Skip to content

NetRecon v4.9 is a modular Python framework for authorized network reconnaissance, featuring dual-mode operation, multi-threaded scanning, service fingerprinting, plugin-based intelligence, and multi-format reporting.

License

Notifications You must be signed in to change notification settings

voltsparx/NetRecon

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

25 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

NetRecon v4.9

NetRecon is a modular reconnaissance framework for authorized security testing, combining guided learning workflows with high-speed automated scanning.

It supports interactive usage for learners and fast flag-based execution for automation and repeatable security assessments.

Author: voltsparx
Contact: voltsparx@gmail.com


βš–οΈ Legal Disclaimer

Use this tool only on systems you own or have explicit written permission to assess.
Unauthorized scanning may violate law and policy. You are responsible for compliant use.


πŸ›‘οΈ Ethical Use Warning

  • NetRecon is for defensive security testing and learning in authorized environments only.
  • Do not scan public or private infrastructure without explicit approval.
  • Do not use findings for exploitation, disruption, or unauthorized access.
  • Always operate within legal scope, written rules of engagement, and local law.

✨ Highlights

  • Interactive mode with guided prompts and metadata banner
  • Argparse mode with compact, industry-familiar scan output
  • Single host, CIDR, and multi-target scanning
  • Hybrid engine stack (threading + parallel + async) for faster execution
  • Timing templates (-T0 to -T5) with adaptive RTT timeout tuning
  • Host grouping scheduler for large target sets
  • Target/port exclusion controls
  • Optional host timeout guardrails for unstable targets
  • Periodic progress ticker for long scans
  • Service probe engine with intensity levels and fallback logic
  • TCP connect scanning with retry, timeout, and jitter controls
  • Optional SYN scan mode (Scapy + elevated privileges)
  • Service fingerprinting and OS inference
  • Plugin-based intelligence and misconfiguration checks
  • CVE hint correlation
  • Report export: CLI, JSON, HTML

🧭 Who Is NetRecon For?

  • πŸŽ“ Security students learning reconnaissance workflows
  • πŸ›‘οΈ Blue teams performing internal audits
  • πŸ§ͺ Researchers building scanning pipelines
  • πŸ§‘β€πŸ« Educators running lab environments

πŸ“¦ Installation

Requirements

  • Python 3.8+
  • scapy (required for SYN scanning)

Install Dependencies

pip install -r requirements.txt

πŸš€ Launch Modes

Interactive Prompt Mode

python netrecon.py

Behavior

  • Clears terminal (Windows + Unix)
  • Displays banner, version, author, and contact
  • Prompts for profile, plugins, and report export

Argparse Fast Mode

python netrecon.py <target> [options]

Behavior

  • Does not clear terminal
  • Displays compact scan header and tabular output
  • Ideal for scripts and automation

πŸ§ͺ Core Commands

python netrecon.py --help
python netrecon.py --about
python netrecon.py --launch-modes
python netrecon.py --list-profiles

πŸ” Scan Examples

Quick scan

python netrecon.py 192.168.1.10 -p quick

Aggressive scan with plugins and reports

python netrecon.py 10.0.0.0/24 -p aggressive --plugins --json --html

Web-focused analysis

python netrecon.py example.com -p web --plugins --html

Stealth / SYN scan

python netrecon.py 192.168.1.10 -p stealth --syn -s

Privileged root scan

python netrecon.py 10.0.0.0/24 -p root --sudo --json --html

⚑ Usage Cheat Sheet

Basic host scan

python netrecon.py 192.168.1.10 -p quick

CIDR range scan

python netrecon.py 192.168.1.0/24 -p aggressive --plugins

Custom ports

python netrecon.py example.com --ports 22,80,443,8443 --plugins

Full export set

python netrecon.py 10.10.10.0/24 -p vuln --plugins --json --html

Scoped/excluded scan

python netrecon.py 10.0.0.0/24 -p aggressive --exclude 10.0.0.1,10.0.0.2 --exclude-ports 23,445

