ReconCobra Complete Automated pentest - 5 min read

ReconCobra Is an automated pentest tool. You can use ReconCobra for Kali, Parrot OS, Black Arch, Termux, Android Led TV. ReconCobra Software has 82 Options with full automation with powerful information-gathering capability.

Brief Introduction

ReconCobra is useful for Private Organisations and Ethical hacker personnel for legal auditing.
It serves as a defense method to find as much information possible for gaining unauthorized access and intrusion.
With the emergence of more advanced technology, cybercriminals have also found more ways to get into the system of many organizations.

ReconCobra software can audit, firewall behavior, if it is leaking backend machines/server and replying pings, it can find internal and external networks where many software’s like ERP, mail firewalls are installed, exposing servers so it does Footprinting, Scanning & Enumeration as much as possible of target, to discover and collect most possible information like username, web technologies, files, endpoint, API and much more.


It’s the first step to stop cybercriminals by securing your Infrastructural Information Gathering leakage. ReconCobra is false positive free when there is something it will show no matter what, if it is not, it will give blank results rather error.


ReconCobra You can use ReconCobra for Kali, Parrot OS, Black Arch, Termux, Android Led TV. The software has 82 Options with full automation.

University Course

ReconCobra is now also a part of International Hacking Trainings for OSINT
OSINT for Reconnaissance training for CEH, CISSP, Security+, ITPA


Here you can see an impression of what is possible with this tool.

    #--------------------------------------------------------
    #    Ultimate Reconnaissance for Information Gathering   
    #--------------------------------------------------------

#           [1] Website Information                                 #   
#           [2] Domain Whois Lookup                    	            #   
#           [3] Find IP Location                                    #   
#           [4] Recommended Port Scan                  	        #   
#           [5] DNS Whois Lookup                                    #   
#           [6] Reverse Whois Lookup                                #   
#           [7] DNS Zone Transfers Lookup                           #   
#           [8] Reverse IP Lookup                                   #   
#           [9] Forward IP Lookup                                   #   
#           [10] Reverse DNS Lookup                                 #   
#           [11] Forward DNS Lookup                                 #   
#           [12] Shared DNS Lookup                                  #   
#           [13] Technology lookup                                  #   
#           [14] Website Recon                                      #   
#           [15] Metadata Crawler                                   #   
#           [16] Metadata Googler                                   #   
#           [17] Subdomain Scanner using Search Engines             #   
#           [18] Subdomain Takeover Scanner using file              #   
#           [19] Brute Subdomains using nmap                        #   
#           [20] Brute DNS Subdomains                               #   
#           [21] Find Configuration Errors on Target using google   #   
#           [22] Find ASN                                           #   
#           [23] Find Netblocks                                     #   
#           [24] Capture Screenshots                                #   
#           [25] Find Nearest Servers to Victim                     #   
#           [26] Sweep Netblocks & Resolve                          #   
#           [27] Load DNS Hacking Suite Panthera                    #   
#           [28] Find Emails and Names                              #   
#           [29] Find Contact Information                           #   
#           [30] Common Nmap Port Scan                              #   
#           [31] Ping Hop and Firewalk                              #   
#           [32] Find Internal Networks & Sweep                     #   
#           [33] Decoy Scan & Generate Metasploit Data              #   
#           [34] Find SSL Bugs & Information                        #   
#           [35] Extract Users via FTP                              #   
#           [36] Extract Users via POP3                             #   
#           [37] Extract Users via IMAP                             #   
#           [38] Extract Users via SMTP                             #   
#           [39] Extract Users via Form                             #   
#           [40] Extract Full Possible Information via SNMP         #   
#           [41] Extract Possible Information from Certificates     #   
#           [42] Find Victim HTTPS Leaked Data                      #   
#           [43] Find Users via sitemap                             #   
#           [44] Find Directories from robots.txt                   #   
#           [45] Find all accounts by user                          #   
#           [46] Find all accounts by email                         #   
#           [47] Find all tags by account                           #   
#           [48] DNS History                                        #   
#           [49] Passive DNS Search                                 #   
#           [50] Use Common Crawl on Target                         #   
#           [51] Hostname to IP Resolver using Search Engines       #   
#           [52] Reverse NS Lookup                                  #   
#           [53] Forward NS Lookup                                  #   
#           [54] Win - Extract Netbios Information                  #   
#           [55] Win - Contact & Extract Null Shares IPC$           #   
#           [56] Win - Gather Full Information via Netbios          #   
#           [57] Win - Connect to Open Netbios                      #   
#           [58] Invisible Port Scanner                             #   
#           [59] Bypass Cloud Flare                                 #   
#           [60] DNS Cached Records                                 #   
#           [61] Bypass Content Management System Waf Firewall      #   
#           [62] Shared NS                                          #   
#           [63] Master Domain Subdomain Subnet Scanner             #   
#           [64] Domain Certificate Subdomain Enumeration           #   
#           [65] Find Subdomains using API Searcher                 #   
#           [66] Find Cname Information of netblock                 #   
#           [67] Endpoint Extraction                                #   
#           [68] Check misconfigured Cross Origin Resource Sharing  #   
#           [69] Wayback Web Downloader                             #   
#           [70] JS Find Link & Analyse ( local and remote )        #   
#           [71] Extract Geo-Cordinates for Tracking                #   
#           [72] Mirror Complete Website                            #   
#           [73] Brute Forcer Module                                #   
#           [74] Databases and Connections Port Scan using Mascan   #   
#           [75] Set Daisy Chain                                    #   
#           [76] Search PHPinfo and Database Log via Search Engines #   
#           [77] Load Encrypt/Decrypt Module                        #   
#           [78] Load Encryption Scrambling for Antivirus Evasion   #   
#           [79] Load Wi-Fi Takeover Module                         #   
#           [80] Load PPTP Brute Force Module                       #   
#           [81] Load Routers/Load Balancer Interface               #   
#           [82] Tracert Visual Machine Mapper                      #

