ivan-sincek/auto-recon

GitHub: ivan-sincek/auto-recon

一个基于Python的轻量级OSINT自动化框架,通过整合多种侦察工具实现域名、子域名和路径的高效枚举与信息收集。

Stars: 3 | Forks: 1

# Auto Recon 一个自定义构建的 OSINT 框架,旨在简化和自动化各种侦察任务。 该工具需要大量的设置和配置,除非您从 [https://hub.docker.com](https://hub.docker.com) 安装 Docker 镜像,否则可能无法开箱即用。 收集以下信息: * [TXT 文件](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L32) * [JSON 文件](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L90) 所用工具列表可以在[这里](https://github.com/ivan-sincek/auto-recon/blob/main/src/auto_recon/utils/config.py#L156)找到。 ## 目录 * [如何安装](#how-to-install) * [Docker 安装(推荐)](#docker-install-recommended) * [从源码构建并安装](#build-and-install-from-the-source) * [使用方法](#usage) * [图片](#images) ## 如何安装 ### Docker 安装(推荐) 待办。 ### 从源码构建并安装 ``` git clone https://github.com/ivan-sincek/auto-recon && cd auto-recon python3 -m pip install --upgrade build python3 -m build python3 -m pip install dist/auto_recon-1.0.0-py3-none-any.whl ``` **这不会安装所需的工具。更多信息可以在 [Dockerfile]() 中找到。** ## 使用方法 ``` Auto Recon v1.0.0 ( github.com/ivan-sincek/auto-recon ) Usage: auto-recon -d domain -o out [-s subdomains ] [-r resolvers ] [-w wordlist ] Example: auto-recon -d example.com -o results [-s subdomains.txt] [-r resolvers.txt] [-w wordlist.txt] DESCRIPTION Not another auto-reconnaissance framework DOMAIN Fully qualified domain name to search -d, --domain = example.com | etc. EXCLUSIONS File containing [wildcard] domains, subdomains, and IPs to exclude from the scope If restoring a session, the exclusions file from the output directory has priority over the specified file -e, --exclusions = exclusions.txt | etc. NO FILTERING Do not limit the scope to the FQDN Exclusions are still being respected -nf, --no-filtering SUBDOMAINS File containing subdomains to brute force DNS records -s, --subdomains = subdomains.txt | etc. RESOLVERS File containing trusted DNS resolvers to resolve DNS records -r, --resolvers = resolvers.txt | etc. WORDLIST Wordlist to brute force URL paths -w, --wordlist = wordlist.txt | etc. COLLABORATOR Collaborator URL -c, --collaborator = https://xyz.interact.sh | https://xyz.burpcollaborator.net | etc. THREADS Number of parallel tools to run per stage Default: 5 -th, --threads = 10 | etc. OUT Output directory -o, --out = results | etc. RESTORE SESSION Restore the session from the last breakpoint -rs, --restore-session ``` ## 图片

Runtime

图 1 - 运行时

Collected Results

图 2 - 收集的结果

Specific Results Example

图 3 - 特定结果示例

标签:AES-256, C2日志可视化, Docker, ESC4, ESC6, OSINT, Python, 侦察框架, 子域名挖掘, 安全防御评估, 实时处理, 密码管理, 指纹识别, 无后门, 漏洞评估, 网络安全, 自动化侦察, 请求拦截, 逆向工具, 隐私保护