Recon-ng – Web Reconnaissance Framework


Recon-ng is a full-featured Web Reconnaissance Framework written in Python. Complete with independent modules, database interaction, interactive help, and command completion – Recon-ng provides a powerful environment in which open source web-based reconnaissance can be conducted quickly and thoroughly.

Recon-ng - Web Reconnaissance Framework


Recon-ng has a look and feel and even command flow similar to the Metasploit Framework, reducing the learning curve for leveraging the framework. It is of course quite different though, Recon-ng is not designed to compete with existing frameworks, as it is designed exclusively for web-based open source reconnaissance.

If you want to exploit, use the Metasploit Framework. If you want to social engineer, use the Social-Engineer Toolkit. If you want to conduct passive reconnaissance, use Recon-ng!

An example on active reconnaissance would be Skipfish by the Google Security Team.

What is Recon-ng?

Recon ng is a completely modular framework and makes it easy for even the newest of Python developers to contribute. Each module is a subclass of the “module” class. The “module” class is a customized “cmd” interpreter equipped with built-in functionality that provides simple interfaces to common tasks such as standardizing output, interacting with the database, making web requests, and managing API keys. Therefore, all the hard work has been done. Building modules is simple and takes little more than a few minutes.

Recon-ng Modules

Recon-ng comes with ~80 recon moduloes, 2 discovery modules, 2 exploitation modules, 7 reporting modules and 2 import modules.

  • cache_snoop – DNS Cache Snooper
  • interesting_files – Interesting File Finder
  • command_injector – Remote Command Injection Shell Interface
  • xpath_bruter – Xpath Injection Brute Forcer
  • csv_file – Advanced CSV File Importer
  • list – List File Importer
  • point_usage – Jigsaw – Point Usage Statistics Fetcher
  • purchase_contact – Jigsaw – Single Contact Retriever
  • search_contacts – Jigsaw Contact Enumerator
  • jigsaw_auth – Jigsaw Authenticated Contact Enumerator
  • linkedin_auth – LinkedIn Authenticated Contact Enumerator
  • github_miner – Github Resource Miner
  • whois_miner – Whois Data Miner
  • bing_linkedin – Bing Linkedin Profile Harvester
  • email_validator – SalesMaple Email Validator
  • mailtester – MailTester Email Validator
  • mangle – Contact Name Mangler
  • unmangle – Contact Name Unmangler
  • hibp_breach – Have I been pwned? Breach Search
  • hibp_paste – Have I been pwned? Paste Search
  • pwnedlist – PwnedList Validator
  • migrate_contacts – Contacts to Domains Data Migrator
  • facebook_directory – Facebook Directory Crawler
  • fullcontact – FullContact Contact Enumerator
  • adobe – Adobe Hash Cracker
  • bozocrack – PyBozoCrack Hash Lookup
  • hashes_org – Hashes.org Hash Lookup
  • leakdb – leakdb Hash Lookup
  • metacrawler – Meta Data Extractor
  • pgp_search – PGP Key Owner Lookup
  • salesmaple – SalesMaple Contact Harvester
  • whois_pocs – Whois POC Harvester
  • account_creds – PwnedList – Account Credentials Fetcher
  • api_usage – PwnedList – API Usage Statistics Fetcher
  • domain_creds – PwnedList – Pwned Domain Credentials Fetcher
  • domain_ispwned – PwnedList – Pwned Domain Statistics Fetcher
  • leak_lookup – PwnedList – Leak Details Fetcher
  • leaks_dump – PwnedList – Leak Details Fetcher
  • brute_suffix – DNS Public Suffix Brute Forcer
  • baidu_site – Baidu Hostname Enumerator
  • bing_domain_api – Bing API Hostname Enumerator
  • bing_domain_web – Bing Hostname Enumerator
  • brute_hosts – DNS Hostname Brute Forcer
  • builtwith – BuiltWith Enumerator
  • google_site_api – Google CSE Hostname Enumerator
  • google_site_web – Google Hostname Enumerator
  • netcraft – Netcraft Hostname Enumerator
  • shodan_hostname – Shodan Hostname Enumerator
  • ssl_san – SSL SAN Lookup
  • vpnhunter – VPNHunter Lookup
  • yahoo_domain – Yahoo Hostname Enumerator
  • zone_transfer – DNS Zone File Harvester
  • ghdb – Google Hacking Database
  • punkspider – PunkSPIDER Vulnerabilty Finder
  • xssed – XSSed Domain Lookup
  • xssposed – XSSposed Domain Lookup
  • migrate_hosts – Hosts to Domains Data Migrator
  • bing_ip – Bing API IP Neighbor Enumerator
  • freegeoip – FreeGeoIP
  • ip_neighbor – My-IP-Neighbors.com Lookup
  • ipinfodb – IPInfoDB GeoIP
  • resolve – Hostname Resolver
  • reverse_resolve – Reverse Resolver
  • ssltools – SSLTools.com Host Name Lookups
  • geocode – Address Geocoder
  • reverse_geocode – Reverse Geocoder
  • flickr – Flickr Geolocation Search
  • instagram – Instagram Geolocation Search
  • picasa – Picasa Geolocation Search
  • shodan – Shodan Geolocation Search
  • twitter – Twitter Geolocation Search
  • whois_orgs – Whois Company Harvester
  • reverse_resolve – Reverse Resolver
  • shodan_net – Shodan Network Enumerator
  • census_2012 – Internet Census 2012 Lookup
  • sonar_cio – Project Sonar Lookup
  • migrate_ports – Ports to Hosts Data Migrator
  • dev_diver – Dev Diver Repository Activity Examiner
  • linkedin – Linkedin Contact Crawler
  • linkedin_crawl – Linkedin Profile Crawler
  • namechk – NameChk.com Username Validator
  • profiler – OSINT HUMINT Profile Collector
  • twitter – Twitter Handles
  • github_repos – Github Code Enumerator
  • gists_search – Github Gist Searcher
  • github_dorks – Github Dork Analyzer
  • csv – CSV File Creator
  • html – HTML Report Generator
  • json – JSON Report Generator
  • list – List Creator
  • pushpin – PushPin Report Generator
  • xlsx – XLSX File Creator
  • xml – XML Report Generator

Recon ng Dependencies

All 3rd party libraries/packages should be installed prior to use. The framework checks for the presence of the following dependencies at runtime and disables the modules affected by missing dependencies.

  • dnspython
  • dicttoxml
  • jsonrpclib
  • lxml
  • mechanize
  • slowaes
  • XlsxWriter

You can download Recon-ng here:

To install:

Change into the Recon-ng directory.

Install dependencies.

Or read on how to use Recon-ng here.

Posted in: Hacking Tools

, , ,


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


Comments are closed.