- Overview
- Author
- Features
- Theory Behind The Features
- Installation & Usage
- Usage Guide
- Disclaimer
- Contributing
- License
ReconX Scan is an advanced network security toolkit built with Streamlit that provides a user-friendly interface for cybersecurity tasks. This tool helps security analysts, penetration testers, and IT professionals perform essential network reconnaissance and security assessments.
🚀 Live Demo: ReconX
Created by Atharv Yadav - GitHub Profile
🔗GitHub Repository: ReconX
- Scans a given target IP within the range 1-500.
- Uses multi-threading (50 threads) to speed up scanning.
- Detects open ports, service banners, and potential vulnerabilities.
- Identifies outdated services that may have known exploits.
- Uses a basic TCP handshake technique to infer the target OS.
- Determines if the system is Linux/Unix or Windows Server based on response analysis.
- Fetches WHOIS information for a given domain or IP.
- Useful for gathering ownership details and domain registration data.
- Converts an IP address to a domain name (if available).
- Helps in identifying associated domains with an IP.
- Retrieves important DNS records (A, AAAA, MX, NS, CNAME, TXT).
- Helps in subdomain enumeration and understanding domain infrastructure.
Port scanning is an active reconnaissance technique used to identify open ports on a target machine. Open ports can indicate running services, which may be exploitable.
By analyzing responses to network requests, we can make an educated guess about the OS running on the target.
WHOIS databases store domain ownership information. Retrieving this data helps in reconnaissance by providing details about registrants, contact info, and hosting providers.
Maps an IP address back to a domain name. If a reverse DNS record exists, it provides clues about the target.
DNS records contain valuable information about a domain’s infrastructure, such as mail servers (MX), authoritative name servers (NS), and textual metadata (TXT).
Ensure you have Python 3.x installed on your system.
git clone https://github.com/atharvbyadav/ReconX.git
cd ReconX
pip install -r requirements.txt
streamlit run ReconX.py
The application will open in your default web browser.
- Enter the Target IP Address.
- Click Start Port Scan.
- View the open ports, banners, outdated services, and potential risks.
- Enter the Target IP Address.
- Click Detect OS.
- View the estimated OS of the target.
- Enter the Domain or IP Address.
- Click Get WHOIS Info.
- View the WHOIS data fetched from public databases.
- Enter the Target IP Address.
- Click Perform Reverse DNS Lookup.
- View the associated domain (if any).
- Enter the Domain Name.
- Click Enumerate DNS.
- View all DNS records found.
This tool is meant for educational and security research purposes only. Unauthorized scanning of networks you do not own or have explicit permission to test is illegal and punishable under cyber laws.
Use this tool responsibly and ethically!
We welcome contributions! Feel free to fork this repository, improve the tool, and submit a pull request. Reach out for Ideas and Suggetions...
This project is licensed under the MIT License.