] [–dns] [–sub] [–trace] [–dir] [–ps]
[–full] [-t T] [-T T] [-w W] [-r] [-s] [-d D] [-e E] [-m M] [-p P] [-tt TT] [-o O]
url
FinalRecon – The Last Recon Tool You Will Need | v1.0.7
positional arguments:
url Target URL
Optional arguments:
-h, –help show this help message and exit
–headers Header Information
–sslinfo SSL Certificate Information
–whois Whois Lookup
–crawl Crawl Target
–dns DNS Enumeration
–sub Sub-Domain Enumeration
–trace Traceroute
–dir Directory Search
–ps Fast Port Scan
–full Full Recon
Extra Options:
-t T Number of Threads [ Default : 30 ]
-T T Request Timeout [ Default : 30.0 ]
-w W Path to Wordlist [ Default : wordlists/dirb_common.txt ]
-r Allow Redirect [ Default : False ]
-s Toggle SSL Verification [ Default : True ]
-d D Custom DNS Servers [ Default : 1.1.1.1 ]
-e E File Extensions [ Example : txt, xml, php ]
-m M Traceroute Mode [ Default : UDP ] [ Available : TCP, ICMP ]
-p P Port for Traceroute [ Default : 80 / 33434 ]
-tt TT Traceroute Timeout [ Default : 1.0 ]
-o O Export Output [ Default : txt ] [ Available : xml, csv ]
python3 finalrecon.py –headers
python3 finalrecon.py –sslinfo
python3 finalrecon.py –whois
python3 finalrecon.py –crawl
python3 finalrecon.py –dir -e txt,php -w /path/to/wordlist
python3 finalrecon.py –full
Demo
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…
Cybersecurity tools play a critical role in safeguarding digital assets, systems, and networks from malicious…
MODeflattener is a specialized tool designed to reverse OLLVM's control flow flattening obfuscation through static…