Project Name | Stars | Downloads | Repos Using This | Packages Using This | Most Recent Commit | Total Releases | Latest Release | Open Issues | License | Language |
---|---|---|---|---|---|---|---|---|---|---|
Finalrecon | 1,869 | 2 days ago | 7 | mit | Python | |||||
All In One Web Recon | ||||||||||
Censys Subdomain Finder | 589 | 4 months ago | 1 | Python | ||||||
⚡ Perform subdomain enumeration using the certificate transparency logs from Censys. | ||||||||||
Cero | 417 | 4 months ago | 4 | December 03, 2021 | 2 | mit | Go | |||
Scrape domain names from SSL certificates of arbitrary hosts | ||||||||||
Delator | 73 | 2 months ago | 8 | January 01, 2021 | 1 | mit | Go | |||
Golang-based subdomain miner leveraging certificate transparency logs | ||||||||||
Certcrunchy | 25 | 4 years ago | 1 | apache-2.0 | Python | |||||
Just a silly recon tool that uses data from SSL Certificates to find potential host names | ||||||||||
Censys Certif Crawl | 10 | 7 years ago | Python | |||||||
Crawl certificate information from censys | ||||||||||
Getfortinetserialnumber | 9 | a year ago | Python | |||||||
A Python script to extract the serial number of a remote Fortinet device. | ||||||||||
Hunterseye | 3 | 2 months ago | mit | Python | ||||||
HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains. The primary goal is to streamline and expedite the process of monitoring newly registered subdomains and SSL certificates related to specified target domains. |
Twitter - Telegram - thewhiteh4t's Blog
FinalRecon is an all in one automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple.
FinalRecon provides detailed information such as :
Header Information
Whois
SSL Certificate Information
Crawler
DNS Enumeration
Subdomain Enumeration
Directory Searching
Wayback Machine
Port Scan
Export
Some Modules Use API Keys to fetch data from different resources, these are optional, if you are not using an API key, they will be simply skipped. If you are interested in using these resources you can store your API key in keys.json file.
Path --> $HOME/.config/finalrecon/keys.json
If you don't want to use a key for a certain data source just set its value to null
, by default values of all available data sources are null.
This data source is used to fetch Certificate Transparency data which is used in Sub Domain Enumeration
Key Format : APP-ID|APP-SECRET
Example :
{
"facebook": "9go1kx9icpua5cm|20yhraldrxt6fi6z43r3a6ci2vckkst3"
}
Read More : https://developers.facebook.com/docs/facebook-login/access-tokens
This data source is used to fetch Sub Domains which are used in Sub Domain Enumeration
Key Format : KEY
Example :
{
"virustotal": "eu4zc5f0skv15fnw54nkhj4m26zbteh9409aklpxhfpp68s8d4l63pn13rsojt9y"
}
This data source is used to fetch Sub Domains which are used in Sub Domain Enumeration
Key Format : KEY
Example :
{
"shodan": "eu4zc5f0skv15fnw54nkhj"
}
This data source is used to fetch Sub Domains which are used in Sub Domain Enumeration
Key Format : KEY
Example :
{
"bevigil": "bteh9409aklpxhfpp68s8d"
}
FinalRecon is a tool for Pentesters and it's designed for Linux based Operating Systems, other platforms like Windows and Termux are NOT supported.
sudo apt install finalrecon
sudo pacman -S finalrecon
doas pkg_add finalrecon
git clone https://github.com/thewhiteh4t/FinalRecon.git
cd FinalRecon
pip3 install -r requirements.txt
docker pull thewhiteh4t/finalrecon
docker run -it --entrypoint /bin/sh thewhiteh4t/finalrecon
Also docker user can use this alias to run the finalrecon as the normal CLI user.
alias finalrecon="docker run -it --rm --name finalrecon --entrypoint 'python3' thewhiteh4t/finalrecon finalrecon.py"
And then use finalrecon
to start your scan.
remark
If you have any api keys you can easily commit that image in your local machine.
This docker usage needs root to run docker command.
usage: finalrecon.py [-h] [--headers] [--sslinfo] [--whois] [--crawl]
[--dns] [--sub] [--dir] [--wayback] [--ps]
[--full] [-dt DT] [-pt PT] [-T T] [-w W] [-r]
[-s] [-sp SP] [-d D] [-e E] [-o O]
url
FinalRecon - The Last Web Recon Tool You Will Need | v1.1.5
positional arguments:
url Target URL
options:
-h, --help show this help message and exit
--headers Header Information
--sslinfo SSL Certificate Information
--whois Whois Lookup
--crawl Crawl Target
--dns DNS Enumeration
--sub Sub-Domain Enumeration
--dir Directory Search
--wayback Wayback URLs
--ps Fast Port Scan
--full Full Recon
Extra Options:
-dt DT Number of threads for directory enum [ Default : 30 ]
-pt PT Number of threads for port scan [ Default : 50 ]
-T T Request Timeout [ Default : 30.0 ]
-w W Path to Wordlist [ Default : wordlists/dirb_common.txt
]
-r Allow Redirect [ Default : False ]
-s Toggle SSL Verification [ Default : True ]
-sp SP Specify SSL Port [ Default : 443 ]
-d D Custom DNS Servers [ Default : 1.1.1.1 ]
-e E File Extensions [ Example : txt, xml, php ]
-o O Export Format [ Default : txt ]
# Check headers
python3 finalrecon.py --headers <url>
# Check ssl Certificate
python3 finalrecon.py --sslinfo <url>
# Check whois Information
python3 finalrecon.py --whois <url>
# Crawl Target
python3 finalrecon.py --crawl <url>
# Directory Searching
python3 finalrecon.py --dir <url> -e txt,php -w /path/to/wordlist
# full scan
python3 finalrecon.py --full <url>