reconftw
MIT๐ธ Web Scanning ยท Shell
reconftw is an automated reconnaissance pipeline that chains together best-of-breed security tools into a comprehensive, single-command recon workflow. Running reconftw against a target domain triggers a full pipeline: subdomain enumeration, DNS resolution, port scanning, web probing, screenshot capture, technology fingerprinting, URL collection, parameter extraction, JavaScript analysis, vulnerability scanning, and nuclei template execution. The tool installs and manages all its dependencies automatically, making it one of the easiest ways to get a professional recon pipeline running. Configuration is done through a single profile file where you can enable/disable specific modules and set scope boundaries. reconftw outputs organized results in a structured directory format with separate files for each recon stage. With over 7,000 GitHub stars, it is one of the most popular recon automation frameworks in the bug bounty community.
Use Cases
- Full-stack automated recon from a single command
- Bug bounty target enumeration
- Chaining multiple recon tools into one pipeline
Tags
Details
- Category
- ๐ธ Web Scanning
- Language
- Shell
- Repository
- six2dez/reconftw
- License
- MIT
- Platforms
- ๐งlinux๐macos
Links
Community Reviews
Alternatives & Comparisons
More in Web Scanning
httpx
GoFast multi-purpose HTTP toolkit. Probes for running HTTP servers with retries and fallbacks.
Nikto
PerlClassic web server scanner. Tests for dangerous files, outdated server software, and version-specific problems.
Gobuster
GoDirectory/file, DNS, and vhost busting tool. Brute-forces URIs, DNS subdomains, virtual host names, and S3 buckets.
Feroxbuster
RustFast, recursive content discovery tool written in Rust. Like gobuster on steroids with auto-recursion.
Burp Suite Community
JavaWeb vulnerability scanner and proxy. Intercept, modify, and replay HTTP/S traffic for web app testing.
ffuf
GoFast web fuzzer written in Go. Fuzz anything - URLs, headers, POST data - with blazing speed.