

GitHub - gokulapap/Reconator: Automated Recon for Pentesting & Bug Bounty
source link: https://github.com/gokulapap/Reconator
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Summary
Reconator is a Framework for automating your process of reconnaisance without any Computing resource (Systemless Recon) at free of cost. Its Purely designed to host on Heroku which is a free cloud hosting provider. It performs the work of enumerations along with many vulnerability checks and obtains maximum information about the target domain.
It also performs various vulnerability checks like XSS, Open Redirects, SSRF, CRLF, LFI, SQLi and much more. Along with these, it performs OSINT, fuzzing, dorking, ports scanning, nuclei scan on your target.
Reconator receives all the targets needs to be reconed via a Web Interface and adds into the Queue and Notifies via Telebot on start and end of Recon on a target. So this is 100% automated and don't require any manual interaction
Deploy
Requirements
- Heroku Free account (For Deploying)
- Telegram account (For notifications)
Demo Video of Deploying
Trailer Video
Usage
WEB APPLICATION PATHS
path Description
(/) home Root page where you will add targets
/initialise Initialise the Database and the cronjob
/queue The targets added will be in the queue can manage targets
/scanned It contains list of all scanned targets can view results by results
/issues It has a quick link for reporting a issue and tool improvement
Features 
- Systemless Recon 100% Free
- Fast scan and Easy to use
- Permanent storage of Results in DB
- Notification support via Telegram bot
- Fully Automated Scanner
- Easy access via Web UI
- Queue support allows to add many targets
- Easy Deploy Easy Recon
- Runs 24/7 for 22 Days [Heroku - 550 hrs/month free]
More Features and More Recon tools will be added in next update
Community & Discussion
Join Our Telegram server here
How to contribute:
If you want to contribute to this project then:
- Submitting an issue because you have found a bug or you have any suggestion or request.
- Submitting a feature request in this Form form
Need help?
- Take a look at the wiki section.
- Check FAQ for commonly asked questions.
- Ask for help in the Telegram group
Helping hands 
- Jopraveen (Video Editing & FrontEnd)
- Santroo (FrontEnd design)
- Godson (Script Searching)
- Yashwant (FrontEnd design)
You can support this work buying me a coffee:
Disclaimer
Usage of this program for attacking targets without consent is illegal. It is the user's responsibility to obey all applicable laws. The developer assumes no liability and is not responsible for any misuse or damage caused by this program. Please use responsibly.
The material contained in this repository is licensed under GNU GPLv3.
License
Reconator
is made with by @gokulap and it is released under the GPL 3.0 License
Recommend
-
175
Large Pose 3D Face Reconstruction from a Single Image via Direct Volumetric Regression Aaron S. Jackson, Adrian Bulat, Vasileios Argyriou and Georgios Tzimiropoulos Try out the code without running it! Check out our o...
-
131
IVRE (Instrument de veille sur les réseaux extérieurs) or DRUNK (Dynamic Recon of UNKnown networks) is a network recon framework, including tools for passive and active recon. IVRE can use data from: The advertising slogans are: ...
-
108
README.md netpwn A framework made to automate tasks of pentesting. Written in python 2.7 Modules reverse_shell - Creates a reverse shell with python to con...
-
93
Files Permalink Latest commit message Comm...
-
243
README.md fuzzDicts Web Pentesting Fuzz 字典,一个就够了。 参数Fuzz字典
-
53
README.md pentest-tools My collection of custom tools I use in my daily. arpa.sh A script that will convert address in "arpa"...
-
25
README.md Pentesting Resources All information and software available on this site are for educational purposes only. Use these at yo...
-
7
description This is the main page. Here you can find the typical workflow for the pentesting of a machine Pentesting Methodology If you want to know about my latest modifications/
-
9
Evil-WinRM The ultimate WinRM shell for hacking/pentesting Description & Purpose This shell is the ultimate WinRM shell for hacking/pentesting. WinRM (Windows Remote Management) is the Microsoft implem...
-
16
conti-pentester-guide-leak This repository was created to archive leaked leaked pentesting materials, which were previous...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK