ReconDog is a Information Gathering and Vulnerability Scanner tool written in Python. It’s an all in one tool for all basic information gathering tasks, such as:
- enumerating subdomains, port scanning, reverse IP lookup, NS lookup, detecting honeypot, detecting CMS, etc.
ReconDog: All In One Tool For Information Gathering
Recon Dog is program designed to perform all most common recon tasks. In other words, it’s a python script which you can use for your information gathering needs. It uses APIs for gathering, so no direct contact is made to the target and your identity wont be exsposed.
- Wizard + CLA interface
- Can extracts targets from STDIN (piped input) and act upon them
- All the information is extracted with APIs, no direct contact is made to the target
You can run ReconDog on anything that has a python interpreter installed. Tested on:
- OSs: Windows, Linux, Mac
- Python v:
Clone it from the github repo:
$ git clone https://github.com/s0md3v/ReconDog.git
Then install the requirements (
$ pip install -r requirements.txt
And all you need to do is to simply run it, as a normal python script. There is no need for manual configuration.
python 2/3with brew (brew depends on Apple’s xcoode). With
$ xcode-select --install $ /usr/bin/ruby -e "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/master/install)" $ brew install python3
- Install the requirements:
$ pip3 install -r requirements.txt
- Then run with the following:
$ python3 dog
_____ ____ | __ |___ ___ ___ ___ |\_/| | \ ___ ___ | -| -_| _| . | | |. .| | | | . | . | |__|__|___|___|___|_|_| \_/ |____/|___|_ | |___| v2.0 1. Censys 2. NS lookup 3. Port scan 4. Detect CMS 5. Whois lookup 6. Detect honeypot 7. Find subdomains 8. Reverse IP lookup 9. Detect technologies 0. All >>
The easiest way to use ReconDog is trough WI. Run it, select what you want from the list and enter the target. That’s it.
You can also use it trough CLI (Command Line Interface). Example:
$ python dog -t example.com -c 7
To enumerate subdomains and scan ports of all found subdomains, run the following:
$ subdomainfinder -t example.com | python dog --domains -c 3
If you just want to print the targets, leaves out
Recon Dog uses regular expressions to find targets, so you can integrate it with every tool. There are two switches available:
--domains: extract domains from STDIN
--ips extract: ip addresses from STDIN