R3Con1Z3R : A Lightweight Web Information Gathering Tool With an Intuitive Features

R3con1z3r is a lightweight Web information gathering tool with an intuitive features written in python. it provides a powerful environment in which open source intelligence (OSINT) web-based foot printing can be conducted quickly and thoroughly.

Footprinting is the first phase of ethical hacking, its the collection of every possible information regarding the target.

R3con1z3r is a passive reconnaissance tool with built-in functionalities which includes: HTTP header flag, Traceroute, Whois Footprinting, DNS information, Site on same server, Nmap port scanner, Reverse Target and hyperlinks on a webpage.

The tool, after being provided with necessary inputs generates an output in HTML format.

Also Read : SQLiScanner – Automatic SQL Injection With Charles & SQLmap API

Screenshots

Installation

r3con1z3r supports Python 2 and Python 3.

$ git clone https://github.com/abdulgaphy/r3con1z3r.git
$ cd r3con1z3r
$ pip install -r requirements.txt

Optional for Linux users

$ sudo chmod +x r3con1z3r.py

Modules

r3con1z3r depends only on the sys and the requests python modules.

Python 3: $ pip3 install -r requirements.txt

For Coloring on Windows: pip install win_unicode_console colorama

Usage

python3 r3con1z3r.py [domain.com]

Examples

To run on all Operating Systems (Linux, Windows, Mac OS X, Android e.t.c) i.e Python 2 environment

python r3con1z3r.py google.com

To run on python3 environment:

python3 r3con1z3r.py facebook.com

To run as executable Unix only

./r3con1z3r.py google.com

R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

1 week ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 weeks ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

2 weeks ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

2 weeks ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

2 weeks ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

3 weeks ago