A tool for performing reconnaissance on web targets in Python.
The tool is designed to integrate into your automation workflow for the reconnaissance stage. Given an engine and an in-scope domain, r3c0n
returns the subdomains and directories associated with the domain.
Engine | Importation | API Key |
---|---|---|
All engines | from r3c0n.engines.all import All |
Free (default) |
Anubis | from r3c0n.engine.anubis import Anubis |
Free |
HackerTarget | from r3c0n.engine.hacker_target import HackerTarget |
Free |
OpenThreat | from r3c0n.engine.open_threat import OpenThreat |
Free |
ProjectSonar | from r3c0n.engine.project_sonar import ProjectSonar |
Free |
Riddler | from r3c0n.engine.riddler import Riddler |
Paid |
Shodan | from r3c0n.engine.shodan import Shodan |
Free Trial/Paid |
ThreatCrowd | from r3c0n.engine.threatcrowd import ThreatCrowd |
Free |
VirusTotal | from r3c0n.engine.virustotal import VirusTotal |
Free/Paid |
More examples below at Usage.
pip install r3c0n
python tests/test_cleanup.py
from r3c0n.engines.anubis import Anubis
domain = 'coda.io'
subdomains = Anubis(domain).subdomains()
print(subdomains)
> ['www.coda.io', 'dev.coda.io', 'blog.coda.io', 'cdn.coda.io', 'staging.coda.io', 'help.coda.io', 'data.coda.io', 'go.coda.io', 'community.coda.io', 'status.coda.io', 'auth.coda.io', 'bounce.coda.io']
from r3c0n.engines.anubis import Anubis
from r3c0n.engines.hacker_target import HackerTarget
domain = 'coda.io'
subdomains = set()
subdomains = set.union(subdomains, set(Anubis(domain).subdomains()))
subdomains = set.union(subdomains, set(HackerTarget(domain).subdomains()))
print(list(subdomains))
> ['bounce.coda.io', 'staging.coda.io', 'data.coda.io', 'cdn.coda.io', 'auth.coda.io', 'dev.coda.io', 'adhoc.coda.io', 'go.coda.io', 'coda.io', 'head.coda.io', 'community.coda.io', 'status.coda.io', 'blog.coda.io', 'www.coda.io', 'help.coda.io', 'maze.coda.io']
# Prints the subdomains from all the engines on the terminal
r3c0n -d coda.io --engines=all
# Outputs the subdomains found from specific engines to a file
r3c0n -d coda.io --engines=anubis,hackertarget --output subdomains.txt