AutoRecon | threaded network reconnaissance tool which performs | Security Testing library
kandi X-RAY | AutoRecon Summary
kandi X-RAY | AutoRecon Summary
AutoRecon is a Python library typically used in Testing, Security Testing applications. AutoRecon has no bugs, it has no vulnerabilities, it has build file available, it has a Strong Copyleft License and it has medium support. You can download it from GitHub.
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans / service detection scans. From those initial results, the tool will launch further enumeration scans of those services using a number of different tools. For example, if HTTP is found, nikto will be launched (as well as many others). Everything in the tool is highly configurable. The default configuration performs no automated exploitation to keep the tool in line with OSCP exam rules. If you wish to add automatic exploit tools to the configuration, you do so at your own risk. The author will not be held responsible for negative actions that result from the mis-use of this tool.
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services. It is intended as a time-saving tool for use in CTFs and other penetration testing environments (e.g. OSCP). It may also be useful in real-world engagements. The tool works by firstly performing port scans / service detection scans. From those initial results, the tool will launch further enumeration scans of those services using a number of different tools. For example, if HTTP is found, nikto will be launched (as well as many others). Everything in the tool is highly configurable. The default configuration performs no automated exploitation to keep the tool in line with OSCP exam rules. If you wish to add automatic exploit tools to the configuration, you do so at your own risk. The author will not be held responsible for negative actions that result from the mis-use of this tool.
Support
Quality
Security
License
Reuse
Support
AutoRecon has a medium active ecosystem.
It has 4120 star(s) with 790 fork(s). There are 98 watchers for this library.
It had no major release in the last 6 months.
There are 26 open issues and 118 have been closed. On average issues are closed in 46 days. There are 2 open pull requests and 0 closed requests.
It has a neutral sentiment in the developer community.
The latest version of AutoRecon is current.
Quality
AutoRecon has no bugs reported.
Security
AutoRecon has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
License
AutoRecon is licensed under the GPL-3.0 License. This license is Strong Copyleft.
Strong Copyleft licenses enforce sharing, and you can use them when creating open source projects.
Reuse
AutoRecon releases are not available. You will need to build from source code and install.
Build file is available. You can build the component from source.
Installation instructions, examples and code snippets are available.
Top functions reviewed by kandi - BETA
kandi has reviewed AutoRecon and discovered the below as its top functions. This is intended to give you an instant insight into AutoRecon implemented functionality, and help decide if they suit your requirements.
- Start the application
- Print error message
- Print a failure message
- Print a message to stdout
- Manage manual command usage
- Add manual commands
- Get option value
- Run the service
- Read lines from the stream
- Manage manual commands
- Add manual logins
- Manage the bruteforce subdomains
- Configure tools
- Install custom commands
- Check that the tool is installed
- Check for known security txt files
- Run robots txt
- Run Heruster dns command
- Execute a command
- Run ftfbuster
- Run nmap
- Execute a single port scan
- Create reports
- Execute the given command
- Write the given targets
- Extract services from a stream
Get all kandi verified functions for this library.
AutoRecon Key Features
No Key Features are available at this moment for AutoRecon.
AutoRecon Examples and Code Snippets
Copy
$ go get github.com/ziutek/mymysql/autorc
package main
import (
"os"
"log"
"github.com/ziutek/mymysql/mysql"
"github.com/ziutek/mymysql/autorc"
_ "github.com/ziutek/mymysql/thrsafe"
)
const (
db_proto = "tcp"
db_addr =
Copy
python3 autorecon.py 127.0.0.1
[*] Scanning target 127.0.0.1
[*] Running service detection nmap-full-tcp on 127.0.0.1
[*] Running service detection nmap-top-20-udp on 127.0.0.1
[*] Running service detection nmap-quick on 127.0.0.1
[*] Service detecti
Copy
[ftp]
service-names = [
'^ftp',
'^ftp\-data'
]
[[ftp.scan]]
name = 'nmap-ftp'
command = 'nmap {nmap_extra} -sV -p {port} --script="(ftp* or ssl*) and not (brute or broadcast or dos or external or fuzzer)" -oN "{scandir}/{protoco
Community Discussions
Trending Discussions on AutoRecon
QUESTION
How to take multiple screenshots through Selenium in Python?
Asked 2018-Aug-06 at 15:32
GECKODRIVER_PATH = 'F:/geckodriver.exe'
firefox_options = Options()
firefox_options .add_argument("-headless")
driver = webdriver.Firefox(executable_path=CHROMEDRIVER_PATH, firefox_options = firefox_options )
test = []
test.append('http://google.com')
test.append('http://stackoverflow.com')
for x in test:
print x
driver.get(x)
driver.set_page_load_timeout(20)
filename = str(x)+'.png'
driver.save_screenshot( filename )
driver.close()
...ANSWER
Answered 2018-Aug-06 at 13:05Try to move driver.close()
out of loop:
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install AutoRecon
If you don't have a Kali instance, you can quickly install AutoRecon using the Dockerfile in the repository. Simply download the Dockerfile, and run the following command from the same directory:.
Ensure you have all of the requirements installed as per the previous section.
Ensure you have all of the requirements installed as per the previous section.
Support
Several commands used in AutoRecon reference the SecLists project, in the directory /usr/share/seclists/. You can either manually download the SecLists project to this directory (https://github.com/danielmiessler/SecLists), or if you are using Kali Linux (highly recommended) you can run the following:. AutoRecon will still run if you do not install SecLists, though several commands may fail, and some manual commands may not run either.
Find more information at:
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page