This is a live development project, until the first stable release (1.0) it will be constantly updated in master branch, so if you have detected any bug, you can open an issue or ping me over Telegram or Twitter and I will try to do my best :)
ReconFTW performs automated enumeration of subdomains via various techniques and futher scanning for vulnerabilties, to give you a potential vulns.
- Installation Guide
- Requires Golang > 1.14 installed and paths correctly set ($GOPATH,$GOROOT)
git clone https://github.com/six2dez/reconftw
cd reconftw
chmod +x *.sh
./install.sh
./reconftw.sh -d target.com -a
- It is highly recommended, and in some cases essential, to set your api keys or env variables:
- amass (
~/.config/amass/config.ini
) - subfinder (
~/.config/subfinder/config.yaml
) - git-hound (
~/.githound/config.yml
) - github-endpoints.py (
GITHUB_TOKEN
env var) - favup (
shodan init <SHODANPAIDAPIKEY>
) - SSRF Server (
COLLAB_SERVER
env var) - Blind XSS Server (
XSS_SERVER
env var)
- amass (
- This script uses dalfox with blind-xss option, you must change to your own server, check xsshunter.com.
TARGET OPTIONS -d DOMAIN Target domain -l list.txt Targets list, one per line MODE OPTIONS -a Perform all checks -s Full subdomains scan (Subs, tko and probe) -g Google dorks searches -w Perform web checks only without subs (-l required) -t Check subdomain takeover(-l required) -i Check all needed tools -v Debug/verbose mode, no file descriptor redir -h Show this help SUBDOMAIN OPTIONS --sp Passive subdomain scans --sb Bruteforce subdomain resolution --sr Subdomain permutations and resolution (-l required) --ss Subdomain scan by scraping (-l required) OUTPUT OPTIONS -o output/path Define output folder
- Google Dorks (based on degoogle_hunter)
- Subdomain enumeration (passive, resolution, bruteforce and permutations)
- Sub TKO (subjack and nuclei)
- Web Prober (httpx)
- Web screenshot (aquatone)
- Template scanner (nuclei)
- Port Scanner (naabu)
- Url extraction (waybackurls, gau, hakrawler, github-endpoints)
- Pattern Search (gf and gf-patterns)
- Param discovery (paramspider and arjun)
- XSS (Gxss and dalfox)
- Open redirect (Openredirex)
- SSRF checks (from m4ll0k/Bug-Bounty-Toolz/SSRF.py)
- Github Check (git-hound)
- Favicon Real IP (fav-up)
- JS Checks (LinkFinder, SecretFinder, scripts from JSFScan)
- Fuzzing (ffuf)
- Cors (Corsy)
- SSL Check (testssl)
- Interlace integration
- Custom output folder (default under Recon/target.com/)
- Run standalone steps (subdomains, subtko, web, gdorks...)
- Polished installer compatible with most distros
- Verbose mode
- Update tools script
- Raspberry supported
These are the last features that we have implemented, take a look at our pending features or suggest a new feature in the issues section:
✔️ Open Redirect with Openredirex
✔️ SSRF Checks
✔️ More error checks
✔️ More verbose
✔️ Enhance this Readme
✔️ Customize output folder
✔️ Interlace usage
✔️ Crawler
✔️ SubDomainizer
✔️ Install script
✔️ Apt,rpm,pacman compatible installer
You can support this work buying me a coffee:
For their great feedback, support, help or for nothing special but well deserved: