ReconCobra : Complete Automated Pentest Framework For Information Gathering

ReconCobra is a complete Automated pentest framework for Information Gathering and it will tested on Kali, Parrot OS, Black Arch, Termux, Android Led TV.

Introduction

  • It is useful in Banks, Private Organizations and Ethical hacker personnel for legal auditing.
  • It serves as a defense method to find as much as information possible for gaining unauthorized access and intrusion.
  • With the emergence of more advanced technology, cyber-criminals have also found more ways to get into the system of many organizations.
  • It software can audit, firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like erp, mail firewalls are installed, exposing servers so it do Foot-printing, Scanning & Enumeration as much as possible of target, to discover and collect most possible information like username, web technologies, files, endpoint, API and much more.
  • It’s first step to stop cyber criminals by securing your Infrastructural Information Gathering leakage. It is false positive free, when there is something it will show no matter what, if it is not, it will give blank results rather error.

Also Read – PBTK : A Toolset For Reverse Engineering & Fuzzing Protobuf-Based Apps

Integrations

  • Tigerman Root Software Package

Kali Installation

  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • sudo chmod u+x *.sh
  • ./Kali_Installer.sh
  • It will integrate as system software
  • Dependencies will be handled automatically
  • Third party software(s)/dependencies/modules will be handled automatically

Parrot OS Installation

  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • Bash ParrotOS_Installer.sh
  • It will integrate as system software
  • Dependencies will be handled automatically
  • Third party software(s)/dependencies/modules will be handled automatically

Termux Installation

  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • pkg install proot
  • type: termux-chroot
  • ./Termux_Installer.sh
  • ./Termux_fixme.sh
  • Reboot your Termux
  • perl ReconCobraTermux.pl
  • Dependencies will be handled automatically for Termux
  • Third party software(s)/dependencies/modules will be handled automatically for Termux

Android Led TV Installation

  • Install termux
  • Input usb keyboard
  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • pkg install proot
  • type: termux-chroot
  • ./Termux_Installer.sh
  • ./Termux_fixme.sh
  • Reboot your Termux
  • perl ReconCobraTermux.pl
  • Dependencies will be handled automatically for Termux
  • Third party software(s)/dependencies/modules will be handled automatically for Termux

Black Arch Installation

  • Open issue, if error occur
  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • ./BlackArch_Installer.sh
  • It will integrate as system software
  • Dependencies will be handled automatically
  • Third party software(s)/dependencies/modules will be handled automatically
R K

Recent Posts

How UDP Works and Why It Is So Fast

When people ask how UDP works, the simplest answer is this: UDP sends data quickly…

3 days ago

How EDR Killers Bypass Security Tools

Endpoint Detection and Response (EDR) solutions have become a cornerstone of modern cybersecurity, designed to…

6 days ago

AI-Generated Malware Campaign Scales Threats Through Vibe Coding Techniques

A large-scale malware campaign leveraging AI-assisted development techniques has been uncovered, revealing how attackers are…

6 days ago

How Does a Firewall Work Step by Step

How Does a Firewall Work Step by Step? What Is a Firewall and How Does…

7 days ago

Fake VPN Download Trap Can Steal Your Work Login in Minutes

People trying to securely connect to work are being tricked into doing the exact opposite.…

1 week ago

This Android Bug Can Crack Your Lock Screen in 60 Seconds

A newly disclosed Android vulnerability is making noise for a good reason. Researchers showed that…

2 weeks ago