mrecon
v0.0.1
Published
Your Bug Bounty Recon and Vulnerability Detection Made Simple.
Downloads
1
Readme
Introducing MR.RECON, an advanced and versatile bug bounty recon and vulnerability detection tool powered by the efficiency of bash scripting. Designed with the needs of bug bounty hunters and security researchers in mind, this tool combines powerful reconnaissance techniques with automated vulnerability detection to supercharge your bug hunting efforts.
How it works ?
This tool mainly performs 2 tasks
Enumeration -
- Effective Subdomain Enumeration from Various Tools
- Get URLs with open HTTP and HTTPS service
- JS File Enumeration
- GitHub code search, Scans for exposed API keys across all of GitHub
Vulnerability Detection -
Subdomain takeover vulnerability checker
Finds 37+ Vulnerability So basically, this is an autmation script for your initial recon and Vulnerability Detection in bugbounty
Setup MR.RECON
MR.RECON requires different tools to run successfully. Run the following command to install the all requirments-
$ git clone [email protected]:techghoshal/mrecon.git
$ cd mrecon
$ sudo ./install.sh
GitHound config.yml
Make sure your github username and password is in "quotation marks"
# Required
github_username: ""
github_password: ""
# Optional (comment out if not using)
# github_totp_seed: "ABCDEF1234567890" # Obtained via https://github.com/settings/security
Two-Factor Authentication
If GitHound is logged into your GitHub account, two-factor authentication may kick in. You can pass 2FA codes to GitHound with --otp-code
. Otherwise, GitHound will prompt you for it when it starts up. You can also supply your 2FA seed in the config and you'll never have to worry about 2FA again. Grab the 2FA seed by decoding the barcode that GitHub shows during the 2FA setup process.
You can also provie your own CONDIF file with your API Keys for subdomain enumeration with subfinder (/root/.config/subfinder/provider-config.yaml) and amass (amass_config.ini)
Easy Usage
./mrecon -h
[HELP]
mrecon -enum target.com
mrecon -enumExploit target.com
mrecon -exploit finalSubdomain.txt waybackurls.txt
Modes
1. Enumuration Mode -
Subdomain and JS File Enumuration, Get URL, Github code search, Find API Keys across all of GitHub
mrecon -enum target.com
2. Exploitation Mode -
Subdomain takeover and finds 37+ vulnerability
mrecon -exploit finalSubdomain.txt waybackurls.txt
3. Enumuration Exploitation Mode -
Enumuration and Exploitation run together
mrecon -enumExploit target.com
For Developers
If you have any queries, you can always contact me on twitter(@techghoshal)
Credits
I would like to express my gratitude to all of the open source projects that have made this tool possible and have made recon tasks easier to accomplish.