ReconCobra You can use ReconCobra for Kali, Parrot OS, Black Arch, Termux, Android Led TV. The software has 82 Options with full automation.

GitHub: https://github.com/haroonawanofficial/ReconCobra

Install ReconCobra:



Kali Installation

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
sudo chmod u+x *.sh
./Kali_Installer.sh

ReconCobra will integrate as system software
Dependencies will be handled automatically
Third-party software(s)/dependencies/modules will be handled automatically


Parrot OS Installation

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
Bash ParrotOS_Installer.sh

ReconCobra will integrate as system software
Dependencies will be handled automatically
Third-party software(s)/dependencies/modules will be handled automatically


Termux Installation

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
pkg install proot
type: termux-chroot
./Termux_Installer.sh
./Termux_fixme.sh
Reboot your Termux
perl ReconCobraTermux.pl

Dependencies will be handled automatically for Termux
Third-party software(s)/dependencies/modules will be handled automatically for Termux


Android Led TV Installation

Install Termux Input USB keyboard

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
pkg install proot
type: termux-chroot
./Termux_Installer.sh
./Termux_fixme.sh
Reboot your Termux
perl ReconCobraTermux.pl

Dependencies will be handled automatically for Termux
Third-party software(s)/dependencies/modules will be handled automatically for Termux


Black Arch Installation

Open issue, if an error occurred

git clone https://github.com/haroonawanofficial/ReconCobra.git
cd Reconcobra
chmod u+x *.sh
./BlackArch_Installer.sh

ReconCobra will integrate as system software
Dependencies will be handled automatically
Third-party software(s)/dependencies/modules will be handled automatically


ReconCobra You can use ReconCobra for Kali, Parrot OS, Black Arch, Termux, Android Led TV. The software has 82 Options with full automation.

IMPORTANT THINGS TO REMEMBER

  • This article was written for educational purposes and pentest only.
  • The author can not be held responsible for damages caused by the use of these resources.
  • You will not misuse the information to gain unauthorized access.
  • This information shall only be used to expand knowledge and not for causing malicious or damaging attacks.
  • Just remember, Performing any hacks without written permission is illegal ..!

Read also the Disclaimer.


Finally

If you have any questions about this article, any feedback, suggestions if you want to share your thoughts, please feel free to do it using the below comment form.

Written by

20   Posts

My name is Jolanda de Koff and on the internet, I'm also known as Bulls Eye. Ethical Hacker, Penetration tester, Researcher, Programmer, Self Learner and forever n00b. Not necessarily in that order. Like to make my own hacking tools and I sometimes share them with you. "You can create art & beauty with a computer and Hacking is not a hobby but a way of life ..." I ♥ open source"
View All Posts

Leave a Reply

Your email address will not be published. Required fields are marked *

Bear
Do NOT follow this link or you will be banned from the site!