Documentation β’ Features β’ Install β’ Quick Start β’ Changelog
AI-powered reconnaissance framework for bug bounty hunters and security professionals. Supports AI-guided analysis, real-time web dashboard, and comprehensive attack surface discovery.
- π§ AI-Powered Analysis - Multi-provider AI (Ollama/Groq/DeepSeek/Claude/OpenAI/Gemini) with auto key rotation
- π Risk Scoring - 0-100 attack surface score with prioritized findings
- π― CVEMap Integration - Real CVE data mapped to detected technologies
- π‘ Manual Check Suggestions - AI suggests SQLi/XSS tests even when automated tools miss them
- β‘ Easy to Install - Single Go binary, run
reconator install --extrasto set up all dependencies - π Interactive Web UI - Run
reconator serverfor a real-time dashboard with multi-mode scanning and visual recon data.
- π΅οΈ Subdomain Enumeration - subfinder, amass, assetfinder, crt.sh, chaos (30+ sources)
- π©οΈ Chaos DB - ProjectDiscovery's 10M+ subdomain dataset
- βοΈ Cloudlist - Multi-cloud asset discovery (AWS, GCP, Azure, K8s)
- π DNS Resolution - Fast validation with puredns & dnsx
- β‘ Port Scanning - naabu for speed, httpx for HTTP validation
- π Web Crawling - katana, waybackurls, gau for endpoint discovery
- π‘οΈ WAF/CDN Detection - Identifies Cloudflare, Akamai + origin IP discovery
- π Tech Fingerprinting - Wappalyzer-based technology detection
- β οΈ Subdomain Takeover - subjack, subzy for dangling DNS detection
- π DNS & Email Security - SPF/DKIM/DMARC email validation, CAA/DNSSEC/AXFR DNS security checks
- π WebScan Mode - 14+ web vulnerability tests (SQLi, XSS, SSRF, etc.) with historic URL collection
- π₯ Import/Pull - Pull scan results from remote systems via SSH for local analysis
- π§ Smart Template Selection - AI analyzes tech stack and picks relevant nuclei templates
- π CVE Mapping - Maps detected technologies to known CVEs via CVEMap
- π Risk Scoring - 0-100 risk score based on attack surface analysis
- π‘ Manual Test Suggestions - Recommends SQLi/XSS tests even when automation fails
- π Attack Surface Report - Prioritized findings with effort/impact ratings
- π 50+ Token Patterns - Comprehensive regex-based detection
- Cloud: AWS, GCP, Azure, DigitalOcean, Heroku, Cloudflare
- Code: GitHub PAT/OAuth, GitLab, NPM, PyPI tokens
- Payment: Stripe, Square, PayPal, Braintree API keys
- Communication: Slack, Discord, Telegram, Twilio
- AI Services: OpenAI, Anthropic, Cohere API keys
- Generic: Private keys, JWTs, Database URLs, OAuth secrets
- πͺ£ S3 Bucket Testing - Multi-region discovery + permission testing
- π¦ GCS & Azure Blob - Bucket enumeration + access verification
- π Auto Name Generation - Creates bucket permutations from target domain
- π 25+ Admin Paths -
/admin,/wp-admin,/phpmyadmin,/jenkins,/grafana - π Login Form Detection - Identifies auth types and login pages
- π Title Extraction - Grabs page titles for quick identification
- π 16 Common Paths -
/graphql,/graphiql,/playground,/v1/graphql - π Introspection Testing - Checks if schema is exposed
- π― Nuclei Integration - Runs GraphQL-specific vulnerability templates
- πΌοΈ Screenshot Capture - gowitness integration for visual evidence
- β‘ Parallel Processing - Fast screenshot collection across all hosts
- π¨ Visual Clustering - Groups similar screenshots automatically
- π§ Email Authentication - SPF, DKIM, DMARC record validation with scoring
- π‘οΈ DNS Security Checks - CAA records, DNSSEC validation, zone transfer testing
- π Nameserver Analysis - Detects dangling nameservers and single points of failure
- π Security Scores - 0-100 scoring for email and DNS security posture
- π Google Dork Generator - 15 dork categories with clickable links
- π No API Required - Works without external API keys
- π HTML Dashboard - Modern, responsive report with dark theme
- π Executive Summary - Key metrics at a glance
β οΈ Vulnerability Breakdown - Critical/High findings highlighted- π Per-Subdomain View - Ports, tech, vulns per host with search/filter
- π Attack Chain Analysis - AI-identified vulnerability chains
- π Prioritized Findings - Ranked by exploitability
Single command - no npm required! The binary includes the web dashboard.
