Skip to content

Broly157/reconftw

 
 

Repository files navigation


reconftw
ReconFTW

A simple bash script for full recon

⚠️ Warning ⚠️

This is a live development project, until the first stable release (1.0) it will be constantly updated in master branch, so if you have detected any bug, you can open an issue or ping me over Telegram or Twitter and I will try to do my best :)

Table of Contents

Summary

ReconFTW performs automated enumeration of subdomains via various techniques and futher scanning for vulnerabilties, to give you a potential vulns.

Installation

git clone https://github.com/six2dez/reconftw
cd reconftw
chmod +x *.sh
./install.sh
./reconftw.sh -d target.com -a
  • It is highly recommended, and in some cases essential, to set your api keys or env variables:
    • amass (~/.config/amass/config.ini)
    • subfinder (~/.config/subfinder/config.yaml)
    • git-hound (~/.githound/config.yml)
    • github-endpoints.py (GITHUB_TOKEN env var)
    • favup (shodan init <SHODANPAIDAPIKEY>)
    • SSRF Server (COLLAB_SERVER env var)
    • Blind XSS Server (XSS_SERVER env var)
  • This script uses dalfox with blind-xss option, you must change to your own server, check xsshunter.com.

Usage

TARGET OPTIONS
-d DOMAIN        Target domain
-l list.txt      Targets list, one per line

MODE OPTIONS
-a               Perform all checks
-s               Full subdomains scan (Subs, tko and probe)
-g               Google dorks searches
-w               Perform web checks only without subs (-l required)
-t               Check subdomain takeover(-l required)
-i               Check all needed tools
-v               Debug/verbose mode, no file descriptor redir
-h               Show this help

SUBDOMAIN OPTIONS
--sp             Passive subdomain scans
--sb             Bruteforce subdomain resolution
--sr             Subdomain permutations and resolution (-l required)
--ss             Subdomain scan by scraping (-l required)

OUTPUT OPTIONS
-o output/path   Define output folder

Features

  • Google Dorks (based on degoogle_hunter)
  • Subdomain enumeration (passive, resolution, bruteforce and permutations)
  • Sub TKO (subjack and nuclei)
  • Web Prober (httpx)
  • Web screenshot (aquatone)
  • Template scanner (nuclei)
  • Port Scanner (naabu)
  • Url extraction (waybackurls, gau, hakrawler, github-endpoints)
  • Pattern Search (gf and gf-patterns)
  • Param discovery (paramspider and arjun)
  • XSS (Gxss and dalfox)
  • Open redirect (Openredirex)
  • SSRF checks (from m4ll0k/Bug-Bounty-Toolz/SSRF.py)
  • Github Check (git-hound)
  • Favicon Real IP (fav-up)
  • JS Checks (LinkFinder, SecretFinder, scripts from JSFScan)
  • Fuzzing (ffuf)
  • Cors (Corsy)
  • SSL Check (testssl)
  • Interlace integration
  • Custom output folder (default under Recon/target.com/)
  • Run standalone steps (subdomains, subtko, web, gdorks...)
  • Polished installer compatible with most distros
  • Verbose mode
  • Update tools script
  • Raspberry supported

Mindmap/Workflow

Mindmap

Improvement plan:

These are the last features that we have implemented, take a look at our pending features or suggest a new feature in the issues section:

✔️ Open Redirect with Openredirex
✔️ SSRF Checks
✔️ More error checks
✔️ More verbose
✔️ Enhance this Readme
✔️ Customize output folder
✔️ Interlace usage
✔️ Crawler
✔️ SubDomainizer
✔️ Install script
✔️ Apt,rpm,pacman compatible installer

You can support this work buying me a coffee:

Thanks

For their great feedback, support, help or for nothing special but well deserved:

About

Simple script for full recon

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Shell 99.1%
  • Dockerfile 0.9%