Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
Features
Recon-TRequirements
Also Read – PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine
Recon-T Usage & Installation
$ apt-get install python3 nmap
$ pip3 install -r requirements.txt
$ python3 reconT.py http://target.co.li
$ python reconT.py –help
Usage: reconT.py [OPTIONS] TARGET
Options:
–timeout INTEGER Seconds to wait before timeout connections
–proxy TEXT if Use a proxy ex: 0.0.0.0:8888if with auth
0.0.0.0:8888@user:password
–cookies TEXT if use cookie comma separated cookies to add the
requestex: PHPSESS:123,kontol=True
–help Show this message and exit.
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…