ReconNote – Web Application Security Automation Framework Which Recons The Target For Various Assets To Maximize The Attack Surface For Security Professionals & Bug-Hunters

ReconNote - Web Application Security Automation Framework Which Recons The Target For Various Assets To Maximize The Attack Surface For Security Professionals & Bug-Hunters

Web Software Safety Recon Automation Framework

It takes person enter as a area name and improve the assault floor region by listing the belongings of the domain like –

  • Subdomains from – Amass ,findomain, subfinder & resolvable subdomains making use of shuffledns
  • Screenshots
  • Port Scan
  • JS files
  • Httpx Standing codes of subdomains
  • Dirsearch file/dir paths by fuzzing

Set up

1 – Put in Docker & docker-compose according to you OS from here – https://docs.docker.com/get-docker/
2 – git clone https://github.com/0xdekster/ReconNote.git
3 – Open docker-compose.yml & modify the volumes listing path to the output folder

example –

volumes: – /root/reconnote/output/:/var/www/html

4 – Transform the API_HOST parameter benefit to your server/host ip or domain title.
5 – Operate docker-compose construct OR docker-compose construct –no-cache
6 – Operate docker-compose up -d
7 – Reconnote framework will be up at – your-server:3000

Established Amass Config File to set API Keys

1- cd /ReconNote
2- docker exec -it reconnote_dekster_1 bash
3- cd /deksterrecon
4- nano amass-config.ini
5- Set your API keys and help save, exit.

Usage

1 – Just enter area/goal title in Include Concentrate on & select scan style
2 – Every thing will be finished by Reconnote and in few minutes you will get the Scan Results

ReconNote 1 reconnote3

Scan Final result

ReconNote 2 reconnote4

Demo Online video

 Contributions

This is an open up source challenge so contributins are welcome. You can ask for a PR for any alterations that can increase the ReconNote framework be it UI improvement , resources adjustment ,functions , and many others..

Acknowledgements

ReconNote Security framework have been made by utilizing the open resource stability instruments designed by incredible protection neighborhood –

1- Eduard Tolosa
2- Tomnomnom
3- Michen riksen
4- Challenge Discovery
5- Corben Leo

lnzNyLPZlsE

Picture and Report Source backlink

Examine Extra on Pentesting Instruments

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *

%d bloggers like this: