ReNgine is a very complete recon tool that can be very helpful to centralize all your recon in one site. Its main website defines it as: «The only web application recon tool you will ever need!« Currently is capable of performing: Subdomain Discovery Vulnerability Detection IPs and Open Ports Identification Directory and files fuzzing Screenshot Gathering Endpoints Gathering OSINT Although reNgine can be installed in a local machine, it is
tools
Script to update go version
Although Go installation it’s a pretty straight-forward process, it can be done even easier if a script is used to install and update your golang installation. We are going to use update-golang script. $ go version $ git clone https://github.com/udhos/update-golang.git $ sudo ./update-golang.sh $ go version To finish the setup, the shell PATH should be updated. The path ‘/usr/local/go/bin’ is added to PATH using ‘/etc/profile.d/golang_path.sh’. Only if needed, GOROOT is
FinalRecon (web reconnaissance tool)
As it is described in its website: FinalRecon is an automatic web reconnaissance tool written in python. Goal of FinalRecon is to provide an overview of the target in a short amount of time while maintaining the accuracy of results. Instead of executing several tools one after another it can provide similar results keeping dependencies small and simple. https://github.com/cbk914/finalrecon Installation $ sudo apt install finalrecon Usage $ finalrecon.py <arguments> url
Ngrok: External connectivity for your PoCs
Ngrok is an application that helps you to give a way to access your local service from the Internet. It can be a useful tool to test your PoCs. This app has a free tier for your projects with non-commercial use. Installation and configuration https://ngrok.com/docs/getting-started Signup into Ngrok and download the app. It is a portable app, so you just have to download the file and run it. No dependencies
Share files with your VM without sharing a folder
When you use a VM, it is often needed to transfer files from the host to the VM and vice-versa. One of the usual options for that is a shared folder that needs previously to be configured. Sometimes happens that you can have an issue with this configuration and it is not possible to do it as easy as it should be. Here is when Magic Wormhole comes to the
Find listening network ports
Hi, To obtain a list of all the open ports of your system and which are the associated applications to them just execute command: netstat -tulp ip or nmap -sT -O ip 9 may 2022 update: As @rogierm points out, netstat is obsolete and its replacement is ss. Then the equivalent command to with ss would be: $ sudo ss -tulp You can read more about this topic here: difference between