A command-line interface for PrettyRecon, a web-based reconnaissance and security scanning platform.
- Subdomain Enumeration: Comprehensive subdomain discovery
- DNS Information: Detailed DNS record analysis
- Port Scanning: Service and port identification
- Wayback URLs: Historical URL discovery
- Vulnerability Assessment: Security misconfiguration detection
- Secrets Detection: Exposed credentials and sensitive information scanning
- Custom Subdomain Scanning: Support for bulk scanning with custom target lists
- Pagination Support: Efficiently handle large datasets with automatic pagination
- Interrupt Handling: Use Ctrl+C to gracefully stop scans and save partial results
- Job Management: Monitor and control running scan tasks
- Rescan Capability: Ability to retrigger specific scan types
- Batch Processing: Handle up to 300 targets per batch in custom scans
- Clone the repository:
git clone https://github.com/yourusername/prettyrecon-cli.git
cd prettyrecon-cli- Install dependencies:
pip install -r requirements.txt- Set up environment variables:
Create a
.envfile in the project root:
PRETTYRECON_EMAIL=your_email
PRETTYRECON_PASSWORD=your_password
- Full Reconnaissance Scan:
python main.py -t example.com -st all -oPerforms complete scanning including subdomains, DNS, ports, URLs, and vulnerabilities.
- Basic Scan:
python main.py -t example.com -st basic -oPerforms basic reconnaissance including subdomains, DNS records, ports, and wayback URLs.
- Vulnerability-focused Scan:
python main.py -t example.com -st vuln -oFocuses on security aspects including vulnerabilities, exposed secrets, and CVEs.
- Subdomain-only Scan:
python main.py -t example.com -st sub -oPerforms only subdomain enumeration.
- Custom Subdomain Scan:
python main.py -cscn targets.txtProcess multiple targets from a file (up to 300 per batch).
- Retrigger Specific Scan:
python main.py -t example.com -st vuln -rRestart a specific type of scan.
-t, --target: Target domain to scan (e.g., example.com)-st, --scan_type: Scan type (all/basic/vuln/sub)-o, --output: Save results to JSON files-cscn, --customsubscan: File containing targets for custom subdomain scan-r, --rescan: Retrigger scans for the specified type
When using the -o flag, results are saved in the output/<target> directory:
subdomains.json: Discovered subdomainsdnsinfo.json: DNS records and informationports.json: Open ports and serviceswaybackurls.json: Historical URLscommon_vulns.json: Common vulnerabilitiesexposed_creds.json: Exposed credentials/secretscves.json: Identified CVEs
The tool implements comprehensive error handling for:
- Network connectivity issues
- Authentication failures
- Invalid input validation
- File operation errors
- API response errors
- Session management
- CSRF token handling
- Fork the repository
- Create a feature branch
- Commit your changes
- Push to the branch
- Create a Pull Request
For support, please open an issue in the GitHub repository.
Use this tool responsibly and only on systems you have permission to test. The authors are not responsible for any misuse or damage.