recon-ng
Web reconnaissance and OSINT framework
TLDR
Start recon-ng interactive console
SYNOPSIS
recon-ng [-w workspace] [-r resource] [--no-analytics]
DESCRIPTION
recon-ng is a modular reconnaissance framework for gathering open-source intelligence (OSINT). Designed with a Metasploit-like interface, it provides a familiar workflow for security professionals conducting the information-gathering phase of assessments.
The framework uses workspaces to organize reconnaissance projects, with each workspace maintaining its own database of collected data (domains, hosts, contacts, credentials, etc.). Modules can query this data and add new findings, building comprehensive intelligence profiles.
Modules cover various reconnaissance categories: discovery (subdomain enumeration, port scanning), recon (WHOIS, DNS records, social media), import (data ingestion), and reporting (HTML, JSON, Excel exports). Many modules integrate with external APIs (Shodan, VirusTotal, HaveIBeenPwned) requiring API keys.
PARAMETERS
-w workspace
Create or load the specified workspace-r resource
Execute resource file (automation script)--no-analytics
Disable anonymous usage tracking--no-check
Disable version check at startup-h, --help
Display help message
CONFIGURATION
~/.recon-ng/workspaces/
Workspace directories containing per-project SQLite databases with collected hosts, contacts, domains, and credentials.keys add name value
API keys for external services (Shodan, VirusTotal, HaveIBeenPwned, etc.) stored in the workspace database and required by many modules.
CONSOLE COMMANDS
workspaces list
List available workspacesworkspaces create name
Create a new workspacemarketplace search [term]
Search available modules in marketplacemarketplace install module
Install a module from marketplacemodules load module
Load an installed moduleoptions set option value
Set module optionoptions list
Display current module optionsrun
Execute the loaded moduleshow table
Display data from database tables (hosts, contacts, domains, etc.)keys add name value
Add API key for external serviceskeys list
List configured API keys
CAVEATS
Authorization required: Only perform reconnaissance against targets you have permission to assess. Unauthorized reconnaissance may violate laws and terms of service.
Many powerful modules require API keys from external services. Configure keys with keys add before using those modules. Some services have rate limits or require paid subscriptions.
The marketplace must be accessed to install modules beyond the base set. Ensure network connectivity for marketplace operations.
Module results vary in accuracy. Cross-reference findings from multiple sources and validate critical information manually.
HISTORY
Recon-ng was developed by Tim Tomes while working at Black Hills Information Security. First released around 2012, it was designed to bring the modular, database-driven approach of Metasploit to the reconnaissance phase. The framework is written in Python and continues active development with community-contributed modules.
SEE ALSO
maltego(1), theharvester(1), amass(1), nmap(1)