# Using Go (fastest)
go install github.com/rootsploit/reconator@latest
# Install reconnaissance tools
reconator install --extras
# Start scanning!
reconator scan example.comOne-liner install script (Coming soon)
# Linux/macOS/WSL
curl -sSfL https://raw.githubusercontent.com/rootsploit/reconator/main/scripts/install.sh | bash
# Installs to /usr/local/bin
reconator install --extrasFrom GitHub Releases
Download pre-built binaries from Releases:
# Linux (x86_64)
wget https://github.com/rootsploit/reconator/releases/latest/download/reconator-linux-x86_64
chmod +x reconator-linux-x86_64
sudo mv reconator-linux-x86_64 /usr/local/bin/reconator
# macOS (Apple Silicon)
wget https://github.com/rootsploit/reconator/releases/latest/download/reconator-darwin-aarch64
chmod +x reconator-darwin-aarch64
sudo mv reconator-darwin-aarch64 /usr/local/bin/reconator
# Windows
# Download reconator-windows-x86_64.exe from releases pageFrom Source (For developers)
Note: Building from source is only needed for development. For normal use, prefer go install above.
git clone https://github.com/rootsploit/reconator.git
cd reconator
# Build with embedded web dashboard (requires Node.js for UI development)
./build.sh
# Or build without web UI rebuild
go build -o reconator ./cmd/reconator
# Install tools
./reconator install --extrasThe web dashboard is automatically embedded in the binary during build. No npm install needed at runtime!
# Check for updates and install latest version
reconator update
# Or force update
reconator update --force
# Rollback if needed
reconator update --rollback# Basic scan
reconator scan target.com
# With AI analysis
export OPENAI_API_KEY="sk-..."
reconator scan target.com
# Full featured scan
reconator scan target.com --screenshots --graphql --osint
# Multiple targets
reconator scan -l targets.txt
# Passive mode
reconator scan target.com --passive
# WebScan - Dedicated web vulnerability scanner
reconator webscan https://target.com
reconator webscan https://target.com --fast # Quick nuclei scan only
# Import remote scan results
reconator import user@remote-host --list # List available scans
reconator import user@remote-host --scan-id a1b2c3d4 # Pull specific scan
# Start web server
reconator server
# Access at http://127.0.0.1:8888Start the web dashboard for real-time scan management:
# Start server (localhost only, secure)
reconator server
# Start with custom API key
reconator server --api-key "your-secure-key"
# Custom port
reconator server --port 9000Then access at http://127.0.0.1:8888
Login credentials: Username is reconator, password is the API key shown in the server console output
All scan results are stored in ~/reconator/ by default:
~/reconator/
# Regular reconnaissance scan
βββ target.com/
βββ 1-subdomains/ # Subdomain enumeration results
βββ 2-waf/ # WAF/CDN detection
βββ 3-ports/ # Port scan results
βββ 4-vhost/ # Virtual host discovery
βββ 5-takeover/ # Subdomain takeover checks
βββ 6-historic/ # Historic URLs
βββ 6b-secheaders/ # DNS & Email security findings
βββ 7-tech/ # Technology detection
βββ 8-dirbrute/ # Directory bruteforce
βββ 9-vulnscan/ # Vulnerability findings
βββ 9-screenshots/ # Screenshot captures
βββ 10-aiguided/ # AI analysis
βββ report_target.com.html # HTML report
βββ summary.json # Scan summary
βββ reconator.db # SQLite database with all scan data
# WebScan output (UUID-prefixed for isolation)
βββ a1b2c3d4_target.com/
βββ 5-historic/ # Historic URL collection (categorized by vulnerability type)
βββ 6-tech/ # Technology detection
βββ 6b-secheaders/ # Security headers analysis
βββ 8-vulnscan/ # Vulnerability findings (all 14+ tests)
βββ report_target.com.html # HTML vulnerability report
βββ reconator.db # Isolated SQLite database for this scan
Dashboard Features:
- β‘ Real-time scan progress with live updates
- π Vulnerability statistics and risk scoring
- π Browse and filter scan results
- π₯ Export results (CSV, JSON, SARIF, HTML)
- βοΈ Configure API keys for OSINT/AI providers
- π Secure authentication with rate limiting
Reconator uses a unified config file (~/.reconator/config.yaml) for ALL API keys:
# Show current configuration
reconator config show
# Sync keys to subfinder/notify
reconator config sync
# Validate your API keys
reconator config testSee Configuration Guide for detailed setup.
