Git Product home page Git Product logo

robotshell / magicrecon Goto Github PK

View Code? Open in Web Editor NEW
721.0 21.0 113.0 857 KB

MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

License: GNU General Public License v3.0

Shell 100.00%
subdomain bug bugbounty-tool bugbounty vulnerability-scanners scanner tool infosec bugbountytricks bash-script

magicrecon's Introduction


magicRecon
MagicRecon: Fast, simple and effective

Hi hacker 😉

Welcome to the MagicRecon tool repository!

MagicRecon is a powerful shell script to maximize the recon and data collection process of an objective and finding common vulnerabilities, all this saving the results obtained in an organized way in directories and with various formats.

With Magic Recon you can perform passive and active reconnaissance, vulnerability analysis, subdomain scan and many more!


Disclaimer ⚠️

The author of this document take no responsibility for correctness. This project is merely here to help guide security researchers towards determining whether something is vulnerable or not, but does not guarantee accuracy. Warning: This code was originally created for personal use, it generates a substantial amount of traffic, please use with caution.


Main features 💥

  • Save the results in an organized way in different formats.
  • Subdomain enumeration.
  • Check if the domains are alive.
  • Get whois information about every subdomain.
  • Get dns information about every subdomain.
  • Extract the technologies used in the domain.
  • Get information about the certificate used in the domain .
  • Take a screenshot on the domain.
  • Searches for emails on the domain, users and more things.
  • Enumerate public resources in AWS, Azure, and Google Cloud.
  • Search juicy information via GitHub Dorks.
  • Check all entrys in robots.txt file.
  • Get all endpoints on the web.
  • Perform a parameter scan.
  • Perform a port scan to discover open ports.
  • Perform a dirsearch to find directories and files.
  • Check if is possible to bypass 403 HTTP status code.
  • Perform a massive recon and vulnerability scan via Nuclei every X seconds.
  • Search missing security headers.
  • Check if the domain is vulnerable to Email spoofing.
  • Check if the domain is vulnerable to Subdomain takeover.
  • Check if the domain is vulnerable to Cross-Origin Resource Sharing (CORS).
  • Check if different endpoints are vulnerable to CSRF.
  • Look for entry points in the URL and check if it is vulnerable to Open Redirect.
  • Look for entry points in the URL and check if it is vulnerable to Cross-site scripting (XSS).
  • Look for entry points in the URL and check if it is vulnerable to SQL Injection (SQLi).
  • Look for entry points in the URL and check if it is vulnerable to Server-side request forgery (SSRF).
  • Search all JS files in the domain and perform a scan for API Keys, access tokens, endpoints, etc.
  • Check if the domain use a CMS and scan it.
  • And many more...

Installation 🔨

$ git clone https://github.com/robotshell/magicRecon
$ cd magicRecon
$ chmod +x install.sh
$ ./install.sh

Configuration 🔧

To configure MagicRecon tool you must open the configuration.cfg file and change variables defined by user data.

It is also important to correctly configure tools such as Subfinder and Notify to guarantee the correct functioning of magicRecon.


Usage 👀

TARGET OPTIONS

Parameter Description
-d Target domain
-w Wildcard domain
-l Target list

MODE OPTIONS

Parameter Description
-a, --all All mode - Full scan with full target recognition and vulnerability scanning
-p, --passive Passive reconnaissance (Footprinting) - Performs only passive recon with multiple tools
-x, --active Active reconnaissance (Fingerprinting) - Performs only active recon with multiple tools
-r, --recon Reconnaissance - Perform active and passive reconnaissance
-v, --vulnerabilities Vulnerabilities - Check multiple vulnerabilities in the domain/list domains
-m, --massive Massive recon - Massive vulnerability analysis with repetitions every X seconds

EXTRA OPTIONS

Parameter Description
-n, --notify Notify - This option is used to receive notifications via Discord, Telegram or Slack
-h, --help Help - Show help
./magicrecon.sh -h                 
 __  __             _      ____                      
|  \/  | __ _  __ _(_) ___|  _ \ ___  ___ ___  _ __  
| |\/| |/ _` |/ _` | |/ __| |_) / _ \/ __/ _ \| '_ \ 
| |  | | (_| | (_| | | (__|  _ <  __/ (_| (_) | | | |
|_|  |_|\__,_|\__, |_|\___|_| \_\___|\___\___/|_| |_|
              |___/                                  
MagicRecon v.3.0 - Open Source Project | Author: Robotshell | Twitter: @robotshelld


