FinalRecon is a fast and simple python program for web recognition. It follows a specific structure so that in the future new sections can be added easily.
Specifications
FinalRecon has a variety of features such as:
- Header Information
- Whois
- SSL Certificate Information
- crawler
- html
- CSS
- JavaScripts
- Internal Links
- External Links
- Pictures
- robots
- Sitemaps
- Links inside Javascripts
- Links from Wayback Machine from Last 1 Year
- html
- DNS Enumeration
- A, AAAA, ANY, CNAME, MX, NS, SOA, TXT Records
- DMARC Records
- Subdomain Enumeration
- Data Sources
- BuffOver
- crt.sh
- ThreatCrowd
- AnubisDB
- ThreatMiner
- Facebook Certificate Transparency API
- Auth Token is Required for this source, read Configuration below
- Data Sources
- traceroute
- Protocols
- UDP
- TCP
- ICMP
- Protocols
- Directory Searching
- Support for File Extensions
- Directories from Wayback Machine from Last 1 Year
- Port Scan
- Fast
- Top 1000 Ports
- Open Ports with Standard Services
- Export
- Formats
- txt
- xml
- csv
- Formats
Tested on
Tested on:
- Kali Linux
- BlackArch Linux
FinalRecon is a tool for Pentesters and is designed for Linux-based operating systems, others platforms such as Windows and Termux are not supported. To run FinalRecon on Termux, you will first need to install a distribution such as Kali.
Installation
BlackArch Linux
pacman -S finalrecon
SecBSD
doas pkg_add finalrecon
Kali Linux
git clone https://github.com/thewhiteh4t/FinalRecon.gitcd FinalReconpip3 install -r requirements.txt
Docker
docker pull thewhiteh4t / finalrecondocker run -it –entrypoint / bin / sh thewhiteh4t / finalrecon
Use
python3 finalrecon.py -h
You can also see how the program works in its wizard NullByte or at YouTube
Application Screenshots