| Feature | Reconator | reconFTW | FinalRecon |
|---|---|---|---|
| AI Analysis | β GPT-4/Claude/Gemini | β | β |
| CVE Intelligence | β CVEMap | nuclei only | β |
| Risk Scoring | β 0-100 | β | β |
| Secret Detection | β 50+ patterns | JS only | β |
| Cloud Storage | β S3/GCS/Azure | S3 only | β |
| Admin Panels | β 25+ paths | β | Dir brute |
| GraphQL Detection | β 16 paths | β | β |
| Screenshot Capture | β gowitness | gowitness | β |
| OSINT Dorks | β 15 categories | β | β |
| HTML Reports | β | β | β |
| Subdomain Sources | 30+ | 30+ | 10+ |
| Single Binary | β Go | Bash scripts | Python |
| Platform | Status |
|---|---|
| Linux (Ubuntu, Debian, Fedora, Arch) | β Full |
| macOS (Intel + Apple Silicon) | β Full |
| Windows (WSL recommended) |
Built with tools from:
- ProjectDiscovery - nuclei, subfinder, httpx, naabu, katana
- tomnomnom - waybackurls, assetfinder
- hahwul - dalfox
- OWASP - amass
- sensepost - gowitness
-
π WebScan Mode: Dedicated web vulnerability scanner with 14+ tests (SQLi, XSS, SSRF, etc.), historic URL collection, smart deduplication, TruffleHog secret scanning
-
π₯ Import/Pull: Pull scan results from remote systems via SSH (
reconator import user@host --scan-id <id>) -
π©οΈ Chaos DB: ProjectDiscovery's 10M+ subdomain dataset integration via subfinder
-
βοΈ Cloudlist: Multi-cloud asset discovery (AWS, GCP, Azure, K8s) integration
-
π¦ TOON Format: Tree-Oriented Object Notation for AI analysis output - 45% token cost savings over JSON
-
β‘ Performance Improvements:
- Parallel Nuclei Scanning: Splits hosts into batches for concurrent vulnerability scanning (15-20 min savings on large scans)
- Template Caching: Skips nuclei template updates during scans for faster execution (1-2 min savings)
- Port Scan Pipelining: Streams discovered ports from naabu to httpx incrementally instead of waiting (2-3 min savings)
- Adaptive DNS Resolution: Progressive backoff strategy with resolver rotation to handle rate limits (2-3 min savings)
-
π Quality Improvements:
- Fixed JavaScript analysis results display in web dashboard
- Improved scan result loading with better error handling
- Enhanced debug logging for troubleshooting
- Fixed database isolation per scan (each scan now has its own reconator.db in scan directory)
- Fixed output manager to properly save all phase results (tech, headers, historic URLs, vulnerabilities)
- Fixed HTML report generation from saved JSON phase outputs
- π¨ Web Dashboard: Modern React-based UI with real-time scan progress
- Live progress updates with WebSocket streaming
- Real-time vulnerability feed during scans
- Interactive scan management (start, stop, view results)
- Dark theme with responsive design
- API key authentication
- π€ Multi-Format Export: CSV, JSON, SARIF, and HTML exports
- Self-contained HTML reports with embedded screenshots
- SARIF format for GitHub Security integration
- Timestamp-based filenames to prevent overwrites
- π§ Performance Improvements:
- Passive mode optimization: Skips DNS bruteforce and permutations (alterx/mksub) for faster scans
- Keeps API-based discovery and DNS validation for thoroughness
- ~30-60 seconds for subdomain enumeration (vs 4-5 minutes with full bruteforce)
- Passive mode optimization: Skips DNS bruteforce and permutations (alterx/mksub) for faster scans
- sxss XSS Scanner: Fast XSS reflection scanning (150 concurrent threads)
- Hybrid CVE Detection: vulnx β NVD API β hardcoded β searchsploit
- ExploitDB Integration: Optional searchsploit support for exploit lookup
- JS Analysis: Clickable file paths in HTML report
- DNS Fix: Trusted resolvers for dnsx validation (prevents false positives)
- Fixed DNS validation false positives with unreliable resolvers
- Created trusted-resolvers.txt for reliable validation
- Fixed historic subdomain merging
- 12-phase reconnaissance pipeline
- Multi-provider AI support (Ollama, Groq, Claude, OpenAI, Gemini)
- Unified config management
- Interactive HTML reports
For authorized security testing only. Always obtain written authorization before scanning.
AGPL-3.0 - See LICENSE
Created by @RootSploit

