Skip to content

sankalpvb/ReconMaster

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

ReconMaster 🚀

An Intelligent Web-based Reconnaissance Framework for Security Professionals

Python
License: MIT
FastAPI
SQLite


🎯 Introduction

ReconMaster is a Python-powered web application that provides a clean, interactive, and intelligent front-end for a suite of powerful command-line security tools.

It streamlines the reconnaissance phase of a security assessment by:

  • Running scans
  • Parsing raw terminal output into structured results
  • Offering actionable suggestions for next steps

This transforms the complex and ephemeral nature of reconnaissance into a structured, persistent, and insightful workflow.


✨ Key Features

  • Centralized Web UI: Dark/light theme with an intuitive layout.
  • Real-time Output: View command results as they are generated.
  • Intelligent Parsing Engine: Extracts open ports, directories, subdomains, and technologies into tables.
  • "Always-On" Suggestion Engine: Provides context-aware recommendations (including Exploit-DB lookups).
  • Persistent Scan History: Save and review past scans via a history page.
  • Interactive Controls: Cancel scans, click discovered links, and toggle themes.
  • Modular & Scalable: Easily add new tools to the framework.

🛠️ Technology Stack

  • Backend: Python 3, FastAPI, Uvicorn
  • Real-time: WebSockets
  • Database: SQLite + SQLAlchemy ORM
  • Frontend: HTML5, CSS3, Vanilla JavaScript (ES6 Modules)
  • UI Framework: Bootstrap 5
  • Core Logic: Python’s asyncio + subprocess
  • Integrated Tools:
    • Nmap
    • Gobuster
    • Assetfinder
    • Sublist3r
    • WhatWeb
    • searchsploit (Exploit-DB)
    • httpx
    • ffuf
    • whois
    • nikto

⚙️ Setup and Installation

ReconMaster comes with an automated setup script.

  1. Clone the repository:

    git clone https://github.com/sankalpvb/ReconMaster.git
    cd ReconMaster
    
    
  2. Make the setup script executable:

    chmod +x setup.sh
  3. Run the setup script (with sudo):

    sudo ./setup.sh
    • Installs required system tools (Nmap, Gobuster, etc.)
    • Optionally installs Exploit-DB (large package)
    • Installs httpx via Go
    • Creates Python virtual environment
    • Installs dependencies from requirements.txt
    • Initializes the SQLite database

📖 Usage

Once setup is complete, follow these steps:

  1. Activate the virtual environment:

    source venv/bin/activate
  2. Start the server:

    uvicorn app.main:app --reload
  3. Open your browser: Go to http://127.0.0.1:8000

From the UI:

  • Select a tool from the sidebar
  • Enter your target and configure options
  • Click "Initiate Scan"
  • View results in the Analysis Table and Raw Output log
  • Save results to History for later review

📜 License

This project is licensed under the MIT License.

About

A web-based command center for reconnaissance tools like Nmap, Gobuster, and Assetfinder. Features real-time output, intelligent parsing, an automated exploit suggestion engine (searchsploit), and persistent scan history. Built with Python, FastAPI, and WebSockets.

Topics

Resources

Stars

Watchers

Forks

Packages

 
 
 

Contributors