ReconCobra : Complete Automated Pentest Framework For Information Gathering

ReconCobra is a complete Automated pentest framework for Information Gathering and it will tested on Kali, Parrot OS, Black Arch, Termux, Android Led TV.

Introduction

  • It is useful in Banks, Private Organizations and Ethical hacker personnel for legal auditing.
  • It serves as a defense method to find as much as information possible for gaining unauthorized access and intrusion.
  • With the emergence of more advanced technology, cyber-criminals have also found more ways to get into the system of many organizations.
  • It software can audit, firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like erp, mail firewalls are installed, exposing servers so it do Foot-printing, Scanning & Enumeration as much as possible of target, to discover and collect most possible information like username, web technologies, files, endpoint, API and much more.
  • It’s first step to stop cyber criminals by securing your Infrastructural Information Gathering leakage. It is false positive free, when there is something it will show no matter what, if it is not, it will give blank results rather error.

Also Read – PBTK : A Toolset For Reverse Engineering & Fuzzing Protobuf-Based Apps

Integrations

  • Tigerman Root Software Package

Kali Installation

  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • sudo chmod u+x *.sh
  • ./Kali_Installer.sh
  • It will integrate as system software
  • Dependencies will be handled automatically
  • Third party software(s)/dependencies/modules will be handled automatically

Parrot OS Installation

  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • Bash ParrotOS_Installer.sh
  • It will integrate as system software
  • Dependencies will be handled automatically
  • Third party software(s)/dependencies/modules will be handled automatically

Termux Installation

  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • pkg install proot
  • type: termux-chroot
  • ./Termux_Installer.sh
  • ./Termux_fixme.sh
  • Reboot your Termux
  • perl ReconCobraTermux.pl
  • Dependencies will be handled automatically for Termux
  • Third party software(s)/dependencies/modules will be handled automatically for Termux

Android Led TV Installation

  • Install termux
  • Input usb keyboard
  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • pkg install proot
  • type: termux-chroot
  • ./Termux_Installer.sh
  • ./Termux_fixme.sh
  • Reboot your Termux
  • perl ReconCobraTermux.pl
  • Dependencies will be handled automatically for Termux
  • Third party software(s)/dependencies/modules will be handled automatically for Termux

Black Arch Installation

  • Open issue, if error occur
  • git clone https://github.com/haroonawanofficial/ReconCobra.git
  • cd Reconcobra
  • chmod u+x *.sh
  • ./BlackArch_Installer.sh
  • It will integrate as system software
  • Dependencies will be handled automatically
  • Third party software(s)/dependencies/modules will be handled automatically
R K

Recent Posts

Cybersecurity Toolkit – Essential Python Tools For Penetration Testing

Welcome to the Cybersecurity Toolkit, a collection of essential Python tools designed for penetration testing…

8 hours ago

i-Haklab : Unleashing The Power Of Termux For Enhanced Cybersecurity

The main objective of the creation of this laboratory is to transport the applications, tools…

8 hours ago

Dark FB – A Comprehensive Toolkit For Advanced Facebook Interactions

"Dark FB" is a powerful toolkit designed for those who wish to delve deeper into…

8 hours ago

Wifi-Hacking.py : Your Ultimate Guide To Ethical WiFi Penetration Testing

Unlock the potential of ethical hacking with Wifi-Hacking.py, a powerful cybersecurity tool designed to navigate…

1 day ago

THREAT ACTORS – TTPs : Decoding The Digital Underworld Through Comprehensive Mapping

This repository was created with the aim of assisting companies and independent researchers about Tactics,…

1 day ago

MagicDot : Harnessing DOT-To-NT Path Conversion For Rootkit-Like Capabilities

A set of rootkit-like abilities for unprivileged users, and vulnerabilities based on the DOT-to-NT path…

1 day ago