Categories: Kali Linux

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.

Features

  • Information Security Headers
  • WAF Detector
  • Banner Grabbing
    • Phone Number
    • Credit Card Number
    • Email
    • US Social Security Number
  • Url Crawl
    • Dom Paramter Url
    • Internal Dynamic Paramter
    • External Dynamic Paramter
    • Internal Link
    • External Link
  • Port Scanner
  • Subdomain Enumeration

Recon-TRequirements

  • click
  • requests
  • colorlog
  • bs4
  • tldextract

Also Read – PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine

Recon-T Usage & Installation

$ apt-get install python3 nmap
$ pip3 install -r requirements.txt
$ python3 reconT.py http://target.co.li

$ python reconT.py –help
Usage: reconT.py [OPTIONS] TARGET

Options:
–timeout INTEGER Seconds to wait before timeout connections
–proxy TEXT if Use a proxy ex: 0.0.0.0:8888if with auth
0.0.0.0:8888@user:password
–cookies TEXT if use cookie comma separated cookies to add the
requestex: PHPSESS:123,kontol=True
–help Show this message and exit.

R K

Recent Posts

Bomber : Navigating Security Vulnerabilities In SBOMs

bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

15 hours ago

EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

15 hours ago

Exploit Street – Navigating The New Terrain Of Windows LPEs

Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

3 days ago

ShadowDumper – Advanced Techniques For LSASS Memory Extraction

Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

4 days ago

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

2 weeks ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

3 weeks ago