ReconNote – Web Application Security Automation Framework Which Recons The Target For Various Assets To Maximize The Attack Surface For Security Professionals & Bug-Hunters
Web Software Safety Recon Automation Framework
It takes person enter as a area name and improve the assault floor region by listing the belongings of the domain like –
- Subdomains from – Amass ,findomain, subfinder & resolvable subdomains making use of shuffledns
- Screenshots
- Port Scan
- JS files
- Httpx Standing codes of subdomains
- Dirsearch file/dir paths by fuzzing
Set up
1 – Put in Docker & docker-compose according to you OS from here – https://docs.docker.com/get-docker/
2 – git clone https://github.com/0xdekster/ReconNote.git
3 – Open docker-compose.yml & modify the volumes listing path to the output folder
example –
volumes: – /root/reconnote/output/:/var/www/html
4 – Transform the API_HOST parameter benefit to your server/host ip or domain title.
5 – Operate docker-compose construct OR docker-compose construct –no-cache
6 – Operate docker-compose up -d
7 – Reconnote framework will be up at – your-server:3000
Established Amass Config File to set API Keys
1- cd /ReconNote
2- docker exec -it reconnote_dekster_1 bash
3- cd /deksterrecon
4- nano amass-config.ini
5- Set your API keys and help save, exit.
Usage
1 – Just enter area/goal title in Include Concentrate on & select scan style
2 – Every thing will be finished by Reconnote and in few minutes you will get the Scan Results
Scan Final result
Demo Online video
Contributions
This is an open up source challenge so contributins are welcome. You can ask for a PR for any alterations that can increase the ReconNote framework be it UI improvement , resources adjustment ,functions , and many others..
Acknowledgements
ReconNote Security framework have been made by utilizing the open resource stability instruments designed by incredible protection neighborhood –
1- Eduard Tolosa
2- Tomnomnom
3- Michen riksen
4- Challenge Discovery
5- Corben Leo