0.0.1 • Published 12 months ago

mrecon v0.0.1

Weekly downloads
-
License
ISC
Repository
github
Last release
12 months ago

Introducing MR.RECON, an advanced and versatile bug bounty recon and vulnerability detection tool powered by the efficiency of bash scripting. Designed with the needs of bug bounty hunters and security researchers in mind, this tool combines powerful reconnaissance techniques with automated vulnerability detection to supercharge your bug hunting efforts.

How it works ?

This tool mainly performs 2 tasks

Enumeration - 1. Effective Subdomain Enumeration from Various Tools 2. Get URLs with open HTTP and HTTPS service 3. JS File Enumeration 4. GitHub code search, Scans for exposed API keys across all of GitHub

Vulnerability Detection - 1. Subdomain takeover vulnerability checker 2. Finds 37+ Vulnerability So basically, this is an autmation script for your initial recon and Vulnerability Detection in bugbounty

Setup MR.RECON

MR.RECON requires different tools to run successfully. Run the following command to install the all requirments-

$ git clone git@github.com:techghoshal/mrecon.git
$ cd mrecon
$ sudo ./install.sh

GitHound config.yml

Make sure your github username and password is in "quotation marks"

# Required
github_username: ""
github_password: ""

# Optional (comment out if not using)
# github_totp_seed: "ABCDEF1234567890" # Obtained via https://github.com/settings/security

Two-Factor Authentication

If GitHound is logged into your GitHub account, two-factor authentication may kick in. You can pass 2FA codes to GitHound with --otp-code. Otherwise, GitHound will prompt you for it when it starts up. You can also supply your 2FA seed in the config and you'll never have to worry about 2FA again. Grab the 2FA seed by decoding the barcode that GitHub shows during the 2FA setup process.

You can also provie your own CONDIF file with your API Keys for subdomain enumeration with subfinder (/root/.config/subfinder/provider-config.yaml) and amass (amass_config.ini)

Easy Usage

./mrecon -h
 [HELP]
   mrecon -enum target.com
   mrecon -enumExploit target.com
   mrecon -exploit finalSubdomain.txt waybackurls.txt

Modes

1. Enumuration Mode -

Subdomain and JS File Enumuration, Get URL, Github code search, Find API Keys across all of GitHub

mrecon -enum target.com

2. Exploitation Mode -

Subdomain takeover and finds 37+ vulnerability

mrecon -exploit finalSubdomain.txt waybackurls.txt

3. Enumuration Exploitation Mode -

Enumuration and Exploitation run together

mrecon -enumExploit target.com

For Developers

If you have any queries, you can always contact me on twitter(@techghoshal)

Credits

I would like to express my gratitude to all of the open source projects that have made this tool possible and have made recon tasks easier to accomplish.

0.0.1

12 months ago