Skip to content
This repository has been archived by the owner on Oct 10, 2023. It is now read-only.

Latest commit

 

History

History
107 lines (97 loc) · 3.69 KB

README.md

File metadata and controls

107 lines (97 loc) · 3.69 KB

recon.cloud

InstallationUsageTodoContribute

recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to terminal.


⚠️ NOTE: This tool will not work anymore because of cloudflare bot protection. Wait for some months till recon.cloud develope a proper API for us to use.

subfinder

⚙ Installation

recon.cloud requires go1.19 to install successfully. Run the following command to get the repo -

go install github.com/Devang-Solanki/recon.cloud@latest

or you can download the pre-built binary from releases page

📔 Usage

recon.cloud -h will print help menu

❯ recon.cloud -h
Usage of ./recon.cloud:
  -d string
        Only Domain
  -l string
        List of file containing Domains
  -o string
        Path of output file (default "none")
  -only-ip
        Get IPs instead of Domains

You can pass single domain with flag -d

❯ recon.cloud -d wikipedia.com
wikipediademo.userlane.com.s3.amazonaws.com
wikipedia.s3.amazonaws.com
wikipedia-links.s3.amazonaws.com
wikipedia-test-data.s3.amazonaws.com
wikipedia.austinshaf.org.s3-website-us-east-1.amazonaws.com

You can also pass domain via stdin

echo "hackerone.com" | recon.cloud 
resources.hackerone.com
test-hackerone-vpn-service.s3.amazonaws.com
git.hackerone-us-west-2-production-attachments.s3.amazonaws.com
hackerone-vpn-service.s3.amazonaws.com
gslink.hackerone.com

❯ cat targets.txt | recon.cloud

With -only-ip you can get IP

echo "hackerone.com" | recon.cloud -only-ip
3.98.63.202
52.60.160.16
52.60.165.183
52.218.209.82
52.92.181.81
52.218.235.67
52.92.128.209
52.92.209.49
52.84.125.62
52.84.125.13
52.84.125.129
52.84.125.74

With -l flag you can pass a list of files containing domains

recon.cloud -l targets.txt

With -o flag you can save output to a file

recon.cloud -d hackerone.com -o result.txt

🤝🏻 How to contribute:

If you want to contribute to this project then:

  • Submitting an issue because you have found a bug or you have any suggestion or request.

💡 TODO

☑️ Implemented everything in GO.

  • Using multiple threads for better speed
  • Option for output in different format eg: JSON, CSV etc
  • Option for filtering based on resources like s3, ec2 etc

Buy Me A Coffee