Skip to content

A modular Python-based recon framework for red teaming and bug bounty engagements. Features include subdomain enumeration, DNS resolution, port scanning, web fingerprinting, directory brute-forcing, screenshots, vulnerability intelligence, customizable wordlists, detailed logs, and timestamped reports. Fully automated and easy to extend.

License

Notifications You must be signed in to change notification settings

aenoshrajora/recon-pipeline

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Full-Scale Recon Automation Pipeline

A modular Python-based reconnaissance framework designed for red teaming, penetration testing, and bug bounty engagements. Automates subdomain enumeration, DNS resolution, port scanning, web fingerprinting, directory brute-forcing, screenshots, and vulnerability intelligence. Includes detailed logs, customizable wordlists, timestamped reports, and optional Slack/Discord notifications.

🚀 Features

  • Automated Subdomain Discovery: Uses subfinder and amass to enumerate all subdomains.
  • DNS Resolution: Filters live hosts for accurate targeting.
  • Port Scanning: Fast scan with Masscan + detailed Nmap service/version scan.
  • Web Technology Fingerprinting: Detects web servers, frameworks, CMS, and other tech stacks.
  • Directory Bruteforcing: Discover hidden endpoints using customizable wordlists.
  • Web Screenshotting: Capture visual snapshots of live hosts with gowitness.
  • Vulnerability Intelligence: Banner/version gathering with placeholders for CVE matching.
  • Notifications: Optional Slack/Discord alerts when recon completes.
  • Structured Reports: Timestamped folders with JSON, text, and screenshots per target.
  • Modular & Extensible: Easy to add new tools or API integrations (Shodan, Censys, etc.).

Folder Structure

recon-pipeline/
├─ targets/ # Target domains/IPs (one per line)
├─ wordlists/ # Directory brute-force wordlists
├─ reports/ # Timestamped recon reports per target
├─ logs/ # Runtime logs for debugging
├─ recon/
│ ├─ main.py # Orchestrates the pipeline
│ ├─ config.py # Configuration (threads, tool paths, webhooks)
│ ├─ modules/ # Modular scripts for each recon step
│ └─ utils/ # Notification scripts

🛠 Installation

  1. Clone the repository:
git clone https://github.com/aenoshrajora/recon-pipeline.git
cd recon-pipeline/recon
  1. Install dependencies:
pip install -r requirements.txt
  1. Ensure required tools are installed:
subfinder
amass
masscan
nmap
httpx
ffuf
gowitness
dnsx
  1. Configure config.py:

Set thread count, output directories, wordlists, and optional Slack/Discord webhooks.

Usage

  1. Add targets to targets/targets.txt:
example.com
testsite.local
  1. Run the pipeline:
python3 main.py
  1. Check reports/ for timestamped folders containing all outputs:
reports/example.com_20250907_2100/
├─ all_subs.txt
├─ live_subs.txt
├─ masscan.txt
├─ nmap.txt
├─ web_hosts.txt
├─ ffuf_example.com.json
├─ screenshots/
└─ vuln_intel.txt

Extensibility

  • Integrate Shodan/Censys APIs for external intelligence.
  • Add automated CVE matching using Nmap scripts or Python CVE APIs.
  • Create a web dashboard to visualize results in real-time.
  • Containerize the pipeline using Docker for portability.

Legal Disclaimer

This tool is intended for authorized penetration testing, bug bounty programs, and educational purposes only. Use it responsibly and ensure you have explicit permission for all targets. The author is not responsible for any misuse.

Contributing

  • Contributions are welcome! Please:
  • Fork the repo
  • Create a branch (feature-name)
  • Commit your changes
  • Open a pull request

Contact

Star this repo if you find it useful!

About

A modular Python-based recon framework for red teaming and bug bounty engagements. Features include subdomain enumeration, DNS resolution, port scanning, web fingerprinting, directory brute-forcing, screenshots, vulnerability intelligence, customizable wordlists, detailed logs, and timestamped reports. Fully automated and easy to extend.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages