autorecon
Automate reconnaissance and enumeration of systems
TLDR
Perform reconnaissance on target host(s) (detailed scan results will be dumped in results)
Perform reconnaissance on target(s) from a file
Output results to a different directory
Limit scanning to specific ports and protocols (T for TCP, U for UDP, B for both)
SYNOPSIS
autorecon [-h] [-v] [-o OUTPUTDIR] [-t THREADS] [-r] [-d] [-w] [-n NMAPOPTS] [-s] [-e] [-p PORTS] [-P] [-N] [-T] [-D] [-db DBFILE] TARGET(S)
PARAMETERS
-h, --help
Show help message and exit
-v, --verbose
Increase verbosity (repeatable for more detail)
-o OUTPUTDIR, --outputdir OUTPUTDIR
Set output directory (default: autorecon)
-t THREADS, --threads THREADS
Number of concurrent threads (default: 10)
-r, --recon
Run basic reconnaissance (default)
-d, --detailed
Enable detailed scans (longer runtime)
-w, --web
Run web application scans (default)
-n NMAPOPTS, --nmapopts NMAPOPTS
Additional Nmap scan options
-s, --scripts
Run Nmap NSE scripts (default)
-e, --enum
Run service enumeration modules
-p PORTS, --ports PORTS
Ports to scan (default: top 1000)
-P, --ping
Enable ping scan first (default)
-N, --no-ping
Skip ping scan
-T, --top-ports
Scan top 1000 ports first (default)
-D, --deep
Perform deep scans (very long)
-db DBFILE, --database DBFILE
SQLite database file for tracking
--version
Show version and exit
DESCRIPTION
AutoRecon is a Bash script designed for multi-threaded, automated information gathering during network reconnaissance phases of penetration tests. It identifies open TCP ports via Nmap scans, then launches targeted tools against those services based on port numbers and banners. Supported tools include Nikto, Dirb, Snmpcheck, Enum4linux, DNSenum, and more, categorized into recon, web, and enumeration modules.
Key features: customizable threads for speed, verbose logging, SQLite database for scan tracking, optional detailed/deep scans, and support for custom Nmap options. It organizes output hierarchically by IP and port, making results easy to navigate. AutoRecon prioritizes common ports (top 1000 by default) and skips ping scans if desired.
Ideal for pentesters automating initial recon on large networks, it reduces manual effort while providing structured reports. Requires tools like Nmap pre-installed; runs best as root for raw socket access. Not for production use due to aggressive scanning.
CAVEATS
Requires root for full Nmap features; generates heavy network traffic; ensure legal authorization before use. Not all tools auto-installed—manual setup needed. High thread counts may overwhelm targets.
INSTALLATION
Clone from GitHub: git clone https://github.com/Tib3rius/AutoRecon. Run chmod +x autorecon; install dependencies via pip or apt (e.g., nmap, nikto).
EXAMPLE USAGE
./autorecon -v -t 5 -o /tmp/recon 192.168.1.0/24
Scans subnet with 5 threads, verbose output to /tmp/recon.
HISTORY
Developed by TiberiusSaiyan in 2019 as open-source GitHub project. Evolved from manual recon scripts; v2+ added database support, modularity. Widely used in Kali Linux pentesting workflows.
SEE ALSO
nmap(1), nikto(1), dirb(1), snmpcheck(1), enum4linux(1)


