๐ Dynamic Information Gathering Toolkit powered by modular recon agents and AI-assisted suggestions. Built for Termux, Linux, and modern offensive recon.
- ๐ Google Dorking with rotating user-agents
- ๐ Subdomain Enumeration (passive and active)
- ๐ Port Scanning using sockets (Nmap-compatible)
- ๐ต๏ธ OSINT Lookup (WHOIS, leaks, geo-IP, and more)
- ๐ค AI Assistant (GPT-style recon tips & dork generation)
- ๐ง Smart CLI + Interactive Menu โ choose how you recon
- ๐ Auto-logs everything by timestamp in
data/<target>/ - ๐ก Designed for both root and non-root users (Termux-ready)
| Module | Emoji | Function |
|---|---|---|
dork.py |
๐ | Google/Searx scraping + user-agents |
subdomains.py |
๐ | Passive/active subdomain finder |
ports.py |
๐ | Socket scanner (top ports) |
osint.py |
๐ต๏ธ | WHOIS, leaks, basic geo-IP info |
ai_assist.py |
๐ค | GPT-based suggestions (offline/local) |
If you're using Termux:
pkg update && pkg install git python curl wget -y
git clone https://github.com/GbeshMod/MARe.git
cd MARe
chmod +x install.sh
./install.shpython3 mare.pymare --target example.com --dork --subdomains
mare --target 1.1.1.1 --full- โ Works in rootless environments (Termux, WSL, etc.)
- ๐ง Linux (root or non-root)
- ๐ Termux (no root)
- ๐ช WSL (Windows Subsystem for Linux)
- โ Auto-installs dependencies where possible
- โ Python-based modular framework
- โ
Adds
mareas a global command - โ
Supports shortcut creation and
$PATHexport - โ Built-in user agent rotation file
- โ Optional post-i
- โ Works on Linux, Termux, WSL, Kali, Parrot
- โ No
sudorequired โ fully user-space
- Suggest a module
- Fork & pull requests welcome
- Use responsibly โ for educational and legal testing only
This tool is provided for educational and research purposes only. Use responsibly and only against systems you own or are authorized to test. nstall launch
๐งผ Uninstall
rm -rf ~/.mare
rm ~/.local/bin/mare
# Optional: remove from your ~/.bashrc or ~/.zshrc if added
---
๐ Folder Structure
.mare/
โโโ mare.py # Main tool
โโโ data/
โ โโโ example.com/ # Default scan target dir
โ โโโ user_agents.txt