Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
Features
Recon-TRequirements
Also Read – PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine
Recon-T Usage & Installation
$ apt-get install python3 nmap
$ pip3 install -r requirements.txt
$ python3 reconT.py http://target.co.li
$ python reconT.py –help
Usage: reconT.py [OPTIONS] TARGET
Options:
–timeout INTEGER Seconds to wait before timeout connections
–proxy TEXT if Use a proxy ex: 0.0.0.0:8888if with auth
0.0.0.0:8888@user:password
–cookies TEXT if use cookie comma separated cookies to add the
requestex: PHPSESS:123,kontol=True
–help Show this message and exit.
bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…
Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…
Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…
Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…