reconftw

reconftw

Verified 6298 Stars Trending

reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and finding out vulnerabilities

six2dez
May 26, 2025
6298 stars
Category
Bug-bounty
GitHub Stars
6298
Project Added On
May 26, 2025
Contributors
30


reconftw
reconFTW

reconFTW is a powerful automated reconnaissance tool designed for security researchers and penetration testers. It streamlines the process of gathering intelligence on a target by performing subdomain enumeration, vulnerability scanning, OSINT and more. With a modular design, extensive configuration options, and support for distributed scanning via AX Framework, reconFTW is built to deliver comprehensive results efficiently.

reconFTW leverages a wide range of techniques, including passive and active subdomain discovery, web vulnerability checks (e.g., XSS, SSRF, SQLi), OSINT, directory fuzzing, port scanning and screenshotting. It integrates with cutting-edge tools and APIs to maximize coverage and accuracy, ensuring you stay ahead in your reconnaissance efforts.

Key Features:

  • Comprehensive subdomain enumeration (passive, bruteforce, permutations, certificate transparency, etc.)

  • Vulnerability scanning for XSS, SSRF, SQLi, LFI, SSTI, and more

  • OSINT for emails, metadata, API leaks, and third-party misconfigurations

  • Distributed scanning with AX Framework for faster execution

  • Customizable workflows with a detailed configuration file

  • Integration with Faraday for reporting and visualization

  • Support for Docker, Terraform and Ansible deployments

Disclaimer: Usage of reconFTW for attacking targets without prior consent is illegal. It is the user’s responsibility to obey all applicable laws. The developers assume no liability for misuse or damage caused by this tool. Use responsibly.


📔 Table of Contents


✨ Features

reconFTW is packed with features to make reconnaissance thorough and efficient. Below is a detailed breakdown of its capabilities, updated to reflect the latest functionality in the script and configuration.

OSINT

  • Domain Information: WHOIS lookup for domain registration details (whois).

  • Email and Password Leaks: Searches for leaked emails and credentials (emailfinder and LeakSearch).

  • Microsoft 365/Azure Mapping: Identifies Microsoft 365 and Azure tenants (msftrecon).

  • Metadata Extraction: Extracts metadata from indexed office documents (metagoofil).

  • API Leaks: Detects exposed APIs in public sources (porch-pirate and SwaggerSpy).

  • Google Dorking: Automated Google dork queries for sensitive information (dorks_hunter and xnldorker).

  • GitHub Analysis: Scans GitHub organizations for repositories and secrets (enumerepo, trufflehog and gitleaks).

  • Third-Party Misconfigurations: Identifies misconfigured third-party services (misconfig-mapper).

  • Spoofable Domains: Checks for domains vulnerable to spoofing (spoofcheck).

Subdomains

  • Passive Enumeration: Uses APIs and public sources for subdomain discovery (subfinder and github-subdomains).

  • Certificate Transparency: Queries certificate transparency logs (crt).

  • NOERROR Discovery: Identifies subdomains with DNS NOERROR responses (dnsx, more info here).

  • Bruteforce: Performs DNS bruteforcing with customizable wordlists (puredns and custom wordlists).

  • Permutations: Generates subdomain permutations using AI, regex and tools (Gotator, ripgen, regulator and subwiz).

  • Web Scraping: Extracts subdomains from web crawling and JS files (katana).

  • DNS Records: Resolves DNS records for subdomains (dnsx).

  • Google Analytics: Identifies subdomains via Analytics IDs (AnalyticsRelationships).

  • TLS Handshake: Discovers subdomains via TLS ports (tlsx).

  • Recursive Search: Performs recursive passive or bruteforce enumeration combined (dsieve).

  • Subdomain Takeover: Detects vulnerable subdomains (nuclei and dnstake).

  • DNS Zone Transfer: Checks for misconfigured DNS zone transfers (dig).

  • Cloud Buckets: Identifies misconfigured S3 buckets (S3Scanner and CloudHunter).

  • Reverse IP Lookup: Discovers subdomains via IP ranges (hakip2host).

Hosts

  • IP Information: Retrieves geolocation and WHOIS data (ipinfo).

  • CDN Detection: Identifies IPs behind CDNs (cdncheck).

  • WAF Detection: Detects Web Application Firewalls (wafw00f).

  • Port Scanning: Active scanning with nmap and passive scanning with smap.

  • Service Vulnerabilities: Checks for vulnerabilities in open ports (vulners).

  • Password Spraying: Attempts password spraying on identified services (brutespray).

  • Geolocation: Maps IP addresses to geographic locations (ipinfo).

Web Analysis

  • Web Probing: Detects live web servers on standard and uncommon ports ((httpx)).

  • Screenshots: Captures screenshots of web pages (nuclei).

  • Virtual Host Fuzzing: Identifies virtual hosts by fuzzing HTTP headers (VhostFinder).

  • CMS Detection: Identifies content management systems (CMSeeK).

  • URL Extraction: Collects URLs passively and actively (urlfinder, katana, github-endpoints and JSA).

  • URL Pattern Analysis: Classifies URLs using patterns (urless, gf and gf-patterns).

  • Favicon Analysis: Discovers real IPs behind favicons (fav-up).

  • JavaScript Analysis: Extracts secrets and endpoints from JS files (subjs, [JSA](ht

... Content truncated. Click "See More" to view the full README.

Tool Information

Author

six2dez

Project Added On

May 26, 2025

License

Open Source

Tags

bug-bounty bugbounty dns fuzzing hacking nuclei osint penetration-testing pentest pentest-tool pentesting recon reconnaissance scanner security security-tools subdomain vulnerabilities