ReconRaptor is a comprehensive reconnaissance tool designed to perform extensive scanning and enumeration of domains and subdomains. It integrates various open-source tools and APIs to provide detailed information about the target.
- Subdomain enumeration using multiple APIs and SubFinder
- URL fetching using Waymore
- Subdomain takeover detection
- JavaScript exposure scanning
- Live host filtering
- Port scanning using Naabu
- Exposed panel detection
- Reflection scanning
- GF pattern-based scanning
- XSS scanning using Dalfox
- Fuzzing with ffuf
- SQL injection scanning with sqlmap
Make sure you have the following tools installed:
- subfinder
- httpx
- waymore
- subov88r
- nuclei
- naabu
- kxss
- qsreplace
- gf
- dalfox
- ffuf
- interlace
- urldedupe
bash setup.sh
git clone https://github.com/h0tak88r/ReconRaptor.git
cd ReconRaptor
git clone https://github.com/1ndianl33t/Gf-Patterns
mkdir -p ~/.gf
cp Gf-Patterns/*.json ~/.gf
echo 'source $GOPATH/src/github.com/tomnomnom/gf/gf-completion.bash' >> ~/.bashrc
source ~/.bashrc
./reconraptor.sh <target_domain> [-s single_subdomain]
<target_domain>
: The main domain to be scanned.-s single_subdomain
: (Optional) Specify a single subdomain to scan.
-
Scan a domain:
./reconraptor.sh example.com
-
Scan a single subdomain:
./reconraptor.sh example.com -s sub.example.com
Results are saved in the results
directory, which is recreated for each run.
All log messages are saved to reconraptor.log
.
Uses multiple APIs and SubFinder to find subdomains.
Fetches URLs using Waymore.
Detects potential subdomain takeovers.
Scans for exposed JavaScript files.
Filters live hosts using httpx.
Scans top 1000 ports using Naabu.
Detects exposed panels using nuclei templates.
Scans for reflection vulnerabilities using kxss.
Uses GF patterns to detect vulnerabilities such as XSS, SSRF, SSTI, and more.
Scans for XSS vulnerabilities using Dalfox.
Performs fuzzing using ffuf.
Scans for SQL injection vulnerabilities using sqlmap.
This project is licensed under the MIT License.
Contributions are welcome! Please fork the repository and create a pull request.