USAGE
./magicrecon.sh [-d domain.com] [-w domain.com] [-l listdomains.txt]
                      [-a] [-p] [-x] [-r] [-v] [-m] [-n] [-h] 

TARGET OPTIONS
   -d domain.com     Target domain
   -w domain.com     Wildcard domain
   -l list.txt       Target list
 
MODE OPTIONS
   -a, --all         All mode - Full scan with full target recognition and vulnerability scanning
   -p, --passive     Passive reconnaissance (Footprinting) - Performs only passive recon with multiple tools
   -x, --active      Active reconnaissance (Fingerprinting) - Performs only active recon with multiple tools
   -r, --recon       Reconnaissance - Perform active and passive reconnaissance
   -v, --vulnerabilities         Vulnerabilities - Check multiple vulnerabilities in the domain/list domains
   -m, --massive     Massive recon - Massive vulnerability analysis with repetitions every X seconds
 
EXTRA OPTIONS
   -n, --notify      Notify - This option is used to receive notifications via Discord, Telegram or Slack
   -h, --help                Help - Show this help


Example Usage 🙊

All:

./magicrecon.sh -d domain.com -a

Passive reconnaissance to a list of domains:

./magicrecon.sh -l domainlist.txt -p

Active reconnaissance to a domain:

./magicrecon.sh -d domain.com -x

Full reconnaissance:

./magicrecon.sh -d domain.com -r

Full reconnaissance and vulnerabilities scanning:

./magicrecon.sh -d domain.com -r -v

Full reconnaissance and vulnerabilities scanning to a wildcard:

./magicrecon.sh -w domain.com 

Massive reconnaissance and vulnerabilities scanning:

./magicrecon.sh -w domain.com -m 

Sample video: passive reconnaissance 🎥

Example image


To do 🧙‍♂️

  • Change tool operation to parameters.
  • Improve the use of Notify.
  • Add new interesting tools to find more vulnerabilities.
  • Save results in other formats.
  • Save the results in a document as a report.
  • Check if the emails found by the tool are leaked.
  • Integrate RobotScraper.

Contribution & License 👪

You can contribute in following ways:

  • Report bugs & add issues.
  • Fix something and open a pull request.
  • Give suggestions (Ideas) to make it better.
  • Spread the word.

Do you want to have a conversation in private? email me : [email protected]

MagicRecon is licensed under GPL-3.0 License


Special thanks


About me

Twitter


Useful? 🤔

  • If you've earned a bug bounty using this tool, please consider donating to support it's development. You can help me to develop more useful scripts and tools. Thanks! 😍

Buy Me A Coffee PayPal

magicrecon's People

Contributors

robotshell avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

magicrecon's Issues

Update the command

Please update the command , because now
" go get " command did't work , please update it to " go install ".

using updated kali linux as of today , some error

Average DNS queries performed: 217/sec, Average retries required: 82.03%

OWASP Amass v3.5.4 https://github.com/OWASP/Amass

24 names discovered - dns: 6, cert: 18

ASN: 15802 - DU-AS1
94.205.224.0/19 2 Subdomain Name(s)
ASN: 29684 - NOURNET-ASN
46.235.90.0/24 1 Subdomain Name(s)
ASN: 8075 - MICROSOFT-CORP-MSN-AS-BLOCK - Microsoft Corporation
52.96.0.0/14 3 Subdomain Name(s)
2603:1000::/25 4 Subdomain Name(s)
ASN: 46606 - UNIFIEDLAYER-AS-1
198.1.64.0/18 2 Subdomain Name(s)
192.185.0.0/18 2 Subdomain Name(s)
192.163.192.0/18 5 Subdomain Name(s)
ASN: 34397 - CYBERIA-RUH Cyberia Riyadh Autonomous System
212.119.64.0/20 10 Subdomain Name(s)
ASN: 17974 - TELKOMNET-AS2-AP PT Telekomunikasi Indonesia
36.86.60.0/22 1 Subdomain Name(s)
[+] Starting Certsh.py
python: can't open file '/root/CertificateTransparencyLogs/certsh.py': [Errno 2] No such file or directory
[+] Starting Github-subdomains.py
python3: can't open file '/root/github-search/github-subdomains.py': [Errno 2] No such file or directory
[+] Starting Gobuster DNS
Error: error on parsing arguments: wordlist file "/root/SecLists/Discovery/DNS/namelist.txt" does not exist: stat /root/SecLists/Discovery/DNS/namelist.txt: no such file or directory
sed: can't read gobusterDomains.txt: No such file or directory
rm: cannot remove 'gobusterDomains.txt': No such file or directory
[+] Starting Assetfinder
./magicRecon.sh: line 52: /root/go/bin/assetfinder: No such file or directory
[+] Starting Subjack for search subdomains takevoer
./magicRecon.sh: line 56: subjack: command not found

