LinuxCommandLibrary

autorecon

Automated multi-threaded network reconnaissance

TLDR

Scan target host

$ sudo autorecon 192.168.1.1
copy
Scan from file
$ sudo autorecon -t targets.txt
copy
Specify output directory
$ sudo autorecon -o /path/to/results 192.168.1.1
copy
Scan specific ports
$ sudo autorecon -p T:21-25,80,443,U:53 192.168.1.1
copy

SYNOPSIS

autorecon [OPTIONS] targets

DESCRIPTION

autorecon is a multi-threaded network reconnaissance tool that performs automated enumeration of services. It runs various scanning tools in parallel and organizes results by host and service type.
The tool first performs port scanning using nmap, then launches service-specific enumeration scripts based on detected open ports. Results are organized into per-target directories with structured output for each scanning phase. It supports custom scan profiles and plugin-based service enumeration, making it extensible for different penetration testing methodologies.

PARAMETERS

-t, --target-file file

Read targets from file
-o, --output dir
Output results to specified directory
-p, --ports ports
Limit scanning to specific ports (T: TCP, U: UDP, B: both)
--single-target
Only scan a single target at a time
-v, --verbose
Enable verbose output
--heartbeat
Show periodic status updates

CONFIGURATION

~/.config/AutoRecon/

Directory for custom scan profiles and plugin configurations.

CAVEATS

Requires root privileges for certain scan types. Results are saved to a results directory organized by target. This tool should only be used on systems you have authorization to scan.

HISTORY

autorecon was created for penetration testing and CTF competitions to automate initial reconnaissance.

SEE ALSO

nmap(1), nikto(1)

> TERMINAL_GEAR

Curated for the Linux community

Copied to clipboard

> TERMINAL_GEAR

Curated for the Linux community