josh1643/totalrecon
A lightweight Python tool for passive reconnaissance, including subdomain, email, and S3 bucket extraction, with AI-powered scanner for sensitive infrastructure mentions.
This tool helps cybersecurity professionals quickly find critical information hidden within text and PDF documents during passive reconnaissance. It takes in various files and outputs extracted subdomains, email addresses, and AWS S3 bucket names, along with AI-generated summaries of potentially sensitive infrastructure mentions. This is ideal for red teamers, bug bounty hunters, CTF players, and cyber analysts.
No commits in the last 6 months. Available on PyPI.
Use this if you need to rapidly scan text or PDF files for cyber intelligence like exposed subdomains, emails, and S3 buckets, and want AI assistance in summarizing key findings.
Not ideal if you require 100% guaranteed accuracy without human review, as the AI component may occasionally produce inaccuracies.
Stars
8
Forks
—
Language
Python
License
MIT
Category
Last pushed
Apr 27, 2025
Commits (30d)
0
Dependencies
4
Get this data via API
curl "https://pt-edge.onrender.com/api/v1/quality/ml-frameworks/josh1643/totalrecon"
Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.
Higher-rated alternatives
nmap/nmap
Nmap - the Network Mapper. Github mirror of official SVN repository.
e-m-b-a/emba
EMBA - The firmware security analyzer
ait-testbed/attackbed
The AttackBed is a simulated enterprise network with numerous vulnerabilities. Attacks in this...
ritesh-gupta-git/AI-Powered-Vulnerability-Management
AI-VMF: AI-Powered Vulnerability Management Framework demo (ensemble exploit prediction + risk scoring)
scorpiondefense/cyberweapons
Automated Cyber Offense