Raccoon: reconnaissance and vulnerability scanning
Raccoon
Raccoon is a tool made for reconnaissance and information gathering with an emphasis on simplicity.
It will do everything from fetching DNS records, retrieving WHOIS information, obtaining TLS data, detecting WAF presence and up to threaded dir busting and subdomain enumeration. Every scan outputs to a corresponding file.
As most of Raccoon’s scans are independent and do not rely on each other’s results, it utilizes Python’s asyncio to run most scans asynchronously.
Raccoon supports Tor/proxy for anonymous routing. It uses default wordlists (for URL fuzzing and subdomain discovery) from the amazing SecLists repository but different lists can be passed as arguments.
Features
- DNS details
- DNS visual mapping using DNS dumpster
- WHOIS information
- TLS Data – supported ciphers, TLS versions, certificate details and SANs
- Port Scan
- Services and scripts scan
- URL fuzzing and directory detection
- Subdomain enumeration – uses Google Dorking, bruteforce and SAN discovery
- Web application data (CMS, Web Server info, robots & sitemap extraction)
- Detects known WAFs
- Supports anonymous routing through Tor/Proxies
- Uses asyncio for improved performance
- Saves output to files – separates targets by folders and modules by files
Installation
pip install raccoon-scanner
Usage
Copyright (c) 2018 Evyatar Meged
Source: https://github.com/evyatarmeged/