3.7 KiB
3.7 KiB
DeadHydra Scripts Collection
Elite hacker tools and penetration testing scripts.
🎯 Recon Scanner
Advanced reconnaissance tool for penetration testing and security research.
Features
- DNS Resolution - Resolve hostnames to IP addresses
- Port Scanning - Multi-threaded TCP port scanning
- Banner Grabbing - Service version detection
- DNS Enumeration - Query all DNS record types
- Subdomain Discovery - Brute-force subdomain enumeration
- Web Technology Detection - Identify CMS, frameworks, libraries
- WHOIS Lookup - Domain registration information
- JSON Export - Structured output format
Installation
# Install dependencies
pip3 install dnspython requests urllib3
# Make script executable
chmod +x recon_scanner.py recon.sh
Usage
Quick Start
# Basic scan
./recon.sh -t example.com
# Quick scan (common ports only)
./recon.sh -t example.com --quick
# With output file
./recon.sh -t example.com -o results.json
Advanced Usage
# Full port scan (1-65535)
./recon.sh -t example.com --full
# Custom port range
./recon.sh -t 192.168.1.1 -p 1-1000
# Specific ports
./recon.sh -t example.com -p 22,80,443,8080
# Subdomain enumeration with custom wordlist
./recon.sh -t example.com --subdomains subdomains.txt
# Scan IP address
./recon.sh -t 192.168.1.1 --quick
Command Line Options
-t, --target TARGET Target domain or IP address (required)
-p, --ports PORTS Port range (e.g., 1-1000) or comma-separated
-o, --output OUTPUT Output file for results (JSON format)
--subdomains WORDLIST Subdomain wordlist file
--quick Quick scan (common ports only)
--full Full scan (all 65535 ports)
What It Scans
- Network Layer: IP resolution, reverse DNS
- Transport Layer: TCP port scanning (multi-threaded)
- Application Layer: HTTP/HTTPS, FTP, SSH, SMTP, MySQL, RDP, etc.
- DNS Infrastructure: A, AAAA, MX, NS, TXT, SOA, CNAME records
- Subdomain Discovery: Brute-force with customizable wordlists
- Web Stack: Server headers, CMS detection, framework identification
- Registration Data: WHOIS domain information
Output Format
Results are saved in JSON format with the following structure:
{
"target": "example.com",
"scan_time": "2025-11-07T00:00:00",
"ip_addresses": ["93.184.216.34"],
"open_ports": [80, 443],
"services": [...],
"subdomains": [...],
"dns_records": {...},
"web_technologies": {...}
}
Files
recon_scanner.py- Main scanner scriptrecon.sh- Convenience wrapper scriptsubdomains.txt- Default subdomain wordlist (100+ entries)
Examples
Scan a website
./recon.sh -t example.com -o example_scan.json
Quick security assessment
./recon.sh -t target.com --quick --subdomains subdomains.txt
Full infrastructure scan
./recon.sh -t target.com --full -o full_scan.json
Network range scan
./recon.sh -t 192.168.1.1 -p 1-1000
Security Notes
⚠️ Authorization Required: Only use this tool on systems you own or have explicit permission to test.
⚠️ Legal Compliance: Unauthorized port scanning and reconnaissance may be illegal in your jurisdiction.
⚠️ Ethical Usage: This tool is intended for:
- Authorized penetration testing
- Security research with permission
- CTF competitions
- Educational purposes
- Testing your own infrastructure
Contributing
This is part of the DeadHydra Collective security toolkit. Contributions welcome!
License
MIT License - Use responsibly and ethically.
HACK THE PLANET // DeadHydra Collective