[+] Checking for alive domains..
./magicRecon.sh: line 65: /root/go/bin/httprobe: No such file or directory

[+] Starting Corsy to find CORS missconfigurations
python3: can't open file '/root/Corsy/corsy.py': [Errno 2] No such file or directory

[+] Starting Aquatone to take screenshots
mkdir: cannot create directory ‘screenshots’: File exists
./magicRecon.sh: line 82: aquatone: command not found

[+] STEP 2: Storing subdomain headers and response bodies
mkdir: cannot create directory ‘headers’: File exists

[+] STEP 3: Collecting JavaScript files and Hidden Endpoints
mkdir: cannot create directory ‘scripts’: File exists
mkdir: cannot create directory ‘scriptsresponse’: File exists
mkdir: cannot create directory ‘responsebody’: File exists
mkdir: cannot create directory ‘endpoints’: File exists
[+] Starting Jsearch.py
hsagroup
mkdir: cannot create directory ‘javascript’: File exists

[+] STEP 4: Starting Gobuster to find directories and hidden files
mkdir: cannot create directory ‘directories’: File exists

[+]STEP 5: Starting Nmap Scan for alive domains
mkdir: cannot create directory ‘nmapscans’: File exists
Starting Nmap 7.80 ( https://nmap.org ) at 2020-04-11 11:14 EDT
NSE: Loaded 151 scripts for scanning.
NSE: Script Pre-scanning.
Initiating NSE at 11:14
Completed NSE at 11:14, 0.00s elapsed
Initiating NSE at 11:14
Completed NSE at 11:14, 0.00s elapsed
Initiating NSE at 11:14
Completed NSE at 11:14, 0.00s elapsed
Initiating Ping Scan at 11:14
Scanning autodiscover.ksa.hsagroup.com (212.119.79.145) [4 ports]
Completed Ping Scan at 11:14, 0.18s elapsed (1 total hosts)
Initiating Parallel DNS resolution of 1 host. at 11:14
Completed Parallel DNS resolution of 1 host. at 11:14, 13.00s elapsed
Initiating SYN Stealth Scan at 11:14
Scanning autodiscover.ksa.hsagroup.com (212.119.79.145) [1000 ports]
Discovered open port 587/tcp on 212.119.79.145
Discovered open port 80/tcp on 212.119.79.145
Discovered open port 53/tcp on 212.119.79.145
Completed SYN Stealth Scan at 11:14, 11.80s elapsed (1000 total ports)
Initiating Service scan at 11:14

unary operator expected

Hello,

Testing this on Kali rolling release 2021.3.

$ sudo bash magicrecon.sh -d example.com -r
./configuration.cfg: line 19: DICTIONARY: command not found
./configuration.cfg: line 23: BURP: command not found
 __  __             _      ____                      
|  \/  | __ _  __ _(_) ___|  _ \ ___  ___ ___  _ __  
| |\/| |/ _` |/ _` | |/ __| |_) / _ \/ __/ _ \| '_ \ 
| |  | | (_| | (_| | | (__|  _ <  __/ (_| (_) | | | |
|_|  |_|\__,_|\__, |_|\___|_| \_\___|\___\___/|_| |_|
              |___/                                  
MagicRecon v.3.0 - Open Source Project | Author: Robotshell | Twitter: @robotshelld

[*] STARTING FOOTPRINTING

[*] TARGET URL: <example.com>
[*] TARGET IP ADDRESS: 1.2.3.4

mkdir: missing operand
Try 'mkdir --help' for more information.
[+] Checking if the target is alive...
magicrecon.sh: line 38: [: ==: unary operator expected

 is not alive. Aborting passive reconnaissance

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.