A tool for performing reconnaissance on web targets in Python.
Project description
r3c0n
A tool for performing reconnaissance on web targets in Python.
Description
The tool is designed to integrate into your automation workflow for the reconnaissance stage. Given an engine and an in-scope domain, r3c0n
returns the subdomains and directories associated with the domain.
Supported Engines
Engine | Importation | API Key |
---|---|---|
All engines | from r3c0n.engines.all import All |
Free (default) |
Anubis | from r3c0n.engine.anubis import Anubis |
Free |
HackerTarget | from r3c0n.engine.hacker_target import HackerTarget |
Free |
OpenThreat | from r3c0n.engine.open_threat import OpenThreat |
Free |
ProjectSonar | from r3c0n.engine.project_sonar import ProjectSonar |
Free |
Riddler | from r3c0n.engine.riddler import Riddler |
Paid |
Shodan | from r3c0n.engine.shodan import Shodan |
Free Trial/Paid |
ThreatCrowd | from r3c0n.engine.threatcrowd import ThreatCrowd |
Free |
VirusTotal | from r3c0n.engine.virustotal import VirusTotal |
Free/Paid |
More examples below at Usage.
Installation
pip install r3c0n
Run tests
python tests/test_cleanup.py
Usage
Single import
from r3c0n.engines.anubis import Anubis
domain = 'coda.io'
subdomains = Anubis(domain).subdomains()
print(subdomains)
> ['www.coda.io', 'dev.coda.io', 'blog.coda.io', 'cdn.coda.io', 'staging.coda.io', 'help.coda.io', 'data.coda.io', 'go.coda.io', 'community.coda.io', 'status.coda.io', 'auth.coda.io', 'bounce.coda.io']
Multiple imports
from r3c0n.engines.anubis import Anubis
from r3c0n.engines.hacker_target import HackerTarget
domain = 'coda.io'
subdomains = set()
subdomains = set.union(subdomains, set(Anubis(domain).subdomains()))
subdomains = set.union(subdomains, set(HackerTarget(domain).subdomains()))
print(list(subdomains))
> ['bounce.coda.io', 'staging.coda.io', 'data.coda.io', 'cdn.coda.io', 'auth.coda.io', 'dev.coda.io', 'adhoc.coda.io', 'go.coda.io', 'coda.io', 'head.coda.io', 'community.coda.io', 'status.coda.io', 'blog.coda.io', 'www.coda.io', 'help.coda.io', 'maze.coda.io']
Running from the Terminal
# Prints the subdomains from all the engines on the terminal
r3c0n -d coda.io --engines=all
# Outputs the subdomains found from specific engines to a file
r3c0n -d coda.io --engines=anubis,hackertarget --output subdomains.txt
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
r3c0n-1.2.4.tar.gz
(8.4 kB
view details)
File details
Details for the file r3c0n-1.2.4.tar.gz
.
File metadata
- Download URL: r3c0n-1.2.4.tar.gz
- Upload date:
- Size: 8.4 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: twine/3.8.0 pkginfo/1.8.2 readme-renderer/33.0 requests/2.26.0 requests-toolbelt/0.9.1 urllib3/1.26.7 tqdm/4.63.0 importlib-metadata/4.8.2 keyring/23.5.0 rfc3986/2.0.0 colorama/0.4.4 CPython/3.7.9
File hashes
Algorithm | Hash digest | |
---|---|---|
SHA256 | c2b1cbc6ef51eef2cc5b2e27b081e32857e3d25d87fe3ea20cc172f2da88b257 |
|
MD5 | 9cdb5ff88e1bd66a6c8165027db2db8e |
|
BLAKE2b-256 | da6419c3e5b97940a1f0c6d1cef1ba391efbd9ee57bd02216d571425448c205f |