Categories: Kali Linux

Recon-T : Reconnaisance – Footprinting – Information Disclosure

Recon-T made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from.

Features

  • Information Security Headers
  • WAF Detector
  • Banner Grabbing
    • Phone Number
    • Credit Card Number
    • Email
    • US Social Security Number
  • Url Crawl
    • Dom Paramter Url
    • Internal Dynamic Paramter
    • External Dynamic Paramter
    • Internal Link
    • External Link
  • Port Scanner
  • Subdomain Enumeration

Recon-TRequirements

  • click
  • requests
  • colorlog
  • bs4
  • tldextract

Also Read – PeekABoo : Penetration Testing To Enable Remote Desktop On The Targeted Machine

Recon-T Usage & Installation

$ apt-get install python3 nmap
$ pip3 install -r requirements.txt
$ python3 reconT.py http://target.co.li

$ python reconT.py –help
Usage: reconT.py [OPTIONS] TARGET

Options:
–timeout INTEGER Seconds to wait before timeout connections
–proxy TEXT if Use a proxy ex: 0.0.0.0:8888if with auth
0.0.0.0:8888@user:password
–cookies TEXT if use cookie comma separated cookies to add the
requestex: PHPSESS:123,kontol=True
–help Show this message and exit.

R K

Recent Posts

How to Install Java on Ubuntu 24.04 Easily in 2026

Java remains one of the most widely used programming platforms for servers, enterprise applications, Android…

2 days ago

How to Install DEB Files on Ubuntu in 2026 (Step-by-Step Beginner Guide)

Ubuntu users often download software directly from developer websites instead of using the default app…

2 days ago

Things to Do After Installing Ubuntu 26.04 LTS for a Fast, Secure Setup

Installing Ubuntu 26.04 LTS is only the first step toward building a smooth, secure, and…

4 days ago

How to Prevent Software Supply Chain Attacks

What is a Software Supply Chain Attack? A software supply chain attack occurs when a…

1 month ago

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

2 months ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

2 months ago