Lazyrecon – Tool to Automate Reconnaissance Process

LazyRecon is a script written in Bash, it is intended to automate some tedious tasks of reconnaissance and information gathering. This tool allows you to gather some information that should help you identify what to do next and where to look.

Lazyrecon - Script to Automate Reconnaissance Process
Lazyrecon – Script to Automate Reconnaissance Process

The main features with this script are:

  • Create a dated folder with recon notes
  • Grab subdomains using: * Sublist3r, certspotter and cert.sh * Dns bruteforcing using massdns
  • Find any CNAME records pointing to unused cloud services like aws
  • Probe for live hosts over ports 80/443
  • Grab a screenshots of responsive hosts
  • Scrape wayback for data: * Extract javascript files * Build custom parameter wordlist, ready to be loaded later into Burp intruder or any other tool * Extract any urls with .jsp, .php or .aspx and store them for further inspection
  • Perform nmap on specific ports
  • Get dns information about every subdomain
  • Perform dirsearch for all subdomains
  • Generate a HTML report with output from the tools above
  • Improved reporting and less output while doing the work
  • Dark mode for html reports
  • Directory search module is now MULTITHREADED (up to 10 subdomains scanned at a time)
  • Enhanced html reports with the ability to search for strings, endpoints, reponse sizes or status codes

Tools that user should have to run the script are:

  • dirsearch
  • JSParser
  • knockpy
  • lazys3
  • recon_profile
  • sqlmap-dev
  • Sublist3r
  • teh_s3_bucketeers
  • virtual-host-discovery
  • wpscan
  • webscreenshot
  • Massdns
  • Asnlookup
  • Unfurl
  • Waybackurls
  • Httprobe
  • Seclists collection

You can read more and download the tool over here: https://github.com/nahamsec/lazyrecon

Share