npm

mrecon

0.0.1 • Public • Published


Your Bug Bounty Recon and Vulnerability Detection Made Simple.


Twitter Follow

How it worksSetupUsageFor DevelopersCredits


Introducing MR.RECON, an advanced and versatile bug bounty recon and vulnerability detection tool powered by the efficiency of bash scripting. Designed with the needs of bug bounty hunters and security researchers in mind, this tool combines powerful reconnaissance techniques with automated vulnerability detection to supercharge your bug hunting efforts.

How it works ?

This tool mainly performs 2 tasks

Enumeration -

  1. Effective Subdomain Enumeration from Various Tools
  2. Get URLs with open HTTP and HTTPS service
  3. JS File Enumeration
  4. GitHub code search, Scans for exposed API keys across all of GitHub

Vulnerability Detection -

  1. Subdomain takeover vulnerability checker
  2. Finds 37+ Vulnerability
    So basically, this is an autmation script for your initial recon and Vulnerability Detection in bugbounty

Setup MR.RECON

MR.RECON requires different tools to run successfully. Run the following command to install the all requirments-

$ git clone git@github.com:techghoshal/mrecon.git
$ cd mrecon
$ sudo ./install.sh

GitHound config.yml

Make sure your github username and password is in "quotation marks"

# Required
github_username: ""
github_password: ""

# Optional (comment out if not using)
# github_totp_seed: "ABCDEF1234567890" # Obtained via https://github.com/settings/security

Two-Factor Authentication

If GitHound is logged into your GitHub account, two-factor authentication may kick in. You can pass 2FA codes to GitHound with --otp-code. Otherwise, GitHound will prompt you for it when it starts up. You can also supply your 2FA seed in the config and you'll never have to worry about 2FA again. Grab the 2FA seed by decoding the barcode that GitHub shows during the 2FA setup process.

You can also provie your own CONDIF file with your API Keys for subdomain enumeration with subfinder (/root/.config/subfinder/provider-config.yaml) and amass (amass_config.ini)

Easy Usage

./mrecon -h
 [HELP]
   mrecon -enum target.com
   mrecon -enumExploit target.com
   mrecon -exploit finalSubdomain.txt waybackurls.txt

Modes

1. Enumuration Mode -

Subdomain and JS File Enumuration, Get URL, Github code search, Find API Keys across all of GitHub

mrecon -enum target.com

2. Exploitation Mode -

Subdomain takeover and finds 37+ vulnerability

mrecon -exploit finalSubdomain.txt waybackurls.txt

3. Enumuration Exploitation Mode -

Enumuration and Exploitation run together

mrecon -enumExploit target.com

For Developers

If you have any queries, you can always contact me on twitter(@techghoshal)

Credits

I would like to express my gratitude to all of the open source projects that have made this tool possible and have made recon tasks easier to accomplish.

Readme

Keywords

none

Package Sidebar

Install

npm i mrecon

Weekly Downloads

0

Version

0.0.1

License

ISC

Unpacked Size

32.5 MB

Total Files

8

Last publish

Collaborators

  • hackwithghoshal