/Reconbot

Reconnaissance and Enumeration automation script

Primary LanguagePython

Reconbot

Reconnaissance and Enumeration bot

Reconbot allows you to speed up the process of Reconnaissance and Enumeration by automaticly running different nmap scans, enumeration scripts and brute-force scripts. All logged in their seperate files while displaying some details to be able to start poking quickly.

pivot screenshot

Installation

You only need 1 python package for this script to work (I think, let me know if you have any issues), to install use the following command:

sudo pip3 install termcolor

Then you can just run reconbot:

sudo ./reconbot 10.10.10.10

usage: Reconbot [-h] [-HF] [-p] [-U] [-P] [-w] [--nmaponly] [--quick] [--bruteonly] [--verbose]

Automated Reconnaissance Bot

positional arguments:
                     Target

optional arguments:
  -h, --help         show this help message and exit
  -HF , --hostfile   File containing targets to scan
  -p , --ports       Ports to scan
  -U , --userlist    Wordlist to use for usernames when bruteforcing
  -P , --passlist    Wordlist to use for passwords when bruteforcing
  -w , --weblist     Wordlist to use for web directory bruteforcing
  --nmaponly         Only activate the nmap scripts
  --quick            Only activate quick port scanning
  --bruteonly        Only activate the hydra bruteforcing scripts
  --verbose          Display extra output in the reconbot output (things like paths gobuster finds)

EXAMPLES

reconbot 1.1.1.1                                                                        # Full recon scan of target
reconbot -HF ./hosts                                                                    # Full recon scan of targets in file
reconbot 1.1.1.1 -p 80,443                                                              # Recon scan of target only scanning port 80
reconbot 1.1.1.1 -w /usr/share/wordlist/webfiles.txt                                    # Full recon scan of target using custom web directory bruteforce wordlist
reconbot 1.1.1.1 -U /wordlist/usernames.txt -P /wordlist/passwords.txt                  # Full recon scan of target using custom username and password wordlists
reconbot 1.1.1.1 --nmaponly                                                             # Nmap only scan of target
reconbot 1.1.1.1 --nmaponly --quick                                                     # Nmap only scan of target only using quick scans
reconbot 1.1.1.1 -p 22,21 --bruteonly --quick -P /wordlist/passwords.txt                # Bruteforce only scan of target only using quick nmap scans to discover ports