ReconSpider is most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations and find out information from different sources.
ReconSpider can be used by Infosec Researchers, Penetration Testers, Bug Hunters and Cyber Crime Investigators to find deep information about their target.
ReconSpider aggregate all the raw data, visualize it on a dashboard and facilitate alerting and monitoring on the data.
Recon Spider also combines the capabilities of Wave,Photon and Recon Dog to do a comprehensive enumeration of attack surface.
Why it’s called ReconSpider ?
ReconSpider
= Recon
+ Spider
Reconnaissance is a mission to obtain information by various detection methods, about the activities and resources of an enemy or potential enemy, or geographic characteristics of a particular area.
A Web crawler, sometimes called a spider or spiderbot and often shortened to crawler, is an Internet bot that systematically browses the World Wide Web, typically for the purpose of Web indexing (web spidering).
Version (beta)
ReconSpider : 1.0.6
Overview Of The Tool
Mind Map (v1)
Check out our mind map to see visually organize information of this tool regarding api, services and techniques and more.
http://bhavkaran.com/reconspider/mindmap.html
Documentation
Installing and using ReconSpider is very easy. Installation process is very simple.
Let’s Begin !!
Step 1 – Cloning ReconSpider on your linux system.
In order to download ReconSpider simply clone the github repository. Below is the command which you can use in order to clone ReconSpider repository.
git clone https://github.com/bhavsec/reconspider.git
Step 2 – Make sure python3 and python3-pip is installed on your system.
You can also perform a check by typing this command in your terminal.
sudo apt install python3 python3-pip
Step 3 – Installing all dependencies.
Once you clone and check python installation, you will find directory name as reconspider. Just go to that directory and install using these commands:
cd reconspider
sudo python setup.py install
Step 1 – Downloading ReconSpider on your windows system.
In order to download ReconSpider from github repository simply copy and paste this URL in your favourite browser.
https://github.com/bhavsec/reconspider/archive/master.zip
Step 2 – Unzipping the file
Once you download, you will find zipped file name as datasploit-master.zip. Just right click on that zipped file and unzip the file using any software like WinZip, WinRAR.
Step 3 – Installing all dependencies.
After unzipping, go to that directory using Command Prompt and type the following command.
python setup.py install
Step 4 – Database
https://lite.ip2location.com/database/px8-ip-proxytype-country-region-city-isp-domain-usagetype-asn-lastseen
Download database, extract it and move to reconspider/plugins/ directory.
Also Read – Pagodo : Automate Google Hacking Database Scraping And Searching
Usage
ReconSpider is very handy tool and easy to use. All you have to do is just have to pass values to parameter. In order to start ReconSpider just type:
python reconspider.py
This option gathers all the information of given IP Address from public resources.
ReconSpider >> 1
IP >> 8.8.8.8
This option gathers all the information of given URL Address and check for vulneribility.
Reconspider >> 2
HOST (URL / IP) >> vulnweb.com
PORT >> 443
This option allows you to gather information of given phonenumber.
Reconspider >> 3
PHONE NUMBER (919485247632) >>
This option allows you to map an organizations attack surface with a virtual DNS Map of the DNS records associated with the target organization.
ReconSpider >> 4
DNS MAP (URL) >> vulnweb.com
This option allows you to extract all metadat of the file.
Reconspider >> 5
Metadata (PATH) >> /root/Downloads/images.jpeg
This option allows you to obtain information and similar image that are available in internet.
Reconspider >> 6
REVERSE IMAGE SEARCH (PATH) >> /root/Downloads/images.jpeg
Open Search Result in web broser? (Y/N) : y
This option allows you to identify honeypots! The probability that an IP is a honeypot is captured in a “Honeyscore” value that can range from 0.0 to 1.0
ReconSpider >> 7
HONEYPOT (IP) >> 1.1.1.1
This option allows you to identify Mac address details who is manufacturer, address, country, etc.
Reconspider >> 8
MAC ADDRESS LOOKUP (Eg:08:00:69:02:01:FC) >>
This option provided you heatmap of the provided ip or single ip, if connect all the provided ip location with accurate Coordinator.
Reconspider >> 9
1) Trace single IP
2) Trace multiple IPs
OPTIONS >>
This option allows you to gathers history of Torrent download history.
Reconspider >> 10
IPADDRESS (Eg:192.168.1.1) >>
This option allows you to gathers account information of the provided username from social media like Instagram, Twitter, Facebook.
Reconspider >> 11
1.Facebook
2.Twitter
3.Instagram
Username >>
This option allows you to identify whether IP address uses any kind of VPN / Proxy to hide his identify.
Reconspider >> 12
IPADDRESS (Eg:192.168.1.1) >>
This option allows you to identify all breached mail ID from given domain.
Reconspider >> 13
DOMAIN (Eg:intercom.io) >>
This option allows you to check for updates. If a newer version will available, ReconSpider will download and merge the updates into the current directory without overwriting other files.
ReconSpider >> 99
Checking for updates..
This option allows you to exit from ReconSpider Framework to your current Operating System’s terminal.
ReconSpider >> 0
Bye, See ya again..
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…