Recon CLI Tool is a versatile reconnaissance tool designed for cybersecurity professionals. It automates common information gathering tasks such as domain lookups, port scanning, subdomain enumeration, reverse DNS, WHOIS lookups, SSL certificate retrieval, GeoIP lookups, and more. The tool is developed in Python and is intended to provide quick, automated reconnaissance during cybersecurity assessments.
- Domain Information: Fetch A, MX, NS, and TXT records for a given domain.
- Port Scanning: Scan for open ports on a given IP address.
- Subdomain Enumeration: Discover subdomains associated with a domain.
- Directory Bruteforce: Brute force directories on a web server.
- Reverse DNS Lookup: Get reverse DNS information for an IP address.
- Shodan Integration: Perform Shodan lookups using an API key.
- WHOIS Lookup: Retrieve WHOIS data for domain registration details.
- SSL Certificate Information: Get detailed SSL certificate info for a domain.
- HTTP Headers: Retrieve and display HTTP response headers from a server.
- GeoIP Lookup: Perform a geographical lookup for an IP address.
- Encoding/Decoding: Decode Base64, Base32, and ROT13 encoded strings.
- Clone the repository:
git clone https://github.com/useru1k/recon-cli-tool.git cd recon-cli-tool - Install required dependencies:
pip install -r requirements.txt
The tool operates via the command line. Below are the available arguments and how to use them:
usage: master.py [-h] [-auto] [-d] [-p] [-sd] [-dir] [-ip] [-shodan] [-whois]
[-ssl] [-hdr] [-geo] [-bs64] [-rot13] [-bs32]
Recon CLI Tool : A tool or Script that makes gathering information about
targets using Basic Recon Process.
options:
-h, --help show this help message and exit
-auto, --autoprocess Under Construction
-d , --domain Target Domain
-p , --portscan Target IP for Port Scan
-sd , --subdomain Get the Subdomain of the Target System
-dir , --directory Get the Directory brute-forcing function
-ip , --ip IP address for reverse DNS lookup
-shodan , --shodan_api_key
Under Construction : API Key for Shodan
-whois , --whois Perform WHOIS lookup
-ssl , --ssl Retrieve SSL Certificate Info
-hdr , --headers Retrieve HTTP headers
-geo , --geoip Perform GeoIP lookup
-bs64 , --base64 Decode the base64 String
-rot13 , --rot_13 Decode the ROT13 String
-bs32 , --base32 Decode the base322 String
Initiates automatic processing (Currently under development).
python master.py -autoRetrieves DNS information (A, MX, NS, TXT records) for a target domain.
python master.py -d example.comPerforms a port scan on the provided target IP address.
python master.py -p example.comFinds subdomains for the given domain.
python master.py -sd example.comPerforms directory brute-forcing on a given web server.
python master.py -dir example.comRetrieves SSL certificate details for a domain.
python master.py -ssl example.comRetrieves HTTP headers from a web server.
python master.py -hdr http://example.comPerform a geographical lookup based on an IP address.
python master.py -geo example.comDecodes a Base64 encoded string.
python master.py -bs64 <Base64_String>Decodes a ROT13 encoded string.
python master.py -rot13 <ROT13_String>Decodes a Base32 encoded string.
python master.py -bs32 <Base32_String>- For questions, issues, or suggestions, feel free to open an issue on the GitHub repository.