How it works • Setup • Usage • For Developers • Credits
Introducing MR.RECON, an advanced and versatile bug bounty recon and vulnerability detection tool powered by the efficiency of bash scripting. Designed with the needs of bug bounty hunters and security researchers in mind, this tool combines powerful reconnaissance techniques with automated vulnerability detection to supercharge your bug hunting efforts.
Enumeration -
- Effective Subdomain Enumeration from Various Tools
- Get URLs with open HTTP and HTTPS service
- JS File Enumeration
- GitHub code search, Scans for exposed API keys across all of GitHub
Vulnerability Detection -
- Subdomain takeover vulnerability checker
- Finds 37+ Vulnerability
So basically, this is an autmation script for your initial recon and Vulnerability Detection in bugbounty
MR.RECON requires different tools to run successfully. Run the following command to install the all requirments-
$ git clone git@github.com:techghoshal/mrecon.git
$ cd mrecon
$ sudo ./install.sh
Make sure your github username and password is in "quotation marks"
# Required
github_username: ""
github_password: ""
# Optional (comment out if not using)
# github_totp_seed: "ABCDEF1234567890" # Obtained via https://github.com/settings/security
If GitHound is logged into your GitHub account, two-factor authentication may kick in. You can pass 2FA codes to GitHound with --otp-code
. Otherwise, GitHound will prompt you for it when it starts up. You can also supply your 2FA seed in the config and you'll never have to worry about 2FA again. Grab the 2FA seed by decoding the barcode that GitHub shows during the 2FA setup process.
You can also provie your own CONDIF file with your API Keys for subdomain enumeration with subfinder (/root/.config/subfinder/provider-config.yaml) and amass (amass_config.ini)
./mrecon -h
[HELP]
mrecon -enum target.com
mrecon -enumExploit target.com
mrecon -exploit finalSubdomain.txt waybackurls.txt
Subdomain and JS File Enumuration, Get URL, Github code search, Find API Keys across all of GitHub
mrecon -enum target.com
Subdomain takeover and finds 37+ vulnerability
mrecon -exploit finalSubdomain.txt waybackurls.txt
Enumuration and Exploitation run together
mrecon -enumExploit target.com
If you have any queries, you can always contact me on twitter(@techghoshal)
I would like to express my gratitude to all of the open source projects that have made this tool possible and have made recon tasks easier to accomplish.