Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.
Features
Recon-TRequirements
Also Read – PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine
Recon-T Usage & Installation
$ apt-get install python3 nmap
$ pip3 install -r requirements.txt
$ python3 reconT.py http://target.co.li
$ python reconT.py –help
Usage: reconT.py [OPTIONS] TARGET
Options:
–timeout INTEGER Seconds to wait before timeout connections
–proxy TEXT if Use a proxy ex: 0.0.0.0:8888if with auth
0.0.0.0:8888@user:password
–cookies TEXT if use cookie comma separated cookies to add the
requestex: PHPSESS:123,kontol=True
–help Show this message and exit.
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…