ReconNote: Web Application Security Recon Automation Framework
ReconNote
Web Application Security Recon Automation Framework
It takes user input as a domain name and maximizes the attack surface area by listing the assets of the domain like –
- Subdomains from – Amass,findomain, subfinder & resolvable subdomains using shuffledns
- Screenshots
- Port Scan
- JS files
- Httpx Status codes of subdomains
- Dirsearch file/dir paths by fuzzing
Installation
1 – Install Docker & docker-compose according to you OS from here
2 – git clone https://github.com/0xdekster/ReconNote.git
3 – Open docker-compose.yml & change the volumes directory path to the output folder
example –
volumes: – /root/reconnote/output/:/var/www/html
4 – Change the API_HOST parameter value to your server/host ip or domain name.
5 – Run docker-compose build OR docker-compose build –no-cache
6 – Run docker-compose up -d
7 – Reconnote framework will be up at – {your-server}:3000
Set Amass Config File to set API Keys
1- cd /ReconNote
2- docker exec -it reconnote_dekster_1 bash
3- cd /deksterrecon
4- nano amass-config.ini
5- Set your API keys and save, exit.
Usage
1 – Just enter the domain/target name in Add Target & choose the scan type
2 – Everything will be done by Reconnote and in few minutes you will get the Scan Results
Scan Result
Demo Video
Source: https://github.com/0xdekster/