Named output

python netrecon.py 192.168.1.10 -p quick --json --html --save-prefix office_audit

🧰 CLI Options

Option Description
target IP, hostname, CIDR, or comma-separated hosts
-p, --profile quick Β· stealth Β· aggressive Β· web Β· vuln Β· root
-o, --ports Port expression (22,80,443 or 1-1024)
-t, --threads Scanner thread count
-w, --host-workers Concurrent host workers
-g, --host-group-size Hosts per execution group
-k, --plugin-workers Plugin worker threads per host
-a, --async-limit Async enrichment concurrency
-T, --timing-template Timing template (0–5)
-i, --service-intensity Probe intensity (0–9)
-z, --host-timeout Host timeout (seconds)
-A, --stats-every Progress interval
-O, --timeout Socket timeout
-m, --min-rtt-timeout Minimum RTT timeout
-M, --max-rtt-timeout Maximum RTT timeout
-r, --retries Retries per probe
-R, --rate-limit Delay between probes
-q, --exclude-ports Exclude ports
-E, --exclude Exclude targets
-e, --exclude-file Exclude targets from file
-P, --plugins Enable plugins
-j, --json Save JSON report
-H, --html Save HTML report
-f, --save-prefix Custom report prefix
-n, --no-discovery Skip ping discovery
-y, --syn Force SYN mode
-x, --root-scan Require privileged scan
-u, --sudo Relaunch with sudo
-s, --stealth Enable stealth timing
-V, --services Service fingerprinting
-b, --about Show banner
-L, --launch-modes Mode guide
-l, --list-profiles List profiles
-h, --help Show help

πŸ§ͺ Profiles

Profile Purpose
quick Fast top-ports visibility
stealth Lower-noise randomized scan
aggressive Deep recon with plugins and CVE hints
web HTTP/TLS-focused analysis
vuln Vulnerability-oriented recon
root Privileged raw scan requiring admin

Root Profile Notes

  • Linux/macOS: use --sudo
  • Windows: run terminal as Administrator

πŸ”Œ Plugin Set (v4.9)

  • banner_grabber β€” banners, TLS metadata, outdated version hints
  • default_creds β€” default credential exposure risks
  • dir_listing β€” directory listing detection
  • dns_enum β€” DNS enrichment & classification
  • open_proxy β€” proxy exposure checks
  • ssl_info β€” certificate expiry & cipher warnings
  • vuln_headers β€” missing security headers
  • weak_ssh β€” legacy SSH detection
  • whois_lookup β€” registrar & ownership enrichment

πŸ“‚ Output

Reports are saved in:

  • output/cli/
  • output/json/
  • output/html/

Each report includes:

  • target metadata
  • open ports/services
  • risk classification
  • plugin findings
  • CVE hints
  • timing metrics

Use --save-prefix <name> for deterministic filenames.


πŸ—οΈ Architecture Overview

Targets β†’ Scheduler β†’ Scan Engine β†’ Fingerprinting β†’ Plugins β†’ Risk Engine β†’ Reports

βœ… Release Validation (v4.9)

python -B -c "import netrecon; print('import_ok')"
python -B netrecon.py --help
python -B netrecon.py --about
python -B netrecon.py --list-profiles
python -B netrecon.py 127.0.0.1 -p quick -o 80,443 -q 443 -n -A 0.5 -z 2
python -B netrecon.py 127.0.0.1 -p quick --ports 80,443,445 --plugins --json --html

πŸ”’ Security

See SECURITY.md for responsible disclosure policy.


🀝 Code of Conduct

See CODE_OF_CONDUCT.md.


πŸ“œ License

MIT License. See LICENSE.

About

NetRecon v4.9 is a modular Python framework for authorized network reconnaissance, featuring dual-mode operation, multi-threaded scanning, service fingerprinting, plugin-based intelligence, and multi-format reporting.

Topics

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors 2

  •  
  •  

Languages