RecScanSec – Reconnaisance Scanner Security

RecScanSec made for reconnaisance Scanner and information gathering with an emphasis on simplicity. Following are the features of the scanner;

  • Information Security Headers
  • WAF Analyzer
  • Information Disclosure
  • Banner Grabbing
  • Url Crawl
  • HTML Form Detector
  • Port Scanner
  • Get SSL Information
  • Subdomain Enumeration
  • Host Mapper
  • Url Fuzzing & sensitive dir
  • All results scanned will be saved in the output directory

Also Read – ReverseTCPShell : PowerShell ReverseTCP Shell, Client & Server

Requirements

  • asyncio
  • click
  • requests
  • colorlog
  • bs4
  • tldextract

Usage & Installation

$ apt-get install python3 nmap
$ pip3 install -r requirements.txt
$ python3 RecScanSec.py http://target.co.li

Usage: RecScanSec.py [OPTIONS] TARGET

Options:
–version Show the version and exit.
–timeout INTEGER Seconds to wait before timeout connections
–proxy TEXT if Use a proxy ex: 0.0.0.0:8888 if with auth
0.0.0.0:8888@user:password
–cookies TEXT if use cookie comma separated cookies to add the
requestex: PHPSESS:123,kontol:True
–no-url-fuzzing do not fuzz url
–update Check For Update
–help Show this message and exit.

R K

Recent Posts

Playwright-MCP : A Powerful Tool For Browser Automation

Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…

2 weeks ago

JBDev : A Tool For Jailbreak And TrollStore Development

JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…

2 weeks ago

Kereva LLM Code Scanner : A Revolutionary Tool For Python Applications Using LLMs

The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…

2 weeks ago

Nuclei-Templates-Labs : A Hands-On Security Testing Playground

Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…

2 weeks ago

SSH-Stealer : The Stealthy Threat Of Advanced Credential Theft

SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…

2 weeks ago

ollvm-unflattener : A Tool For Reversing Control Flow Flattening In OLLVM

Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…

2 weeks ago