AI-Powered Reconnaissance Dashboard for Penetration Testing
A powerful, all-in-one VAPT reconnaissance tool with a stunning dark-themed dashboard. Perform multiple recon tasks from a single interface and get AI-powered vulnerability suggestions.
| Module | Description |
|---|---|
| 🌐 Subdomain Finder | Multi-API enumeration (crt.sh, HackerTarget, RapidDNS, AlienVault, URLScan) |
| 🔓 Port Scanner | Scan 20+ common ports with service detection & risk levels |
| 🛡️ Security Headers | Analyze HTTP security headers (A+ to F grading) |
| ⚙️ Tech Detector | 50+ technologies (GA4, React, Vue, WordPress, PHP, etc.) |
| 🔒 SSL Analyzer | Check SSL/TLS configuration and certificate details |
| 📋 WHOIS Lookup | Get domain registration information |
| 🤖 AI Suggestions | Smart vulnerability hints based on scan results |
| 📊 Reports System | Save, view, and manage scan reports |
| 📥 Professional Export | PDF with cover page, ToC, colored tables |
| 📈 Excel Export | Separate sheets for each scan type |
# Clone the repository
git clone https://github.com/souravkr529/ReconX.git
cd ReconX
# Install dependencies
pip install -r requirements.txt
# Run the application
python app.pyNavigate to: http://127.0.0.1:5000
- 📄 Cover Page - Target, date, summary stats
- 📋 Table of Contents - 6 sections
- 🌐 Subdomains - Colored table with status & source
- 🔓 Ports (Nmap style) - Risk levels (🟢🟡🔴)
- ⚙️ Technologies - Category & version
- 🛡️ Security Headers - Grade + status (✅❌)
- 🔒 SSL/TLS - Certificate details
- 📝 WHOIS - Domain registration info
- 7 Separate Sheets: Summary, Subdomains, Open Ports, Technologies, Security Headers, SSL TLS, WHOIS
- Colored headers with proper formatting
- Auto-sized columns
ReconX uses multiple reliable sources for comprehensive subdomain discovery:
| Source | Description |
|---|---|
| crt.sh | Certificate Transparency Logs |
| HackerTarget | Free subdomain search API |
| RapidDNS | DNS database |
| AlienVault OTX | Open Threat Exchange |
| URLScan.io | Web scanning service |
| DNS Bruteforce | Common subdomain wordlist |
Detects 50+ technologies including:
- Web Servers: Nginx, Apache, IIS, Cloudflare
- Frameworks: React, Vue.js, Angular, Next.js, Nuxt
- CMS: WordPress, Joomla, Drupal, Shopify
- Analytics: Google Analytics (GA4), Facebook Pixel, Hotjar
- CDN: Cloudflare, AWS CloudFront, Fastly
- Security: HSTS, reCAPTCHA, Cloudflare
- Libraries: jQuery, Bootstrap, Tailwind, Font Awesome
| Layer | Technology |
|---|---|
| Frontend | HTML5, CSS3, Vanilla JavaScript |
| Backend | Python Flask |
| PDF Generation | ReportLab |
| Excel Export | XlsxWriter |
| Styling | Custom CSS with glassmorphism effects |
| Fonts | Inter, JetBrains Mono (Google Fonts) |
ReconX/
├── app.py # Flask backend (main server)
├── requirements.txt # Python dependencies
├── reports/ # Saved scan reports (JSON)
├── templates/
│ └── index.html # Main dashboard HTML
├── static/
│ ├── css/
│ │ └── style.css # Premium dark theme styles
│ └── js/
│ └── app.js # Frontend JavaScript
├── README.md # Documentation
├── LICENSE # MIT License
└── .gitignore
ReconX automatically analyzes scan results and provides intelligent suggestions:
| Finding | Suggestion |
|---|---|
| Port 22 Open | "SSH exposed - Consider IP whitelisting" |
| Missing CSP | "Add Content-Security-Policy to prevent XSS" |
| TLS 1.0/1.1 | "Upgrade to TLS 1.3 for better security" |
| Many Subdomains | "Review all subdomains for vulnerabilities" |
| Missing HSTS | "Enable HSTS to force HTTPS connections" |
- Auto-save: All scans automatically saved to
reports/folder - View Reports: Access via
#reportsURL or nav link - Delete Reports: Remove old scan reports
- Load Reports: View past scan results in dashboard
For Educational & Authorized Testing Only
This tool is designed for:
- Security professionals on authorized engagements
- Educational purposes and learning
- Testing your own infrastructure
Always get written permission before scanning any target.
Contributions are welcome! Feel free to:
- Fork the repository
- Create your feature branch (
git checkout -b feature/AmazingFeature) - Commit changes (
git commit -m 'Add AmazingFeature') - Push to branch (
git push origin feature/AmazingFeature) - Open a Pull Request
This project is licensed under the MIT License - see the LICENSE file.
Give a ⭐ if ReconX helps you with your security testing!
Made with ❤️ by Sourav Kumar