Raccoon – Reconnaissance and Vulnerability Scanning Tool

Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity. It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.

Raccoon – Offensive Reconnaissance and Vulnerability Scanning Tool

As most of Raccoon’s scans are independent and do not rely on each other’s results, it utilizes Python’s asyncio to run most scans asynchronously. There is a large list of features for offensive purposes including:

  • DNS details
  • TLS Data – supported ciphers, TLS versions, certificate details and SANs
  • Services and scripts scan
  • URL fuzzing and dir/file detection
  • Subdomain enumeration – uses Google dorking, DNS dumpster queries, SAN discovery and bruteforce
  • Web application data retrieval such as CMS detection, Cookie inspection, Retrieves all Email addresses and Scans target for vulnerable S3 buckets and enumerates them for sensitive files.
  • Detects known WAFs
  • Supports anonymous routing through Tor/Proxies
  • Saves output to files – separates targets by folders and modules by files

You can read more and download this tool over here: https://github.com/evyatarmeged/Raccoon

Notify of
Inline Feedbacks
View all comments