ReconX — Domain Reconnaissance Spyglass

Cyber Recon • Subdomains • SSL • Ports • Reporting

ReconX is a powerful command‑line domain reconnaissance toolkit designed for cybersecurity researchers, penetration testers, and network administrators. It performs layered intelligence gathering including DNS, SSL certificate harvesting, TCP port scanning, brute‑force subdomain discovery, and automated HTML/text report generation.

Version Information

Version: 2.1.0
Author: K0NxT3D
Website: seaverns.com

Core Features

🔥 Subdomain Enumeration

  • Built‑in list of 20+ common subdomains
  • Wordlist‑based brute force discovery
  • Fast threaded resolver
  • Automatic duplicate removal
  • Graceful handling of NXDOMAIN and timeouts

🔒 SSL Certificate Retrieval

  • Retrieves Subject / Issuer
  • Validity Dates (NotBefore / NotAfter)
  • ISO‑8601 timestamp support
  • Handles expired or invalid certificates

🔍 TCP Port Scanning

Default scanned ports:

  • 21, 22, 23, 25, 53, 80, 110, 143
  • 443, 587, 3306, 8080

📝 Report Generation

  • Plain‑text reports (timestamped)
  • Dark‑themed HTML reports
  • Subdomain lists
  • Brute‑force discoveries
  • SSL certificate details
  • Open ports

📦 Batch Scanning

  • Scan multiple domains from a file
  • Batch + brute mode supported
  • Fully automated with timestamps

Requirements

  • Python 3.12+ (tested on Ubuntu 24 & Raspberry Pi)

Required Python Packages

  • dnspython ≥ 2.6.1
  • termcolor ≥ 2.4.0
  • colorama ≥ 0.4.6
  • requests ≥ 2.32.3
  • beautifulsoup4 ≥ 4.12.3
  • html5lib ≥ 1.1

Optional Enhancements

  • tqdm ≥ 4.66.4
  • rich ≥ 13.7.1
  • Jinja2 ≥ 3.1.4

Installation

git clone https://github.com/your-repo/ReconX.git
cd ReconX

python3 -m venv venv
source venv/bin/activate

pip install -r requirements.txt
python3 ReconX.py

Usage

1) Single Domain Quick Scan

python3 ReconX.py
> 1
> example.com

2) Single Domain + Brute Force

python3 ReconX.py
> 2
> example.com
> /path/to/wordlist.txt

3) Multi‑Domain Batch Scan

python3 ReconX.py
> 3
> domains.txt

4) Batch + Brute Mode

python3 ReconX.py
> 4
> domains.txt
> wordlist.txt

Report Output Location

  • ./reconx_reports/
  • Text: reconx_domain_YYYYMMDD_HHMMSS.txt
  • HTML: reconx_domain_YYYYMMDD_HHMMSS.html

Advanced Notes

DNS Resolver Patching

On Ubuntu 24+, local system DNS can misbehave. ReconX defaults to:

  • 8.8.8.8 (Google)
  • 1.1.1.1 (Cloudflare)
  • 9.9.9.9 (Quad9)

Multi‑Thread Settings

Configurable in the source:

  • SUBDOMAIN_THREADS
  • PORT_THREADS
  • BRUTE_THREADS

Raspberry Pi Notes

No need for sudo unless scanning ports < 1024.

Disclaimer

ReconX is intended for authorized penetration testing, research, and educational use only. Scanning systems without permission may be illegal. Use responsibly.

MIT License

Copyright (c) 2025 Rob Seaverns

Permission is hereby granted, free of charge, to any person obtaining a copy
of this software and associated documentation files (the “Software”), to deal
in the Software without restriction, including without limitation the rights  
to use, copy, modify, merge, publish, distribute, sublicense, and/or sell  
copies of the Software, and to permit persons to whom the Software is  
furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in  
all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR  
IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,  
FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE  
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER  
LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING  
FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER  
DEALINGS IN THE SOFTWARE.

Metadata

Status: Active

Python: 3.12+

Platform: Linux / Raspberry Pi

License: Private

Visit Project Page Download   Source

Tags

DNS Recon SSL Linux Raspberry Pi Cybersecurity