A powerful and modular reconnaissance tool built with Python and Tkinter GUI, designed for information gathering on a target domain. It supports WHOIS lookup, DNS enumeration, subdomain enumeration, port scanning, banner grabbing, and technology detection.
- ✅ WHOIS Lookup
- ✅ DNS Enumeration
- ✅ Subdomain Enumeration
- ✅ Port Scanning
- ✅ Banner Grabbing
- ✅ Technology Detection
- ✅ GUI and CLI support
- ✅ Generates detailed reports in the
reports/folder
git clone https://github.com/yourusername/recon_tool.git
cd recon_toolCreate a virtual environment and install dependencies:
python3 -m venv myenv
source myenv/bin/activate
pip install -r requirements.txt
python recon.py <domain> [options]| Option | Description |
|---|---|
--whois |
Perform WHOIS lookup |
--dns |
Perform DNS enumeration |
--subdomains |
Enumerate subdomains |
--ports |
Scan common ports |
--banners |
Grab service banners (needs --ports) |
--tech |
Detect technologies |
--verbose |
Enable verbose logging |
--debug |
Enable debug logging |
Example:
python recon.py facebook.com --whois --dns --ports --bannerspython gui.py- Enter the target domain.
- Select which recon features you want to run.
- Click on ▶ Run Recon.
- Output will be shown in the console, and a report will be saved in the reports/ folder.
recon_tool/
│
├── recon.py # CLI interface
├── gui.py # GUI interface
├── requirements.txt # Python dependencies
├── README.md # Project documentation
├── modules/ # Recon modules
│ ├── whois_lookup.py
│ ├── dns_enum.py
│ ├── subdomain_enum.py
│ ├── port_scan.py
│ ├── banner_grab.py
│ └── tech_detect.py
├── reports/ # Saved recon reports
└── logs/
--- WHOIS ---
Registrar: XYZ Inc.
Creation Date: 2000-10-10
...
--- DNS ---
A: 93.184.216.34
MX: mail.example.com
...
--- Open Ports ---
22, 80, 443
--- Banners ---
22: OpenSSH 7.4
80: Apache 2.4.29
--- Technologies ---
CMS: WordPress
JS Framework: jQuery
...
This project is licensed under the MIT License — feel free to use, modify, and share!
Built with 💻 and ☕ by Muhammad Talha Attari.
