Skip to content

An automated approach to performing recon for bug bounty hunting and penetration testing.

License

Notifications You must be signed in to change notification settings

capt-meelo/LazyRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

LazyRecon

Version License

LazyRecon is a wrapper of various scripts that automates the tedious process of reconnaissance of a target domain.

LazyRecon utilizes the following tools:

Thanks to the developers of these tools!

Workflow

Flow

Installation

⚠️ NOTE: Before executing install.sh, modify the subEnumTools() function by placing your Virustotal, Passivetotal, SecurityTrails, Censys, Riddler, and Shodan API keys. This will give better results during the subdomain enumeration.

git clone https://github.com/capt-meelo/LazyRecon.git
cd LazyRecon
chmod +x install.sh
./install.sh

How to Use

⚠️ NOTES:

  1. It's recommended to run this tool in a VPS, such as DigitalOcean, for better speed.
  2. Running this tool takes time, thus it's suggested to run it under a screen or tmux session.
cd LazyRecon
chmod +x LazyRecon.sh
./LazyRecon.sh <target_domain>

Contribute

If you have any problem or new idea, feel free to create an issue, or pull a request.

Disclaimer

All of the tools being used by LazyRecon are developed by others. I just put all the pieces together to automate the redundant jobs.

This tool is written for educational purposes only. You are responsible for your own actions. If you mess something up or break any law while using this tool, it's your fault, and your fault only.

About

An automated approach to performing recon for bug bounty hunting and penetration testing.

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages